| 51 |
Robust Website Fingerprinting Through the Cache Occupancy Channel
Anatoly Shusterman, Lachlan Kang, ... (+5 more)
|
👻
Ghosted
|
cs.CR
|
159 |
7 years ago |
| 52 |
Thermal Covert Channels on Multi-core Platforms
Ramya Jayaram Masti, Devendra Rai, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
155 |
11 years ago |
| 53 |
You are Who You Know and How You Behave: Attribute Inference Attacks via Users' Social Friends and Behaviors
Neil Zhenqiang Gong, Bin Liu
|
👻
Ghosted
|
cs.SI
|
154 |
9 years ago |
| 54 |
P$^2$IM: Scalable and Hardware-independent Firmware Testing via Automatic Peripheral Interface Modeling (extended version)
Bo Feng, Alejandro Mera, Long Lu
|
👻
Ghosted
|
cs.CR
|
150 |
6 years ago |
| 55 |
Debloating Software through Piece-Wise Compilation and Loading
Anh Quach, Aravind Prakash, Lok Kwong Yan
|
👻
Ghosted
|
cs.CR
|
147 |
8 years ago |
| 56 |
CURE: A Security Architecture with CUstomizable and Resilient Enclaves
Raad Bahmani, Ferdinand Brasser, ... (+5 more)
|
👻
Ghosted
|
cs.CR
|
144 |
5 years ago |
| 57 |
The Anatomy of a Cryptocurrency Pump-and-Dump Scheme
Jiahua Xu, Benjamin Livshits
|
👻
Ghosted
|
q-fin.TR
|
144 |
7 years ago |
| 58 |
Hiding the Access Pattern is Not Enough: Exploiting Search Pattern Leakage in Searchable Encryption
Simon Oya, Florian Kerschbaum
|
👻
Ghosted
|
cs.CR
|
143 |
5 years ago |
| 59 |
Dirty Road Can Attack: Security of Deep Learning based Automated Lane Centering under Physical-World Attack
Takami Sato, Junjie Shen, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
139 |
5 years ago |
| 60 |
Lost at C: A User Study on the Security Implications of Large Language Model Code Assistants
Gustavo Sandoval, Hammond Pearce, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
138 |
3 years ago |
| 61 |
Drift with Devil: Security of Multi-Sensor Fusion based Localization in High-Level Autonomous Driving under GPS Spoofing (Extended Version)
Junjie Shen, Jun Yeon Won, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
137 |
5 years ago |
| 62 |
UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers
Yuwei Li, Shouling Ji, ... (+10 more)
|
👻
Ghosted
|
cs.CR
|
134 |
5 years ago |
| 63 |
Tracing Information Flows Between Ad Exchanges Using Retargeted Ads
Muhammad Ahmad Bashir, Sajjad Arshad, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
131 |
7 years ago |
| 64 |
Locally Differentially Private Analysis of Graph Statistics
Jacob Imola, Takao Murakami, Kamalika Chaudhuri
|
👻
Ghosted
|
cs.CR
|
130 |
5 years ago |
| 65 |
Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial Sensors
Yazhou Tu, Zhiqiang Lin, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
129 |
7 years ago |
| 66 |
6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices
Amit Kumar Sikder, Hidayet Aksu, A. Selcuk Uluagac
|
👻
Ghosted
|
cs.CR
|
127 |
8 years ago |
| 67 |
Misleading Authorship Attribution of Source Code using Adversarial Learning
Erwin Quiring, Alwin Maier, Konrad Rieck
|
👻
Ghosted
|
cs.LG
|
121 |
6 years ago |
| 68 |
SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection
Peng Gao, Xusheng Xiao, ... (+7 more)
|
👻
Ghosted
|
cs.CR
|
121 |
7 years ago |
| 69 |
Hermes Attack: Steal DNN Models with Lossless Inference Accuracy
Yuankun Zhu, Yueqiang Cheng, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
115 |
5 years ago |
| 70 |
An Off-Chip Attack on Hardware Enclaves via the Memory Bus
Dayeol Lee, Dongha Jung, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
113 |
6 years ago |
| 71 |
Detecting and Characterizing Lateral Phishing at Scale
Grant Ho, Asaf Cidon, ... (+6 more)
|
👻
Ghosted
|
cs.CR
|
110 |
6 years ago |
| 72 |
Utility-Optimized Local Differential Privacy Mechanisms for Distribution Estimation
Takao Murakami, Yusuke Kawamoto
|
👻
Ghosted
|
cs.DB
|
108 |
7 years ago |
| 73 |
ADsafety: Type-Based Verification of JavaScript Sandboxing
Joe Gibbs Politz, Spiridon Eliopoulos, ... (+2 more)
|
👻
Ghosted
|
cs.PL
|
108 |
10 years ago |
| 74 |
MUZZ: Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded Programs
Hongxu Chen, Shengjian Guo, ... (+6 more)
|
👻
Ghosted
|
cs.SE
|
107 |
5 years ago |
| 75 |
Unique Identification of 50,000+ Virtual Reality Users from Head & Hand Motion Data
Vivek Nair, Wenbo Guo, ... (+5 more)
