IEEE Symposium on Security and Privacy 2025
The premier academic forum for computer security and electronic privacy research, held annually since 1980.
→ See editor’s top picks at IEEE Symposium on Security and Privacy 2025
- SoK: Digging into the Digital Underworld of Stolen Data Markets — Tina Marjanov, Alice Hutchings
- Characterizing Robocalls with Multiple Vantage Points — Sathvik Prasad, Aleksandr Nahapetyan, Bradley ReavesNorth Carolina State
- Understanding the Efficacy of Phishing Training in Practice — Grant Ho, Ariana Mirian, Elisa Luo, Khang Tong, Euyhyun Lee, Lin Liu
- Restricting the Link: Effects of Focused Attention and Time Delay on Phishing Warning Effectiveness — Justin Petelka, Benjamin Berens, Carlo Sugatan, Melanie Volkamer, Florian Schaub
- (Blind) Users Really Do Heed Aural Telephone Scam Warnings — Filipo Sharevski, Jennifer Vander Loop, Bill Evans, Alexander Ponticello
- Identifying Incoherent Search Sessions: Search Click Fraud Remediation Under Real-World Constraints — Runze Zhang, Ranjita Pai Sridhar, Mingxuan Yao, Zheng Yang, David Oygenblik, Haichuan Xu
In the highly competitive landscape of online advertising, search engines operate on a pay-per-click (PPC) model, where advertisers compensate the search engine each time a user clicks on their ad…
- What We Talk About When We Talk About Logs: Understanding the Effects of Dataset Quality on Endpoint Threat Detection Research — Jason Liu, Adil Inam, Akul Goyal, Andy Riddle, Kim Westfall, Adam Bates
- CONnecting The EXtra doTS (CONTEXTS): Correlating External Information about Point of Interest for Attack Investigation — Sareh Mohammadi, Hugo Kermabon-Bobinnec, Azadeh Tabiban, Lingyu Wang, Tomás Navarro Múnera, Yosr Jarraya
- Ringtail: Practical Two-Round Threshold Signatures from Learning with Errors — Cecilia Boschini, Darya Kaviani, Russell W. F. Lai, Giulio Malavolta, Akira Takahashi, Mehdi Tibouchi
In an era increasingly shaped by the looming threat of quantum computing and the growing demand for robust cryptographic solutions, the talk "Ringtail: Practical Two-Round Threshold Signatures from…
- Groundhog: A Restart-based Systems Framework for Increasing Availability in Threshold Cryptosystems — Ashish Kashinath, Disha Agarwala, Gabriel Kulp, Sourav Das, Sibin Mohan, Radha Venkatagiri
- Ring Referral: Efficient Publicly Verifiable Ad hoc Credential Scheme with Issuer and Strong User Anonymity for Decentralized Identity and More — The Anh Ta, Xiangyu Hui, Sid Chi-Kin Chau
- Robust Threshold ECDSA with Online-Friendly Design in Three Rounds — Guofeng Tang, Haiyang Xue
This talk, presented by Guofeng Tang and Haiyang Xue from Simple Management University, introduces a groundbreaking advancement in **threshold ECDSA (Elliptic Curve Digital Signature Algorithm)**…
- Security Attacks Abusing Pulse-level Quantum Circuits — Chuanqi Xu, Jakub Szefer
- Phecda: Post-Quantum Transparent zkSNARKs from Improved Polynomial Commitment and VOLE-in-the-Head with Application in Publicly Verifiable AES — Changchang Ding, Yan HuangIndiana
- Gold OPRF: Post-Quantum Oblivious Power-Residue PRF — Yibin Yang, Fabrice Benhamouda, Shai Halevi, Hugo Krawczyk, Tal Rabin
- Benchmarking Attacks on Learning with Errors — Emily Wenger, Eshika Saxena, Mohamed Malhou, Ellie Thieu, Kristin Lauter
- Understanding Users' Security and Privacy Concerns and Attitudes Towards Conversational AI Platforms — Mutahar Ali, Arjun Arunasalam, Habiba Farrukh
- On the (In)Security of LLM App Stores — Xinyi Hou, Yanjie Zhao, Haoyu WangHuazhong
- GPTracker: A Large-Scale Measurement of Misused GPTs — Xinyue Shen, Yun Shen, Michael Backes, Yang Zhang
In an era where large language models (LLMs) are rapidly evolving into sophisticated agents capable of browsing the web, executing code, and integrating with external tools, the emergence of…
- Modifier Unlocked: Jailbreaking Text-to-Image Models Through Prompts — Shuofeng Liu, Mengyao Ma, Minhui Xue, Guangdong Bai
- Fuzz-Testing Meets LLM-Based Agents: An Automated and Efficient Framework for Jailbreaking Text-To-Image Generation Models — Yingkai Dong, Xiangtao Meng, Ning Yu, Zheng Li, Shanqing Guo
- On the Effectiveness of Prompt Stealing Attacks on In-The-Wild Prompts — Yicong Tan, Xinyue Shen, Yun Shen, Michael Backes, Yang Zhang
- Fun-tuning: Characterizing the Vulnerability of Proprietary LLMs to Optimization-based Prompt Injection Attacks via the Fine-Tuning Interface — Andrey Labunets, Nishit V. Pandya, Ashish Hooda, Xiaohan Fu, Earlence Fernandes
- HARMONYCLOAK: Making Music Unlearnable for Generative AI — Syed Irfan Ali Meerza, Lichao Sun, Jian Liu
- Hey, Your Secrets Leaked! Detecting and Characterizing Secret Leakage in the Wild — Jiawei Zhou, Zidong Zhang, Lingyun Ying, Huajun Chai, Jiuxin Cao, Haixin Duan
- Unveiling Security Vulnerabilities in Git Large File Storage Protocol — Yuan Chen, Qinying Wang, Yong Yang, Yuanchao Chen, Yuwei Li, Shouling Ji
- My Model is Malware to You: Transforming AI Models into Malware by Abusing TensorFlow APIs — Ruofan Zhu, Ganhao Chen, Wenbo Shen, Xiaofei Xie, Rui Chang
- Speedrunning the Maze: Meeting Regulatory Patching Deadlines in a Large Enterprise Environment — Gerbrand ten Napel, Michel van Eeten, Simon ParkinDelft
- A Deep Dive Into How Open-Source Project Maintainers Review and Resolve Bug Bounty Reports — Jessy Ayala, Steven Ngo, Joshua Garcia
- Study Club, Labor Union or Start-Up? Characterizing Teams and Collaboration in the Bug Bounty Ecosystem — Yangheran Piao, Temima Hrle, Daniel W. Woods, Ross Anderson
- Codebreaker: Dynamic Extraction Attacks on Code Language Models — Changzhou Han, Zehang Deng, Wanlun Ma, Xiaogang Zhu, Jason (Minhui) Xue, Tianqing Zhu
- Make a Feint to the East While Attacking in the West: Blinding LLM-Based Code Auditors with Flashboom Attacks — Xiao Li, Yue Li, Hao Wu, Yue Zhang, Kaidi Xu, Xiuzhen Cheng
- Post-quantum Cryptographic Analysis of SSH — Benjamin Benčina, Benjamin Dowling, Varun Maram, Keita Xagawa
