💀 The Wall of Shame

The most cited papers with no code. Sorted by the weight of their sins.

Page 2, showing 50 papers

# Paper Cause of Death Category Citations Published
51 Robust Website Fingerprinting Through the Cache Occupancy Channel
Anatoly Shusterman, Lachlan Kang, ... (+5 more)
👻 Ghosted cs.CR 159 7 years ago
52 Thermal Covert Channels on Multi-core Platforms
Ramya Jayaram Masti, Devendra Rai, ... (+4 more)
👻 Ghosted cs.CR 155 11 years ago
53 You are Who You Know and How You Behave: Attribute Inference Attacks via Users' Social Friends and Behaviors
Neil Zhenqiang Gong, Bin Liu
👻 Ghosted cs.SI 154 9 years ago
54 P$^2$IM: Scalable and Hardware-independent Firmware Testing via Automatic Peripheral Interface Modeling (extended version)
Bo Feng, Alejandro Mera, Long Lu
👻 Ghosted cs.CR 150 6 years ago
55 Debloating Software through Piece-Wise Compilation and Loading
Anh Quach, Aravind Prakash, Lok Kwong Yan
👻 Ghosted cs.CR 147 8 years ago
56 CURE: A Security Architecture with CUstomizable and Resilient Enclaves
Raad Bahmani, Ferdinand Brasser, ... (+5 more)
👻 Ghosted cs.CR 144 5 years ago
57 The Anatomy of a Cryptocurrency Pump-and-Dump Scheme
Jiahua Xu, Benjamin Livshits
👻 Ghosted q-fin.TR 144 7 years ago
58 Hiding the Access Pattern is Not Enough: Exploiting Search Pattern Leakage in Searchable Encryption
Simon Oya, Florian Kerschbaum
👻 Ghosted cs.CR 143 5 years ago
59 Dirty Road Can Attack: Security of Deep Learning based Automated Lane Centering under Physical-World Attack
Takami Sato, Junjie Shen, ... (+4 more)
👻 Ghosted cs.CR 139 5 years ago
60 Lost at C: A User Study on the Security Implications of Large Language Model Code Assistants
Gustavo Sandoval, Hammond Pearce, ... (+4 more)
👻 Ghosted cs.CR 138 3 years ago
61 Drift with Devil: Security of Multi-Sensor Fusion based Localization in High-Level Autonomous Driving under GPS Spoofing (Extended Version)
Junjie Shen, Jun Yeon Won, ... (+2 more)
👻 Ghosted cs.CR 137 5 years ago
62 UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers
Yuwei Li, Shouling Ji, ... (+10 more)
👻 Ghosted cs.CR 134 5 years ago
63 Tracing Information Flows Between Ad Exchanges Using Retargeted Ads
Muhammad Ahmad Bashir, Sajjad Arshad, ... (+2 more)
👻 Ghosted cs.CR 131 7 years ago
64 Locally Differentially Private Analysis of Graph Statistics
Jacob Imola, Takao Murakami, Kamalika Chaudhuri
👻 Ghosted cs.CR 130 5 years ago
65 Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial Sensors
Yazhou Tu, Zhiqiang Lin, ... (+2 more)
👻 Ghosted cs.CR 129 7 years ago
66 6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices
Amit Kumar Sikder, Hidayet Aksu, A. Selcuk Uluagac
👻 Ghosted cs.CR 127 8 years ago
67 Misleading Authorship Attribution of Source Code using Adversarial Learning
Erwin Quiring, Alwin Maier, Konrad Rieck
👻 Ghosted cs.LG 121 6 years ago
68 SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection
Peng Gao, Xusheng Xiao, ... (+7 more)
👻 Ghosted cs.CR 121 7 years ago
69 Hermes Attack: Steal DNN Models with Lossless Inference Accuracy
Yuankun Zhu, Yueqiang Cheng, ... (+2 more)
👻 Ghosted cs.CR 115 5 years ago
70 An Off-Chip Attack on Hardware Enclaves via the Memory Bus
Dayeol Lee, Dongha Jung, ... (+3 more)
👻 Ghosted cs.CR 113 6 years ago
71 Detecting and Characterizing Lateral Phishing at Scale
Grant Ho, Asaf Cidon, ... (+6 more)
👻 Ghosted cs.CR 110 6 years ago
72 Utility-Optimized Local Differential Privacy Mechanisms for Distribution Estimation
Takao Murakami, Yusuke Kawamoto
👻 Ghosted cs.DB 108 7 years ago
73 ADsafety: Type-Based Verification of JavaScript Sandboxing
Joe Gibbs Politz, Spiridon Eliopoulos, ... (+2 more)
👻 Ghosted cs.PL 108 10 years ago
74 MUZZ: Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded Programs
Hongxu Chen, Shengjian Guo, ... (+6 more)
