IEEE S&P 2022 Teasers
146 videos • 6,590 views • by IEEE Symposium on Security and Privacy
1
Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Security
IEEE Symposium on Security and Privacy
Download
2
Sabre: Sender-Anonymous Messaging with Fast Audits
IEEE Symposium on Security and Privacy
Download
3
Exposed Infrastructures: Discovery, Attacks, & Remediation of Insecure ICS Remote Management Devices
IEEE Symposium on Security and Privacy
Download
4
SnarkBlock: Scalable Anonymous Blocklisting
IEEE Symposium on Security and Privacy
Download
5
HEAPSTER:Analyzing the Security of Dynamic Allocators for Monolithic Firmware Images
IEEE Symposium on Security and Privacy
Download
6
Private Approximate Nearest Neighbor Search
IEEE Symposium on Security and Privacy
Download
7
Effective Seed Scheduling for Fuzzing with Graph Centrality Analysis
IEEE Symposium on Security and Privacy
Download
8
Low-Bandwidth Threshold ECDSA via Pseudorandom Correlation Generators
IEEE Symposium on Security and Privacy
Download
9
Graphics Peeping Unit: Exploiting EM Side-Channel Information of GPUs to Eavesdrop on Your Neighbors
IEEE Symposium on Security and Privacy
Download
10
SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in Seconds
IEEE Symposium on Security and Privacy
Download
11
GREBE: Unveiling Exploitation Potential for Linux Kernel Bugs
IEEE Symposium on Security and Privacy
Download
12
Phishing in Organizations: Findings from a Large-Scale and Long-Term Study
IEEE Symposium on Security and Privacy
Download
13
AccEar: Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary
IEEE Symposium on Security and Privacy
Download
14
ShorTor: Improving Tor Network Latency via Multi-hop Overlay Routing
IEEE Symposium on Security and Privacy
Download
15
DeepCASE: Semi-Supervised Contextual Analysis of Security Events
IEEE Symposium on Security and Privacy
Download
16
Security Analysis of the MLS Key Distribution
IEEE Symposium on Security and Privacy
Download
17
SIRAJ: A Unified Framework for Aggregation of Malicious Entity Detectors
IEEE Symposium on Security and Privacy
Download
18
COBRA: Dynamic Proactive Secret Sharing for Confidential BFT Services
IEEE Symposium on Security and Privacy
Download
19
Security Foundations for Application-Based Covert Communication Channels
IEEE Symposium on Security and Privacy
Download
20
Spook.js: Attacking Chrome Strict Site Isolation via Speculative Execution
IEEE Symposium on Security and Privacy
Download
21
MatRiCT+: More Efficient Post-Quantum Private Blockchain Payments
IEEE Symposium on Security and Privacy
Download
22
IRShield: A Countermeasure Against Adversarial Physical-Layer Wireless Sensing
IEEE Symposium on Security and Privacy
Download
23
A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols
IEEE Symposium on Security and Privacy
Download
24
Sphinx: Enabling Privacy-Preserving Online Learning over the Cloud
IEEE Symposium on Security and Privacy
Download
25
Back to the Drawing Board: A Critical Analysis of Poisoning Attacks on Production Federated Learning
IEEE Symposium on Security and Privacy
Download
26
Surakav: Generating Realistic Traces for a Strong Website Fingerprinting Defense
IEEE Symposium on Security and Privacy
Download
27
HardLog: Practical Tamper-Proof System Auditing Using a Novel Audit Device
IEEE Symposium on Security and Privacy
Download
28
Wobfuscator: Obfuscating JavaScript Malware via Opportunistic Translation to WebAssembly
IEEE Symposium on Security and Privacy
Download
29
SecFloat: Accurate Floating-Point meets Secure 2-Party Computation
IEEE Symposium on Security and Privacy
Download
30
Towards Automated Auditing for Account and Session Management Flaws in Single Sign-On Deployments
IEEE Symposium on Security and Privacy
Download
31
LinkTeller: Recovering Private Edges from Graph Neural Networks via Influence Analysis
IEEE Symposium on Security and Privacy
Download
32
Evaluating Physical-Layer BLE Location Tracking Attacks on Mobile Devices
IEEE Symposium on Security and Privacy
Download
33
How to Attack and Generate Honeywords
IEEE Symposium on Security and Privacy
Download
34
Universal Atomic Swaps: Secure Exchange of Coins Across All Blockchains
IEEE Symposium on Security and Privacy
Download
35
SoK: Authentication in Augmented and Virtual Reality
IEEE Symposium on Security and Privacy
Download
36
How Not to Protect Your IP - An Industry-Wide Break of IEEE 1735 Implementations
IEEE Symposium on Security and Privacy
Download
37
Repairing DoS Vulnerability of Real-World Regexes
IEEE Symposium on Security and Privacy
Download
38
