IEEE S&P Sessions 2024
184 videos • 2,064 views • by IEEE Symposium on Security and Privacy
1
#15 No Privacy Left Outside Ziqi Zhang
IEEE Symposium on Security and Privacy
Download
2
#144 TCP Spoofing Reliable Payload Transmission Past the Spoofed TCP Handshake Eric Pan
IEEE Symposium on Security and Privacy
Download
3
#498 Learn What You Want to Unlearn Unlearning Inversion Attacks against Machine Unlearning Hongsh
IEEE Symposium on Security and Privacy
Download
4
#518 LACMUS Latent Concept Masking for General Robustness Enhancement of DNNs Hongsheng Hu
IEEE Symposium on Security and Privacy
Download
5
6 Efficient Zero knowledge Arguments for Paillier Cryptosystem Rae Gong
IEEE Symposium on Security and Privacy
Download
6
6 Efficient Zero knowledge Arguments for Paillier Cryptosystem Rae Gong1
IEEE Symposium on Security and Privacy
Download
7
06 Zihao Li NURGLE zihao li
IEEE Symposium on Security and Privacy
Download
8
7B Ehsanul Kabir FLShield A Validation Based Federated Learning Framework to Defend Against Poisonin
IEEE Symposium on Security and Privacy
Download
9
9 Prune+PlumTree Finding Eviction Sets at Scale Tom Kissos
IEEE Symposium on Security and Privacy
Download
10
14 TuDoor Xiang Li
IEEE Symposium on Security and Privacy
Download
11
33 INVISILINE Invisible Plausibly Deniable Storage Sandeep Kiran Pinjala
IEEE Symposium on Security and Privacy
Download
12
43 P4Control Line Rate Cross Host Attack Prevention via In Network Information Flow Control Enabled
IEEE Symposium on Security and Privacy
Download
13
52 A Picture is Worth 500 Labels A Case Study of Demographic Disparities in Local Machine Learning M
IEEE Symposium on Security and Privacy
Download
14
77 UnTrustZone Systematic Accelerated Aging to Expose On chip Jubayer Mahmod
IEEE Symposium on Security and Privacy
Download
15
91 PIRANA Faster Multi query PIR via Constant weight Codes Jingyu Li
IEEE Symposium on Security and Privacy
Download
16
95 Preserving Node level Privacy in Graph Neural Networks ZH X
IEEE Symposium on Security and Privacy
Download
17
101 The Great Request Robbery Soheil Khodayari Soheil Khodayari
IEEE Symposium on Security and Privacy
Download
18
109 BULKOR:Enabling Bulk Loading for Path ORAM Xiang Li
IEEE Symposium on Security and Privacy
Download
19
111 Efficient and Generic Microarchitectural Hash Function Recovery Lukas Gerlach
IEEE Symposium on Security and Privacy
Download
20
116 Security Privacy and Data Sharing Challenges When Moving to the US Insights from a Qualitative s
IEEE Symposium on Security and Privacy
Download
21
154 Test time Poisoning Attacks Against Test time Adaptation Models Tianshuo Cong
IEEE Symposium on Security and Privacy
Download
22
164 SoK Security and Privacy of Blockchain Interoperability André Augusto
IEEE Symposium on Security and Privacy
Download
23
172 Don t Eject the Impostor Fast Three Party Computation With a Known Cheater Andreas Brüggeman
IEEE Symposium on Security and Privacy
Download
24
185 BadVFL backdoor attacks in vertical federated learning Mohammad Naseri
IEEE Symposium on Security and Privacy
Download
25
211 Multi Instance Adversarial Attack on GNN Based Malicious Domain Detection Mahmoud Khaled Ahm
IEEE Symposium on Security and Privacy
Download
26
220 Piano Extremely Simple Single Server PIR with Sublinear Server Computation Mingxun Zhou
IEEE Symposium on Security and Privacy
Download
27
227 Sabre Cutting through Adversarial Noise with Adaptive Spectral Filtering and Input Reconstructio
IEEE Symposium on Security and Privacy
Download
28
241 Backdooring Multimodal Learning 卡的不动弹
IEEE Symposium on Security and Privacy
Download
29
251 Text CRS A Generalized Certified Robustness Framework against Textual Adversarial Attacks Jane
IEEE Symposium on Security and Privacy
Download
30
252 SrcMarker Dual channel Source Code Watermarking via Scalable Code Transformations 杨博睿
