💀 The Wall of Shame

The most cited papers with no code. Sorted by the weight of their sins.

Page 3, showing 50 papers

# Paper Cause of Death Category Citations Published
101 Leakage of Dataset Properties in Multi-Party Machine Learning
Wanrong Zhang, Shruti Tople, Olga Ohrimenko
👻 Ghosted cs.LG 89 5 years ago
102 Retrofitting Fine Grain Isolation in the Firefox Renderer (Extended Version)
Shravan Narayan, Craig Disselkoen, ... (+6 more)
👻 Ghosted cs.CR 87 6 years ago
103 Datalog Disassembly
Antonio Flores-Montoya, Eric Schulte
👻 Ghosted cs.PL 86 6 years ago
104 SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks
Saad Islam, Ahmad Moghimi, ... (+5 more)
👻 Ghosted cs.CR 85 7 years ago
105 Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models
Shagufta Mehnaz, Sayanton V. Dibbo, ... (+3 more)
👻 Ghosted cs.CR 82 4 years ago
106 TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves
Tobias Cloosters, Michael Rodler, Lucas Davi
👻 Ghosted cs.CR 77 5 years ago
107 REMARK-LLM: A Robust and Efficient Watermarking Framework for Generative Large Language Models
Ruisi Zhang, Shehzeen Samarah Hussain, ... (+2 more)
👻 Ghosted cs.CR 77 2 years ago
108 SIGL: Securing Software Installations Through Deep Graph Learning
Xueyuan Han, Xiao Yu, ... (+6 more)
👻 Ghosted cs.CR 76 5 years ago
109 Adapting Security Warnings to Counter Online Disinformation
Ben Kaiser, Jerry Wei, ... (+4 more)
👻 Ghosted cs.HC 76 5 years ago
110 On Training Robust PDF Malware Classifiers
Yizheng Chen, Shiqi Wang, ... (+2 more)
👻 Ghosted cs.CR 76 7 years ago
111 JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT
Sam Kumar, Yuncong Hu, ... (+3 more)
👻 Ghosted cs.CR 75 6 years ago
112 ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the Evolution of Cyberattacks
Yun Shen, Gianluca Stringhini
👻 Ghosted cs.CR 75 6 years ago
113 Why Older Adults (Don't) Use Password Managers
Hirak Ray, Flynn Wolf, ... (+2 more)
👻 Ghosted cs.CR 74 5 years ago
114 Programmable In-Network Security for Context-aware BYOD Policies
Qiao Kang, Lei Xue, ... (+4 more)
👻 Ghosted cs.NI 73 6 years ago
115 CopyCat: Controlled Instruction-Level Attacks on Enclaves
Daniel Moghimi, Jo Van Bulck, ... (+3 more)
👻 Ghosted cs.CR 71 6 years ago
116 That Was Then, This Is Now: A Security Evaluation of Password Generation, Storage, and Autofill in Thirteen Password Managers
Sean Oesch, Scott Ruoti
👻 Ghosted cs.CR 71 6 years ago
117 Gradient Obfuscation Gives a False Sense of Security in Federated Learning
Kai Yue, Richeng Jin, ... (+3 more)
👻 Ghosted cs.CR 71 3 years ago
118 Towards A Proactive ML Approach for Detecting Backdoor Poison Samples
Xiangyu Qi, Tinghao Xie, ... (+4 more)
👻 Ghosted cs.LG 71 3 years ago
119 Visor: Privacy-Preserving Video Analytics as a Cloud Service
Rishabh Poddar, Ganesh Ananthanarayanan, ... (+3 more)
👻 Ghosted cs.CR 70 5 years ago
120 Continuous Learning for Android Malware Detection
Yizheng Chen, Zhoujie Ding, David Wagner
👻 Ghosted cs.CR 68 3 years ago
121 Machine Against the RAG: Jamming Retrieval-Augmented Generation with Blocker Documents
Avital Shafran, Roei Schuster, Vitaly Shmatikov
👻 Ghosted cs.CR 67 1 year ago
122 MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning
Zian Jia, Yun Xiong, ... (+4 more)
👻 Ghosted cs.CR 67 2 years ago
123 Loophole: Timing Attacks on Shared Event Loops in Chrome
Pepe Vila, Boris Köpf
👻 Ghosted cs.CR 66 9 years ago
124 Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition
Chen Yan, Zhijian Xu, ... (+3 more)
👻 Ghosted cs.CV 63 4 years ago
125 PTAuth: Temporal Memory Safety via Robust Points-to Authentication
Reza Mirzazade Farkhani, Mansour Ahmadi, Long Lu