Measuring and Mitigating the Risk of IP Reuse on Public Clouds
IEEE Symposium on Security and Privacy
Download
39
CirC: Compiler infrastructure for proof systems, software verification, and more
IEEE Symposium on Security and Privacy
Download
40
[Private video]
Download
41
Model Stealing Attacks Against Inductive Graph Neural Networks
IEEE Symposium on Security and Privacy
Download
42
SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications
IEEE Symposium on Security and Privacy
Download
43
Practical EMV Relay Protection
IEEE Symposium on Security and Privacy
Download
44
DeepSteal Advanced Model Extractions Leveraging Efficient Weight Stealing in Memories
IEEE Symposium on Security and Privacy
Download
45
Universal 3-Dimensional Perturbations for Black-Box Attacks on Video Recognition Systems
IEEE Symposium on Security and Privacy
Download
46
mmSpy: Spying Phone Calls using mmWave Radars
IEEE Symposium on Security and Privacy
Download
47
"Desperate Times Call for Desperate Measures": User Concerns with Mobile Loan Apps in Kenya
IEEE Symposium on Security and Privacy
Download
48
Invisible Finger: Practical Electromagnetic Interference Attack on Touchscreen-based Devices
IEEE Symposium on Security and Privacy
Download
49
Asleep at the Keyboard? Assessing the Security of GitHub Copilot's Code Contributions
IEEE Symposium on Security and Privacy
Download
50
Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification Documents
IEEE Symposium on Security and Privacy
Download
51
Differentially Private Histograms in the Shuffle Model from Fake Users
IEEE Symposium on Security and Privacy
Download
52
Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques
IEEE Symposium on Security and Privacy
Download
53
Investigating Influencer VPN Ads on YouTube
IEEE Symposium on Security and Privacy
Download
54
PCR-Auth: Solving Authentication Puzzle Challenges with Encoded Palm Contact Responses
IEEE Symposium on Security and Privacy
Download
55
Hardening Circuit-Design IP Against Reverse-Engineering Attacks
IEEE Symposium on Security and Privacy
Download
56
TROLLMAGNIFIER: Detecting State-Sponsored Troll Accounts on Reddit
IEEE Symposium on Security and Privacy
Download
57
Robbery on DevOps: Understanding and Mitigating Illicit Cryptomining in Continuous Integration
IEEE Symposium on Security and Privacy
Download
58
Publicly Accountable Robust Multi-Party Computation
IEEE Symposium on Security and Privacy
Download
59
BadEncoder: Backdoor Attacks to Pre-trained Encoders in Self-Supervised Learning
IEEE Symposium on Security and Privacy
Download
60
Scraping Sticky Leftovers: App User Information Left on Servers After Account Deletion
IEEE Symposium on Security and Privacy
Download
61
Are We There Yet? Timing and Floating-Point Attacks on Differential Privacy Systems
IEEE Symposium on Security and Privacy
Download
62
Foundations of Dynamic BFT
IEEE Symposium on Security and Privacy
Download
63
Formal Model-Driven Discovery of Bluetooth Protocol Design Vulnerabilities
IEEE Symposium on Security and Privacy
Download
64
SoK: Social Cybersecurity
IEEE Symposium on Security and Privacy
Download
65
The State of the SameSite: Studying the Usage, Effectiveness, and Adequacy of SameSite Cookies
IEEE Symposium on Security and Privacy
Download
66
Noise-SDR Arbitrary Modulation of Electromagnetic Noise from Unprivileged Software
IEEE Symposium on Security and Privacy
Download
67
Attacks on Wireless Coexistence
IEEE Symposium on Security and Privacy
Download
68
Hamraz: Resilient Object Partitioning and Replication
IEEE Symposium on Security and Privacy
Download
69
SoK: A Framework for Unifying At-Risk User Research
IEEE Symposium on Security and Privacy
Download
70
Quantifying Blockchain Extractable Value: How dark is the forest?
IEEE Symposium on Security and Privacy
Download
71
Bad Characters: Imperceptible NLP Attacks
IEEE Symposium on Security and Privacy
Download
72
Four Attacks and a Proof for Telegram
IEEE Symposium on Security and Privacy
Download
73
ProVerif with Lemmas, Induction, Fast Subsumption, and Much More
IEEE Symposium on Security and Privacy
Download
74
A Secret-Free Hypervisor: Rethinking Isolation in the Age of Speculative Vulnerabilities
IEEE Symposium on Security and Privacy
Download
75
ZeeStar: Private Smart Contracts by Homomorphic Encryption and Zero-knowledge Proofs
IEEE Symposium on Security and Privacy
Download
76
27 Years and 81 Million Opportunities Later: Investigating Email Encryption for an Entire University
IEEE Symposium on Security and Privacy
Download
77
How Does Usable Security (Not) End Up in Software Products?