- SoK: Dlog-based Distributed Key Generation — Renas Bacho, Alireza Kavousi
- Verifiable Secret Sharing Simplified — Sourav Das, Zhuolun Xiang, Alin Tomescu, Alexander Spiegelman, Benny Pinkas, Ling Ren
- Clubcards for the WebPKI: smaller certificate revocation tests in theory and practice — John Schanck
- AccuRevoke: Enhancing Certificate Revocation with Distributed Cryptographic Accumulators — Munshi Rejwan Ala Muid, Tijay Chung, Thang Hoang
The internet relies heavily on **TLS certificates** to establish trust and secure communication between clients and websites. When a website's private key is compromised, its certificate must be…
- RankGuess: Password Guessing Using Adversarial Ranking — Tao Yang, Ding WangNankai
- Security Analysis of Master-Password-Protected Password Management Protocols — Yihe Duan, Ding Wang, Yanduo FuNankai
- Open Sesame! On the Security and Memorability of Verbal Passwords — Eunsoo Kim, Kiho Lee, Doowon Kim, Hyoungshick Kim
This talk, "Open Sesame! On the Security and Memorability of Verbal Passwords," presented by Eunsoo Kim from Sanguan University, delves into the critical aspects of security and memorability for…
- CMASan: Custom Memory Allocator-aware Address Sanitizer — Junwha Hong, Wonil Jang, Mijung Kim, Lei Yu, Yonghwi Kwon, Yuseok Jeon
In the realm of software security, memory safety bugs remain a persistent and critical threat. Tools like **AddressSanitizer (ASan)** have become indispensable for detecting common memory errors…
- GoSonar: Detecting Logical Vulnerabilities in Memory Safe Language Using Inductive Constraint Reasoning — Md Sakib Anwar, Carter Yagemann, Zhiqiang LinThe Ohio State
- Evaluating the Effectiveness of Memory Safety Sanitizers — Emanuel Vintila, Philipp Zieris, Julian Horsch
- SwiftSweeper: Defeating Use-After-Free Bugs Using Memory Sweeper Without Stop-the-World — Junho Ahn, Kanghyuk Lee, Chanyoung Park, Hyungon Moon, Youngjin Kwon
The talk "SwiftSweeper: Defeating Use-After-Free Bugs Using Memory Sweeper Without Stop-the-World," presented by Junho Ahn and co-authored by Kanghyuk Lee, Chanyoung Park, Hyungon Moon, and Youngjin…
- BridgeRouter: Automated Capability Upgrading of Out-Of-Bounds Write Vulnerabilities to Arbitrary Memory Write Primitives in the Linux Kernel — Dongchen Xie, Dongnan He, Wei You, Jianjun Huang, Bin Liang, Shuitao Gan
- Mon CHÉRI: Mitigating Uninitialized Memory Access with Conditional Capabilities — Merve Gülmez, Håkan Englund, Jan Tobias Mühlberg, Thomas Nyman
- SoK: Challenges and Paths Toward Memory Safety for eBPF — Kaiming Huang, Mathias Payer, Zhiyun Qian, Jack Sampson, Gang Tan, Trent Jaeger
- IUBIK: Isolating User Bytes in Commodity Operating System Kernels via Memory Tagging Extensions — Marius Momeu, Alexander J. Gaidis, Jasper von der Heidt, Vasileios P. Kemerlis
Despite decades of dedicated research and significant advancements in software engineering, memory safety vulnerabilities continue to pose a formidable threat to the integrity and security of…
- Predator: Directed Web Application Fuzzing for Efficient Vulnerability Validation — Chenlin Wang, Wei Meng, Changhua Luo, Penghui Li
- MOCGuard: Automatically Detecting Missing-Owner-Check Vulnerabilities in Java Web Applications — Fengyu Liu, Youkun Shi, Yuan Zhang, Guangliang Yang, Enhao Li, Min Yang
- RGFuzz: Rule-Guided Fuzzer for WebAssembly Runtimes — JunYoung Park, Yunho Kim, Insu Yun
In this insightful talk from IEEE S&P, JunYoung Park, Yunho Kim, and Insu Yun introduce **RGFuzz**, a novel **rule-guided fuzzer** specifically designed to uncover **semantic bugs** within…
- RaceDB: Detecting Request Race Vulnerabilities in Database-Backed Web Applications — An Chen, Yonghwi Kwon, Kyu Hyung Lee
- PFORTIFIER: Mitigating PHP Object Injection through Automatic Patch Generation — Bo Pang, Yiheng Zhang, Mingzhe Gao, Junzhe Zhang, Ligeng Chen, Mingxue Zhang
- Detecting Taint-Style Vulnerabilities in Microservice-Structured Web Applications — Fengyu Liu, Yuan Zhang, Tian Chen, Youkun Shi, Guangliang Yang, Zihan Lin
- Follow My Flow: Unveiling Client-Side Prototype Pollution Gadgets from One Million Real-World Websites — Zifeng Kang, Muxi Lyu, Zhengyu Liu, Jianjia Yu, Runqi Fan, Song Li
This talk introduces "Follow My Flow," a groundbreaking research effort to identify and analyze **client-side prototype pollution gadgets** across a vast dataset of real-world websites. Presented by…
- “Only as Strong as the Weakest Link”: On the Security of Brokered Single Sign-On on the Web — Tommaso Innocenti, Louis Jannett, Christian Mainka, Vladislav Mladenov, Engin Kirda
- SoK: Space Infrastructures Vulnerabilities, Attacks and Defenses — Jose Luis Castanon Remy, Ekzhin Ear, Caleb Chang, Antonia Feffer, Shouhuai Xu
- Space RadSim: Binary-Agnostic Fault Injection to Evaluate Cosmic Radiation Impact on Exploit Mitigation Techniques in Space — Johannes Willbold, Tobias Cloosters, Moritz Schloegel, Simon Wörner, Felix Buchmann, Lucas Davi
- Mind the Location Leakage in LEO Direct-to-Cell Satellite Networks — Weisen Liu, Zeqi Lai, Qian Wu, Hewu Li, Yuxuan Weng, Wei Liu
- From Control to Chaos: A Comprehensive Formal Analysis of 5G's Access Control — Mujtahid Akon, Md Toufikuzzaman, Syed Rafiul HussainPennsylvania State
- BaseBridge: Bridging the Gap between Emulation and Over-The-Air Testing for Cellular Baseband Firmware — Daniel Klischies, Dyon Goos, David Hirsch, Alyssa Milburn, Marius Muench, Veelasha Moonsamy
- Stateful Analysis and Fuzzing of Commercial Baseband Firmware — Ali Ranjbar, Tianchang Yang, Kai Tu, Saaman Khalilollahi, Syed Rafiul HussainPennsylvania State
In this compelling talk from IEEE S&P, Ali Ranjbar, alongside his colleagues from Pennsylvania State, unveiled **Loris**, a novel framework designed for the stateful analysis and fuzzing of…
- PGUS: Pretty Good User Security for Thick MVNOs with a Novel Sanitizable Blind Signature — Yang Yang, Quan Shi, Prosanta Gope, Behzad Abdolmaleki, Biplab Sikdar
