|

楼主 |
发表于 2024-2-3 14:55:15
|
显示全部楼层
本帖最后由 SmithArno 于 2024-3-8 16:25 编辑 9 l7 R; t6 M0 o; }5 r
K% V! |. c6 K. i' C/ c7 H( ?IEEE S&P 2024 n( `7 z" a$ `
, v. O8 G O! u, _. r; M( Q" }0 X【1】华中科技大学
6 U$ h6 w% k; _8 U9 JWhy Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferabilitypp. 10-10
! C5 d0 \' P# D/ }8 W$ o- Kby Yechao Zhang, Shengshan Hu, Leo Yu Zhang, Junyu Shi, Minghui Li, Xiaogeng Liu, Wei Wan, Hai Jin
! Z+ F: X& |% e8 Z8 o9 U% P8 r$ ~3 ~- | F. o6 s ]: ]
【2】华中科技大学
v. }7 C% H% ZMQTTactic: Security Analysis and Verification for Logic Flaws in MQTT Implementationspp. 13-130 J+ j" F) |( b) q
by Bin Yuan, Zhanxiang Song, Yan Jia, Zhenyu Lu, Deqing Zou, Hai Jin, Luyi Xing4 ]7 _& x! a: I k
4 [$ L$ O0 q: i. u! I
【3】复旦大学1 L( _( Z) \' Q# Q
Withdrawing is believing? Detecting Inconsistencies Between Withdrawal Choices and Third-party Data Collections in Mobile Appspp. 14-14
2 c. I6 `0 S9 L+ X+ D1 R- C+ B, P, ~2 }by Xiaolin Du, Zhemin Yang, Jiapeng Lin, Yinzhi Cao, Min Yang
3 Q |" O( C* ^
- s. T) H& {6 S. i- A【4】浙江大学
# m2 B7 c/ J. n, u8 G9 P5 iPIRANA: Faster Multi-query PIR via Constant-weight Codespp. 39-391 D- \* A$ f' M$ i5 J# a& h
by Jian Liu, Jingyu Li, Di Wu, Kui Ren" e8 Y/ F* k( L6 ? o, x! M. L9 U* {
0 B5 W& F! g5 ]# Z【5】东南大学
7 A5 s# O. M" ~4 [9 qPredecessor-aware Directed Greybox Fuzzingpp. 40-40
( C# s6 ?$ K q8 E5 ?! Nby Yujian Zhang, Yaokun Liu, Jinyu Xu, Yanhao Wang
/ S8 Q! K/ f; L: ?0 D; X- ~8 ?8 J8 \5 _* E: e e
【6】中南大学( y+ _& E+ O8 a) d" o
Guessing on Dominant Paths: Understanding the Limitation of Wireless Authentication Using Channel State Informationpp. 42-42" m( X* k4 f" g8 r0 N% I
by Zhe Qu, Rui Duan, Xiao Han, Shangqing Zhao, Yao Liu, Zhuo Lu3 a0 u( i3 c' Y1 ?0 L8 E
) A! B0 A7 ^) `: T* N8 N8 n5 d【7】清华大学
/ F4 @. [* A8 p. @8 ? J% ` mTuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packetspp. 46-460 J0 Y( S7 V& n+ N8 g! e/ H
by Xiang Li, Wei Xu, Baojun Liu, Mingming Zhang, Zhou Li, Jia Zhang, Deliang Chang, Xiaofeng Zheng, Chuhan Wang, Jianjun Chen, Haixin Duan, Qi Li9 @2 ?3 ~2 q! R& Y
/ ?# Y+ w8 x0 N2 r8 e
【8】清华大学
& m7 V2 f, a; |SATURN: Host-Gadget Synergistic USB Driver Fuzzingpp. 51-51
8 u' d' Z7 ^! v9 p% x& ` {by Yiru Xu, Hao Sun, Jianzhong Liu, Yuheng Shen, Yu Jiang5 p3 j% }8 B5 p9 z% F
% P6 K1 O" @3 ~: v
【9】北京大学
" j8 B( I& m' R* C+ f; ENo Privacy Left Outside: On the (In-)Security of TEE-Shielded DNN Partition for On-Device MLpp. 52-52
0 o" o: H5 b: Y9 oby Ziqi Zhang, Chen Gong, Yifeng Cai, Yuanyuan Yuan, Bingyan Liu, Ding Li, Yao Guo, Xiangqun Chen. g% K, H' l. j& `1 g
/ V) M2 Y1 b& h% E# ?7 z; ?