IEEE Symposium on Security and Privacy
Download
31
262 A Representative Study on Human Detection of Artificially Generated Media Across Countries Joe
IEEE Symposium on Security and Privacy
Download
32
275 Don t Shoot the Messenger Localization Prevention of Satellite Internet Users Richard Mitev
IEEE Symposium on Security and Privacy
Download
33
276 Everyone for Themselves A Qualitative Study about Individual Security Setups of Open Source Sof
IEEE Symposium on Security and Privacy
Download
34
591 Where URLs Become Weapons Automated Discovery of SSRF Vulnerabilities in Web Applications Sam
IEEE Symposium on Security and Privacy
Download
35
280 NFCEraser A Security Threat of NFC Message Modification Caused by Quartz Crystal Oscillator Jo
IEEE Symposium on Security and Privacy
Download
36
282 Transferable Multimodal Attack on Vision Language Pre training Models haodi wang
IEEE Symposium on Security and Privacy
Download
37
284 Group Oblivious Message Retrieval Thomas
IEEE Symposium on Security and Privacy
Download
38
301 Scalable Verification of Zero Knowledge Protocols MIGUEL ISABEL MÁRQUEZ
IEEE Symposium on Security and Privacy
Download
39
305 LLMs Cannot Reliably Identify and Reason About Security Vulnerabilities Yet A Comprehensive Eva
IEEE Symposium on Security and Privacy
Download
40
307 Springproofs Efficient Inner Product Arguments for Vectors of Arbitrary Length Ming Su
IEEE Symposium on Security and Privacy
Download
41
335 Nightshade Prompt Specific Poisoning Attacks on Text to Image Generative Models Shawn Shan
IEEE Symposium on Security and Privacy
Download
42
339 NodeAwareSmoothing Yuni Lai Lena
IEEE Symposium on Security and Privacy
Download
43
398 Pulling Off The Mask Forensic Analysis of the Deceptive Creator Wallets Behind Smart Contract Fr
IEEE Symposium on Security and Privacy
Download
44
415 SoK Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields Jan G
IEEE Symposium on Security and Privacy
Download
45
435 Measure Observe Remeasure An Interactive Paradigm for Differentially Private Exploratory Analysi
IEEE Symposium on Security and Privacy
Download
46
443 Targeted and Troublesome Zahra Moti Zahra Moti
IEEE Symposium on Security and Privacy
Download
47
446 Flash a comprehensive approach to intrusion detection via provenance graph representation learni
IEEE Symposium on Security and Privacy
Download
48
483 Pandora Principled Symbolic Validation of Intel SGX Enclave Runtimes Jo Van Bulck
IEEE Symposium on Security and Privacy
Download
49
520 BELT Old School Backdoor Attacks can Evade the State of the Art Defense with Backdoor Exclusivit
IEEE Symposium on Security and Privacy
Download
50
555 Patchy Performance Uncovering the Vulnerability Management Practices of IoT Centric Vendors S
IEEE Symposium on Security and Privacy
Download
51
574 Cohere Managing Differential Privacy in Large Scale Systems Nicolas Küchler
IEEE Symposium on Security and Privacy
Download
52
584 Break the Wall from bottom Automated Discovery of Protocol Level Evasion Vulnerabilities in Web
IEEE Symposium on Security and Privacy
Download
53
601 SHERPA Explainable Robust Algorithms for Privacy Preserved Federated Learning in Future Networks
IEEE Symposium on Security and Privacy
Download
54
605 Larger scale Nakamoto style Blockchains Don’t Necessarily Offer Better Security Jannik Albrech
IEEE Symposium on Security and Privacy
Download
55
617 PromptCARE Prompt Copyright Protection by Watermark Injection and Verification homeway yao
IEEE Symposium on Security and Privacy
Download
56
624 WeSee Using Malicious #VC Interrupts to Break AMD SEV SNP Supraja Sridhara
IEEE Symposium on Security and Privacy
Download
57
646 attackinng byzantine robustness in high dimensions kolluri aashish
IEEE Symposium on Security and Privacy
Download
58
646 SoK Prudent Evaluation Practices for Fuzzing Moritz Schloegel
