|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1522 occurrences of 848 keywords
|
|
|
Results
Found 5891 publication records. Showing 5890 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
29 | Peng Chen, Yuxuan Xie, Yunlong Lyu, Yuxiao Wang, Hao Chen 0003 |
Hopper: Interpretative Fuzzing for Libraries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, pp. 1600-1614, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Kha Dinh Duy, Kyuwon Cho, Taehyun Noh, Hojoon Lee 0001 |
Capacity: Cryptographically-Enforced In-Process Capabilities for Modern ARM Architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, pp. 874-888, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Jung Hee Cheon, Wonhee Cho 0001, Jaehyung Kim, Damien Stehlé |
Homomorphic Multiple Precision Multiplication for CKKS and Reduced Modulus Consumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, pp. 696-710, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Zhengyuan Jiang, Jinghuai Zhang, Neil Zhenqiang Gong |
Evading Watermark based Detection of AI-Generated Content. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, pp. 1168-1181, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Sergiu Bursuc, Ross Horne, Sjouke Mauw, Semen Yurkov |
Provably Unlinkable Smart Card-based Payments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, pp. 1392-1406, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Elia Anzuoni, Tommaso Gagliardoni |
Shufflecake: Plausible Deniability for Multiple Hidden Filesystems on Linux. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, pp. 3033-3047, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Benjamin Eriksson, Amanda Stjerna, Riccardo De Masellis, Philipp Rümmer, Andrei Sabelfeld |
Black Ostrich: Web Application Scanning with String Solvers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, pp. 549-563, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Christopher Lenk, Johannes Kinder |
Poster: Privacy Risks from Misconfigured Android Content Providers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, pp. 3579-3581, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Collins W. Munyendo, Peter Mayer 0001, Adam J. Aviv |
"I just stopped using one and started using the other": Motivations, Techniques, and Challenges When Switching Password Managers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, pp. 3123-3137, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Sabrina Amft, Sandra Höltervennhoff, Nicolas Huaman, Alexander Krause, Lucy Simko, Yasemin Acar, Sascha Fahl |
"We've Disabled MFA for You": An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, pp. 3138-3152, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Maximilian Noppel, Christian Wressnegger |
Poster: Fooling XAI with Explanation-Aware Backdoors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, pp. 3612-3614, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Jaehyung Lee, Woosuk Lee |
Simplifying Mixed Boolean-Arithmetic Obfuscation by Program Synthesis and Term Rewriting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, pp. 2351-2365, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Fabian Kaiser, Haya Schulmann, Michael Waidner |
Poster: Longitudinal Analysis of DoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, pp. 3573-3575, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Yinxi Liu, Wei Meng 0001 |
DSFuzz: Detecting Deep State Bugs with Dependent State Exploration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, pp. 1242-1256, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Lei Xu 0019, Leqian Zheng, Chengzhi Xu, Xingliang Yuan, Cong Wang 0001 |
Leakage-Abuse Attacks Against Forward and Backward Private Searchable Symmetric Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, pp. 3003-3017, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Xueyuan Han, James Mickens, Siddhartha Sen 0001 |
Splice: Efficiently Removing a User's Data from In-memory Application State. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, pp. 2989-3002, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Kushal Babel, Mojan Javaheripi, Yan Ji 0001, Mahimna Kelkar, Farinaz Koushanfar, Ari Juels |
Lanturn: Measuring Economic Security of Smart Contracts Through Adaptive Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, pp. 1212-1226, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Changmin Lee, Sooel Son |
AdCPG: Classifying JavaScript Code Property Graphs with Explanations for Ad and Tracker Blocking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, pp. 3505-3518, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Yuyang Sang, Ning Luo, Samuel Judson, Ben Chaimberg, Timos Antonopoulos, Xiao Wang 0012, Ruzica Piskac, Zhong Shao |
Ou: Automating the Parallelization of Zero-Knowledge Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, pp. 534-548, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Wyatt Sweat, Danfeng (Daphne) Yao |
Poster: Cybersecurity Usage in the Wild: A look at Deployment Challenges in Intrusion Detection and Alert Handling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, pp. 3606-3608, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Zhiqiang Lin, Xiaojing Liao |
