💀 The Wall of Shame

The most cited papers with no code. Sorted by the weight of their sins.

Page 2, showing 50 papers

# Paper Cause of Death Category Citations Published
51 The Value of Collaboration in Convex Machine Learning with Differential Privacy
Nan Wu, Farhad Farokhi, ... (+2 more)
👻 Ghosted cs.CR 109 6 years ago
52 Hardware-Software Contracts for Secure Speculation
Marco Guarnieri, Boris Köpf, ... (+2 more)
👻 Ghosted cs.CR 106 5 years ago
53 An Analysis of Pre-installed Android Software
Julien Gamba, Mohammed Rashed, ... (+3 more)
👻 Ghosted cs.CR 103 6 years ago
54 Kairos: Practical Intrusion Detection and Investigation using Whole-system Provenance
Zijun Cheng, Qiujian Lv, ... (+5 more)
👻 Ghosted cs.CR 101 2 years ago
55 Ebb-and-Flow Protocols: A Resolution of the Availability-Finality Dilemma
Joachim Neu, Ertem Nusret Tas, David Tse
👻 Ghosted cs.CR 100 5 years ago
56 SoK: All You Ever Wanted to Know About x86/x64 Binary Disassembly But Were Afraid to Ask
Chengbin Pang, Ruotong Yu, ... (+5 more)
👻 Ghosted cs.CR 95 5 years ago
57 ICLab: A Global, Longitudinal Internet Censorship Measurement Platform
Arian Akhavan Niaki, Shinyoung Cho, ... (+5 more)
👻 Ghosted cs.CR 94 6 years ago
58 Improving Password Guessing via Representation Learning
Dario Pasquini, Ankit Gangwal, ... (+3 more)
👻 Ghosted cs.CR 92 6 years ago
59 Nightshade: Prompt-Specific Poisoning Attacks on Text-to-Image Generative Models
Shawn Shan, Wenxin Ding, ... (+4 more)
👻 Ghosted cs.CR 88 2 years ago
60 Flamingo: Multi-Round Single-Server Secure Aggregation with Applications to Private Federated Learning
Yiping Ma, Jess Woods, ... (+3 more)
👻 Ghosted cs.CR 88 2 years ago
61 MAD-HTLC: Because HTLC is Crazy-Cheap to Attack
Itay Tsabary, Matan Yechieli, ... (+2 more)
👻 Ghosted cs.CR 86 5 years ago
62 OAT: Attesting Operation Integrity of Embedded Devices
Zhichuang Sun, Bo Feng, ... (+2 more)
👻 Ghosted cs.CR 82 8 years ago
63 On the Economics of Offline Password Cracking
Jeremiah Blocki, Ben Harsha, Samson Zhou
👻 Ghosted cs.CR 79 5 years ago
64 Security of GPS/INS based On-road Location Tracking Systems
Sashank Narain, Aanjhan Ranganathan, Guevara Noubir
👻 Ghosted cs.CR 79 7 years ago
65 DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis
Alejandro Mera, Bo Feng, ... (+2 more)
👻 Ghosted cs.CR 78 5 years ago
66 On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud (Extended Version)
William C. Garrison, Adam Shull, ... (+2 more)
👻 Ghosted cs.CR 75 10 years ago
67 SPECCFI: Mitigating Spectre Attacks using CFI Informed Speculation
Esmaeil Mohammadian Koruyeh, Shirin Haji Amin Shirazi, ... (+3 more)
👻 Ghosted cs.CR 73 6 years ago
68 Effective Seed Scheduling for Fuzzing with Graph Centrality Analysis
Dongdong She, Abhishek Shah, Suman Jana
👻 Ghosted cs.CR 73 4 years ago
69 SEVurity: No Security Without Integrity -- Breaking Integrity-Free Memory Encryption with Minimal Assumptions
Luca Wilke, Jan Wichelmann, ... (+2 more)
👻 Ghosted cs.CR 72 6 years ago
70 Binsec/Rel: Efficient Relational Symbolic Execution for Constant-Time at Binary-Level
Lesly-Ann Daniel, Sébastien Bardin, Tamara Rezk
👻 Ghosted cs.CR 72 6 years ago
71 Deepfake Text Detection: Limitations and Opportunities
Jiameng Pu, Zain Sarwar, ... (+6 more)
👻 Ghosted cs.CR 72 3 years ago
72 Towards Effective Differential Privacy Communication for Users' Data Sharing Decision and Comprehension
Aiping Xiong, Tianhao Wang, ... (+2 more)
👻 Ghosted cs.CR 71 6 years ago
73 The Last Mile: High-Assurance and High-Speed Cryptographic Implementations
José Bacelar Almeida, Manuel Barbosa, ... (+6 more)
👻 Ghosted cs.CR 67 7 years ago
74 MM-BD: Post-Training Detection of Backdoor Attacks with Arbitrary Backdoor Pattern Types Using a Maximum Margin Statistic
Hang Wang, Zhen Xiang, ... (+2 more)