IEEE Symposium on Security and Privacy
Download
78
[Private video]
Download
79
"Adversarial Examples" for Proof-of-Learning
IEEE Symposium on Security and Privacy
Download
80
They’re not that hard to mitigate: What Cryptographic Library Developers Think About Timing Attacks
IEEE Symposium on Security and Privacy
Download
81
Analyzing Ground-Truth Data of Mobile Gambling Scams
IEEE Symposium on Security and Privacy
Download
82
[Private video]
Download
83
Domains Do Change Their Spots: Quantifying Potential Abuse of Residual Trust
IEEE Symposium on Security and Privacy
Download
84
Deployment of Source Address Validation by Network Operators: A Randomized Control Trial
IEEE Symposium on Security and Privacy
Download
85
vSGX: Virtualizing SGX Enclaves on AMD SEV
IEEE Symposium on Security and Privacy
Download
86
A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP
IEEE Symposium on Security and Privacy
Download
87
Waldo: A Private Time-Series Database from Function Secret Sharing
IEEE Symposium on Security and Privacy
Download
88
BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning
IEEE Symposium on Security and Privacy
Download
89
Noise⋆: A Library of Verified High-Performance Secure Channel Protocol Implementations
IEEE Symposium on Security and Privacy
Download
90
FuzzUSB: Hybrid Stateful Fuzzing of USB Gadget Stacks
IEEE Symposium on Security and Privacy
Download
91
Privacy-from-Birth: Protecting Sensed Data from Malicious Sensors with VERSA
IEEE Symposium on Security and Privacy
Download
92
DEPCOMM Graph Summarization on System Audit Logs for Attack Investigation
IEEE Symposium on Security and Privacy
Download
93
Finding and Exploiting CPU Features using MSR Templating
IEEE Symposium on Security and Privacy
Download
94
Timing-Based Browsing Privacy Vulnerabilities Via Site Isolation
IEEE Symposium on Security and Privacy
Download
95
Using Throughput-Centric Byzantine Broadcast to Tolerate Malicious Majority in Blockchains
IEEE Symposium on Security and Privacy
Download
96
WtaGraph: Web Tracking and Advertising Detection using Graph Neural Networks
IEEE Symposium on Security and Privacy
Download
97
PGPATCH: Policy-Guided Logic Bug Patching for Robotic Vehicles
IEEE Symposium on Security and Privacy
Download
98
Augury: Using Data Memory-Dependent Prefetchers to Leak Data at Rest
IEEE Symposium on Security and Privacy
Download
99
SpecHammer: Combining Spectre and Rowhammer for New Speculative Attacks
IEEE Symposium on Security and Privacy
Download
100
Experts’ Insights on the Peer Review Process of Evaluating Security Papers
IEEE Symposium on Security and Privacy
Download
101
PICCOLO: Exposing Complex Backdoors in NLP Transformer Models
IEEE Symposium on Security and Privacy
Download
102
Hark: A Deep Learning System for Navigating Privacy Feedback at Scale
IEEE Symposium on Security and Privacy
Download
103
MeshUp: Stateless Cache Side-channel Attack on CPU Mesh
IEEE Symposium on Security and Privacy
Download
101
PICCOLO: Exposing Complex Backdoors in NLP Transformer Models
IEEE Symposium on Security and Privacy
Download
102
Hark: A Deep Learning System for Navigating Privacy Feedback at Scale
IEEE Symposium on Security and Privacy
Download
103
MeshUp: Stateless Cache Side-channel Attack on CPU Mesh
IEEE Symposium on Security and Privacy
Download
104
Cats vs. Spectre: An Axiomatic Approach to Modeling Speculative Execution Attacks
IEEE Symposium on Security and Privacy
Download
105
PROTRR: Principled yet Optimal In-DRAM Target Row Refresh
IEEE Symposium on Security and Privacy
Download
106
Delay Wreaks Havoc on Your Smart Home: Delay-based Automation Interference Attacks
IEEE Symposium on Security and Privacy
Download
107
DeepCoFFEA: Improved Flow Correlation Attacks on Tor via Metric Learning and Amplification
IEEE Symposium on Security and Privacy
Download
108
Deidentifcation’s Impact on Minority Representation and Privacy Preservation in the US Census
IEEE Symposium on Security and Privacy
Download
109
Locally Differentially Private Vector Aggregation
IEEE Symposium on Security and Privacy
Download
110
Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings
IEEE Symposium on Security and Privacy
Download
111
SwarmFlawFinder: Discovering and Exploiting Logic Flaws of Swarm Algorithms