IEEE Symposium on Security and Privacy
Download
59
665 Obelix Mitigating Side Channels Through Dynamic Obfuscation Jan
IEEE Symposium on Security and Privacy
Download
60
2024 05 22 02 41 48 H 264 Rui Xi
IEEE Symposium on Security and Privacy
Download
61
671 One for All and All for One GNN based Control Flow Attestation for Embedded Devices Richard M
IEEE Symposium on Security and Privacy
Download
62
699 CoreLocker Andrew Wang
IEEE Symposium on Security and Privacy
Download
63
2023 219 Formal Model Driven Analysis of Resilience of GossipSub to Attacks from Misbehaving Peers
IEEE Symposium on Security and Privacy
Download
64
694 LLMIF Augmented Large Language Model for Fuzzing IoT Devices Jincheng Wang
IEEE Symposium on Security and Privacy
Download
65
2024 11 NetShuffle Circumventing Censorship with Shuffle Proxies at the Edge Patrick Kon
IEEE Symposium on Security and Privacy
Download
66
2024 13 Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis
IEEE Symposium on Security and Privacy
Download
67
2024 18 A Practical Root Cause Analysis System with an Under Constrained State Mutation 박영기
IEEE Symposium on Security and Privacy
Download
68
2024 22 BUSted Microarchitectural Side Channel Attacks on the MCU Bus Interconnect Cristiano Rodri
IEEE Symposium on Security and Privacy
Download
69
2024 37 SoK Safer Digital Safety Research Involving At Risk Users Rosanna “Rosie” Bellini
IEEE Symposium on Security and Privacy
Download
70
2024 48 SwiftRange Vincent
IEEE Symposium on Security and Privacy
Download
71
2024 50 BAFFLE Mr HE Junda
IEEE Symposium on Security and Privacy
Download
72
2024 76 Formal Dolev Yao Models Meet Cryptographic Protocol Fuzz Testing Max Ammann
IEEE Symposium on Security and Privacy
Download
73
2024 100 The Dark Side of Scale Insecurity of Direct to Cell Satellite Mega Constellations 刘威
IEEE Symposium on Security and Privacy
Download
74
2024 102 BOUNCEATTACK A Query Efficient Decision based Adversarial Attack by Bouncing into the Wild
IEEE Symposium on Security and Privacy
Download
75
2024 124 LOKI Large scale Data Reconstruction Attack against Federated Learning through Model Manipu
IEEE Symposium on Security and Privacy
Download
76
2024 125 DeepTheft Stealing DNN Model Architectures through Power Side Channel Garrison Gao
IEEE Symposium on Security and Privacy
Download
77
2024 144 Withdrawing is believing Detecting Inconsistencies between Withdrawal Choices and Third par
IEEE Symposium on Security and Privacy
Download
78
2024 151 Shedding Light on CVSS Scoring Inconsistencies A User Centric Study on Evaluating Widespre
IEEE Symposium on Security and Privacy
Download
79
2024 158 Jaehan Kim PassREfinder Credential Stuffing Risk Prediction by Representing Password Reuse
IEEE Symposium on Security and Privacy
Download
80
2024 171 Private Analytics via Streaming, Sketching, and Silently Verifiable Proofs Mayank Rathee
IEEE Symposium on Security and Privacy
Download
81
2024 176 PolySphinx Extending the Sphinx Mix Format with Better Multicast Support Daniel Schadt
IEEE Symposium on Security and Privacy
Download
82
2024 196 The Times They Are A Changin Christos Tsoukaladelis
IEEE Symposium on Security and Privacy
Download
83
2024 205 FlowMur A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge Jiahe Lan
IEEE Symposium on Security and Privacy
Download
84
2024 237 SoK Unintended Interactions among ML Defenses and Risks Vasisht Duddu
IEEE Symposium on Security and Privacy
Download
85
2024 319 FCert yantiing wang
IEEE Symposium on Security and Privacy
Download
86
2024 305 Pianist Scalable zkRollups via Fully Distributed Zero Knowledge Proofs Tianyi Liu
IEEE Symposium on Security and Privacy
Download
87
2024 265 eAudit A Fast, Scalable and Deployable Audit Data Collection System Hanke Kimm
IEEE Symposium on Security and Privacy
Download
88
2024 431 Routing Attacks on Cryptocurrency Mining Pools Muoi Tran