【10】浙江大学% k& o! V$ W% c" m
Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attackspp. 53-53
]5 q, F$ C- p% a. s4 O, Nby Xinyu Zhang, Hanbin Hong, Yuan Hong, Peng Huang, Binghui Wang, Zhongjie Ba, Kui Ren
* v2 {8 x$ o9 c9 Y9 k6 [$ b) z4 V/ y \
【11】浙江大学
& z; |" [* w" }6 d5 nALIF: Low-Cost Adversarial Audio Attacks on Black-Box Speech Platforms using Linguistic Featurespp. 56-56
+ F' g, s& m8 V# Xby Peng Cheng, Yuwei Wang, Peng Huang, Zhongjie Ba, Xiaodong Lin, Feng Lin, Li Lu, Kui Ren
1 d7 G4 }/ O& \1 q* C1 g+ I6 i8 s6 K+ O) A; I* R
【12】南开大学, I: g# b% J. T) U' p" Y% v1 v5 {
Springproofs: Efficient Inner Product Arguments for Vectors of Arbitrary Lengthpp. 67-67
( q" G" |7 s5 n2 j# cby Jianning Zhang, Ming Su, Xiaoguang Liu, Gang Wang% v3 `. Q, i9 M1 \1 L
& A" m5 Z/ @0 Z; J5 |4 V' i
【13】浙江大学& Q. d; v; s, A: U8 R
BounceAttack: A Query-Efficient Decision-based Adversarial Attack by Bouncing into the Wildpp. 68-68
5 n1 r. x9 G9 d( u5 ]# Mby Jie Wan, Jianhao Fu, Lijin Wang, Ziqi Yang7 t* S' M, f2 k5 Y* Y2 u3 x0 E8 f
( c& ?6 f. t4 m: x( h; M: @3 U【14】浙江大学
# g2 c/ ~. o. G- e- T) ] HSyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devicespp. 70-70
?' v5 p0 I6 R/ Z0 n. Q0 tby Qinying Wang, Boyu Chang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Gaoning Pan, Chenyang Lyu, Mathias Payer, Wenhai Wang, Raheem Beyah
: `5 y% D6 o' k4 h4 P2 T1 U
: p) L- N6 W2 p$ b, O【15】清华大学
5 c" S& t, f8 n2 iTest-Time Poisoning Attacks Against Test-Time Adaptation Modelspp. 72-72
?. ^( T* x- a5 U( iby Tianshuo Cong, Xinlei He, Yun Shen, Yang Zhang
, A1 ?/ ]% A5 v; `- c+ g
( p! p/ o8 `4 f/ E- W9 ?【16】上海交大% c% i% I4 [3 k; ?4 S
SrcMarker: Dual-Channel Source Code Watermarking via Scalable Code Transformationspp. 97-970 k4 C8 ~/ D5 A
by Borui Yang, Wei Li, Liyao Xiang, Bo Li; K. ~' m8 F7 q* ^4 C
8 x$ Z0 D& T& l1 Z
【17】重庆大学/ V1 [( L& E! [
From Individual Computation to Allied Optimization: Remodeling Privacy-Preserving Neural Inference with Function Input Tuningpp. 101-101
! X9 z2 o6 o. E9 h8 h4 w: mby Qiao Zhang, Tao Xiang, Chunsheng Xin, Hongyi Wu- M7 f+ n. h: F1 a g
8 I6 Q1 r2 x* W
【18】东南大学
3 `9 Y9 x3 L' vTransferable Multimodal Attack on Vision-Language Pre-training Modelspp. 102-1025 A( m5 K- ]0 k. j, H0 ^
by Haodi Wang, Kai Dong, Zhilei Zhu, Haotong Qin, Aishan Liu, Xiaolin Fang, Jiakai Wang, Xianglong Liu- y/ _" d& {3 [ ^" Y
) E6 r/ P" m* f! `
【19】清华大学
' _, z7 I( G& V+ _! K3 NBULKOR: Enabling Bulk Loading for Path ORAMpp. 103-103
& H! b" R, s5 y$ \% l/ B2 yby Xiang Li, Yunqian Luo, Mingyu Gao
0 ]0 n0 L" e4 W
8 ^: y6 N/ T) i7 r6 E4 A【20】清华大学
5 X; q2 V+ [' |Chronos: Finding Timeout Bugs in Practical Distributed Systems by Deep-Priority Fuzzing with Transient Delaypp. 109-1091 y& |7 h" g0 K! y+ X2 K
by Yuanliang Chen
0 K$ S# q! ], L, W$ X+ I8 m" d% q; Y! a1 t% t
【21】浙江大学
. D# H9 q; X+ C& o. N& N |0 aUnderstanding and Benchmarking the Commonality of Adversarial Examplespp. 111-111( v% @, ~7 v5 Q# q6 w
