💀 The Wall of Shame

The most cited papers with no code. Sorted by the weight of their sins.

Page 3, showing 50 papers

# Paper Cause of Death Category Citations Published
101 Trick or Heat? Manipulating Critical Temperature-Based Control Systems Using Rectification Attacks
Yazhou Tu, Sara Rampazzi, ... (+4 more)
👻 Ghosted cs.CR 84 7 years ago
102 POPE: Partial Order Preserving Encoding
Daniel S. Roche, Daniel Apon, ... (+2 more)
👻 Ghosted cs.CR 82 9 years ago
103 BFT Protocol Forensics
Peiyao Sheng, Gerui Wang, ... (+3 more)
👻 Ghosted cs.CR 81 5 years ago
104 Economic Factors of Vulnerability Trade and Exploitation
Luca Allodi
👻 Ghosted cs.CR 80 8 years ago
105 Back to the Drawing Board: Revisiting the Design of Optimal Location Privacy-preserving Mechanisms
Simon Oya, Carmela Troncoso, Fernando Pérez-González
👻 Ghosted cs.CR 80 8 years ago
106 Build It, Break It, Fix It: Contesting Secure Development
Andrew Ruef, Michael Hicks, ... (+4 more)
👻 Ghosted cs.CR 80 9 years ago
107 Gotta Catch 'Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks
Shawn Shan, Emily Wenger, ... (+4 more)
👻 Ghosted cs.LG 79 7 years ago
108 Identifying and Mitigating Vulnerabilities in LLM-Integrated Applications
Fengqing Jiang, Zhangchen Xu, ... (+5 more)
👻 Ghosted cs.CR 79 2 years ago
109 Why So Toxic? Measuring and Triggering Toxic Behavior in Open-Domain Chatbots
Wai Man Si, Michael Backes, ... (+5 more)
👻 Ghosted cs.CY 79 3 years ago
110 Eliminating Sandwich Attacks with the Help of Game Theory
Lioba Heimbach, Roger Wattenhofer
👻 Ghosted cs.GT 79 4 years ago
111 Stacco: Differentially Analyzing Side-Channel Traces for Detecting SSL/TLS Vulnerabilities in Secure Enclaves
Yuan Xiao, Mengyuan Li, ... (+2 more)
👻 Ghosted cs.CR 77 8 years ago
112 On the Detection of Disinformation Campaign Activity with Network Analysis
Luis Vargas, Patrick Emami, Patrick Traynor
👻 Ghosted cs.SI 76 5 years ago
113 Leaky Wires: Information Leakage and Covert Communication Between FPGA Long Wires
Ilias Giechaskiel, Kasper B. Rasmussen, Ken Eguro
👻 Ghosted cs.CR 76 9 years ago
114 Procedural Noise Adversarial Examples for Black-Box Attacks on Deep Convolutional Networks
Kenneth T. Co, Luis Muñoz-González, ... (+2 more)
👻 Ghosted cs.CR 75 7 years ago
115 Most Websites Don't Need to Vibrate: A Cost-Benefit Approach to Improving Browser Security
Peter Snyder, Cynthia Taylor, Chris Kanich
👻 Ghosted cs.CR 75 8 years ago
116 Protocols for Checking Compromised Credentials
Lucy Li, Bijeeta Pal, ... (+4 more)
👻 Ghosted cs.CR 74 6 years ago
117 zkLLM: Zero Knowledge Proofs for Large Language Models
Haochen Sun, Jason Li, Hongyang Zhang
👻 Ghosted cs.LG 73 2 years ago
118 Cleartext Data Transmissions in Consumer IoT Medical Devices
Daniel Wood, Noah Apthorpe, Nick Feamster
👻 Ghosted cs.CR 72 8 years ago
119 Are Attribute Inference Attacks Just Imputation?
Bargav Jayaraman, David Evans
💀 404 Not Found cs.CR 72 3 years ago
120 CROSSLINE: Breaking "Security-by-Crash" based Memory Isolation in AMD SEV
Mengyuan Li, Yinqian Zhang, Zhiqiang Lin
👻 Ghosted cs.CR 71 5 years ago
121 On the TOCTOU Problem in Remote Attestation
Ivan De Oliveira Nunes, Sashidhar Jakkamsetti, ... (+2 more)
👻 Ghosted cs.CR 71 5 years ago
122 Deemon: Detecting CSRF with Dynamic Analysis and Property Graphs
Giancarlo Pellegrino, Martin Johns, ... (+3 more)
👻 Ghosted cs.CR 71 8 years ago
123 IoTScanner: Detecting and Classifying Privacy Threats in IoT Neighborhoods
Sandra Siby, Rajib Ranjan Maiti, Nils Tippenhauer
👻 Ghosted cs.CR 71 9 years ago
124 Model Extraction Attacks on Graph Neural Networks: Taxonomy and Realization
Bang Wu, Xiangwen Yang, ... (+2 more)
👻 Ghosted cs.LG 70 5 years ago
125 Don't Skype & Type! Acoustic Eavesdropping in Voice-Over-IP