IEEE Symposium on Security and Privacy
Download
89
2024 467 ARMOR A Formally Verified Implementation of X 509 Certificate Chain Validation Joyanta De
IEEE Symposium on Security and Privacy
Download
90
2024 517 Understanding and Benchmarking the Commonality of Adversarial Examples cheng yushi
IEEE Symposium on Security and Privacy
Download
91
2024 519 From Individual Computation to Allied Optimization Remodeling Privacy Preserving Neural Inf
IEEE Symposium on Security and Privacy
Download
92
2024 471 Private Hierarchical Governance for Encrypted Messaging Armin Namavari
IEEE Symposium on Security and Privacy
Download
93
2024 637 Poisoned ChatGPT Finds Work for Idle Hands Exploring Developers Coding Practices with Inse
IEEE Symposium on Security and Privacy
Download
94
Backdooring Multimodal Learning
IEEE Symposium on Security and Privacy
Download
95
Chronos presentation sard Chen
IEEE Symposium on Security and Privacy
Download
96
MEA Defender Lv Peizhuo
IEEE Symposium on Security and Privacy
Download
97
GroVE 20mins S&P Asim Waheed
IEEE Symposium on Security and Privacy
Download
98
LowerBoundsRDP Tim Kutta
IEEE Symposium on Security and Privacy
Download
99
SP24 HD Florian Hantke
IEEE Symposium on Security and Privacy
Download
100
sp24 long recording Jannis Rautenstrauch
IEEE Symposium on Security and Privacy
Download
101
video Zhen Xiang
IEEE Symposium on Security and Privacy
Download
102
sokvideo v1 Max N
IEEE Symposium on Security and Privacy
Download
103
video1092237667 Hoang Nguyen Dai
IEEE Symposium on Security and Privacy
Download
104
211 Multi Instance Adversarial Attack on GNN Based Malicious Domain Detection Mahmoud Khaled Ahm
IEEE Symposium on Security and Privacy
Download
105
2024 265 eAudit A Fast, Scalable and Deployable Audit Data Collection System Hanke Kimm
IEEE Symposium on Security and Privacy
Download
106
2024 100 The Dark Side of Scale Insecurity of Direct to Cell Satellite Mega Constellations 刘威
IEEE Symposium on Security and Privacy
Download
107
251 Text CRS A Generalized Certified Robustness Framework against Textual Adversarial Attacks Jane
IEEE Symposium on Security and Privacy
Download
108
398 Pulling Off The Mask Forensic Analysis of the Deceptive Creator Wallets Behind Smart Contract Fr
IEEE Symposium on Security and Privacy
Download
109
2024 13 Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis
IEEE Symposium on Security and Privacy
Download
110
#144 TCP Spoofing Reliable Payload Transmission Past the Spoofed TCP Handshake Eric Pan
IEEE Symposium on Security and Privacy
Download
111
699 CoreLocker Andrew Wang
IEEE Symposium on Security and Privacy
Download
112
443 Targeted and Troublesome Zahra Moti Zahra Moti
IEEE Symposium on Security and Privacy
Download
113
2024 637 Poisoned ChatGPT Finds Work for Idle Hands Exploring Developers Coding Practices with Inse
IEEE Symposium on Security and Privacy
Download
114
132 Certifying Zero Knowledge Circuits with Refinement Types Junrui Liu
IEEE Symposium on Security and Privacy
Download
115
75 Serberus Protecting Cryptographic Code frrom Spectres at Compile Time Nicholas Hunter Mosier
IEEE Symposium on Security and Privacy
Download
116
14 TuDoor new Xiang Li
IEEE Symposium on Security and Privacy
Download
117
2024 25 MQTTactic Security Analysis and Verification for Logic Flaws in MQTT Implementations szx
IEEE Symposium on Security and Privacy
Download
118
183 Who Left the Door Open Investigating the Causes of Exposed IoT Devices in an Academic Network
IEEE Symposium on Security and Privacy
Download
119
320 Signing in Four Public Software Package Registries Quantity, Quality, and Influencing Factors
IEEE Symposium on Security and Privacy
Download
120
tor1 Zhongtang Luo
IEEE Symposium on Security and Privacy
Download
121
602 Rethinking IC Layout Vulnerability Simulation Based Hardware Trojan Threat Assessment with High
