| 101 |
Leakage of Dataset Properties in Multi-Party Machine Learning
Wanrong Zhang, Shruti Tople, Olga Ohrimenko
|
👻
Ghosted
|
cs.LG
|
89 |
5 years ago |
| 102 |
Retrofitting Fine Grain Isolation in the Firefox Renderer (Extended Version)
Shravan Narayan, Craig Disselkoen, ... (+6 more)
|
👻
Ghosted
|
cs.CR
|
87 |
6 years ago |
| 103 |
Datalog Disassembly
Antonio Flores-Montoya, Eric Schulte
|
👻
Ghosted
|
cs.PL
|
86 |
6 years ago |
| 104 |
SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks
Saad Islam, Ahmad Moghimi, ... (+5 more)
|
👻
Ghosted
|
cs.CR
|
85 |
7 years ago |
| 105 |
Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models
Shagufta Mehnaz, Sayanton V. Dibbo, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
82 |
4 years ago |
| 106 |
TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves
Tobias Cloosters, Michael Rodler, Lucas Davi
|
👻
Ghosted
|
cs.CR
|
77 |
5 years ago |
| 107 |
REMARK-LLM: A Robust and Efficient Watermarking Framework for Generative Large Language Models
Ruisi Zhang, Shehzeen Samarah Hussain, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
77 |
2 years ago |
| 108 |
SIGL: Securing Software Installations Through Deep Graph Learning
Xueyuan Han, Xiao Yu, ... (+6 more)
|
👻
Ghosted
|
cs.CR
|
76 |
5 years ago |
| 109 |
Adapting Security Warnings to Counter Online Disinformation
Ben Kaiser, Jerry Wei, ... (+4 more)
|
👻
Ghosted
|
cs.HC
|
76 |
5 years ago |
| 110 |
On Training Robust PDF Malware Classifiers
Yizheng Chen, Shiqi Wang, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
76 |
7 years ago |
| 111 |
JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT
Sam Kumar, Yuncong Hu, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
75 |
6 years ago |
| 112 |
ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the Evolution of Cyberattacks
Yun Shen, Gianluca Stringhini
|
👻
Ghosted
|
cs.CR
|
75 |
6 years ago |
| 113 |
Why Older Adults (Don't) Use Password Managers
Hirak Ray, Flynn Wolf, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
74 |
5 years ago |
| 114 |
Programmable In-Network Security for Context-aware BYOD Policies
Qiao Kang, Lei Xue, ... (+4 more)
|
👻
Ghosted
|
cs.NI
|
73 |
6 years ago |
| 115 |
CopyCat: Controlled Instruction-Level Attacks on Enclaves
Daniel Moghimi, Jo Van Bulck, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
71 |
6 years ago |
| 116 |
That Was Then, This Is Now: A Security Evaluation of Password Generation, Storage, and Autofill in Thirteen Password Managers
Sean Oesch, Scott Ruoti
|
👻
Ghosted
|
cs.CR
|
71 |
6 years ago |
| 117 |
Gradient Obfuscation Gives a False Sense of Security in Federated Learning
Kai Yue, Richeng Jin, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
71 |
3 years ago |
| 118 |
Towards A Proactive ML Approach for Detecting Backdoor Poison Samples
Xiangyu Qi, Tinghao Xie, ... (+4 more)
|
👻
Ghosted
|
cs.LG
|
71 |
3 years ago |
| 119 |
Visor: Privacy-Preserving Video Analytics as a Cloud Service
Rishabh Poddar, Ganesh Ananthanarayanan, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
70 |
5 years ago |
| 120 |
Continuous Learning for Android Malware Detection
Yizheng Chen, Zhoujie Ding, David Wagner
|
👻
Ghosted
|
cs.CR
|
68 |
3 years ago |
| 121 |
Machine Against the RAG: Jamming Retrieval-Augmented Generation with Blocker Documents
Avital Shafran, Roei Schuster, Vitaly Shmatikov
|
👻
Ghosted
|
cs.CR
|
67 |
1 year ago |
| 122 |
MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning
Zian Jia, Yun Xiong, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
67 |
2 years ago |
| 123 |
Loophole: Timing Attacks on Shared Event Loops in Chrome
Pepe Vila, Boris Köpf
|
👻
Ghosted
|
cs.CR
|
66 |
9 years ago |
| 124 |
Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition
Chen Yan, Zhijian Xu, ... (+3 more)
|
👻
Ghosted
|
cs.CV
|
63 |
4 years ago |
| 125 |
PTAuth: Temporal Memory Safety via Robust Points-to Authentication
Reza Mirzazade Farkhani, Mansour Ahmadi, Long Lu
|
👻
Ghosted
|
cs.CR
|
62 |
6 years ago |
| 126 |
Frontal Attack: Leaking Control-Flow in SGX via the CPU Frontend
