| 51 |
The Value of Collaboration in Convex Machine Learning with Differential Privacy
Nan Wu, Farhad Farokhi, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
109 |
6 years ago |
| 52 |
Hardware-Software Contracts for Secure Speculation
Marco Guarnieri, Boris Köpf, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
106 |
5 years ago |
| 53 |
An Analysis of Pre-installed Android Software
Julien Gamba, Mohammed Rashed, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
103 |
6 years ago |
| 54 |
Kairos: Practical Intrusion Detection and Investigation using Whole-system Provenance
Zijun Cheng, Qiujian Lv, ... (+5 more)
|
👻
Ghosted
|
cs.CR
|
101 |
2 years ago |
| 55 |
Ebb-and-Flow Protocols: A Resolution of the Availability-Finality Dilemma
Joachim Neu, Ertem Nusret Tas, David Tse
|
👻
Ghosted
|
cs.CR
|
100 |
5 years ago |
| 56 |
SoK: All You Ever Wanted to Know About x86/x64 Binary Disassembly But Were Afraid to Ask
Chengbin Pang, Ruotong Yu, ... (+5 more)
|
👻
Ghosted
|
cs.CR
|
95 |
5 years ago |
| 57 |
ICLab: A Global, Longitudinal Internet Censorship Measurement Platform
Arian Akhavan Niaki, Shinyoung Cho, ... (+5 more)
|
👻
Ghosted
|
cs.CR
|
94 |
6 years ago |
| 58 |
Improving Password Guessing via Representation Learning
Dario Pasquini, Ankit Gangwal, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
92 |
6 years ago |
| 59 |
Nightshade: Prompt-Specific Poisoning Attacks on Text-to-Image Generative Models
Shawn Shan, Wenxin Ding, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
88 |
2 years ago |
| 60 |
Flamingo: Multi-Round Single-Server Secure Aggregation with Applications to Private Federated Learning
Yiping Ma, Jess Woods, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
88 |
2 years ago |
| 61 |
MAD-HTLC: Because HTLC is Crazy-Cheap to Attack
Itay Tsabary, Matan Yechieli, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
86 |
5 years ago |
| 62 |
OAT: Attesting Operation Integrity of Embedded Devices
Zhichuang Sun, Bo Feng, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
82 |
8 years ago |
| 63 |
On the Economics of Offline Password Cracking
Jeremiah Blocki, Ben Harsha, Samson Zhou
|
👻
Ghosted
|
cs.CR
|
79 |
5 years ago |
| 64 |
Security of GPS/INS based On-road Location Tracking Systems
Sashank Narain, Aanjhan Ranganathan, Guevara Noubir
|
👻
Ghosted
|
cs.CR
|
79 |
7 years ago |
| 65 |
DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis
Alejandro Mera, Bo Feng, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
78 |
5 years ago |
| 66 |
On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud (Extended Version)
William C. Garrison, Adam Shull, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
75 |
10 years ago |
| 67 |
SPECCFI: Mitigating Spectre Attacks using CFI Informed Speculation
Esmaeil Mohammadian Koruyeh, Shirin Haji Amin Shirazi, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
73 |
6 years ago |
| 68 |
Effective Seed Scheduling for Fuzzing with Graph Centrality Analysis
Dongdong She, Abhishek Shah, Suman Jana
|
👻
Ghosted
|
cs.CR
|
73 |
4 years ago |
| 69 |
SEVurity: No Security Without Integrity -- Breaking Integrity-Free Memory Encryption with Minimal Assumptions
Luca Wilke, Jan Wichelmann, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
72 |
6 years ago |
| 70 |
Binsec/Rel: Efficient Relational Symbolic Execution for Constant-Time at Binary-Level
Lesly-Ann Daniel, Sébastien Bardin, Tamara Rezk
|
👻
Ghosted
|
cs.CR
|
72 |
6 years ago |
| 71 |
Deepfake Text Detection: Limitations and Opportunities
Jiameng Pu, Zain Sarwar, ... (+6 more)
|
👻
Ghosted
|
cs.CR
|
72 |
3 years ago |
| 72 |
Towards Effective Differential Privacy Communication for Users' Data Sharing Decision and Comprehension
Aiping Xiong, Tianhao Wang, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
71 |
6 years ago |
| 73 |
The Last Mile: High-Assurance and High-Speed Cryptographic Implementations
José Bacelar Almeida, Manuel Barbosa, ... (+6 more)
|
👻
Ghosted
|
cs.CR
|
67 |
7 years ago |
| 74 |
MM-BD: Post-Training Detection of Backdoor Attacks with Arbitrary Backdoor Pattern Types Using a Maximum Margin Statistic
Hang Wang, Zhen Xiang, ... (+2 more)
|
👻
Ghosted
|
cs.LG
|
67 |
3 years ago |
| 75 |