IEEE Symposium on Security and Privacy
Download
122
114 GAuV Xingyu Xie
IEEE Symposium on Security and Privacy
Download
123
431 Asterisk Super fast MPC with a Friend Protik Paul
IEEE Symposium on Security and Privacy
Download
124
gpuzip 20 yingchen wang
IEEE Symposium on Security and Privacy
Download
125
239 Nebula A Privacy First Platform for Data Backhaul Jean Luc Watson
IEEE Symposium on Security and Privacy
Download
126
582 Janus Safe Biometric Deduplication for Humanitarian Aid Distribution kasra EdalatNejad
IEEE Symposium on Security and Privacy
Download
127
270 An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape sif
IEEE Symposium on Security and Privacy
Download
128
2024 531 Please Tell Me More Liu Han
IEEE Symposium on Security and Privacy
Download
129
S&PFinal Louis Henri
IEEE Symposium on Security and Privacy
Download
130
cut final presentation Sönke Huster
IEEE Symposium on Security and Privacy
Download
131
545video Irina Ford
IEEE Symposium on Security and Privacy
Download
132
Ati Priya Bajaj Len or index or count, anything but v1 Predicting Variable Names in Decompilation Ou
IEEE Symposium on Security and Privacy
Download
133
CanWeCastABallotAsIntendedAndBeReceiptFree Henri Devillez
IEEE Symposium on Security and Privacy
Download
134
2024 108 DeepShuffle A Lightweight Defense Framework against Adversarial Fault Injection Attacks on
IEEE Symposium on Security and Privacy
Download
135
311 Scalable Mixed Mode MPC Radhika Garg
IEEE Symposium on Security and Privacy
Download
136
2024 449 Undefined oriented Programming Detecting and Chaining Prototype Pollution Gadgets in Node
IEEE Symposium on Security and Privacy
Download
137
588 From Principle to Practice Vertical Data Minimization for Machine Learning Robin Staab
IEEE Symposium on Security and Privacy
Download
138
433 On SMS Phishing Tactics and Infrastructure Alex Nahapetyan
IEEE Symposium on Security and Privacy
Download
139
574 Cohere Managing Differential Privacy in Large Scale Systems Nicolas Küchler
IEEE Symposium on Security and Privacy
Download
140
02 Saiid El Hajj Chehade SINBAD 20 min Saiid El Hajj Chehade
IEEE Symposium on Security and Privacy
Download
141
272 SneakyPrompt Jailbreaking Text to image Generative Models Yuchen Yang
IEEE Symposium on Security and Privacy
Download
142
59 Hyena Balancing Packing, Reuse, and Rotations for Encrypted Inference Sarabjeet Singh
IEEE Symposium on Security and Privacy
Download
143
sp 2024 holepunch final Zachary Ratliff
IEEE Symposium on Security and Privacy
Download
144
Eureka Presentation Yu Wei
IEEE Symposium on Security and Privacy
Download
145
727 From Chatbots to Phishbots Phishing Scam Generation in Commercial Large Language Models Sayak
IEEE Symposium on Security and Privacy
Download
146
86 Understanding Parents' Perceptions and Practices Toward Children's Security and Privacy in Virtua
IEEE Symposium on Security and Privacy
Download
147
2024 567 More is Merrier Relax the Non Collusion Assumption in Multi Server PIR esnierde
IEEE Symposium on Security and Privacy
Download
148
Practical Attacks Against DNS Reputation Systems
IEEE Symposium on Security and Privacy
Download
149
308 SoK CollusionResistantMPSI Jelle Vos
IEEE Symposium on Security and Privacy
Download
150
2024 456 State aware Fuzzing on Trusted OS Designed for IoT Devices Qinying
IEEE Symposium on Security and Privacy
Download
151
2024 88 AFGEN Whole Function Fuzzing for Applications and Libraries Yuwei LIU 1
IEEE Symposium on Security and Privacy
Download
152
79 Leaky Address Masking Mathé Hertogh 1
IEEE Symposium on Security and Privacy
Download
153
243 MAWSEO Adversarial Wiki Search Poisoning for Illicit Online Promotion Zilong Lin
IEEE Symposium on Security and Privacy
Download
154
556 Pudding Private User Discovery in Anonymity Networks Ceren Kocaogullar
IEEE Symposium on Security and Privacy