|
👻
Ghosted
|
cs.CR
|
105 |
3 years ago |
| 76 |
$A^{4}NT$: Author Attribute Anonymity by Adversarial Training of Neural Machine Translation
Rakshith Shetty, Bernt Schiele, Mario Fritz
|
👻
Ghosted
|
cs.CR
|
102 |
8 years ago |
| 77 |
MIRAGE: Mitigating Conflict-Based Cache Attacks with a Practical Fully-Associative Design
Gururaj Saileshwar, Moinuddin Qureshi
|
👻
Ghosted
|
cs.CR
|
101 |
5 years ago |
| 78 |
BLENDER: Enabling Local Search with a Hybrid Differential Privacy Model
Brendan Avent, Aleksandra Korolova, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
101 |
8 years ago |
| 79 |
EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts
Michael Rodler, Wenting Li, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
100 |
5 years ago |
| 80 |
Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer
Suyoung Lee, HyungSeok Han, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
100 |
6 years ago |
| 81 |
PCKV: Locally Differentially Private Correlated Key-Value Data Collection with Optimized Utility
Xiaolan Gu, Ming Li, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
100 |
6 years ago |
| 82 |
RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks
Samira Briongos, Pedro Malagón, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
100 |
6 years ago |
| 83 |
Cognitive Triaging of Phishing Attacks
Amber van der Heijden, Luca Allodi
|
👻
Ghosted
|
cs.CR
|
99 |
6 years ago |
| 84 |
The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums
Emily Tseng, Rosanna Bellini, ... (+6 more)
|
👻
Ghosted
|
cs.CR
|
98 |
5 years ago |
| 85 |
Mind Your Weight(s): A Large-scale Study on Insufficient Machine Learning Model Protection in Mobile Apps
Zhichuang Sun, Ruimin Sun, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
97 |
6 years ago |
| 86 |
V0LTpwn: Attacking x86 Processor Integrity from Software
Zijo Kenjar, Tommaso Frassetto, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
97 |
6 years ago |
| 87 |
HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments
Ghada Dessouky, Tommaso Frassetto, Ahmad-Reza Sadeghi
|
👻
Ghosted
|
cs.CR
|
97 |
6 years ago |
| 88 |
You Can't See Me: Physical Removal Attacks on LiDAR-based Autonomous Vehicles Driving Frameworks
Yulong Cao, S. Hrushikesh Bhupathiraju, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
97 |
3 years ago |
| 89 |
An Observational Investigation of Reverse Engineers' Processes
Daniel Votipka, Seth M. Rabin, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
95 |
6 years ago |
| 90 |
Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic Privacy
Saba Eskandarian, Henry Corrigan-Gibbs, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
95 |
6 years ago |
| 91 |
Data Poisoning Attacks to Local Differential Privacy Protocols
Xiaoyu Cao, Jinyuan Jia, Neil Zhenqiang Gong
|
👻
Ghosted
|
cs.CR
|
95 |
6 years ago |
| 92 |
TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable Vulnerabilities
Aakash Tyagi, Addison Crump, ... (+5 more)
|
👻
Ghosted
|
cs.CR
|
95 |
4 years ago |
| 93 |
Large Language Models for Code Analysis: Do LLMs Really Do Their Job?
Chongzhou Fang, Ning Miao, ... (+9 more)
|
👻
Ghosted
|
cs.SE
|
94 |
2 years ago |
| 94 |
Stateful Greybox Fuzzing
Jinsheng Ba, Marcel Böhme, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
94 |
3 years ago |
| 95 |
Tracing Transactions Across Cryptocurrency Ledgers
Haaroon Yousaf, George Kappos, Sarah Meiklejohn
|
👻
Ghosted
|
cs.CR
|
93 |
7 years ago |
| 96 |
Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features
Liang Tong, Bo Li, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
93 |
8 years ago |
| 97 |
SpecFuzz: Bringing Spectre-type vulnerabilities to the surface
Oleksii Oleksenko, Bohdan Trach, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
92 |
6 years ago |
| 98 |
X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item Detection
Aishan Liu, Jun Guo, ... (+7 more)
|
👻
Ghosted
|
cs.CR
|
92 |
3 years ago |
| 99 |
TPM-FAIL: TPM meets Timing and Lattice Attacks
Daniel Moghimi, Berk Sunar, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
91 |
6 years ago |
| 100 |
Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets
Jan Ruge, Jiska Classen, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
90 |
5 years ago |