Ivan Puddu, Moritz Schneider, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
61 |
5 years ago |
| 127 |
LZR: Identifying Unexpected Internet Services
Liz Izhikevich, Renata Teixeira, Zakir Durumeric
|
👻
Ghosted
|
cs.CR
|
60 |
3 years ago |
| 128 |
A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise
Ivan De Oliveira Nunes, Karim Eldefrawy, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
60 |
6 years ago |
| 129 |
PACStack: an Authenticated Call Stack
Hans Liljestrand, Thomas Nyman, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
60 |
6 years ago |
| 130 |
Automatic Heap Layout Manipulation for Exploitation
Sean Heelan, Tom Melham, Daniel Kroening
|
👻
Ghosted
|
cs.CR
|
60 |
8 years ago |
| 131 |
Deep-Dup: An Adversarial Weight Duplication Attack Framework to Crush Deep Neural Network in Multi-Tenant FPGA
Adnan Siraj Rakin, Yukui Luo, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
58 |
5 years ago |
| 132 |
Padding Ain't Enough: Assessing the Privacy Guarantees of Encrypted DNS
Jonas Bushart, Christian Rossow
|
👻
Ghosted
|
cs.CR
|
58 |
6 years ago |
| 133 |
Membership Inference Attacks and Defenses in Neural Network Pruning
Xiaoyong Yuan, Lan Zhang
|
👻
Ghosted
|
cs.CR
|
58 |
4 years ago |
| 134 |
What Are the Chances? Explaining the Epsilon Parameter in Differential Privacy
Priyanka Nanayakkara, Mary Anne Smart, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
56 |
3 years ago |
| 135 |
Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box Attacks
Huiying Li, Shawn Shan, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
56 |
5 years ago |
| 136 |
Identifying Cache-Based Side Channels through Secret-Augmented Abstract Interpretation
Shuai Wang, Yuyan Bao, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
56 |
6 years ago |
| 137 |
Your Microphone Array Retains Your Identity: A Robust Voice Liveness Detection System for Smart Speakers
Yan Meng, Jiachun Li, ... (+6 more)
|
👻
Ghosted
|
cs.CR
|
55 |
5 months ago |
| 138 |
Uncovering the Limits of Machine Learning for Automatic Vulnerability Detection
Niklas Risse, Marcel Böhme
|
👻
Ghosted
|
cs.CR
|
55 |
2 years ago |
| 139 |
Constant-weight PIR: Single-round Keyword PIR via Constant-weight Equality Operators
Rasoul Akhavan Mahdavi, Florian Kerschbaum
|
👻
Ghosted
|
cs.CR
|
55 |
4 years ago |
| 140 |
StrongChain: Transparent and Collaborative Proof-of-Work Consensus
Pawel Szalachowski, Daniel Reijsbergen, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
54 |
6 years ago |
| 141 |
Identifying and characterizing Sybils in the Tor network
Philipp Winter, Roya Ensafi, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
52 |
10 years ago |
| 142 |
Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations
Tadayoshi Kohno, Yasemin Acar, Wulf Loh
|
👻
Ghosted
|
cs.CR
|
52 |
3 years ago |
| 143 |
Preech: A System for Privacy-Preserving Speech Transcription
Shimaa Ahmed, Amrita Roy Chowdhury, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
51 |
6 years ago |
| 144 |
AutoLock: Why Cache Attacks on ARM Are Harder Than You Think
Marc Green, Leandro Rodrigues-Lima, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
51 |
9 years ago |
| 145 |
Fuzzing BusyBox: Leveraging LLM and Crash Reuse for Embedded Bug Unearthing
Asmita, Yaroslav Oliinyk, ... (+4 more)
|
👻
Ghosted
|
cs.SE
|
50 |
2 years ago |
| 146 |
Privacy Side Channels in Machine Learning Systems
Edoardo Debenedetti, Giorgio Severi, ... (+6 more)
|
👻
Ghosted
|
cs.CR
|
50 |
2 years ago |
| 147 |
PrivTrace: Differentially Private Trajectory Synthesis by Adaptive Markov Model
Haiming Wang, Zhikun Zhang, ... (+5 more)
|
👻
Ghosted
|
cs.CR
|
48 |
3 years ago |
| 148 |
VoteAgain: A scalable coercion-resistant voting system
Wouter Lueks, Iñigo Querejeta-Azurmendi, Carmela Troncoso
|
👻
Ghosted
|
cs.CR
|
47 |
5 years ago |
| 149 |
HyPFuzz: Formal-Assisted Processor Fuzzing
Chen Chen, Rahul Kande, ... (+5 more)
|
👻
Ghosted
|
cs.CR
|
45 |
3 years ago |
| 150 |
Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks
Kaiwen Shen, Chuhan Wang, ... (+9 more)
|
👻
Ghosted
|
cs.CR
|
44 |
5 years ago |