Editor's Picks

Best Talks at IEEE Symposium on Security and Privacy 2024

Hand-picked from in-depth reviewer verdicts — the top 12 talks from this conference. Skip the noise, find the signal.

← All talks at IEEE Symposium on Security and Privacy 2024

  1. 1

    No Privacy Left Outside: On the (In-)Security of TEE-Shielded DNN Partition for On-Device ML

    Ziqi Zhang, Chen Gong, Yifeng Cai, Yuanyuan Yuan, Bingyan Liu, Shuai Wang

    In an era where machine learning (ML) models are both immensely valuable and deeply integrated into private applications, their secure deployment on edge devices presents significant challenges. This talk, delivered by Ziqi Zhang, a postdoctoral researcher at the University of…

    0 Dr. Zero MUST SEE ★★★★★ H Heather Calloway MUST SEE ★★★★★
  2. 2

    TCP Spoofing: Reliable Payload Transmission Past the Spoofed TCP Handshake

    Yepeng Pan, Christian Rossow

    This talk, "TCP Spoofing: Reliable Payload Transmission Past the Spoofed TCP Handshake," presented by Yepeng Pan and Christian Rossow at IEEE S&P, delves into advanced techniques for exploiting TCP spoofing vulnerabilities. While traditional TCP spoofing attacks have focused…

    0 Dr. Zero MUST SEE ★★★★★ H Heather Calloway MUST SEE ★★★★★
  3. 3

    Prune+PlumTree - Finding Eviction Sets at Scale

    Tom Kessous, Niv Gilboa

    The talk "Prune+PlumTree - Finding Eviction Sets at Scale" by Tom Kessous and Niv Gilboa introduces a groundbreaking algorithm designed to rapidly identify a large number of **eviction sets** within a CPU cache. An eviction set is a critical component for **cache side-channel…

    0 Dr. Zero MUST SEE ★★★★★ H Heather Calloway MUST SEE ★★★★★
  4. 4

    INVISILINE: Invisible Plausibly-Deniable Storage

    Sandeep Kiran Pinjala, Bogdan Carbunar, Anrin Chakraborti, Radu Sion

    In this talk, Sandeep Kiran Pinjala, a PhD student at Stony Brook University, presents "INVISILINE," a novel system for invisible, plausibly-deniable storage. The work, a collaboration with Professors Bogdan Carbunar, Anrin Chakraborti, and Radu Sion, addresses a critical…

    0 Dr. Zero MUST SEE ★★★★★ H Heather Calloway MUST SEE ★★★★★
  5. 5

    SoK: Security and Privacy of Blockchain Interoperability

    Andre Augusto, Rafael Belchior, Miguel Nuno Dias Alves Pupo Correia, Andre Vasconcelos, Luyao Zhang, Thomas Hardjono

    Blockchain interoperability, the ability for disparate blockchain systems to communicate and exchange assets or data, is a cornerstone of the burgeoning Web3 ecosystem. However, this critical functionality has become a prominent target for malicious actors, leading to…

    0 Dr. Zero MUST SEE ★★★★★ H Heather Calloway MUST SEE ★★★★★
  6. 6

    Multi-Instance Adversarial Attack on GNN-Based Malicious Domain Detection

    Mahmoud Nazzal, Issa Khalil, Abdallah Khreishah, NhatHai Phan, Yao Ma

    This talk, presented by Mahmoud Nazzal, delves into a critical vulnerability within **Graph Neural Networks (GNNs)** when applied to security-critical tasks, specifically **Malicious Domain Detection (MDD)**. The research introduces a novel **multi-instance adversarial attack**…

    0 Dr. Zero MUST SEE ★★★★★ H Heather Calloway MUST SEE ★★★★★
  7. 7

    A Representative Study on Human Detection of Artificially Generated Media Across Countries

    Joel Frank, Franziska Herbert, Jonas Ricker, Lea Schönherr, Thorsten Eisenhofer, Asja Fischer

    In an era increasingly shaped by sophisticated artificial intelligence, the line between authentic and artificially generated media has become dangerously blurred. This IEEE S&P talk, presented by Joel Frank and his colleagues, delves into a critical question: can humans…

    0 Dr. Zero MUST SEE ★★★★★ H Heather Calloway MUST SEE ★★★★★
  8. 8

    Nightshade: Prompt-Specific Poisoning Attacks on Text-to-Image Generative Models

    Shawn Shan, Wenxin Ding, Josephine Passananti, Stanley Wu, Haitao Zheng, Ben Y. Zhao

    This talk introduces **Nightshade**, a novel data poisoning attack designed to protect copyrighted content from unauthorized use in **text-to-image generative AI models**. Presented by Shawn Shan and his co-authors, Nightshade addresses the growing challenge faced by content…

    0 Dr. Zero MUST SEE ★★★★★ H Heather Calloway MUST SEE ★★★★★
  9. 9

    INTFAIL: Using Spurious #VC Interrupts to Break AMD SEV-SNP

    Benedict Schlüter, Supraja Sridhara, Andrin Bertschi, Shweta Shinde

    This talk, "INTFAIL: Using Spurious #VC Interrupts to Break AMD SEV-SNP," delves into a critical vulnerability discovered in **AMD Secure Encrypted Virtualization-Secure Nested Paging (SEV-SNP)**, the latest and most robust generation of AMD's confidential computing processors…

    0 Dr. Zero MUST SEE ★★★★★ H Heather Calloway MUST SEE ★★★★★
  10. 10

    BUSted!!! Microarchitectural Side-Channel Attacks on the MCU Bus Interconnect

    Cristiano Rodrigues, Daniel Oliveira, Sandro Pinto

    The talk "BUSted!!! Microarchitectural Side-Channel Attacks on the MCU Bus Interconnect," presented by Cristiano Rodrigues, Daniel Oliveira, and Sandro Pinto from the University of Minho, Portugal, unveils a groundbreaking new class of microarchitectural side-channel attacks…

    0 Dr. Zero MUST SEE ★★★★★ H Heather Calloway MUST SEE ★★★★★
  11. 11

    LOKI: Large-scale Data Reconstruction Attack against Federated Learning through Model Manipulation

    Joshua C. Zhao, Atul Sharma, Ahmed Roushdy Elkordy, Yahya H. Ezzeldin, Salman Avestimehr, Saurabh Bagchi

    This article delves into LOKI, a groundbreaking data reconstruction attack designed to compromise the privacy of Federated Learning (FL) systems through sophisticated model manipulation. Presented by Joshua C. Zhao and his collaborators from Purdue University and the University…

    0 Dr. Zero MUST SEE ★★★★★ H Heather Calloway MUST SEE ★★★★★
  12. 12

    Routing Attacks on Cryptocurrency Mining Pools

    Muoi Tran, Theo von Arx, Laurent Vanbever

    This talk, "Routing Attacks on Cryptocurrency Mining Pools," delivered by Muoi Tran, Theo von Arx, and Laurent Vanbever at IEEE S&P, unveils a critical vulnerability in the infrastructure supporting modern cryptocurrencies. The presentation meticulously details how…

    0 Dr. Zero MUST SEE ★★★★★ H Heather Calloway MUST SEE ★★★★★