👻 Ghosted cs.LG 67 3 years ago
75 You Only Prompt Once: On the Capabilities of Prompt Learning on Large Language Models to Tackle Toxic Content
Xinlei He, Savvas Zannettou, ... (+2 more)
👻 Ghosted cs.CL 66 2 years ago
76 The EMV Standard: Break, Fix, Verify
David Basin, Ralf Sasse, Jorge Toro-Pozo
👻 Ghosted cs.CR 65 5 years ago
77 Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks! But We Can Fix It
Wei Song, Boya Li, ... (+4 more)
👻 Ghosted cs.CR 64 5 years ago
78 This PIN Can Be Easily Guessed: Analyzing the Security of Smartphone Unlock PINs
Philipp Markert, Daniel V. Bailey, ... (+3 more)
👻 Ghosted cs.CR 64 6 years ago
79 Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels
Daniel Genkin, Mihir Pattani, ... (+2 more)
👻 Ghosted cs.CR 62 7 years ago
80 SoK: Let the Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine Learning
Ahmed Salem, Giovanni Cherubin, ... (+6 more)
👻 Ghosted cs.LG 59 3 years ago
81 AccEar: Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary
Pengfei Hu, Hui Zhuang, ... (+5 more)
👻 Ghosted cs.SD 59 3 years ago
82 EmPoWeb: Empowering Web Applications with Browser Extensions
Dolière Francis Somé
👻 Ghosted cs.CR 58 7 years ago
83 Talos: Neutralizing Vulnerabilities with Security Workarounds for Rapid Response
Zhen Huang, Mariana D'Angelo, ... (+2 more)
👻 Ghosted cs.CR 58 8 years ago
84 SoK: Watermarking for AI-Generated Content
Xuandong Zhao, Sam Gunn, ... (+12 more)
👻 Ghosted cs.CR 57 1 year ago
85 SoK: Privacy-Preserving Data Synthesis
Yuzheng Hu, Fan Wu, ... (+8 more)
👻 Ghosted cs.CR 57 2 years ago
86 LOKI: Large-scale Data Reconstruction Attack against Federated Learning through Model Manipulation
Joshua C. Zhao, Atul Sharma, ... (+4 more)
👻 Ghosted cs.LG 57 3 years ago
87 Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks
Yixin Sun, Anne Edmundson, ... (+3 more)
👻 Ghosted cs.CR 56 9 years ago
88 Learn What You Want to Unlearn: Unlearning Inversion Attacks against Machine Unlearning
Hongsheng Hu, Shuo Wang, ... (+2 more)
👻 Ghosted cs.CR 55 2 years ago
89 Fidelius: Protecting User Secrets from Compromised Browsers
Saba Eskandarian, Jonathan Cogan, ... (+12 more)
👻 Ghosted cs.CR 54 7 years ago
90 SoK: Prudent Evaluation Practices for Fuzzing
Moritz Schloegel, Nils Bars, ... (+8 more)
👻 Ghosted cs.SE 54 1 year ago
91 Neutaint: Efficient Dynamic Taint Analysis with Neural Networks
Dongdong She, Yizheng Chen, ... (+3 more)
👻 Ghosted cs.CR 53 6 years ago
92 Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification Documents
Maria Leonor Pacheco, Max von Hippel, ... (+3 more)
👻 Ghosted cs.CR 52 4 years ago
93 "Should I Worry?" A Cross-Cultural Examination of Account Security Incident Response
Elissa M. Redmiles
👻 Ghosted cs.CR 51 7 years ago
94 CRYLOGGER: Detecting Crypto Misuses Dynamically
Luca Piccolboni, Giuseppe Di Guglielmo, ... (+2 more)
👻 Ghosted cs.CR 50 5 years ago
95 Bitcoin vs. Bitcoin Cash: Coexistence or Downfall of Bitcoin Cash?
Yujin Kwon, Hyoungshick Kim, ... (+2 more)
👻 Ghosted cs.CR 50 7 years ago
96 Verifying and Synthesizing Constant-Resource Implementations with Types
Van Chan Ngo, Mario Dehesa-Azuara, ... (+2 more)
👻 Ghosted cs.PL 50 8 years ago
97 A Machine Learning Approach To Prevent Malicious Calls Over Telephony Networks
Huichen Li, Xiaojun Xu, ... (+7 more)
👻 Ghosted cs.CR 48 8 years ago
98 No Privacy Left Outside: On the (In-)Security of TEE-Shielded DNN Partition for On-Device ML
Ziqi Zhang, Chen Gong, ... (+6 more)
👻 Ghosted cs.CR 47 2 years ago
99 Measure-Observe-Remeasure: An Interactive Paradigm for Differentially-Private Exploratory Analysis
Priyanka Nanayakkara, Hyeok Kim, ... (+5 more)
👻 Ghosted cs.CR 45 1 year ago
100 Bounded and Unbiased Composite Differential Privacy
Kai Zhang, Yanjun Zhang, ... (+6 more)
👻 Ghosted cs.CR 44 2 years ago