- Invade the Walled Garden: Evaluating GTP Security in Cellular Networks — Yiming Zhang, Tao Wan, Yaru Yang, Haixin Duan, Yichen Wang, Jianjun Chen
- SoK: A Privacy Framework for Security Research Using Social Media Data — Kyle Beadle, Kieron Ivy Turk, Aliai Eusebi, Mindy Tran, Marilyne Ordekian, Enrico Mariconti
- GDPR in the Small: a field study of privacy and security challenges in schools — Francesco Ciclosi, Giovanna Varni, Fabio Massacci
- ”Sorry for bugging you so much.“ Exploring Developers’ Behavior Towards Privacy-Compliant Implementation — Stefan Albert Horstmann, Sandy Hong, David Klein, Raphael Serafini, Martin Degeling, Martin Johns
In an era defined by stringent data protection regulations such as the General Data Protection Regulation (GDPR) in the European Union and the California Consumer Privacy Act (CCPA), companies face…
- A Low-Cost Privacy-Preserving Digital Wallet for Humanitarian Aid Distribution — Eva Luvison, Sylvain Chatel, Justinas Sukaitis, Vincent Graf Narbel, Carmela Troncoso, Wouter Lueks
In this compelling talk from IEEE S&P, Eva Luvison and her co-authors present a novel solution for digitizing humanitarian aid distribution, specifically focusing on budget allocation. The…
- Teaching Data Science Students to Sketch Privacy Designs through Heuristics — Jinhe Wen, Yingxi Zhao, Wenqian Xu, Yaxing Yao, Haojian Jin
- Characterizing the Usability and Usefulness of U.S. Ad Transparency Systems — Kevin Bryson, Arthur Borem, Phoebe Moh, Omer Akgul, Laura Edelson, Tobias Lauinger
- Supporting Family Discussions About Digital Privacy Through Perspective-Taking: An Empirical Investigation — Zikai Wen, Lanjing Liu, Yaxing Yao
Digital privacy has become an increasingly complex and contentious topic within families, particularly as adolescents navigate the burgeoning landscape of social media. The talk, "Supporting Family…
- The Importance of Being Earnest: Shedding Light on Johnny's (False) Sense of Privacy — Wirawan Agahari, Alexandra Dirksen, Martin Johns, Mark de Reuver, Tobias Fiebig
- Learning from Censored Experiences: Social Media Discussions around Censorship Circumvention Technologies — Elham Pourabbas Vafa, Mohit Singhal, Poojitha Thota, Sayak Saha Roy
- Transport Layer Obscurity: Circumventing SNI Censorship on the TLS Layer — Niklas Niere, Felix Lange, Juraj Somorovsky, Robert Merget
- A Wall Behind A Wall: Emerging Regional Censorship in China — Mingshi Wu, Ali Zohaib, Zakir Durumeric, Amir Houmansadr, Eric Wustrow
- Anix: Anonymous Blackout-Resistant Microblogging with Message Endorsing — Sina Kamali, Diogo Barradas
- Is Nobody There? Good! Globally Measuring Connection Tampering without Responsive Endhosts — Sadia Nourin, Erik Rye, Kevin Bock, Nguyen Phong Hoang, Dave Levin
This talk introduces **Mint** (Measuring Interference with Non-responsive Targets), a groundbreaking tool designed to conduct global network interference measurements without the need for responsive…
- CountMamba: A Generalized Website Fingerprinting Attack via Coarse-Grained Representation and Fine-Grained Prediction — Xianwen Deng, Ruijie Zhao, Yanhao Wang, Mingwei Zhan, Zhi Xue, Yijun Wang
- Provably Robust and Secure Steganography in Asymmetric Resource Scenarios — Minhao Bai, Jinshuai Yang, Kaiyi Pang, Xin Xu, Zhen Yang, Yongfeng Huang
- Sparta: Practical Anonymity with Long-Term Resistance to Traffic Analysis — Kyle Fredrickson, Ioannis Demertzis, James Hughes, Darrell Long
In an era where digital communication is ubiquitous, the talk "Sparta: Practical Anonymity with Long-Term Resistance to Traffic Analysis" by Kyle Fredrickson and co-authors introduces a…
- P2C2T: Preserving the Privacy of Cross-Chain Transfer — Panpan Han, Zheng Yan, Laurence T. Yang, Elisa Bertino
- Liquefaction: Privately Liquefying Blockchain Assets — James Austgen, Mahimna Kelkar, Andrés Fábrega, Dani Vilardell, Sarah Allen, Kushal Babel
- Decentralization of Ethereum's Builder Market — Sen Yang, Kartik Nayak, Fan Zhang
- A Composability Analysis Framework for Web3 Wallet Recovery Mechanisms — Panagiotis Chatzigiannis, Coby Wang, Sunpreet Arora, Mohsen Minaei
The proliferation of Web3 technologies, particularly decentralized finance (DeFi) and non-fungible tokens (NFTs), has brought with it a critical challenge: secure and reliable management of private…
- Signature-Free Atomic Broadcast with Optimal $O(n^2)$ Messages and $O(1)$ Expected Time — Xiao Sui, Xin Wang, Sisi Duan
- Warning! The Timeout T Cannot Protect You From Losing Coins, PipeSwap: Forcing the Timely Release of a Secret for Atomic Cross-Chain Swaps — Peifang Ni, Anqi Tian, Jing Xu
- Asymmetric Mempool DoS Security: Formal Definitions and Provable Secure Designs — Wanning Ding, Yuzhe Tang, Yibo WangSyracuse
In the fast-evolving landscape of blockchain technology, the **mempool** (memory pool) serves as a critical staging area for unconfirmed transactions. It acts as a buffer where transactions await…
- Papercraft: Lattice-based Verifiable Delay Function Implemented — Michał Osadnik, Darya Kaviani, Valerio Cini, Russell W. F. Lai, Giulio Malavolta
- Preference Poisoning Attacks on Reward Model Learning — Junlin Wu, Jiongxiao Wang, Chaowei Xiao, Chenguang Wang, Ning Zhang, Yevgeniy Vorobeychik
- Query Provenance Analysis: Efficient and Robust Defense against Query-based Black-box Attacks — Shaofei Li, Ziqi Zhang, Haomin Jia, Yao Guo, Xiangqun Chen, Ding Li
- Architectural Neural Backdoors from First Principles — Harry Langford, Ilia Shumailov, Yiren Zhao, Robert Mullins, Nicolas Papernot
- BAIT: Large Language Model Backdoor Scanning by Inverting Attack Target — Guangyu Shen, Siyuan Cheng, Zhuo Zhang, Guanhong Tao, Kaiyuan Zhang, Hanxi Guo
- Prompt Inversion Attack against Collaborative Inference of Large Language Models — Wenjie Qu, Yuguang Zhou, Yongji Wu, Tingsong Xiao, Binhang Yuan, Yiming Li
- PEFTGuard: Detecting Backdoor Attacks Against Parameter-Efficient Fine-Tuning — Zhen Sun, Tianshuo Cong, Yule Liu, Chenhao Lin, Xinlei He, Rongmao Chen
