| 101 |
Trick or Heat? Manipulating Critical Temperature-Based Control Systems Using Rectification Attacks
Yazhou Tu, Sara Rampazzi, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
84 |
7 years ago |
| 102 |
POPE: Partial Order Preserving Encoding
Daniel S. Roche, Daniel Apon, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
82 |
9 years ago |
| 103 |
BFT Protocol Forensics
Peiyao Sheng, Gerui Wang, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
81 |
5 years ago |
| 104 |
Economic Factors of Vulnerability Trade and Exploitation
Luca Allodi
|
👻
Ghosted
|
cs.CR
|
80 |
8 years ago |
| 105 |
Back to the Drawing Board: Revisiting the Design of Optimal Location Privacy-preserving Mechanisms
Simon Oya, Carmela Troncoso, Fernando Pérez-González
|
👻
Ghosted
|
cs.CR
|
80 |
8 years ago |
| 106 |
Build It, Break It, Fix It: Contesting Secure Development
Andrew Ruef, Michael Hicks, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
80 |
9 years ago |
| 107 |
Gotta Catch 'Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks
Shawn Shan, Emily Wenger, ... (+4 more)
|
👻
Ghosted
|
cs.LG
|
79 |
7 years ago |
| 108 |
Identifying and Mitigating Vulnerabilities in LLM-Integrated Applications
Fengqing Jiang, Zhangchen Xu, ... (+5 more)
|
👻
Ghosted
|
cs.CR
|
79 |
2 years ago |
| 109 |
Why So Toxic? Measuring and Triggering Toxic Behavior in Open-Domain Chatbots
Wai Man Si, Michael Backes, ... (+5 more)
|
👻
Ghosted
|
cs.CY
|
79 |
3 years ago |
| 110 |
Eliminating Sandwich Attacks with the Help of Game Theory
Lioba Heimbach, Roger Wattenhofer
|
👻
Ghosted
|
cs.GT
|
79 |
4 years ago |
| 111 |
Stacco: Differentially Analyzing Side-Channel Traces for Detecting SSL/TLS Vulnerabilities in Secure Enclaves
Yuan Xiao, Mengyuan Li, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
77 |
8 years ago |
| 112 |
On the Detection of Disinformation Campaign Activity with Network Analysis
Luis Vargas, Patrick Emami, Patrick Traynor
|
👻
Ghosted
|
cs.SI
|
76 |
5 years ago |
| 113 |
Leaky Wires: Information Leakage and Covert Communication Between FPGA Long Wires
Ilias Giechaskiel, Kasper B. Rasmussen, Ken Eguro
|
👻
Ghosted
|
cs.CR
|
76 |
9 years ago |
| 114 |
Procedural Noise Adversarial Examples for Black-Box Attacks on Deep Convolutional Networks
Kenneth T. Co, Luis Muñoz-González, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
75 |
7 years ago |
| 115 |
Most Websites Don't Need to Vibrate: A Cost-Benefit Approach to Improving Browser Security
Peter Snyder, Cynthia Taylor, Chris Kanich
|
👻
Ghosted
|
cs.CR
|
75 |
8 years ago |
| 116 |
Protocols for Checking Compromised Credentials
Lucy Li, Bijeeta Pal, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
74 |
6 years ago |
| 117 |
zkLLM: Zero Knowledge Proofs for Large Language Models
Haochen Sun, Jason Li, Hongyang Zhang
|
👻
Ghosted
|
cs.LG
|
73 |
2 years ago |
| 118 |
Cleartext Data Transmissions in Consumer IoT Medical Devices
Daniel Wood, Noah Apthorpe, Nick Feamster
|
👻
Ghosted
|
cs.CR
|
72 |
8 years ago |
| 119 |
Are Attribute Inference Attacks Just Imputation?
