|
楼主 |
发表于 2024-2-3 14:55:15
|
显示全部楼层
本帖最后由 SmithArno 于 2024-3-8 16:25 编辑
IEEE S&P 2024
【1】华中科技大学
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferabilitypp. 10-10
by Yechao Zhang, Shengshan Hu, Leo Yu Zhang, Junyu Shi, Minghui Li, Xiaogeng Liu, Wei Wan, Hai Jin
【2】华中科技大学
MQTTactic: Security Analysis and Verification for Logic Flaws in MQTT Implementationspp. 13-13
by Bin Yuan, Zhanxiang Song, Yan Jia, Zhenyu Lu, Deqing Zou, Hai Jin, Luyi Xing
【3】复旦大学
Withdrawing is believing? Detecting Inconsistencies Between Withdrawal Choices and Third-party Data Collections in Mobile Appspp. 14-14
by Xiaolin Du, Zhemin Yang, Jiapeng Lin, Yinzhi Cao, Min Yang
【4】浙江大学
PIRANA: Faster Multi-query PIR via Constant-weight Codespp. 39-39
by Jian Liu, Jingyu Li, Di Wu, Kui Ren
【5】东南大学
Predecessor-aware Directed Greybox Fuzzingpp. 40-40
by Yujian Zhang, Yaokun Liu, Jinyu Xu, Yanhao Wang
【6】中南大学
Guessing on Dominant Paths: Understanding the Limitation of Wireless Authentication Using Channel State Informationpp. 42-42
by Zhe Qu, Rui Duan, Xiao Han, Shangqing Zhao, Yao Liu, Zhuo Lu
【7】清华大学
TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packetspp. 46-46
by Xiang Li, Wei Xu, Baojun Liu, Mingming Zhang, Zhou Li, Jia Zhang, Deliang Chang, Xiaofeng Zheng, Chuhan Wang, Jianjun Chen, Haixin Duan, Qi Li
【8】清华大学
SATURN: Host-Gadget Synergistic USB Driver Fuzzingpp. 51-51
by Yiru Xu, Hao Sun, Jianzhong Liu, Yuheng Shen, Yu Jiang
【9】北京大学
No Privacy Left Outside: On the (In-)Security of TEE-Shielded DNN Partition for On-Device MLpp. 52-52
by Ziqi Zhang, Chen Gong, Yifeng Cai, Yuanyuan Yuan, Bingyan Liu, Ding Li, Yao Guo, Xiangqun Chen
【10】浙江大学
Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attackspp. 53-53
by Xinyu Zhang, Hanbin Hong, Yuan Hong, Peng Huang, Binghui Wang, Zhongjie Ba, Kui Ren
【11】浙江大学
ALIF: Low-Cost Adversarial Audio Attacks on Black-Box Speech Platforms using Linguistic Featurespp. 56-56
by Peng Cheng, Yuwei Wang, Peng Huang, Zhongjie Ba, Xiaodong Lin, Feng Lin, Li Lu, Kui Ren
【12】南开大学
Springproofs: Efficient Inner Product Arguments for Vectors of Arbitrary Lengthpp. 67-67
by Jianning Zhang, Ming Su, Xiaoguang Liu, Gang Wang
【13】浙江大学
BounceAttack: A Query-Efficient Decision-based Adversarial Attack by Bouncing into the Wildpp. 68-68
by Jie Wan, Jianhao Fu, Lijin Wang, Ziqi Yang
【14】浙江大学
SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devicespp. 70-70
by Qinying Wang, Boyu Chang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Gaoning Pan, Chenyang Lyu, Mathias Payer, Wenhai Wang, Raheem Beyah
【15】清华大学
Test-Time Poisoning Attacks Against Test-Time Adaptation Modelspp. 72-72
by Tianshuo Cong, Xinlei He, Yun Shen, Yang Zhang
【16】上海交大
SrcMarker: Dual-Channel Source Code Watermarking via Scalable Code Transformationspp. 97-97