- Secure Transfer Learning: Training Clean Model Against Backdoor in Pre-Trained Encoder and Downstream Dataset — Yechao Zhang, Yuxuan Zhou, Tianyu Li, Minghui Li, Shengshan Hu, Wei Luo
- Practical Poisoning Attacks with Limited Byzantine Clients in Clustered Federated Learning — Viet Vo, Mengyao Ma, Guangdong Bai, Ryan Ko, Surya Nepal
- Beyond the Horizon: Uncovering Hosts and Services Behind Misconfigured Firewalls — Qing Deng, Juefei Pu, Zhaowei Tan, Zhiyun Qian, Srikanth V. Krishnamurthy
- MANTIS: Detection of Zero-Day Malicious Domains Leveraging Low Reputed Hosting Infrastructure — Fatih Deniz, Mohamed Nabeel, Ting Yu, Issa Khalil
- Resolution Without Dissent: In-Path Per-Query Sanitization to Defeat Surreptitious Communication Over DNS — Daiping Liu, Ruian Duan, Jun Wang
- SoK: Decoding the Enigma of Encrypted Network Traffic Classifiers — Nimesha Wickramasinghe, Arash Shaghaghi, Gene Tsudik, Sanjay Jha
- TrafficFormer: An Efficient Pre-trained Model for Traffic Data — Guangmeng Zhou, Xiongwen Guo, Zhuotao Liu, Tong Li, Qi Li, Ke Xu
- SCAD: Towards a Universal and Automated Network Side-Channel Vulnerability Detection — Keyu Man, Zhongjie Wang, Yu Hao, Shenghan Zheng, Xin'an Zhou, Yue Cao
- SYN Proof-of-Work: Improving Volumetric DoS Resilience in TCP — Samuel DeLaughter, Karen Sollins
- Low-cost and Robust Global Time Synchronization — Marc Wyss, Marc Frei, Jonghoon Kwon, Adrian Perrig
- Constant latency and finality for dynamically available DAG — Hans Schmiedel, Runchao Han, Qiang Tang, Ron Steinfeld, Jiangshan Yu
- Sailfish: Towards Improving the Latency of DAG-based BFT — Nibesh Shrestha, Rohan Shrothrium, Aniket Kate, Kartik Nayak
In the realm of distributed systems, achieving both high performance and robust fault tolerance is a perennial challenge. This talk introduces **Sailfish**, a novel **Byzantine Fault Tolerant…
- Cauchyproofs: Batch-Updatable Vector Commitment with Easy Aggregation and Application to Stateless Blockchains — Zhongtang Luo, Yanxue Jia, Alejandra Victoria Ospina Gracia, Aniket Kate
This talk introduces **Cauchyproofs**, a novel **batch-updatable vector commitment** scheme that leverages the algebraic structure of **KZG commitments** to achieve unprecedented efficiency in…
- MicroNova: Folding-based arguments with efficient (on-chain) verification — Jiaxing Zhao, Srinath Setty, Weidong Cui, Greg Zaverucha
- Permissionless Verifiable Information Dispersal (Data Availability for Bitcoin Rollups) — Ben Fisch, Arthur Lazzaretti, Zeyu Liu, Lei Yang
- An Attack on TON’s ADNL Secure Channel Protocol — Aviv Frenkel, Dmitry KoganFordefi
- VITARIT: Paying for Threshold Services on Bitcoin and Friends — Easwar Vivek Mangipudi, Sri AravindaKrishnan Thyagarajan, Pratyay Mukherjee, Lucjan Hanzlik, Aniket Kate
In the rapidly evolving landscape of Web3, the demand for decentralized services, such as verifiable random functions (VRFs) and oracles, has surged. These services are critical for maintaining the…
- "Check-Before-you-Solve": Verifiable Time-lock Puzzles — Jiajun Xin, Dimitrios PapadopoulosHong Kong
In the realm of modern cryptography and decentralized systems, **time-lock puzzles (TLPs)** have emerged as a foundational primitive, enabling a variety of applications from secure auctions to…
- Verifiable Boosted Tree Ensembles — Stefano Calzavara, Lorenzo Cazzaro, Claudio Lucchese, Giulio Ermanno PibiriUniversità Ca' Foscari Venezia
- SoK: Dataset Copyright Auditing in Machine Learning Systems — Linkang Du, Xuanru Zhou, Min Chen, Chusong Zhang, Zhou Su, Peng Cheng
- GRID: Protecting Training Graph from Link Stealing Attacks on GNN Models — Jiadong Lou, Xu Yuan, Rui Zhang, Xingliang Yuan, Neil Zhenqiang Gong, Nian-Feng Tzeng
- TSQP: Safeguarding Real-Time Inference for Quantization Neural Networks on Edge Devices — Yu Sun, Gaojian Xiong, Jianhua Liu, Zheng Liu, Jian CuiBeihang
- Fight Fire with Fire: Combating Adversarial Patch Attacks using Pattern-randomized Defensive Patches — Jianan Feng, Jiachun Li, Changqing Miao, Jianjun Huang, Wei You, Wenchang Shi
- Alleviating the Fear of Losing Alignment in LLM Fine-tuning — Kang Yang, Guanhong Tao, Xun Chen, Jun Xu
- On the Conflict between Robustness and Learning in Collaborative Machine Learning — Mathilde Raynal, Carmela Troncoso
- DataSentinel: A Game-Theoretic Detection of Prompt Injection Attacks — Yupei Liu, Yuqi Jia, Jinyuan Jia, Dawn Song, Neil Zhenqiang Gong
- Ownership and Gatekeeping vs. Safeguarding and Consent: How Migrant Parents Navigate Child Data Management Complexities — Rui Huan, Kopo Marvin Ramokapane, Awais Rashid
- "It’s time. Time for digital security.”: An End User Study on Actionable Security and Privacy Advice — Anna Lena Rotthaler, Harshini Sri Ramulu, Lucy Simko, Sascha Fahl, Yasemin Acar
- Attitudes towards Client-Side Scanning in the USA and from the view-point of IT security experts — Lisa Geierhaas, Florin Martius, Arthi Arumugam, Matthew Smith
- "Why would money protect me from cyber bullying?": A Mixed-Methods Study of Personal Cyber Insurance — Rachiyta Jain, Temima Hrle, Margherita Marinetti, Adam Jenkins, Rainer Böhme, Daniel W Woods
- Security and Privacy Experiences of First- and Second-Generation Pakistani Immigrants to the US: Perceptions, Practices, Challenges, and Parent-Child Dynamics — Warda Usman, John Sadik, Taha, Ran Elgedawy, Scott Ruoti, Daniel Zappala
- Let's Get Visual - Testing Visual Analogies and Metaphors for Conveying Privacy Policies and Data Handling Information — Verena Zimmermann, Adrienn Toth, Hannah Sievers, Linda Fanconi, Yanis Isenring, Mona Henz
- “I’m pretty expert and I still screw it up”: Qualitative Insights into Experiences and Challenges of Designing and Implementing Cryptographic Library APIs — Juliane Schmüser, Philip Klostermeyer, Kay Friedrich, Sascha Fahl
- “We can’t change it overnight”: Understanding Industry Perspectives on IoT Product Security Compliance and Certification — Prianka Mandal, Adwait NadkarniWilliam & Mary