SaTS'23: The 1st ACM Workshop on Secure and Trustworthy Superapps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, pp. 3655-3656, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Zhenrui Zhang, Geng Hong, Xiang Li, Zhuoqun Fu, Jia Zhang 0004, Mingxuan Liu, Chuhan Wang, Jianjun Chen 0005, Baojun Liu, Haixin Duan, Chao Zhang 0008, Min Yang 0002 |
Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab)use in the Wild. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, pp. 326-340, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Yunhang Zhang, Chengbin Pang, Stefan Nagy, Xun Chen, Jun Xu 0024 |
Profile-guided System Optimizations for Accelerated Greybox Fuzzing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, pp. 1257-1271, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Kelsey Merrill, Zachary Newman, Santiago Torres-Arias, Karen R. Sollins |
Speranza: Usable, Privacy-friendly Software Signing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, pp. 3388-3402, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Vidya Lakshmi Rajagopalan, Konstantinos Kleftogiorgos, Enes Göktas, Jun Xu 0024, Georgios Portokalidis |
SysPart: Automated Temporal System Call Filtering for Binaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, pp. 1979-1993, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Stefano Calzavara, Lorenzo Cazzaro, Giulio Ermanno Pibiri, Nicola Prezza |
Verifiable Learning for Robust Tree Ensembles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, pp. 1850-1864, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Heng Yin 0001, Angelos Stavrou, Cas Cremers, Elaine Shi (eds.) |
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022 ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![ACM, 978-1-4503-9450-5 The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Gilad Asharov, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Ariel Nof, Benny Pinkas, Katsumi Takahashi, Junichi Tomida |
Efficient Secure Three-Party Sorting with Applications to Data Analysis and Heavy Hitters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 125-138, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Mikael Bougon, Hervé Chabanne, Véronique Cortier, Alexandre Debant, Emmanuelle Dottax, Jannik Dreier, Pierrick Gaudry, Mathieu Turuani |
Themis: An On-Site Voting System with Systematic Cast-as-intended Verification and Partial Accountability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 397-410, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Chandra Thapa, Seyit Camtepe, Raj Gaire 0001, Surya Nepal, Seung Ick Jang |
Demo - MaLFraDA: A Machine Learning Framework with Data Airlock. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 3523-3525, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Daniel Escudero 0001, Vipul Goyal, Antigoni Polychroniadou, Yifan Song |
TurboPack: Honest Majority MPC with Constant Online Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 951-964, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Libo Chen, Quanpu Cai, Zhenbang Ma, Yanhao Wang, Hong Hu 0004, Minghang Shen, Yue Liu, Shanqing Guo, Haixin Duan, Kaida Jiang, Zhi Xue |
SFuzz: Slice-based Fuzzing for Real-Time Operating Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 485-498, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Doreen Riepel, Hoeteck Wee |
FABEO: Fast Attribute-Based Encryption with Optimal Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 2491-2504, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Levi Taiji Li, Mu Zhang 0001 |
Poster: EOSDFA: Data Flow Analysis of EOSIO Smart Contracts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 3391-3393, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Shihan Lin, Rui Xin, Aayush Goel, Xiaowei Yang 0001 |
InviCloak: An End-to-End Approach to Privacy and Performance in Web Content Distribution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 1947-1961, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Zeinab El-Rewini, Zhuo Zhang 0002, Yousra Aafer |
Poirot: Probabilistically Recommending Protections for the Android Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 937-950, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Yusuke Naito 0001, Yu Sasaki, Takeshi Sugawara 0001, Kan Yasuda |
The Multi-User Security of Triple Encryption, Revisited: Exact Security, Strengthening, and Application to TDES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 2323-2336, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Marc Wyss, Giacomo Giuliari, Jonas Mohler, Adrian Perrig |
Protecting Critical Inter-Domain Communication through Flyover Reservations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 2961-2974, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Marten van Dijk, Francesco Regazzoni 0001 |
CCSW '22: The 2022 Cloud Computing Security Workshop. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 3541-3542, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Martin Serror, Lennart Bader, Martin Henze, Arne Schwarze, Kai Nürnberger |