You Only Prompt Once: On the Capabilities of Prompt Learning on Large Language Models to Tackle Toxic Content
Xinlei He, Savvas Zannettou, ... (+2 more)
|
👻
Ghosted
|
cs.CL
|
66 |
2 years ago |
| 76 |
The EMV Standard: Break, Fix, Verify
David Basin, Ralf Sasse, Jorge Toro-Pozo
|
👻
Ghosted
|
cs.CR
|
65 |
5 years ago |
| 77 |
Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks! But We Can Fix It
Wei Song, Boya Li, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
64 |
5 years ago |
| 78 |
This PIN Can Be Easily Guessed: Analyzing the Security of Smartphone Unlock PINs
Philipp Markert, Daniel V. Bailey, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
64 |
6 years ago |
| 79 |
Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels
Daniel Genkin, Mihir Pattani, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
62 |
7 years ago |
| 80 |
SoK: Let the Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine Learning
Ahmed Salem, Giovanni Cherubin, ... (+6 more)
|
👻
Ghosted
|
cs.LG
|
59 |
3 years ago |
| 81 |
AccEar: Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary
Pengfei Hu, Hui Zhuang, ... (+5 more)
|
👻
Ghosted
|
cs.SD
|
59 |
3 years ago |
| 82 |
EmPoWeb: Empowering Web Applications with Browser Extensions
Dolière Francis Somé
|
👻
Ghosted
|
cs.CR
|
58 |
7 years ago |
| 83 |
Talos: Neutralizing Vulnerabilities with Security Workarounds for Rapid Response
Zhen Huang, Mariana D'Angelo, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
58 |
8 years ago |
| 84 |
SoK: Watermarking for AI-Generated Content
Xuandong Zhao, Sam Gunn, ... (+12 more)
|
👻
Ghosted
|
cs.CR
|
57 |
1 year ago |
| 85 |
SoK: Privacy-Preserving Data Synthesis
Yuzheng Hu, Fan Wu, ... (+8 more)
|
👻
Ghosted
|
cs.CR
|
57 |
2 years ago |
| 86 |
LOKI: Large-scale Data Reconstruction Attack against Federated Learning through Model Manipulation
Joshua C. Zhao, Atul Sharma, ... (+4 more)
|
👻
Ghosted
|
cs.LG
|
57 |
3 years ago |
| 87 |
Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks
Yixin Sun, Anne Edmundson, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
56 |
9 years ago |
| 88 |
Learn What You Want to Unlearn: Unlearning Inversion Attacks against Machine Unlearning
Hongsheng Hu, Shuo Wang, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
55 |
2 years ago |
| 89 |
Fidelius: Protecting User Secrets from Compromised Browsers
Saba Eskandarian, Jonathan Cogan, ... (+12 more)
|
👻
Ghosted
|
cs.CR
|
54 |
7 years ago |
| 90 |
SoK: Prudent Evaluation Practices for Fuzzing
Moritz Schloegel, Nils Bars, ... (+8 more)
|
👻
Ghosted
|
cs.SE
|
54 |
1 year ago |
| 91 |
Neutaint: Efficient Dynamic Taint Analysis with Neural Networks
Dongdong She, Yizheng Chen, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
53 |
6 years ago |
| 92 |
Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification Documents
Maria Leonor Pacheco, Max von Hippel, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
52 |
4 years ago |
| 93 |
"Should I Worry?" A Cross-Cultural Examination of Account Security Incident Response
Elissa M. Redmiles
|
👻
Ghosted
|
cs.CR
|
51 |
7 years ago |
| 94 |
CRYLOGGER: Detecting Crypto Misuses Dynamically
Luca Piccolboni, Giuseppe Di Guglielmo, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
50 |
5 years ago |
| 95 |
Bitcoin vs. Bitcoin Cash: Coexistence or Downfall of Bitcoin Cash?
Yujin Kwon, Hyoungshick Kim, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
50 |
7 years ago |
| 96 |
Verifying and Synthesizing Constant-Resource Implementations with Types
Van Chan Ngo, Mario Dehesa-Azuara, ... (+2 more)
|
👻
Ghosted
|
cs.PL
|
50 |
8 years ago |
| 97 |
A Machine Learning Approach To Prevent Malicious Calls Over Telephony Networks
Huichen Li, Xiaojun Xu, ... (+7 more)
|
👻
Ghosted
|
cs.CR
|
48 |
8 years ago |
| 98 |
No Privacy Left Outside: On the (In-)Security of TEE-Shielded DNN Partition for On-Device ML
Ziqi Zhang, Chen Gong, ... (+6 more)
|
👻
Ghosted
|
cs.CR
|
47 |
2 years ago |
| 99 |
Measure-Observe-Remeasure: An Interactive Paradigm for Differentially-Private Exploratory Analysis
Priyanka Nanayakkara, Hyeok Kim, ... (+5 more)
|
👻
Ghosted
|
cs.CR
|
45 |
1 year ago |
| 100 |
Bounded and Unbiased Composite Differential Privacy
Kai Zhang, Yanjun Zhang, ... (+6 more)
|
👻
Ghosted
|
cs.CR
|
44 |
2 years ago |