The proliferation of Internet of Things (IoT) devices has introduced a complex landscape of security and privacy challenges. In response, regulatory bodies worldwide have begun to introduce…
- OPERA: Achieving Secure and High-performance OLAP with Parallelized Homomorphic Comparisons — Qi HU, Wei Chen, Tianxiang Shen, Xin Yao, Nicholas Zhang, Heming Cui
- DataSeal: Ensuring the Verifiability of Private Computation on Encrypted Data — Muhammad Husni Santriaji, Jiaqi Xue, Yancheng Zhang, Qian Lou, Yan Solihin
- CHLOE: Loop Transformation over Fully Homomorphic Encryption via Multi-Level Vectorization and Control-Path Reduction — Song Bian, Zian Zhao, Ruiyu Shen, Zhou Zhang, Ran Mao, Dawei Li
The talk introduces CHLOE, an innovative compiler designed to significantly enhance the efficiency of programs leveraging Fully Homomorphic Encryption (FHE) by addressing one of FHE's most…
- Improved Constructions for Distributed Multi-Point Functions — Yaxin Tu, Matan Hamilis, Elette Boyle, Yuval Ishai, Niv Gilboa
- Preprocessing for Life: Dishonest-Majority MPC with a Trusted or Untrusted Dealer — Elette Boyle, Niv Gilboa, Matan Hamilis, Yuval Ishai, Ariel Nof
- MatriGear: Accelerating Authenticated Matrix Triple Generation with Scalable Prime Fields via Optimized HE Packing — HyunHo Cha, Intak Hwang, Seonhong Min, Jinyeong Seo, Yongsoo SongSeoul
- Shark: Actively Secure Inference using Function Secret Sharing — Kanav Gupta, Nishanth Chandran, Divya Gupta, Jonathan Katz, Rahul Sharma
- Rushing at SPDZ: On the Practical Security of Malicious MPC Implementations — Alexander Kyster, Frederik Huss Nielsen, Sabine Oechsner, Peter Scholl
- Rigging the Foundation: Manipulating Pre-training for Advanced Membership Inference Attacks — Zihao Wang, Rui Zhu, Zhikun Zhang, Haixu Tang, XiaoFeng Wang
- Not All Edges are Equally Robust: Evaluating the Robustness of Ranking-Based Federated Learning — Zirui Gong, Yanjun Zhang, Leo Yu Zhang, Zhaoxi Zhang, Yong Xiang, Shirui Pan
This talk, presented by Zirui Gong from Griffith University, delves into the often-overlooked security vulnerabilities within **Federated Learning (FL)** frameworks, specifically focusing on a…
- Edge Unlearning is Not "on Edge"! An Adaptive Exact Unlearning System on Resource-Constrained Devices — Xiaoyu Xia, Ziqi Wang, Ruoxi Sun, Bowen Liu, Ibrahim Khalil, Minhui Xue
- Towards Reliable Verification of Unauthorized Data Usage in Personalized Text-to-Image Diffusion Models — Boheng Li, Yanhao Wei, Yankai Fu, Zhenting Wang, Yiming Li, Jie Zhang
- Watermarking Language Models for Many Adaptive Users — Aloni Cohen, Alexander Hoover, Gabe SchoenbachThe
- UnMarker: A Universal Attack on Defensive Image Watermarking — Andre Kassis, Urs Hengartner
- SoK: Watermarking for AI-Generated Content — Xuandong Zhao, Sam Gunn, Miranda Christ, Jaiden Fairoze, Andres Fabrega, Nicholas Carlini
- Machine Learning with Privacy for Protected Attributes — Saeed Mahloujifar, Chuan Guo, Edward Suh, Kamalika Chaudhuri
- Transparency in Usable Privacy and Security Research: Scholars’ Perspectives, Practices, and Recommendations — Jan H. Klemmer, Juliane Schmüser, Byron M. Lowens, Fabian Fischer, Lea Schmüser, Florian Schaub
- Data to Infinity and Beyond: Examining Data Sharing and Reuse Practices in the Computer Security Community — Anna Crowder, Allison Lu, Kevin Childs, Carson Stillman, Patrick Traynor, Kevin Butler
- SoK: A Framework and Guide for Human-Centered Threat Modeling in Security and Privacy Research — Warda Usman, Daniel ZappalaBrigham Young
- Prevalence Overshadows Concerns? Understanding Chinese Users' Privacy Awareness and Expectations Towards LLM-based Healthcare Consultation — Zhihuang Liu, Ling Hu, Tongqing Zhou, Yonghao Tang, Zhiping Cai
- Exploring Parent-Child Perspectives on Safety in Generative AI: Concerns, Mitigation Strategies, and Design Implications — Yaman Yu, Tanusree Sharma, Melinda Hu, Justin Wang, Yang Wang
- Security Perceptions of Users in Stablecoins: Advantages and Risks within the Cryptocurrency Ecosystem — Maggie Yongqi Guan, Yaman Yu, Tanusree Sharma, Molly Z. Huang, Kaihua Qin, Yang Wang
- Supporting Human Raters with the Detection of Harmful Content using Large Language Models — Kurt Thomas, Patrick Kelley, David Tao, Sarah Meiklejohn, Owen Vallis, Shunwen Tan
- "It's been lovely watching you'': Institutional Decision-Making on Online Proctoring Software — Elisa Shioji, Ani Meliksetyan, Lucy Simko, Ryan Watkins, Adam Aviv, Shaanan Cohney
- Is MPC Secure? Leveraging Neural Network Classifiers to Detect Data Leakage Vulnerabilities in MPC Implementations — Guopeng Lin, Xiaoning Du, Lushan Song, Weili Han, Jin Tan, Junming Ma
- Comet: Accelerating Private Inference for Large Language Model by Predicting Activation Sparsity — Guang Yan, Yuhui Zhang, Zimu Guo, Lutan Zhao, Xiaojun Chen, Chen Wang
- Highly Efficient Actively Secure Two-Party Computation with One-Bit Advantage Bound — Yi Liu, Junzuo Lai, Peng Yang, Anjia Yang, Qi Wang, Siu-Ming Yiu
- Hermes: Efficient and Secure Multi-Writer Encrypted Database — Tung Le, Thang Hoang
In an era increasingly reliant on cloud services for data storage and collaboration, ensuring both data utility and privacy remains a paramount challenge. The talk "Hermes: Efficient and Secure…
- Towards Efficient and Practical Multi-party Computation under Inconsistent Trust in TEEs — Xuanwei Hu, Rujia Li, Yi Liu, Qi Wang
- Hash-Prune-Invert: Improved Differentially Private Heavy-Hitter Detection in the Two-Server Model — Albert Cheu, Adria Gascon, Borja Balle, James Bell-Clark, Jonathan Katz, Mariana Raykova
- Click Without Compromise: Online Advertising Measurement via Per User Differential Privacy — Yingtai Xiao, Jian Du, Shikun Zhang, Wanrong Zhang, Qiang Yan, Danfeng Zhang
- Smaug: Modular Augmentation of LLVM for MPC — Radhika Garg, Xiao WangNorthwestern
- Redefining Indirect Call Analysis with KallGraph — Guoren Li, Manu Sridharan, Zhiyun Qian