Poster: INSIDE - Enhancing Network Intrusion Detection in Power Grids with Automated Facility Monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 3463-3465, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Zheng Li 0023, Yiyong Liu, Xinlei He, Ning Yu, Michael Backes 0001, Yang Zhang 0016 |
Auditing Membership Leakages of Multi-Exit Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 1917-1931, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Mingrui Ai, Kaiping Xue, Bo Luo, Lutong Chen, Nenghai Yu, Qibin Sun, Feng Wu 0001 |
Blacktooth: Breaking through the Defense of Bluetooth in Silence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 55-68, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Yibin Xu, Tijs Slaats, Boris Düdder |
Poster: Unanimous-Majority - Pushing Blockchain Sharding Throughput to its Limit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 3495-3497, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Seulbae Kim, Major Liu, Junghwan John Rhee, Yuseok Jeon, Yonghwi Kwon 0001, Chung Hwan Kim |
DriveFuzz: Discovering Autonomous Driving Bugs through Driving Quality-Guided Fuzzing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 1753-1767, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Santiago Torres-Arias, Marcela S. Melara, Laurent Simon |
SCORED '22: ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 3555-3556, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Guannan Liu, Daiping Liu, Shuai Hao 0001, Xing Gao 0001, Kun Sun 0001, Haining Wang |
Ready Raider One: Exploring the Misuse of Cloud Gaming Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 1993-2007, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Chengjun Cai, Yichen Zang, Cong Wang 0001, Xiaohua Jia, Qian Wang 0002 |
Vizard: A Metadata-hiding Data Analytic System with End-to-End Policy Controls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 441-454, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Tomas Hlavacek, Philipp Jeitner, Donika Mirdita, Haya Schulmann, Michael Waidner |
Behind the Scenes of RPKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 1413-1426, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Vasudev Gohil, Hao Guo, Satwik Patnaik, Jeyavijayan Rajendran |
ATTRITION: Attacking Static Hardware Trojan Detection Techniques Using Reinforcement Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 1275-1289, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Louis Jannett, Vladislav Mladenov, Christian Mainka, Jörg Schwenk |
DISTINCT: Identity Theft using In-Browser Communications in Dual-Window Single Sign-On. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 1553-1567, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Elias Heftrig, Haya Schulmann, Michael Waidner |
Poster: The Unintended Consequences of Algorithm Agility in DNSSEC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 3363-3365, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Jiawei Liu 0002, Yangyang Kang, Di Tang, Kaisong Song, Changlong Sun, Xiaofeng Wang 0006, Wei Lu 0019, Xiaozhong Liu |
Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 2025-2039, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Bingyu Liu, Rujia Wang, Zhongjie Ba, Shanglin Zhou, Caiwen Ding, Yuan Hong |
Poster: Cryptographic Inferences for Video Deep Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 3395-3397, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Kohei Doi, Takeshi Sugawara 0001 |
Poster: Inaudible Acoustic Noise from Silicon Capacitors for Voice-Command Injection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 3339-3341, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Jan Wichelmann, Florian Sieck, Anna Pätschke, Thomas Eisenbarth 0001 |
Microwalk-CI: Practical Side-Channel Analysis for JavaScript Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 2915-2929, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Nicolas Huber, Ralf Küsters, Toomas Krips, Julian Liedtke, Johannes Müller 0001, Daniel Rausch 0001, Pascal Reisert, Andreas Vogt 0001 |
Kryvos: Publicly Tally-Hiding Verifiable E-Voting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 1443-1457, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Salman Manzoor, Antonios Gouglidis, Matthew Bradbury, Neeraj Suri |
Poster: Effectiveness of Moving Target Defense Techniques to Disrupt Attacks in the Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 3415-3417, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Akshit Aggarwal, Srinibas Swain |
Poster: Correctness of n-parties ECDSA By the Claim of Byzantine Agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 3319-3321, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Kiho Lee, Sanghak Oh, Hyoungshick Kim |
Poster: Adversarial Perturbation Attacks on the State-of-the-Art Cryptojacking Detection System in IoT Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 3387-3389, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Hai Huang, Zhikun Zhang 0001, Yun Shen, Michael Backes 0001, Qi Li 0002, Yang Zhang 0016 |
