💀 The Wall of Shame

The most cited papers with no code. Sorted by the weight of their sins.

Page 4, showing 50 papers

# Paper Cause of Death Category Citations Published
151 Automatic Techniques to Systematically Discover New Heap Exploitation Primitives
Insu Yun, Dhaval Kapil, Taesoo Kim
👻 Ghosted cs.CR 44 7 years ago
152 Exploring ChatGPT's Capabilities on Vulnerability Management
Peiyu Liu, Junming Liu, ... (+8 more)
👻 Ghosted cs.SE 44 2 years ago
153 MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols
Qinying Wang, Shouling Ji, ... (+9 more)
👻 Ghosted cs.CR 44 3 years ago
154 ReZone: Disarming TrustZone with TEE Privilege Reduction
David Cerdeira, José Martins, ... (+2 more)
👻 Ghosted cs.CR 44 4 years ago
155 I Always Feel Like Somebody's Sensing Me! A Framework to Detect, Identify, and Localize Clandestine Wireless Sensors
Akash Deep Singh, Luis Garcia, ... (+2 more)
👻 Ghosted cs.CR 43 5 years ago
156 Security, Availability, and Multiple Information Sources: Exploring Update Behavior of System Administrators
Christian Tiefenau, Maximilian Häring, ... (+2 more)
👻 Ghosted cs.HC 43 5 years ago
157 Heckler: Breaking Confidential VMs with Malicious Interrupts
Benedict Schlüter, Supraja Sridhara, ... (+3 more)
👻 Ghosted cs.CR 43 2 years ago
158 A Highly Accurate Query-Recovery Attack against Searchable Encryption using Non-Indexed Documents
Marc Damie, Florian Hahn, Andreas Peter
👻 Ghosted cs.CR 43 2 years ago
159 Iodine: Verifying Constant-Time Execution of Hardware
Klaus v. Gleissenthall, Rami Gökhan Kıcı, ... (+2 more)
👻 Ghosted cs.CR 42 6 years ago
160 TPatch: A Triggered Physical Adversarial Patch
Wenjun Zhu, Xiaoyu Ji, ... (+3 more)
👻 Ghosted cs.CR 42 2 years ago
161 Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy Labels at Scale
Yue Xiao, Zhengyi Li, ... (+5 more)
👻 Ghosted cs.CR 42 3 years ago
162 PoisonedEncoder: Poisoning the Unlabeled Pre-training Data in Contrastive Learning
Hongbin Liu, Jinyuan Jia, Neil Zhenqiang Gong
👻 Ghosted cs.CR 42 3 years ago
163 Defending against malicious peripherals with Cinch
Sebastian Angel, Riad S. Wahby, ... (+6 more)
👻 Ghosted cs.OS 41 10 years ago
164 We Have a Package for You! A Comprehensive Analysis of Package Hallucinations by Code Generating LLMs
Joseph Spracklen, Raveen Wijewickrama, ... (+4 more)
👻 Ghosted cs.SE 41 1 year ago
165 MAGE: Mutual Attestation for a Group of Enclaves without Trusted Third Parties
Guoxing Chen, Yinqian Zhang
👻 Ghosted cs.CR 40 5 years ago
166 How Do Tor Users Interact With Onion Services?
Philipp Winter, Anne Edmundson, ... (+4 more)
👻 Ghosted cs.CR 40 7 years ago
167 Elasticlave: An Efficient Memory Model for Enclaves
Zhijingcheng Yu, Shweta Shinde, ... (+2 more)
👻 Ghosted cs.CR 39 5 years ago
168 Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks
Jialai Wang, Ziyuan Zhang, ... (+7 more)
👻 Ghosted cs.CR 39 3 years ago
169 Virtual Secure Platform: A Five-Stage Pipeline Processor over TFHE
Kotaro Matsuoka, Ryotaro Banno, ... (+3 more)
👻 Ghosted cs.CR 38 5 years ago
170 Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era
Changjiang Li, Li Wang, ... (+5 more)
👻 Ghosted cs.CR 38 4 years ago
171 Cached and Confused: Web Cache Deception in the Wild
Seyed Ali Mirheidari, Sajjad Arshad, ... (+4 more)
👻 Ghosted cs.CR 37 6 years ago
172 Silent Spring: Prototype Pollution Leads to Remote Code Execution in Node.js
Mikhail Shcherbakov, Musard Balliu, Cristian-Alexandru Staicu
👻 Ghosted cs.CR 36 3 years ago
173 Discovering Flaws in Security-Focused Static Analysis Tools for Android using Systematic Mutation
Richard Bonett, Kaushal Kafle, ... (+3 more)
👻 Ghosted cs.CR 35 7 years ago
174 PrivGraph: Differentially Private Graph Data Publication by Exploiting Community Information
Quan Yuan, Zhikun Zhang, ... (+4 more)
👻 Ghosted cs.CR 35 3 years ago
175 UnGANable: Defending Against GAN-based Face Manipulation