Alberto Compagno, Mauro Conti, ... (+2 more)
👻 Ghosted cs.CR 70 9 years ago
126 FreeGuard: A Faster Secure Heap Allocator
Sam Silvestro, Hongyu Liu, ... (+3 more)
👻 Ghosted cs.OS 69 8 years ago
127 Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic with Neural Networks
Shuaike Dong, Zhou Li, ... (+4 more)
👻 Ghosted cs.CR 67 6 years ago
128 SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders
Tianshuo Cong, Xinlei He, Yang Zhang
👻 Ghosted cs.CR 67 4 years ago
129 InSpectre: Breaking and Fixing Microarchitectural Vulnerabilities by Formal Analysis
Roberto Guanciale, Musard Balliu, Mads Dam
👻 Ghosted cs.CR 66 6 years ago
130 How Unique is Your .onion? An Analysis of the Fingerprintability of Tor Onion Services
Rebekah Overdorf, Marc Juarez, ... (+3 more)
👻 Ghosted cs.CR 66 8 years ago
131 Inaudible Voice Commands
Liwei Song, Prateek Mittal
👻 Ghosted cs.CR 66 8 years ago
132 SoK: Analysis of Software Supply Chain Security by Establishing Secure Design Properties
Chinenye Okafor, Taylor R. Schorlemmer, ... (+2 more)
👻 Ghosted cs.CR 66 1 year ago
133 AdVersarial: Perceptual Ad Blocking meets Adversarial Machine Learning
Florian Tramèr, Pascal Dupré, ... (+3 more)
👻 Ghosted cs.CR 65 7 years ago
134 Advanced Probabilistic Couplings for Differential Privacy
Gilles Barthe, Noémie Fong, ... (+4 more)
🔮 The Ethereal cs.LO 65 9 years ago
135 Byzantine-Robust Decentralized Federated Learning
Minghong Fang, Zifan Zhang, ... (+6 more)
👻 Ghosted cs.CR 64 1 year ago
136 Use Privacy in Data-Driven Systems: Theory and Experiments with Machine Learnt Programs
Anupam Datta, Matthew Fredrikson, ... (+3 more)
👻 Ghosted cs.CR 64 8 years ago
137 LineSwitch: Efficiently Managing Switch Flow in Software-Defined Networking while Effectively Tackling DoS Attacks
Moreno Ambrosin, Mauro Conti, ... (+2 more)
👻 Ghosted cs.NI 62 11 years ago
138 ConAML: Constrained Adversarial Machine Learning for Cyber-Physical Systems
Jiangnan Li, Yingyuan Yang, ... (+3 more)
👻 Ghosted cs.CR 61 6 years ago
139 Sui Lutris: A Blockchain Combining Broadcast and Consensus
Sam Blackshear, Andrey Chursin, ... (+10 more)
👻 Ghosted cs.DC 59 2 years ago
140 Verified Correctness and Security of mbedTLS HMAC-DRBG
Katherine Q. Ye, Matthew Green, ... (+4 more)
👻 Ghosted cs.CR 59 8 years ago
141 The Circle Game: Scalable Private Membership Test Using Trusted Hardware
Sandeep Tamrakar, Jian Liu, ... (+4 more)
👻 Ghosted cs.CR 59 9 years ago
142 SPRESSO: A Secure, Privacy-Respecting Single Sign-On System for the Web
Daniel Fett, Ralf Kuesters, Guido Schmitz
👻 Ghosted cs.CR 59 10 years ago
143 Insecure Until Proven Updated: Analyzing AMD SEV's Remote Attestation
Robert Buhren, Christian Werling, Jean-Pierre Seifert
👻 Ghosted cs.CR 58 6 years ago
144 Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values
Benjamin Mood, Debayan Gupta, ... (+2 more)
👻 Ghosted cs.CR 58 10 years ago
145 Realistic Website Fingerprinting By Augmenting Network Trace
Alireza Bahramali, Ardavan Bozorgi, Amir Houmansadr
👻 Ghosted cs.CR 58 2 years ago
146 Off-Path TCP Exploits of the Mixed IPID Assignment
Xuewei Feng, Chuanpu Fu, ... (+3 more)
👻 Ghosted cs.CR 57 5 years ago
147 The Unwanted Sharing Economy: An Analysis of Cookie Syncing and User Transparency under GDPR
Tobias Urban, Dennis Tatang, ... (+3 more)
👻 Ghosted cs.CR 57 7 years ago
148 PTrix: Efficient Hardware-Assisted Fuzzing for COTS Binary
Yaohui Chen, Dongliang Mu, ... (+6 more)
👻 Ghosted cs.SE 56 6 years ago
149 HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices (Extended Version)
Dominik Breitenbacher, Ivan Homoliak, ... (+3 more)
👻 Ghosted cs.CR 55 6 years ago
150 MVG Mechanism: Differential Privacy under Matrix-Valued Query
Thee Chanyaswad, Alex Dytso, ... (+2 more)
👻 Ghosted cs.CR 55 8 years ago