👻 Ghosted cs.SE 107 5 years ago
75 Unique Identification of 50,000+ Virtual Reality Users from Head & Hand Motion Data
Vivek Nair, Wenbo Guo, ... (+5 more)
👻 Ghosted cs.CR 105 3 years ago
76 $A^{4}NT$: Author Attribute Anonymity by Adversarial Training of Neural Machine Translation
Rakshith Shetty, Bernt Schiele, Mario Fritz
👻 Ghosted cs.CR 102 8 years ago
77 MIRAGE: Mitigating Conflict-Based Cache Attacks with a Practical Fully-Associative Design
Gururaj Saileshwar, Moinuddin Qureshi
👻 Ghosted cs.CR 101 5 years ago
78 BLENDER: Enabling Local Search with a Hybrid Differential Privacy Model
Brendan Avent, Aleksandra Korolova, ... (+3 more)
👻 Ghosted cs.CR 101 8 years ago
79 EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts
Michael Rodler, Wenting Li, ... (+2 more)
👻 Ghosted cs.CR 100 5 years ago
80 Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer
Suyoung Lee, HyungSeok Han, ... (+2 more)
👻 Ghosted cs.CR 100 6 years ago
81 PCKV: Locally Differentially Private Correlated Key-Value Data Collection with Optimized Utility
Xiaolan Gu, Ming Li, ... (+3 more)
👻 Ghosted cs.CR 100 6 years ago
82 RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks
Samira Briongos, Pedro Malagón, ... (+2 more)
👻 Ghosted cs.CR 100 6 years ago
83 Cognitive Triaging of Phishing Attacks
Amber van der Heijden, Luca Allodi
👻 Ghosted cs.CR 99 6 years ago
84 The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums
Emily Tseng, Rosanna Bellini, ... (+6 more)
👻 Ghosted cs.CR 98 5 years ago
85 Mind Your Weight(s): A Large-scale Study on Insufficient Machine Learning Model Protection in Mobile Apps
Zhichuang Sun, Ruimin Sun, ... (+2 more)
👻 Ghosted cs.CR 97 6 years ago
86 V0LTpwn: Attacking x86 Processor Integrity from Software
Zijo Kenjar, Tommaso Frassetto, ... (+3 more)
👻 Ghosted cs.CR 97 6 years ago
87 HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments
Ghada Dessouky, Tommaso Frassetto, Ahmad-Reza Sadeghi
👻 Ghosted cs.CR 97 6 years ago
88 You Can't See Me: Physical Removal Attacks on LiDAR-based Autonomous Vehicles Driving Frameworks
Yulong Cao, S. Hrushikesh Bhupathiraju, ... (+4 more)
👻 Ghosted cs.CR 97 3 years ago
89 An Observational Investigation of Reverse Engineers' Processes
Daniel Votipka, Seth M. Rabin, ... (+3 more)
👻 Ghosted cs.CR 95 6 years ago
90 Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic Privacy
Saba Eskandarian, Henry Corrigan-Gibbs, ... (+2 more)
👻 Ghosted cs.CR 95 6 years ago
91 Data Poisoning Attacks to Local Differential Privacy Protocols
Xiaoyu Cao, Jinyuan Jia, Neil Zhenqiang Gong
👻 Ghosted cs.CR 95 6 years ago
92 TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable Vulnerabilities
Aakash Tyagi, Addison Crump, ... (+5 more)
👻 Ghosted cs.CR 95 4 years ago
93 Large Language Models for Code Analysis: Do LLMs Really Do Their Job?
Chongzhou Fang, Ning Miao, ... (+9 more)
👻 Ghosted cs.SE 94 2 years ago
94 Stateful Greybox Fuzzing
Jinsheng Ba, Marcel Böhme, ... (+2 more)
👻 Ghosted cs.CR 94 3 years ago
95 Tracing Transactions Across Cryptocurrency Ledgers
Haaroon Yousaf, George Kappos, Sarah Meiklejohn
👻 Ghosted cs.CR 93 7 years ago
96 Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features
Liang Tong, Bo Li, ... (+4 more)
👻 Ghosted cs.CR 93 8 years ago
97 SpecFuzz: Bringing Spectre-type vulnerabilities to the surface
Oleksii Oleksenko, Bohdan Trach, ... (+2 more)
👻 Ghosted cs.CR 92 6 years ago
98 X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item Detection
Aishan Liu, Jun Guo, ... (+7 more)
👻 Ghosted cs.CR 92 3 years ago
99 TPM-FAIL: TPM meets Timing and Lattice Attacks
Daniel Moghimi, Berk Sunar, ... (+2 more)
👻 Ghosted cs.CR 91 6 years ago
100 Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets
Jan Ruge, Jiska Classen, ... (+2 more)
👻 Ghosted cs.CR 90 5 years ago