- PyLingual: Toward Perfect Decompilation of Evolving High-Level Languages — Joshua Wiedemeier, Elliot Tarbet, Max Zheng, Sangsoo Ko, Jessica Ouyang, Sang Kil Cha
This talk introduces **PyLingual**, a novel Python decompiler designed to achieve "perfect decompilation" even in the face of Python's rapidly evolving bytecode. Presented by Joshua Wiedemeier from…
- Empc: Effective Path Prioritization for Symbolic Execution with Path Cover — Shuangjie Yao, Dongdong SheHong Kong
- SV-TrustEval-C: Evaluating Structure and Semantic Reasoning in Large Language Models for Source Code Vulnerability Analysis — Yansong Li, Paula Branco, Alexander M. Hoole, Manish Marwah, Hari Manassery Koduvely, Guy-Vincent Jourdan
- Disassembly as Weighted Interval Scheduling with Learned Weights — Antonio Flores-Montoya, Junghee Lim, Adam Seitz, Akshay Sood, Edward Raff, James Holt
- Inspecting Virtual Machine Diversification Inside Virtualization Obfuscation — Naiqian Zhang, Dongpeng Xu, Jiang Ming, Jun Xu, Qiaoyan Yu
- TypeForge: Synthesizing and Selecting Best-Fit Composite Data Types for Stripped Binaries — Yanzhong Wang, Ruigang Liang, Yilin Li, Peiwei Hu, Kai Chen, Bolun Zhang
- CHIMERA: Fuzzing P4 Network Infrastructure for Multi-Plane Bug Detection and Vulnerability Discovery — Jiwon Kim, Dave (Jing) Tian, Benjamin E. Ujcich
This talk introduces Chimera, a novel fuzzing framework designed to uncover bugs and vulnerabilities within **P4 network infrastructure**. Presented by Jiwon Kim from Purdue University, with…
- SoK: Software Compartmentalization — Hugo Lefeuvre, Nathan Dautenhahn, David Chisnall, Pierre Olivier
In an era where software vulnerabilities are a constant threat, the principle of **least privilege** stands as a critical last line of defense. This talk, "SoK: Software Compartmentalization,"…
- COINDEF: A Comprehensive Code Injection Defense for the Electron Framework — Zheng Yang, Simon Chung, Jizhou Chen, Runze Zhang, Brendan Saltaformaggio, Wenke Lee
The proliferation of desktop applications built on the **Electron framework** has brought convenience and cross-platform compatibility, but also introduced a critical security vulnerability: the…
- Efficient Storage Integrity in Adversarial Settings — Quinn Burke, Ryan Sheatsley, Yohan Beugin, Eric Pauley, Owen Hines, Michael Swift
- Growlithe: A Developer-Centric Compliance Tool for Serverless Applications — Praveen Gupta, Arshia Moghimi, Devam Sisodraker, Mohammad Shahrad, Aastha Mehta
The talk introduces Growlithe, an innovative compliance tool developed by researchers at the University of British Columbia, designed to empower serverless developers in meeting their data…
- The File That Contained the Keys Has Been Removed: An Empirical Analysis of Secret Leaks in Cloud Buckets and Responsible Disclosure Outcomes — Soufian El Yadmani, Olga Gadyatskaya, Yury Zhauniarovich
- EPScan: Automated Detection of Excessive RBAC Permissions in Kubernetes Applications — Yue Gu, Xin Tan, Yuan Zhang, Siyan Gao, Min Yang
- 403 Forbidden? Ethically Evaluating Broken Access Control in the Wild — Saiid El Hajj Chehade, Florian Hantke, Ben Stock
- "It's almost like Frankenstein": Investigating the Complexities of Scientific Collaboration and Privilege Management within Research Computing Infrastructures — Souradip Nath, Ananta Soneji, Jaejong Baek, Tiffany Bao, Adam Doupé, Carlos Rubio-Medrano
- SoK: Integrity, Attestation, and Auditing of Program Execution — Mahmoud Ammar, Adam Caulfield, Ivan De Oliveira Nunes
- The Digital Cybersecurity Expert: How Far Have We Come? — Dawei Wang, Geng Zhou, Xianglong Li, Yu Bai, Li Chen, Ting Qin
- Efficient Proofs of Possession for Legacy Signatures — Anna Pui Yung Woo, Alex Ozdemir, Chad Sharp, Thomas Pornin, Paul Grubbs
- Volatile and Persistent Memory for zkSNARKs via Algebraic Interactive Proofs — Alex Ozdemir, Evan Laufer, Dan Boneh
This technical article delves into groundbreaking research presented at IEEE S&P 2025, focusing on a novel approach to enhance the efficiency of **Zero-Knowledge Succinct Non-Interactive Arguments…
- ZHE: Efficient Zero-Knowledge Proofs for HE Evaluations — Zhelei Zhou, Yun Li, Yuchen Wang, Zhaomin Yang, Bingsheng Zhang, Cheng Hong
- COBBL: Dynamic constraint generation for SNARKs — Kunming Jiang, Fraser Brown, Riad Wahby
- ALPACA: Anonymous Blocklisting with Constant-Sized Updatable Proofs — Jiwon Kim, Abhiram Kothapalli, Orestis Chardouvelis, Riad Wahby, Paul Grubbs
- HyperPianist: Pianist with Linear-Time Prover and Logarithmic Communication Cost — Chongrong Li, Pengfei Zhu, Yun Li, Cheng Hong, Wenjie Qu, Jiaheng Zhang
- JesseQ: Efficient Zero-Knowledge Proofs for Circuits over Any Field — Mengling Liu, Yang Heng, Xingye Lu, Man Ho AuThe Hong Kong Polytechnic
- HydraProofs: Optimally Computing All Proofs in a Vector Commitment (with applications to efficient zkSNARKs over data from multiple users) — Christodoulos Pappas, Dimitrios Papadopoulos, Charalampos Papamanthou
- Zero-Knowledge Location Privacy via Accurate Floating-Point SNARKs — Jens Ernstberger, Chengru Zhang, Luca Ciprian, Philipp Jovanovic, Sebastian Steinhorst
In an era where location-based services (LBS) are deeply integrated into daily life, the pervasive collection and processing of geospatial data raise significant privacy concerns. From mapping…
- FairZK: A Scalable System to Prove Machine Learning Fairness in Zero-Knowledge — Tianyu Zhang, Shen Dong, O. Deniz Kose, Yanning Shen, Yupeng Zhang
- Slice+Slice Baby: Generating Last-Level Cache Eviction Sets in the Blink of an Eye — Bradley Morgan, Gal Horowitz, Sioli O’Connell, Stephan van Schaik, Chitchanok Chuengsatiansup, Daniel Genkin
- Rapid Reversing of Non-Linear CPU Cache Slice Functions: Unlocking Physical Address Leakage — Mikka Rainer, Lorenz Hetterich, Fabian Thomas, Tristan Hornetz, Leon Trampert, Lukas Gerlach
- Breaking the Barrier: Post-Barrier Spectre Attacks — Johannes Wikner, Kaveh Razavi