IEEE Symposium on Security and Privacy
Download
112
SPURT: Scalable Distributed Randomness Beacon with Transparent Setup
IEEE Symposium on Security and Privacy
Download
113
Reconstructing Training Data with Informed Adversaries
IEEE Symposium on Security and Privacy
Download
114
SoK: Practical Foundations for Software Spectre Defenses
IEEE Symposium on Security and Privacy
Download
115
Transcending Transcend: Revisiting Malware Classification in the Presence of Concept Drift
IEEE Symposium on Security and Privacy
Download
116
Practical Asynchronous Distributed Key Generation
IEEE Symposium on Security and Privacy
Download
117
A Formal Security Analysis of the W3C Web Payment APIs: Attacks and Verification
IEEE Symposium on Security and Privacy
Download
118
JIGSAW: Efficient and Scalable Path Constraints Fuzzing
IEEE Symposium on Security and Privacy
Download
119
Anti-Tamper Radio: System-Level Tamper Detection for Computing Systems
IEEE Symposium on Security and Privacy
Download
120
SoK: How Robust is Image Classification Deep Neural Network Watermarking
IEEE Symposium on Security and Privacy
Download
121
Exploit the Last Straw That Breaks Android Systems
IEEE Symposium on Security and Privacy
Download
122
Copy, Right? A Testing Framework for Copyright Protection of Deep Learning Models
IEEE Symposium on Security and Privacy
Download
123
Time-Print: Authenticating USB Flash Drives with Novel Timing Fingerprints
IEEE Symposium on Security and Privacy
Download
124
WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens
IEEE Symposium on Security and Privacy
Download
125
Statistical Quantification of Differential Privacy: A Local Approach
IEEE Symposium on Security and Privacy
Download
126
SMILE: Secure Memory Introspection for Live Enclave
IEEE Symposium on Security and Privacy
Download
127
RT-TEE: Real-time System Availability for Cyber-physical Systems using ARM TrustZone
IEEE Symposium on Security and Privacy
Download
128
Committed to Trust: A Qualitative Study on Security & Trust in Open Source Software Projects
IEEE Symposium on Security and Privacy
Download
129
Peekaboo: A Hub-Based Approach to Enable Transparency in Data Processing within Smart Homes
IEEE Symposium on Security and Privacy
Download
130
TASHAROK—Using Mechanism Design for Enhancing Security Resource Allocation in Interdependent Systems
IEEE Symposium on Security and Privacy
Download
131
Finding SMM Privilege-Escalation in UEFI Firmware with Protocol-Centric Static Analysis
IEEE Symposium on Security and Privacy
Download
132
SYMBEXCEL: Automated Analysis and Understanding of Malicious Excel 4.0 Macros
IEEE Symposium on Security and Privacy
Download
133
SoK: The Dual Nature of Technology in Sexual Abuse
IEEE Symposium on Security and Privacy
Download
134
Multi-Server Verifiable Computation of Low-Degree Polynomials
IEEE Symposium on Security and Privacy
Download
135
Property Inference from Poisoning
IEEE Symposium on Security and Privacy
Download
136
IronMask: Versatile Verification of Masking Security
IEEE Symposium on Security and Privacy
Download
137
Spiral: Fast, High-Rate Single-Server PIR via FHE Composition
IEEE Symposium on Security and Privacy
Download
138
IRQDebloat: Reducing Driver Attack Surface in Embedded Devices
IEEE Symposium on Security and Privacy
Download
139
ShadeWatcher: Recommendation-guided Cyber Threat Analysis using System Audit Records
IEEE Symposium on Security and Privacy
Download
140
Goshawk: Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis
IEEE Symposium on Security and Privacy
Download
141
Adversarial Prefetch: New Cross Core Cache Side Channel Attacks
IEEE Symposium on Security and Privacy
Download
142
Mind the Gap: Studying the Insecurity of Provably Secure Embedded Trusted Execution Architectures
IEEE Symposium on Security and Privacy
Download
143
Adversarial Prefetch: New Cross-Core Cache Side Channel Attacks
IEEE Symposium on Security and Privacy
Download
144
Device Fingerprinting with Peripheral Timestamps
IEEE Symposium on Security and Privacy
Download
145
Spinning Language Models: Risks of Propaganda-As-A-Service and Countermeasures
IEEE Symposium on Security and Privacy
Download
146
Blacksmith: Scalable Rowhammering in the Frequency Domain
IEEE Symposium on Security and Privacy
Download