Bargav Jayaraman, David Evans
|
💀
404 Not Found
|
cs.CR
|
72 |
3 years ago |
| 120 |
CROSSLINE: Breaking "Security-by-Crash" based Memory Isolation in AMD SEV
Mengyuan Li, Yinqian Zhang, Zhiqiang Lin
|
👻
Ghosted
|
cs.CR
|
71 |
5 years ago |
| 121 |
On the TOCTOU Problem in Remote Attestation
Ivan De Oliveira Nunes, Sashidhar Jakkamsetti, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
71 |
5 years ago |
| 122 |
Deemon: Detecting CSRF with Dynamic Analysis and Property Graphs
Giancarlo Pellegrino, Martin Johns, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
71 |
8 years ago |
| 123 |
IoTScanner: Detecting and Classifying Privacy Threats in IoT Neighborhoods
Sandra Siby, Rajib Ranjan Maiti, Nils Tippenhauer
|
👻
Ghosted
|
cs.CR
|
71 |
9 years ago |
| 124 |
Model Extraction Attacks on Graph Neural Networks: Taxonomy and Realization
Bang Wu, Xiangwen Yang, ... (+2 more)
|
👻
Ghosted
|
cs.LG
|
70 |
5 years ago |
| 125 |
Don't Skype & Type! Acoustic Eavesdropping in Voice-Over-IP
Alberto Compagno, Mauro Conti, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
70 |
9 years ago |
| 126 |
FreeGuard: A Faster Secure Heap Allocator
Sam Silvestro, Hongyu Liu, ... (+3 more)
|
👻
Ghosted
|
cs.OS
|
69 |
8 years ago |
| 127 |
Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic with Neural Networks
Shuaike Dong, Zhou Li, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
67 |
6 years ago |
| 128 |
SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders
Tianshuo Cong, Xinlei He, Yang Zhang
|
👻
Ghosted
|
cs.CR
|
67 |
4 years ago |
| 129 |
InSpectre: Breaking and Fixing Microarchitectural Vulnerabilities by Formal Analysis
Roberto Guanciale, Musard Balliu, Mads Dam
|
👻
Ghosted
|
cs.CR
|
66 |
6 years ago |
| 130 |
How Unique is Your .onion? An Analysis of the Fingerprintability of Tor Onion Services
Rebekah Overdorf, Marc Juarez, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
66 |
8 years ago |
| 131 |
Inaudible Voice Commands
Liwei Song, Prateek Mittal
|
👻
Ghosted
|
cs.CR
|
66 |
8 years ago |
| 132 |
SoK: Analysis of Software Supply Chain Security by Establishing Secure Design Properties
Chinenye Okafor, Taylor R. Schorlemmer, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
66 |
1 year ago |
| 133 |
AdVersarial: Perceptual Ad Blocking meets Adversarial Machine Learning
Florian Tramèr, Pascal Dupré, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
65 |
7 years ago |
| 134 |
Advanced Probabilistic Couplings for Differential Privacy
Gilles Barthe, Noémie Fong, ... (+4 more)
|
🔮
The Ethereal
|
cs.LO
|
65 |
9 years ago |
| 135 |
Byzantine-Robust Decentralized Federated Learning
Minghong Fang, Zifan Zhang, ... (+6 more)
|
👻
Ghosted
|
cs.CR
|
64 |
1 year ago |
| 136 |
Use Privacy in Data-Driven Systems: Theory and Experiments with Machine Learnt Programs
Anupam Datta, Matthew Fredrikson, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
64 |
8 years ago |
| 137 |
LineSwitch: Efficiently Managing Switch Flow in Software-Defined Networking while Effectively Tackling DoS Attacks
Moreno Ambrosin, Mauro Conti, ... (+2 more)
|
👻
Ghosted
|
cs.NI
|
62 |
11 years ago |
| 138 |
ConAML: Constrained Adversarial Machine Learning for Cyber-Physical Systems
Jiangnan Li, Yingyuan Yang, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
61 |
6 years ago |
| 139 |
Sui Lutris: A Blockchain Combining Broadcast and Consensus
Sam Blackshear, Andrey Chursin, ... (+10 more)
|
👻
Ghosted
|
cs.DC
|
59 |
2 years ago |
| 140 |
Verified Correctness and Security of mbedTLS HMAC-DRBG
Katherine Q. Ye, Matthew Green, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
59 |
8 years ago |
| 141 |
The Circle Game: Scalable Private Membership Test Using Trusted Hardware
Sandeep Tamrakar, Jian Liu, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
59 |
9 years ago |
| 142 |
SPRESSO: A Secure, Privacy-Respecting Single Sign-On System for the Web
Daniel Fett, Ralf Kuesters, Guido Schmitz
|
👻
Ghosted
|
cs.CR
|
59 |
10 years ago |
| 143 |
Insecure Until Proven Updated: Analyzing AMD SEV's Remote Attestation
Robert Buhren, Christian Werling, Jean-Pierre Seifert
|
👻
Ghosted
|
cs.CR
|
58 |
6 years ago |
| 144 |
Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values
Benjamin Mood, Debayan Gupta, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
58 |
10 years ago |
| 145 |
Realistic Website Fingerprinting By Augmenting Network Trace
Alireza Bahramali, Ardavan Bozorgi, Amir Houmansadr
|
👻
Ghosted
|
cs.CR
|
58 |
2 years ago |
| 146 |
Off-Path TCP Exploits of the Mixed IPID Assignment
Xuewei Feng, Chuanpu Fu, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
57 |
5 years ago |
| 147 |
The Unwanted Sharing Economy: An Analysis of Cookie Syncing and User Transparency under GDPR
Tobias Urban, Dennis Tatang, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
57 |
7 years ago |
| 148 |
PTrix: Efficient Hardware-Assisted Fuzzing for COTS Binary
Yaohui Chen, Dongliang Mu, ... (+6 more)
|
👻
Ghosted
|
cs.SE
|
56 |
6 years ago |
| 149 |
HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices (Extended Version)
Dominik Breitenbacher, Ivan Homoliak, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
55 |
6 years ago |
| 150 |
MVG Mechanism: Differential Privacy under Matrix-Valued Query
Thee Chanyaswad, Alex Dytso, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
55 |
8 years ago |