by Borui Yang, Wei Li, Liyao Xiang, Bo Li
【17】重庆大学
From Individual Computation to Allied Optimization: Remodeling Privacy-Preserving Neural Inference with Function Input Tuningpp. 101-101
by Qiao Zhang, Tao Xiang, Chunsheng Xin, Hongyi Wu
【18】东南大学
Transferable Multimodal Attack on Vision-Language Pre-training Modelspp. 102-102
by Haodi Wang, Kai Dong, Zhilei Zhu, Haotong Qin, Aishan Liu, Xiaolin Fang, Jiakai Wang, Xianglong Liu
【19】清华大学
BULKOR: Enabling Bulk Loading for Path ORAMpp. 103-103
by Xiang Li, Yunqian Luo, Mingyu Gao
【20】清华大学
Chronos: Finding Timeout Bugs in Practical Distributed Systems by Deep-Priority Fuzzing with Transient Delaypp. 109-109
by Yuanliang Chen
【21】浙江大学
Understanding and Benchmarking the Commonality of Adversarial Examplespp. 111-111
by Ruiwen He, Yushi Cheng, Junning Ze, Xiaoyu Ji, Wenyuan Xu
【22】电子科技大学
NURGLE: Exacerbating Resource Consumption in Blockchain State Storage via MPT Manipulationpp. 125-125
by Zheyuan He, Zihao Li, Ao Qiao, Xiapu Luo, Xiaosong Zhang, Ting Chen, Shuwei Song, Dijun Liu, Weina Niu
【23】清华大学
LABRADOR: Response Guided Directed Fuzzing for Black-box IoT Devicespp. 127-127
by Hangtian Liu, Shuitao Gan, Chao Zhang, Zicong Gao, Hongqi Zhang, Xiangzhi Wang, Guangming Gao
【24】清华大学
Break the Wall from bottom: Automated Discovery of Protocol-Level Evasion Vulnerabilities in Web Application Firewallspp. 129-129
by Qi Wang, Jianjun Chen, Zheyu Jiang, Run Guo, Ximeng Liu, Chao Zhang, Haixin Duan
【25】清华大学
GAuV: A Graph-Based Automated Verification Framework for Perfect Semi-Honest Security of Multiparty Computation Protocolspp. 131-131
by Xingyu Xie, Yifei Li, Wei Zhang, Tuowei Wang, Shizhen Xu, Jun Zhu, Yifan Song
【26】清华大学
More Haste, Less Speed: Cache Related Security Threats in Continuous Integration Servicespp. 138-138
by Yacong Gu, Lingyun Ying, Huajun Chai, Yingyuan Pu, Haixin Duan, Xing Gao
【27】西电
FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledgepp. 148-148
by Jiahe Lan, Jie Wang, Baochen Yan, Zheng Yan, Elisa Bertino
【28】清华大学
The Dark Side of Scale: Insecurity of Direct-to-Cell Satellite Mega-Constellationspp. 149-149
by Wei Li, Yuanjie Li, Hewu Li, Yimei Chen, Yufeng Wang, Jingyi Lan, Jianping Wu, Qian Wu, Jun Liu, Zeqi Lai
【29】复旦大学
Efficient Detection of Java Deserialization Gadget Chains via Bottom-up Gadget Search and Dataflow-aided Payload Constructionpp. 150-150
by Bofei Chen
【30】山东大学
AVA: Inconspicuous Attribute Variation-based Adversarial Attack bypassing DeepFake Detectionpp. 155-155
by Xiangtao Meng, Li Wang, Shanqing Guo, Lei Ju, Qingchuan Zhao
【31】北京大学
Rethinking IC Layout Vulnerability: Simulation-Based Hardware Trojan Threat Assessment with High Fidelitypp. 160-160
by Xinming Wei, Jiaxi Zhang, Guojie Luo
|
|