On the Privacy Risks of Cell-Based NAS Architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 1427-1441, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Daniel Franzen, Saskia Nuñez von Voigt, Peter Sörries, Florian Tschorsch, Claudia Müller-Birn |
Am I Private and If So, how Many?: Communicating Privacy Guarantees of Differential Privacy with Risk Communication Formats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 1125-1139, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Chaya Ganesh, Bhavana Kanukurthi, Girisha Shankar |
Secure Auctions in the Presence of Rational Adversaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 1173-1186, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Thomas Humphries, Rasoul Akhavan Mahdavi, Shannon Veitch, Florian Kerschbaum |
Selective MPC: Distributed Computation of Differentially Private Key-Value Statistics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 1459-1472, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Andrea Fioraldi, Dominik Christian Maier, Dongjia Zhang, Davide Balzarotti |
LibAFL: A Framework to Build Modular and Reusable Fuzzers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 1051-1065, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Yunjie Deng, Chenxu Wang, Shunchang Yu, Shiqing Liu, Zhenyu Ning, Kevin Leach, Jin Li 0002, Shoumeng Yan, Zhengyu He, Jiannong Cao 0001, Fengwei Zhang |
StrongBox: A GPU TEE on Arm Endpoints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 769-783, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Shaoyong Du, Xin Liu, Guoqing Lai, Xiangyang Luo |
Watch Out for Race Condition Attacks When Using Android External Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 891-904, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Yuqing Yang 0003, Yue Zhang 0025, Zhiqiang Lin |
Cross Miniapp Request Forgery: Root Causes, Attacks, and Vulnerability Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 3079-3092, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Lorenzo Grassi 0001, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger, Roman Walch |
Reinforced Concrete: A Fast Hash Function for Verifiable Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 1323-1335, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Keitaro Hashimoto, Shuichi Katsumata, Thomas Prest |
How to Hide MetaData in MLS-Like Secure Group Messaging: Simple, Modular, and Post-Quantum. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 1399-1412, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Xiaoyu Fan, Kun Chen, Guosai Wang, Mingchun Zhuang, Yi Li, Wei Xu 0005 |
NFGen: Automatic Non-linear Function Evaluation Code Generator for General-purpose MPC Platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 995-1008, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Yuan Lu 0001, Zhenliang Lu, Qiang Tang 0005 |
Bolt-Dumbo Transformer: Asynchronous Consensus As Fast As the Pipelined BFT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 2159-2173, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Tim Ruffing, Viktoria Ronge, Elliott Jin, Jonas Schneider-Bensch, Dominique Schröder |
ROAST: Robust Asynchronous Schnorr Threshold Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 2551-2564, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Edwin Yang, Qiuye He, Song Fang |
WINK: Wireless Inference of Numerical Keystrokes via Zero-Training Spatiotemporal Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 3033-3047, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Akira Ito, Rei Ueno, Naofumi Homma |
On the Success Rate of Side-Channel Attacks on Masked Implementations: Information-Theoretical Bounds and Their Practical Usage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 1521-1535, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Karthikeyan Bhargavan, Vincent Cheval, Christopher A. Wood |
A Symbolic Analysis of Privacy for TLS 1.3 with Encrypted Client Hello. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 365-379, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Anna Harbluk Lorimer, Nick Feamster, Prateek Mittal |
Poster: Investigating QUIC's Potential Impact on Censorship Circumvention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 3403-3405, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Xiuling Wang, Wendy Hui Wang |
Group Property Inference Attacks Against Graph Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 2871-2884, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Shuai Li 0006, Zhemin Yang, Nan Hua, Peng Liu 0005, Xiaohan Zhang 0001, Guangliang Yang 0001, Min Yang 0002 |
Collect Responsibly But Deliver Arbitrarily?: A Study on Cross-User Privacy Leakage in Mobile Apps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 1887-1900, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Yupei Liu, Jinyuan Jia, Hongbin Liu 0005, Neil Zhenqiang Gong |
StolenEncoder: Stealing Pre-trained Encoders in Self-supervised Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 2115-2128, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Juanru Fang, Wei Dong 0007, Ke Yi 0001 |