- Peek-a-Walk: Leaking Secrets via Page Walk Side Channels — Alan Wang, Boru Chen, Yingchen Wang, Christopher W. Fletcher, Daniel Genkin, David Kohlbrenner
- SLAP: Data Speculation Attacks via Load Address Prediction on Apple Silicon — Jason Kim, Daniel Genkin, Yuval Yarom
- PQ-Hammer: End-to-end Key Recovery Attacks on Post-Quantum Cryptography Using Rowhammer — Samy Amer, Yingchen Wang, Hunter Kippen, Thinh Dang, Daniel Genkin, Andrew Kwong
- Half Spectre, Full Exploit: Hardening Rowhammer Attacks with Half Spectre Gadgets — Andrea Di Dio, Mathé Hertogh, Cristiano GiuffridaVrije Universiteit Amsterdam
- Training Solo: On the Limitations of Domain Isolation Against Spectre-v2 Attacks — Sander Wiebing, Cristiano GiuffridaVrije Universiteit Amsterdam
- Scheduled Disclosure: Turning Power Into Timing Without Frequency Scaling — Inwhan Chun, Isabella Siu, Riccardo Paccagnella
The talk "Scheduled Disclosure: Turning Power Into Timing Without Frequency Scaling" introduces a groundbreaking new class of side-channel attacks that redefines the landscape of remote timing…
- I Know What You Sync: Covert and Side Channel Attacks on File Systems via syncfs — Cheng Gu, Yicheng Zhang, Nael Abu-Ghazaleh
- CamLoPA: A Hidden Wireless Camera Localization Framework via Signal Propagation Path Analysis — Xiang Zhang, Jie Zhang, Zehua Ma, Jinyang Huang, Meng Li, Huan Yan
- Adversarial Robust ViT-based Automatic Modulation Recognition in Practical Deep Learning-based Wireless Systems — Gen Li, Chun-Chih Lin, Xiaonan Zhang, Xiaolong Ma, Linke Guo
- SAECRED: A State-Aware, Over-the-Air Protocol Testing Approach for Discovering Parsing Bugs in SAE Handshake Implementations of COTS Wi-Fi Access Points — Muhammad Daniyal Pirwani Dar, Rob Lorch, Aliakbar Sadeghi, Vincenzo Sorcigli, Héloïse Gollier, Cesare Tinelli
- Your Cable, My Antenna: Eavesdropping Serial Communication via Backscatter Signals — Lina Pu, Yu Luo, Song Han, Junming Diao
- You Can’t Judge a Binary by Its Header: Data-Code Separation for Non-Standard ARM Binaries using Pseudo Labels — Hadjer Benkraouda, Nirav Diwan, Gang Wang
- "We can’t allow IoT vendors to pass off all such liability to the consumer": Investigating the U.S. Legal Perspectives on Liability for IoT Product Security — Prianka Mandal, Amit Seal Ami, Iria Giuffrida, Daniel Shin, Ella Sullivan, Adwait NadkarniWilliam & Mary
The proliferation of Internet of Things (IoT) devices has introduced unprecedented convenience into daily life, yet it has simultaneously opened a Pandora's Box of security vulnerabilities. With…
- PEARTS: Provable Execution in Real-Time Embedded Systems — Antonio Joia Neto, Norrathep Rattanavipanon, Ivan De Oliveira Nunes
- FirmRCA: Towards Post-Fuzzing Analysis on ARM Embedded Firmware with Efficient Event-based Fault Localization — Boyu Chang, Binbin Zhao, Qiao Zhang, Peiyu Liu, Yuan Tian, Raheem Beyah
- HouseFuzz: Service-Aware Grey-Box Fuzzing for Vulnerability Detection in Linux-Based Firmware — Haoyu Xiao, Ziqi Wei, Jiarun Dai, Bowen Li, Yuan Zhang, Min Yang
- Proving Faster Implementations Faster: Combining Deductive and Circuit-Based Reasoning in EasyCrypt — José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Gustavo Xavier Delerue Marinho Alves, Luís Esquível, Vincent Hwang
- PAC-Private Algorithms — Mayuri Sridhar, Hanshen Xiao, Srinivas Devadas
- An Attack-Agnostic Defense Framework Against Manipulation Attacks under Local Differential Privacy — Puning Zhao, Zhikun Zhang, Jiawei Dong, Jiafei Wu, Shaowei Wang, Zhe Liu
- From Randomized Response to Randomized Index: Answering Subset Counting Queries with Local Differential Privacy — Qingqing Ye, Liantong Yu, Kai Huang, Xiaokui Xiao, Weiran Liu, Haibo Hu
- Augmented Shuffle Protocols for Accurate and Robust Frequency Estimation under Differential Privacy — Takao Murakami, Yuichi Sei, Reo Eriguchi
- Differentially Private Release of Israel’s National Registry of Live Births — Shlomi Hod, Ran CanettiBoston
- Meeting Utility Constraints in Differential Privacy: A Privacy-Boosting Approach — Bo Jiang, Wanrong Zhang, Jian Du, Donghang Lu, Sagar Sharma, Qiang Yan
- DPolicy: Managing Privacy Risks Across Multiple Releases with Differential Privacy — Nicolas Küchler, Alexander Viand, Hidde Lycklama, Anwar Hithnawi
- Differentially Private Selection using Smooth Sensitivity — Iago C. Chaves, Victor A. E. Farias, Amanda Perez, Diego Mesquita, Javam C. Machado
- From Easy to Hard: Building a Shortcut for Differentially Private Image Synthesis — Kecen Li, Chen Gong, Xiaochen Li, Yuzhong Zhao, Xinwen Hou, Tianhao Wang
- The Inadequacy of Similarity-based Privacy Metrics: Privacy Attacks against ``Truly Anonymous'' Synthetic Datasets — Georgi Ganev, Emiliano De Cristofaro
- EUCLEAK — Thomas RocheNinjaLab
- Towards ML-KEM & ML-DSA on OpenTitan — Amin Abdulrahman, Hoang Nguyen Hien Pham, Tobias Stelzer, Felix Oberhansl, Andreas Zankl, Jade Philipoom
- TikTag: Breaking ARM's Memory Tagging Extension with Speculative Execution — Juhee Kim, Jinbum Park, Sihyeon Roh, Jaeyoung Chung, Youngjoo Lee, Taesoo Kim
- Ceviche: Capability-Enhanced Secure Virtualization of Caches — Arnabjyoti Kalita, Yilong Yang, Alenkruth Krishnan Murali, Ashish Venkat
- PORTAL: Fast and Secure Device Access with Arm CCA for Modern Arm Mobile System-on-Chips (SoCs) — Fan Sang, Jaehyuk Lee, Xiaokuan Zhang, Taesoo Kim
- BadRAM: Practical Memory Aliasing Attacks on Trusted Execution Environments — Jesse De Meulemeester, Luca Wilke, David Oswald, Thomas Eisenbarth, Ingrid Verbauwhede, Jo Van Bulck
- CipherSteal: Stealing Input Data from TEE-Shielded Neural Networks with Ciphertext Side Channels — Yuanyuan Yuan, Zhibo Liu, Sen Deng, Yanzuo Chen, Shuai Wang, Yinqian Zhang
In an era where deep neural networks (DNNs) are increasingly processing sensitive user data—ranging from facial photos and biometric scans to highly personal genetic information—the imperative for…
- GuardAIn: Protecting Emerging Generative AI Workloads on Heterogeneous NPU — Aritra Dhar, Clément Thorens, Lara Magdalena Lazier, Lukas Cavigelli