Zheng Li, Ning Yu, ... (+4 more)
👻 Ghosted cs.CR 35 3 years ago
176 UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband
Mridula Singh, Patrick Leu, ... (+2 more)
👻 Ghosted cs.CR 34 6 years ago
177 Hot Pixels: Frequency, Power, and Temperature Attacks on GPUs and ARM SoCs
Hritvik Taneja, Jason Kim, ... (+4 more)
👻 Ghosted cs.CR 34 2 years ago
178 Black-box Adversarial Example Attack towards FCG Based Android Malware Detection under Incomplete Feature Information
Heng Li, Zhang Cheng, ... (+5 more)
👻 Ghosted cs.SE 34 3 years ago
179 Effective Notification Campaigns on the Web: A Matter of Trust, Framing, and Support
Max Maass, Alina Stöver, ... (+5 more)
👻 Ghosted cs.CR 33 5 years ago
180 Measuring I2P Censorship at a Global Scale
Nguyen Phong Hoang, Sadie Doreen, Michalis Polychronakis
👻 Ghosted cs.CY 33 6 years ago
181 A Linear Reconstruction Approach for Attribute Inference Attacks against Synthetic Data
Meenatchi Sundaram Muthu Selva Annamalai, Andrea Gadotti, Luc Rocher
👻 Ghosted cs.LG 33 3 years ago
182 Attacks on Deidentification's Defenses
Aloni Cohen
👻 Ghosted cs.CR 33 4 years ago
183 Fine-grained Poisoning Attack to Local Differential Privacy Protocols for Mean and Variance Estimation
Xiaoguang Li, Ninghui Li, ... (+3 more)
👻 Ghosted cs.CR 32 3 years ago
184 Detecting stuffing of a user's credentials at her own accounts
Ke Coby Wang, Michael K. Reiter
👻 Ghosted cs.CR 31 6 years ago
185 Reverse Engineering x86 Processor Microcode
Philipp Koppe, Benjamin Kollenda, ... (+5 more)
👻 Ghosted cs.CR 31 6 years ago
186 ALOHA: Auxiliary Loss Optimization for Hypothesis Augmentation
Ethan M. Rudd, Felipe N. Ducau, ... (+3 more)
👻 Ghosted cs.CR 31 7 years ago
187 Bug Hunters' Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem
Omer Akgul, Taha Eghtesad, ... (+6 more)
👻 Ghosted cs.CR 31 3 years ago
188 TrustBase: An Architecture to Repair and Strengthen Certificate-based Authentication
Mark O'Neill, Scott Heidbrink, ... (+5 more)
👻 Ghosted cs.CR 30 9 years ago
189 ACAI: Protecting Accelerator Execution with Arm Confidential Computing Architecture
Supraja Sridhara, Andrin Bertschi, ... (+4 more)
👻 Ghosted cs.CR 30 2 years ago
190 Injection Attacks Reloaded: Tunnelling Malicious Payloads over DNS
Philipp Jeitner, Haya Shulman
👻 Ghosted cs.CR 30 3 years ago
191 WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring
Stefano Calzavara, Riccardo Focardi, ... (+4 more)
👻 Ghosted cs.CR 29 7 years ago
192 Adversarial Illusions in Multi-Modal Embeddings
Tingwei Zhang, Rishi Jha, ... (+2 more)
👻 Ghosted cs.CR 29 2 years ago
193 Rethinking White-Box Watermarks on Deep Learning Models under Neural Structural Obfuscation
Yifan Yan, Xudong Pan, ... (+2 more)
👻 Ghosted cs.CR 29 3 years ago
194 ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks
Phillip Rieger, Marco Chilese, ... (+4 more)
👻 Ghosted cs.CR 29 3 years ago
195 Dynamic proofs of retrievability with low server storage
Gaspard Anthoine, Jean-Guillaume Dumas, ... (+5 more)
👻 Ghosted cs.CR 28 5 years ago
196 Website-Targeted False Content Injection by Network Operators
Gabi Nakibly, Jaime Schcolnik, Yossi Rubin
👻 Ghosted cs.CR 28 10 years ago
197 LLMmap: Fingerprinting For Large Language Models
Dario Pasquini, Evgenios M. Kornaropoulos, Giuseppe Ateniese
👻 Ghosted cs.CR 28 1 year ago
198 Pool Inference Attacks on Local Differential Privacy: Quantifying the Privacy Guarantees of Apple's Count Mean Sketch in Practice
Andrea Gadotti, Florimond Houssiau, ... (+2 more)
👻 Ghosted cs.CR 28 3 years ago
199 High Recovery with Fewer Injections: Practical Binary Volumetric Injection Attacks against Dynamic Searchable Encryption
Xianglong Zhang, Wei Wang, ... (+3 more)
👻 Ghosted cs.CR 28 3 years ago
200 On (The Lack Of) Location Privacy in Crowdsourcing Applications
Spyros Boukoros, Mathias Humbert, ... (+2 more)
👻 Ghosted cs.CR 27 7 years ago