| 151 |
Automatic Techniques to Systematically Discover New Heap Exploitation Primitives
Insu Yun, Dhaval Kapil, Taesoo Kim
|
👻
Ghosted
|
cs.CR
|
44 |
7 years ago |
| 152 |
Exploring ChatGPT's Capabilities on Vulnerability Management
Peiyu Liu, Junming Liu, ... (+8 more)
|
👻
Ghosted
|
cs.SE
|
44 |
2 years ago |
| 153 |
MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols
Qinying Wang, Shouling Ji, ... (+9 more)
|
👻
Ghosted
|
cs.CR
|
44 |
3 years ago |
| 154 |
ReZone: Disarming TrustZone with TEE Privilege Reduction
David Cerdeira, José Martins, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
44 |
4 years ago |
| 155 |
I Always Feel Like Somebody's Sensing Me! A Framework to Detect, Identify, and Localize Clandestine Wireless Sensors
Akash Deep Singh, Luis Garcia, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
43 |
5 years ago |
| 156 |
Security, Availability, and Multiple Information Sources: Exploring Update Behavior of System Administrators
Christian Tiefenau, Maximilian Häring, ... (+2 more)
|
👻
Ghosted
|
cs.HC
|
43 |
5 years ago |
| 157 |
Heckler: Breaking Confidential VMs with Malicious Interrupts
Benedict Schlüter, Supraja Sridhara, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
43 |
2 years ago |
| 158 |
A Highly Accurate Query-Recovery Attack against Searchable Encryption using Non-Indexed Documents
Marc Damie, Florian Hahn, Andreas Peter
|
👻
Ghosted
|
cs.CR
|
43 |
2 years ago |
| 159 |
Iodine: Verifying Constant-Time Execution of Hardware
Klaus v. Gleissenthall, Rami Gökhan Kıcı, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
42 |
6 years ago |
| 160 |
TPatch: A Triggered Physical Adversarial Patch
Wenjun Zhu, Xiaoyu Ji, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
42 |
2 years ago |
| 161 |
Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy Labels at Scale
Yue Xiao, Zhengyi Li, ... (+5 more)
|
👻
Ghosted
|
cs.CR
|
42 |
3 years ago |
| 162 |
PoisonedEncoder: Poisoning the Unlabeled Pre-training Data in Contrastive Learning
Hongbin Liu, Jinyuan Jia, Neil Zhenqiang Gong
|
👻
Ghosted
|
cs.CR
|
42 |
3 years ago |
| 163 |
Defending against malicious peripherals with Cinch
Sebastian Angel, Riad S. Wahby, ... (+6 more)
|
👻
Ghosted
|
cs.OS
|
41 |
10 years ago |
| 164 |
We Have a Package for You! A Comprehensive Analysis of Package Hallucinations by Code Generating LLMs
Joseph Spracklen, Raveen Wijewickrama, ... (+4 more)
|
👻
Ghosted
|
cs.SE
|
41 |
1 year ago |
| 165 |
MAGE: Mutual Attestation for a Group of Enclaves without Trusted Third Parties
Guoxing Chen, Yinqian Zhang
|
👻
Ghosted
|
cs.CR
|
40 |
5 years ago |
| 166 |
How Do Tor Users Interact With Onion Services?
Philipp Winter, Anne Edmundson, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
40 |
7 years ago |
| 167 |
Elasticlave: An Efficient Memory Model for Enclaves
Zhijingcheng Yu, Shweta Shinde, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
39 |
5 years ago |
| 168 |
Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks
Jialai Wang, Ziyuan Zhang, ... (+7 more)
|
👻
Ghosted
|
cs.CR
|
39 |
3 years ago |
| 169 |
Virtual Secure Platform: A Five-Stage Pipeline Processor over TFHE
Kotaro Matsuoka, Ryotaro Banno, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
38 |
5 years ago |
| 170 |
Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era
Changjiang Li, Li Wang, ... (+5 more)
|
👻
Ghosted
|
cs.CR
|
38 |
4 years ago |
| 171 |
Cached and Confused: Web Cache Deception in the Wild
Seyed Ali Mirheidari, Sajjad Arshad, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
37 |
6 years ago |
| 172 |
Silent Spring: Prototype Pollution Leads to Remote Code Execution in Node.js
Mikhail Shcherbakov, Musard Balliu, Cristian-Alexandru Staicu
|
👻
Ghosted
|
cs.CR
|
36 |
3 years ago |
| 173 |
Discovering Flaws in Security-Focused Static Analysis Tools for Android using Systematic Mutation
Richard Bonett, Kaushal Kafle, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
35 |
7 years ago |
| 174 |
PrivGraph: Differentially Private Graph Data Publication by Exploiting Community Information
Quan Yuan, Zhikun Zhang, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
35 |
3 years ago |
| 175 |
UnGANable: Defending Against GAN-based Face Manipulation
Zheng Li, Ning Yu, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
35 |
3 years ago |
| 176 |
UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband
Mridula Singh, Patrick Leu, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
34 |
6 years ago |
| 177 |
Hot Pixels: Frequency, Power, and Temperature Attacks on GPUs and ARM SoCs
Hritvik Taneja, Jason Kim, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
34 |
2 years ago |
| 178 |
Black-box Adversarial Example Attack towards FCG Based Android Malware Detection under Incomplete Feature Information
Heng Li, Zhang Cheng, ... (+5 more)
|
👻
Ghosted
|
cs.SE
|
34 |
3 years ago |
| 179 |
Effective Notification Campaigns on the Web: A Matter of Trust, Framing, and Support
Max Maass, Alina Stöver, ... (+5 more)
|
👻
Ghosted
|
cs.CR
|
33 |
5 years ago |
| 180 |
Measuring I2P Censorship at a Global Scale
Nguyen Phong Hoang, Sadie Doreen, Michalis Polychronakis
|
👻
Ghosted
|
cs.CY
|
33 |
6 years ago |
| 181 |
A Linear Reconstruction Approach for Attribute Inference Attacks against Synthetic Data
Meenatchi Sundaram Muthu Selva Annamalai, Andrea Gadotti, Luc Rocher
|
👻
Ghosted
|
cs.LG
|
33 |
3 years ago |
| 182 |
Attacks on Deidentification's Defenses
Aloni Cohen
|
👻
Ghosted
|
cs.CR
|
33 |
4 years ago |
| 183 |
Fine-grained Poisoning Attack to Local Differential Privacy Protocols for Mean and Variance Estimation
Xiaoguang Li, Ninghui Li, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
32 |
3 years ago |
| 184 |
Detecting stuffing of a user's credentials at her own accounts
Ke Coby Wang, Michael K. Reiter
|
👻
Ghosted
|
cs.CR
|
31 |
6 years ago |
| 185 |
Reverse Engineering x86 Processor Microcode
Philipp Koppe, Benjamin Kollenda, ... (+5 more)
|
👻
Ghosted
|
cs.CR
|
31 |
6 years ago |
| 186 |
ALOHA: Auxiliary Loss Optimization for Hypothesis Augmentation
Ethan M. Rudd, Felipe N. Ducau, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
31 |
7 years ago |
| 187 |
Bug Hunters' Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem
Omer Akgul, Taha Eghtesad, ... (+6 more)
|
👻
Ghosted
|
cs.CR
|
31 |
3 years ago |
| 188 |
TrustBase: An Architecture to Repair and Strengthen Certificate-based Authentication
Mark O'Neill, Scott Heidbrink, ... (+5 more)
|
👻
Ghosted
|
cs.CR
|
30 |
9 years ago |
| 189 |
ACAI: Protecting Accelerator Execution with Arm Confidential Computing Architecture
Supraja Sridhara, Andrin Bertschi, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
30 |
2 years ago |
| 190 |
Injection Attacks Reloaded: Tunnelling Malicious Payloads over DNS
Philipp Jeitner, Haya Shulman
|
👻
Ghosted
|
cs.CR
|
30 |
3 years ago |
| 191 |
WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring
Stefano Calzavara, Riccardo Focardi, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
29 |
7 years ago |
| 192 |
Adversarial Illusions in Multi-Modal Embeddings
Tingwei Zhang, Rishi Jha, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
29 |
2 years ago |
| 193 |
Rethinking White-Box Watermarks on Deep Learning Models under Neural Structural Obfuscation
Yifan Yan, Xudong Pan, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
29 |
3 years ago |
| 194 |
ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks
Phillip Rieger, Marco Chilese, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
29 |
3 years ago |
| 195 |
Dynamic proofs of retrievability with low server storage
Gaspard Anthoine, Jean-Guillaume Dumas, ... (+5 more)
|
👻
Ghosted
|
cs.CR
|
28 |
5 years ago |
| 196 |
Website-Targeted False Content Injection by Network Operators
Gabi Nakibly, Jaime Schcolnik, Yossi Rubin
|
👻
Ghosted
|
cs.CR
|
28 |
10 years ago |
| 197 |
LLMmap: Fingerprinting For Large Language Models
Dario Pasquini, Evgenios M. Kornaropoulos, Giuseppe Ateniese
|
👻
Ghosted
|
cs.CR
|
28 |
1 year ago |
| 198 |
Pool Inference Attacks on Local Differential Privacy: Quantifying the Privacy Guarantees of Apple's Count Mean Sketch in Practice
Andrea Gadotti, Florimond Houssiau, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
28 |
3 years ago |
| 199 |
High Recovery with Fewer Injections: Practical Binary Volumetric Injection Attacks against Dynamic Searchable Encryption
Xianglong Zhang, Wei Wang, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
28 |
3 years ago |
| 200 |
On (The Lack Of) Location Privacy in Crowdsourcing Applications
Spyros Boukoros, Mathias Humbert, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
27 |
7 years ago |