Shifted Inverse: A General Mechanism for Monotonic Functions under User Differential Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 1009-1022, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Xaver Fabian, Marco Guarnieri, Marco Patrignani |
Automatic Detection of Speculative Execution Combinations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 965-978, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Alexander Spiegelman, Neil Giridharan, Alberto Sonnino, Lefteris Kokoris-Kogias |
Bullshark: DAG BFT Protocols Made Practical. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 2705-2718, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Florian Tramèr, Reza Shokri, Ayrton San Joaquin, Hoang Le, Matthew Jagielski, Sanghyun Hong 0001, Nicholas Carlini |
Truth Serum: Poisoning Machine Learning Models to Reveal Their Secrets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 2779-2792, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Lamya Alkhariji, Suparna De, Omer F. Rana, Charith Perera |
Poster: Ontology Enabled Chatbot for Applying Privacy by Design in IoT Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 3323-3325, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Nur Imtiazul Haque, Maurice Ngouen, Yazen Al-Wahadneh, Mohammad Ashiqur Rahman |
Poster: A Novel Formal Threat Analyzer for Activity Monitoring-based Smart Home Heating, Ventilation, and Cooling Control System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 3359-3361, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Min Chen 0032, Zhikun Zhang 0001, Tianhao Wang 0001, Michael Backes 0001, Mathias Humbert, Yang Zhang 0016 |
Graph Unlearning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 499-513, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Daniel Günther 0004, Marco Holz, Benjamin Judkewitz, Helen Möllering, Benny Pinkas, Thomas Schneider 0003, Ajith Suresh |
Poster: Privacy-Preserving Epidemiological Modeling on Mobile Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 3351-3353, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal |
PentaGOD: Stepping beyond Traditional GOD with Five Parties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 1843-1856, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Arantxa Zapico, Vitalik Buterin, Dmitry Khovratovich, Mary Maller, Anca Nitulescu, Mark Simkin 0001 |
Caulk: Lookup Arguments in Sublinear Time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 3121-3134, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Sajjad Pourali, Nayanamana Samarasinghe, Mohammad Mannan |
Hidden in Plain Sight: Exploring Encrypted Channels in Android Apps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 2445-2458, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Bernardo David, Bernardo Magri, Christian Matt 0002, Jesper Buus Nielsen, Daniel Tschudi |
GearBox: Optimal-size Shard Committees by Leveraging the Safety-Liveness Dichotomy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 683-696, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Zayd Hammoudeh, Daniel Lowd |
Identifying a Training-Set Attack's Target Using Renormalized Influence Estimation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 1367-1381, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Siwei Cui, Gang Zhao, Yifei Gao, Tien Tavu, Jeff Huang 0001 |
VRust: Automated Vulnerability Detection for Solana Smart Contracts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 639-652, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Konstantinos Solomos, Panagiotis Ilia, Nick Nikiforakis, Jason Polakis |
Escaping the Confines of Time: Continuous Browser Extension Fingerprinting Through Ephemeral Modifications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 2675-2688, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Anirudh Ekambaranathan, Jun Zhao 0003, Max Van Kleek |
Poster: An Analysis of Privacy Features in 'Expert-Approved' Kids' Apps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 3343-3345, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Rui Duan, Zhe Qu, Shangqing Zhao, Leah Ding, Yao Liu 0007, Zhuo Lu |
Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 905-919, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Zhenpeng Lin, Yuhang Wu 0003, Xinyu Xing |
DirtyCred: Escalating Privilege in Linux Kernel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 1963-1976, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Weili Wang 0005, Sen Deng, Jianyu Niu, Michael K. Reiter, Yinqian Zhang |
ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 2841-2855, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Paola de Perthuis, David Pointcheval |
Two-Client Inner-Product Functional Encryption with an Application to Money-Laundering Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 725-737, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Tamjid Al Rahat, Yu Feng 0001, Yuan Tian 0001 |
Cerberus: Query-driven Scalable Vulnerability Detection in OAuth Service Provider Implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 2459-2473, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
Displaying result #401 - #500 of 5890 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ >>] |
|