👻 Ghosted cs.CR 62 6 years ago
126 Frontal Attack: Leaking Control-Flow in SGX via the CPU Frontend
Ivan Puddu, Moritz Schneider, ... (+2 more)
👻 Ghosted cs.CR 61 5 years ago
127 LZR: Identifying Unexpected Internet Services
Liz Izhikevich, Renata Teixeira, Zakir Durumeric
👻 Ghosted cs.CR 60 3 years ago
128 A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise
Ivan De Oliveira Nunes, Karim Eldefrawy, ... (+2 more)
👻 Ghosted cs.CR 60 6 years ago
129 PACStack: an Authenticated Call Stack
Hans Liljestrand, Thomas Nyman, ... (+3 more)
👻 Ghosted cs.CR 60 6 years ago
130 Automatic Heap Layout Manipulation for Exploitation
Sean Heelan, Tom Melham, Daniel Kroening
👻 Ghosted cs.CR 60 8 years ago
131 Deep-Dup: An Adversarial Weight Duplication Attack Framework to Crush Deep Neural Network in Multi-Tenant FPGA
Adnan Siraj Rakin, Yukui Luo, ... (+2 more)
👻 Ghosted cs.CR 58 5 years ago
132 Padding Ain't Enough: Assessing the Privacy Guarantees of Encrypted DNS
Jonas Bushart, Christian Rossow
👻 Ghosted cs.CR 58 6 years ago
133 Membership Inference Attacks and Defenses in Neural Network Pruning
Xiaoyong Yuan, Lan Zhang
👻 Ghosted cs.CR 58 4 years ago
134 What Are the Chances? Explaining the Epsilon Parameter in Differential Privacy
Priyanka Nanayakkara, Mary Anne Smart, ... (+3 more)
👻 Ghosted cs.CR 56 3 years ago
135 Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box Attacks
Huiying Li, Shawn Shan, ... (+4 more)
👻 Ghosted cs.CR 56 5 years ago
136 Identifying Cache-Based Side Channels through Secret-Augmented Abstract Interpretation
Shuai Wang, Yuyan Bao, ... (+4 more)
👻 Ghosted cs.CR 56 6 years ago
137 Your Microphone Array Retains Your Identity: A Robust Voice Liveness Detection System for Smart Speakers
Yan Meng, Jiachun Li, ... (+6 more)
👻 Ghosted cs.CR 55 5 months ago
138 Uncovering the Limits of Machine Learning for Automatic Vulnerability Detection
Niklas Risse, Marcel Böhme
👻 Ghosted cs.CR 55 2 years ago
139 Constant-weight PIR: Single-round Keyword PIR via Constant-weight Equality Operators
Rasoul Akhavan Mahdavi, Florian Kerschbaum
👻 Ghosted cs.CR 55 4 years ago
140 StrongChain: Transparent and Collaborative Proof-of-Work Consensus
Pawel Szalachowski, Daniel Reijsbergen, ... (+2 more)
👻 Ghosted cs.CR 54 6 years ago
141 Identifying and characterizing Sybils in the Tor network
Philipp Winter, Roya Ensafi, ... (+2 more)
👻 Ghosted cs.CR 52 10 years ago
142 Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations
Tadayoshi Kohno, Yasemin Acar, Wulf Loh
👻 Ghosted cs.CR 52 3 years ago
143 Preech: A System for Privacy-Preserving Speech Transcription
Shimaa Ahmed, Amrita Roy Chowdhury, ... (+2 more)
👻 Ghosted cs.CR 51 6 years ago
144 AutoLock: Why Cache Attacks on ARM Are Harder Than You Think
Marc Green, Leandro Rodrigues-Lima, ... (+4 more)
👻 Ghosted cs.CR 51 9 years ago
145 Fuzzing BusyBox: Leveraging LLM and Crash Reuse for Embedded Bug Unearthing
Asmita, Yaroslav Oliinyk, ... (+4 more)
👻 Ghosted cs.SE 50 2 years ago
146 Privacy Side Channels in Machine Learning Systems
Edoardo Debenedetti, Giorgio Severi, ... (+6 more)
👻 Ghosted cs.CR 50 2 years ago
147 PrivTrace: Differentially Private Trajectory Synthesis by Adaptive Markov Model
Haiming Wang, Zhikun Zhang, ... (+5 more)
👻 Ghosted cs.CR 48 3 years ago
148 VoteAgain: A scalable coercion-resistant voting system
Wouter Lueks, Iñigo Querejeta-Azurmendi, Carmela Troncoso
👻 Ghosted cs.CR 47 5 years ago
149 HyPFuzz: Formal-Assisted Processor Fuzzing
Chen Chen, Rahul Kande, ... (+5 more)
👻 Ghosted cs.CR 45 3 years ago
150 Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks
Kaiwen Shen, Chuhan Wang, ... (+9 more)
👻 Ghosted cs.CR 44 5 years ago