Download
155
526 From Virtual Touch to Tesla Command Unlocking Unauthenticated Control Chains From Smart Glasses
IEEE Symposium on Security and Privacy
Download
156
2024 winter 448 Efficient Actively Secure DPF and RAM based 2PC with One Bit Leakage Wenhao Zhang
IEEE Symposium on Security and Privacy
Download
157
2024 62 Enforcing End to end Security for Remote Conferencing Triste L
IEEE Symposium on Security and Privacy
Download
158
258 ALIF Low Cost Adversarial Audio Attacks on Black Box Speech Platforms using Linguistic Features
IEEE Symposium on Security and Privacy
Download
159
2024 61 ERASAN Efficient Rust Address Sanitizer Jiun Min
IEEE Symposium on Security and Privacy
Download
160
2024 57 Counterexample Guided Directed Fuzzing via Likely Invariant Inference Shadow HUANG
IEEE Symposium on Security and Privacy
Download
161
24 Architectural Mimicry Innovative Instructions to Efficiently Address Control Flow Leakage in Dat
IEEE Symposium on Security and Privacy
Download
162
322 SoK SGX Fail How Stuff Gets eXposed Stephan van Schaik
IEEE Symposium on Security and Privacy
Download
163
2024 606 BOLT Privacy Preserving, Accurate and Efficient Inference for Transformers Qi Pang
IEEE Symposium on Security and Privacy
Download
164
706 A Security Analysis of Honey Vaults Fei Duan
IEEE Symposium on Security and Privacy
Download
165
#81 The Role of User Agent Interactions on Mobile Money Practices Karen Sowon
IEEE Symposium on Security and Privacy
Download
166
366 CaFA Cost aware, Feasible Attacks With Database Constraints Matan BT
IEEE Symposium on Security and Privacy
Download
167
2024 500 Exploring the Orthogonality and Linearity of Backdoor Attacks Kaiyuan Zhang
IEEE Symposium on Security and Privacy
Download
168
202 Ad Inventory Pooling in the Ad Tech Supply Chain Yash Vekaria
IEEE Symposium on Security and Privacy
Download
169
434 Casual Users and Rational Choices within Differential Privacy Narges Ashena
IEEE Symposium on Security and Privacy
Download
170
Practical Obfuscation of BLE Physical Layer Fingerprints on Mobile Devices Hadi Givehchian
IEEE Symposium on Security and Privacy
Download
171
2024 614 Few shot Unlearning Youngsik Yoon
IEEE Symposium on Security and Privacy
Download
172
117 Cheng Gongye Side Channel Assisted Reverse Engineering of Encrypted DNN Hardware Accelerator IP
IEEE Symposium on Security and Privacy
Download
173
ItsSimplexIEEES+P 20min Andrew Cullen
IEEE Symposium on Security and Privacy
Download
174
428 Understanding the Privacy Practices of Political Campaigns A Perspective from the 2020 US Electi
IEEE Symposium on Security and Privacy
Download
175
354 Tabbed Out Subverting the Android Custom Tab Security Model Philipp Beer
IEEE Symposium on Security and Privacy
Download
176
362 Thwarting Last Minute Voter Coercion Rosario Giustolisi
IEEE Symposium on Security and Privacy
Download
177
174 Automated Synthesis of Effect Graph Policies for Microservice Aware Stateful System Call Special
IEEE Symposium on Security and Privacy
Download
178
155 Specular Towards Secure, Trust minimized Optimistic Blockchain Execution Zhe Ye
IEEE Symposium on Security and Privacy
Download
179
2024 267 Wear's my Data Understanding the Cross Device Runtime Permission Model in Wearables Dogu
IEEE Symposium on Security and Privacy
Download
180
MPCitH without reputation IEEE S^0P online qw gao
IEEE Symposium on Security and Privacy
Download
181
153 APP Miner Detecting API Misuses via Automatically Mining API Path Patterns Jiasheng Jiang
IEEE Symposium on Security and Privacy
Download
182
104 Pryde A Modular Generalizable Workflow for Uncovering Evasion Attacks Against Stateful Firewall
IEEE Symposium on Security and Privacy
Download
183
S&P 2024 hvc Nicholas Ngai
IEEE Symposium on Security and Privacy
Download
184
MIMOCrypt Jun Luo John
IEEE Symposium on Security and Privacy
Download