by Ruiwen He, Yushi Cheng, Junning Ze, Xiaoyu Ji, Wenyuan Xu
; K% U# p/ Z( v* g: c5 d# {# u7 n' I. K C- L# Y. Y, C/ j
【22】电子科技大学* ]2 [; K7 V) M. [ {/ ~, t
NURGLE: Exacerbating Resource Consumption in Blockchain State Storage via MPT Manipulationpp. 125-1255 t6 B+ {1 T# K8 R8 o& B
by Zheyuan He, Zihao Li, Ao Qiao, Xiapu Luo, Xiaosong Zhang, Ting Chen, Shuwei Song, Dijun Liu, Weina Niu8 O9 {2 _3 p# l$ c x a
; e) z' Y9 [5 [5 U( X/ q& b【23】清华大学
0 ^8 Z9 V! l/ f; J8 mLABRADOR: Response Guided Directed Fuzzing for Black-box IoT Devicespp. 127-127
- V. R& A5 z$ w5 m) xby Hangtian Liu, Shuitao Gan, Chao Zhang, Zicong Gao, Hongqi Zhang, Xiangzhi Wang, Guangming Gao: G# W: {$ _& P) O3 r7 H
9 W; i* s7 q; ?4 L# o2 ~# K- F
【24】清华大学
/ D" c$ ~7 B7 }Break the Wall from bottom: Automated Discovery of Protocol-Level Evasion Vulnerabilities in Web Application Firewallspp. 129-129# W5 q; |' w8 X$ @( ~+ V
by Qi Wang, Jianjun Chen, Zheyu Jiang, Run Guo, Ximeng Liu, Chao Zhang, Haixin Duan8 z2 e* h! U# y3 v
0 r9 q4 }' S0 D, `2 M E0 {3 U
【25】清华大学1 i1 X y) a, c4 Z, A% E3 z
GAuV: A Graph-Based Automated Verification Framework for Perfect Semi-Honest Security of Multiparty Computation Protocolspp. 131-131
R/ M, J7 A# h" K/ P5 ~by Xingyu Xie, Yifei Li, Wei Zhang, Tuowei Wang, Shizhen Xu, Jun Zhu, Yifan Song
( I$ A6 F6 F, {0 A2 J$ O& t0 O. H3 m
【26】清华大学& Z" n/ |! |( i
More Haste, Less Speed: Cache Related Security Threats in Continuous Integration Servicespp. 138-138" K. n) w+ N- o5 ?+ |
by Yacong Gu, Lingyun Ying, Huajun Chai, Yingyuan Pu, Haixin Duan, Xing Gao
8 i: F$ L% J: j0 I9 c' k X% g7 a& W1 F
【27】西电
4 X) h8 W/ ]. t* Y' m2 E, V+ GFlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledgepp. 148-148
d' p* O" J% w7 ?by Jiahe Lan, Jie Wang, Baochen Yan, Zheng Yan, Elisa Bertino/ B I2 U% G+ M
* _, Y& L; P) z7 ^* v
【28】清华大学
2 w* y- i% X" X( e: QThe Dark Side of Scale: Insecurity of Direct-to-Cell Satellite Mega-Constellationspp. 149-1499 J7 K) F0 p6 A m4 O. k
by Wei Li, Yuanjie Li, Hewu Li, Yimei Chen, Yufeng Wang, Jingyi Lan, Jianping Wu, Qian Wu, Jun Liu, Zeqi Lai, B* Y2 J, ]; x5 O
1 e# U; X0 M# l9 p2 P8 `【29】复旦大学
6 U0 {8 }! ~# A- DEfficient Detection of Java Deserialization Gadget Chains via Bottom-up Gadget Search and Dataflow-aided Payload Constructionpp. 150-150" U# G7 [4 z9 T! a" x* D
by Bofei Chen
# c1 A, n0 a. v# g3 H- m" S' T5 f# F: D* S* h# f0 Y
【30】山东大学" r( P1 S- Y0 M! [& h9 j+ k# |: t
AVA: Inconspicuous Attribute Variation-based Adversarial Attack bypassing DeepFake Detectionpp. 155-155
5 x2 Y# ]& K. [" yby Xiangtao Meng, Li Wang, Shanqing Guo, Lei Ju, Qingchuan Zhao
0 S; k; `% G1 q* F( O: z$ F/ F" w P, f
【31】北京大学0 m1 w+ F/ q/ ~. N3 t6 e2 Z
Rethinking IC Layout Vulnerability: Simulation-Based Hardware Trojan Threat Assessment with High Fidelitypp. 160-160* t Q+ O) [, L+ P* f* [% y
by Xinming Wei, Jiaxi Zhang, Guojie Luo
3 D {: X; ~+ ^2 B# _ t5 h7 Q7 \5 c% `; s5 J
|
|