- TokenWeaver: Privacy Preserving and Post-Compromise Secure Attestation — Cas Cremers, Gal Horowitz, Charlie Jacomme, Eyal Ronen
- IncognitOS: A Practical Unikernel Design for Full-System Obfuscation in Confidential Virtual Machines — Kha Dinh Duy, Jaeyoon Kim, Hajeong Lim, Hojoon Lee
- A Big Step Forward? A User-Centric Examination of iOS App Privacy Report and Enhancements — Liu Wang, Dong Wang, Shidong Pan, Zheng Jiang, Haoyu Wang, Yi Wang
- Analyzing the iOS Local Network Permission from a Technical and User Perspective — David Schmidt, Alexander Ponticello, Magdalena Steinboeck, Katharina Krombholz, Martina Lindorfer
- WireWatch: Measuring the security of proprietary network encryption in the global Android ecosystem — Mona Wang, Jeffrey Knockel, Zoë Reichert, Prateek Mittal, Jonathan Mayer
- Born with a Silver Spoon: On the (In)Security of Native Granted App Privileges in Custom Android ROMs — Chao Wang, Yanjie Zhao, Jiapeng Deng, Haoyu WangHuazhong
- Code Speaks Louder: Exploring Security and Privacy Relevant Regional Variations in Mobile Applications — Jiawei Guo, Yu Nong, Zhiqiang Lin, Haipeng Cai
- Lombard-VLD: Voice Liveness Detection based on Human Auditory Feedback — Hongcheng Zhu, Zongkun Sun, Yanzhen Ren, Kun He, Yongpeng Yan, Zixuan Wang
In an era where **automatic speaker verification (ASV)** systems are increasingly integrated into mobile devices and critical security applications, ensuring the integrity of voice authentication…
- Analyzing Ad Prevalence, Characteristics, and Compliance in Alexa Skills — Aafaq Sabir, Abhinaya S.B., Dilawer Ahmed, Anupam DasNorth Carolina State
The proliferation of smart voice assistants like Amazon Alexa has opened new avenues for third-party applications, known as "skills." While these skills enhance functionality, they also introduce…
- Eyes on Your Typing: Snooping Finger Motions on Virtual Keyboards — Sunwoo Lee, Wonsuk Choi
- BPSniff: Continuously Surveilling Private Blood Pressure Information in the Metaverse via Unrestricted Inbuilt Motion Sensors — Zhengkun Ye, Ahmed Tanvir Mahdad, Yan Wang, Cong Shi, Yingying Chen, Nitesh Saxena
- TreeKEM: A Modular Machine-Checked Symbolic Security Analysis of Group Key Agreement in Messaging Layer Security — Théophile Wallez, Jonathan Protzenko, Karthikeyan Bhargavan
- Impossibility Results for Post-Compromise Security in Real-World Communication Systems — Aurora Naska, Cas Cremers, Niklas Medinger
- Extended Diffie-Hellman Encryption for Secure and Efficient Real-Time Beacon Notifications — Liron David, Omer Berkman, Avinatan Hassidim, David Lazarov, Yossi Matias, Moti Yung
This article delves into a presentation by Liron David and collaborators at IEEE S&P, introducing a novel cryptographic protocol designed to address the complex security and efficiency challenges…
- Myco: Unlocking Polylogarithmic Accesses in Metadata-Private Messaging — Darya Kaviani, Deevashwer Rathee, Bhargav Annem, Raluca Ada Popa
In an era where end-to-end encrypted messaging has become commonplace, the focus of privacy research is increasingly shifting from message content to **metadata**. This talk, "Myco: Unlocking…
- Peer2PIR: Private Queries for IPFS — Miti Mazmudar, Shannon Veitch, Rasoul Akhavan Mahdavi
- Mixnets on a tightrope: Quantifying the leakage of mix networks using a provably optimal heuristic adversary — Sebastian Meiser, Debajyoti Das, Moritz Kirschte, Esfandiar Mohammadi, Aniket Kate
This talk, presented by Sebastian Meiser from the University of Lübeck, introduces a novel approach to quantify the information leakage in **mix networks**, a crucial technology for anonymous…
- TreePIR: Efficient Private Retrieval of Merkle Proofs via Tree Colorings with Fast Indexing and Zero Storage Overhead — Quang Cao, Son Hoang Dau, Rinaldo Gagiano, Duy Huynh, Xun Yi, Phuc Lu Le
- SoK: Self-Generated Nudes over Private Chats: How Can Technology Contribute to a Safer Sexting? — Joel Samper, Bernardo FerreiraLASIGE, Faculdade de Ciências, Universidade de Lisboa
- "You Have to Ignore the Dangers": User Perceptions of the Security and Privacy Benefits of WhatsApp Mods — Collins W. Munyendo, Kentrell Owens, Faith Strong, Shaoqi Wang, Adam J. Aviv, Tadayoshi Kohno
- EveGuard: Defeating Vibration-based Side-Channel Eavesdropping with Audio Adversarial Perturbations — Jung-Woo Chang, Ke Sun, David Xia, Xinyu Zhang, Farinaz Koushanfar
In an increasingly voice-interface driven world, the omnipresence of speakers in devices like smartphones, smart home assistants, vehicles, and public infrastructure presents a significant yet often…
- Spoofing Eavesdroppers with Audio Misinformation — Zhambyl Shaikhanov, Mahmoud Al-Madi, Hou-Tong Chen, Chun-Chieh Chang, Sadhvikas Addamane, Daniel M. Mittleman
- EvilHarmony: Stealthy Adversarial Attacks against Black-box Speech Recognition Systems — Xuejing Yuan, Jiangshan Zhang, Feng Guo, Kai Chen, XiaoFeng Wang, Shengzhi Zhang
- Investigating Physical Latency Attacks against Camera-based Perception — Raymond Muller, Ruoyu Song, Chenyi Wang, Yuxia Zhan, Jean-Philippe Monteuuis, Yanmao Man
- VerITAS: Verifying Image Transformations at Scale — Trisha Datta, Binyi Chen, Dan Boneh
- Trust Nobody: Privacy-Preserving Proofs for Edited Photos with Your Laptop — Pierpaolo Della Monica, Ivan Visconti, Andrea Vitaletti, Marco ZecchiniSapienza
- Eva: Efficient Privacy-Preserving Proof of Authenticity for Lossily Encoded Videos — Chengru Zhang, Xiao Yang, David Oswald, Mark Ryan, Philipp Jovanovic
In an era increasingly plagued by sophisticated digital manipulation and the rapid proliferation of generative AI, establishing the authenticity and provenance of digital media, particularly videos…
- From One Stolen Utterance: Assessing the Risks of Voice Cloning in the AIGC Era — Kun Wang, Meng Chen, Li Lu, Jingwen Feng, Qianniu Chen, Zhongjie Ba
- Sniffing Location Privacy of Video Conference Users Using Free Audio Channels — Long Huang, Chen WangSouthern Methodist