|

楼主 |
发表于 2024-2-3 14:55:15
|
显示全部楼层
本帖最后由 SmithArno 于 2024-3-8 16:25 编辑
/ _( _% {& I2 x
{6 C- s- o) p! I8 [IEEE S&P 2024' P) a: C' _# ~2 T& A3 M
2 z( E8 z6 w R8 Z
【1】华中科技大学* j7 t* e) ^& Z1 y: X) m
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferabilitypp. 10-106 Y& {9 }) L# u5 `
by Yechao Zhang, Shengshan Hu, Leo Yu Zhang, Junyu Shi, Minghui Li, Xiaogeng Liu, Wei Wan, Hai Jin
9 U8 U5 x: i+ j4 O% d% g4 _1 g- Y6 ^) T0 E7 ~; @$ \. r$ U! A- ?: x
【2】华中科技大学5 q! e- ]9 v9 T$ z
MQTTactic: Security Analysis and Verification for Logic Flaws in MQTT Implementationspp. 13-13( H* m/ j6 w9 c, r% r3 i$ b) M! C
by Bin Yuan, Zhanxiang Song, Yan Jia, Zhenyu Lu, Deqing Zou, Hai Jin, Luyi Xing: L9 ~! r q0 `3 c# q; s
2 s! F4 ^* |+ W# f7 @! G0 ]
【3】复旦大学
0 a6 L; m: E! c3 ^0 SWithdrawing is believing? Detecting Inconsistencies Between Withdrawal Choices and Third-party Data Collections in Mobile Appspp. 14-14
# a; |' H( Q% N- C: @# sby Xiaolin Du, Zhemin Yang, Jiapeng Lin, Yinzhi Cao, Min Yang6 U' I" N- [9 U( w5 }
, c5 m8 l3 O3 a
【4】浙江大学
1 ?! f# v* @. r, WPIRANA: Faster Multi-query PIR via Constant-weight Codespp. 39-39+ L1 ^2 B W$ B6 c
by Jian Liu, Jingyu Li, Di Wu, Kui Ren1 M2 r/ y' a: U4 a/ [6 I
; K: E( Q* j, h: q) j4 U1 ]
【5】东南大学
8 N! }/ V! Y+ m4 H2 X5 [4 E( vPredecessor-aware Directed Greybox Fuzzingpp. 40-40" p0 Z1 {# A) P3 ]. q- t
by Yujian Zhang, Yaokun Liu, Jinyu Xu, Yanhao Wang0 a# [) w R4 n; H
7 B& C4 `& `6 [$ S% `【6】中南大学
# o- x6 k; B) S5 F, |. H! sGuessing on Dominant Paths: Understanding the Limitation of Wireless Authentication Using Channel State Informationpp. 42-42
5 [( W! q( P1 l4 }( ~4 Lby Zhe Qu, Rui Duan, Xiao Han, Shangqing Zhao, Yao Liu, Zhuo Lu z' F) V* R2 E1 e* W
* q5 P; }. ?' ]! @. M0 V. Q0 \
【7】清华大学6 @7 F, I6 @* V/ \
TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packetspp. 46-46: U$ B* y" S6 M! T/ r
by Xiang Li, Wei Xu, Baojun Liu, Mingming Zhang, Zhou Li, Jia Zhang, Deliang Chang, Xiaofeng Zheng, Chuhan Wang, Jianjun Chen, Haixin Duan, Qi Li
$ o4 d6 K" @+ J: \) L1 u
, O; d1 \7 S/ v2 w9 T4 x1 z【8】清华大学# p5 |; g/ b% T2 R+ H' Q
SATURN: Host-Gadget Synergistic USB Driver Fuzzingpp. 51-51
( u( C9 n" ^# ~5 b+ @. \$ uby Yiru Xu, Hao Sun, Jianzhong Liu, Yuheng Shen, Yu Jiang
, a9 b6 I/ X+ y# y$ a& s0 @8 N5 U" x; G4 Z, i2 q5 n. f0 Y: W
【9】北京大学
( i* C; x) W. w' }No Privacy Left Outside: On the (In-)Security of TEE-Shielded DNN Partition for On-Device MLpp. 52-52
- ^# M$ j7 H/ z1 ^' _, Qby Ziqi Zhang, Chen Gong, Yifeng Cai, Yuanyuan Yuan, Bingyan Liu, Ding Li, Yao Guo, Xiangqun Chen# q! a. K. v; f6 Q0 n- ^
x2 W) J3 h9 p) O1 l6 g r【10】浙江大学% A2 l$ ?; s' x; Z2 H! ?
Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attackspp. 53-53
3 L! E7 l' K F8 |7 L1 ?8 Rby Xinyu Zhang, Hanbin Hong, Yuan Hong, Peng Huang, Binghui Wang, Zhongjie Ba, Kui Ren3 `/ O5 P4 U" C/ Y! U& T
# ?8 W- M N: H" N6 W% w* q【11】浙江大学5 n' G" G7 A0 Z0 m1 |6 P4 s" K5 L
ALIF: Low-Cost Adversarial Audio Attacks on Black-Box Speech Platforms using Linguistic Featurespp. 56-563 X; a, m4 f( g+ Y& ]
by Peng Cheng, Yuwei Wang, Peng Huang, Zhongjie Ba, Xiaodong Lin, Feng Lin, Li Lu, Kui Ren
1 ~5 f3 n( N# ^: I
$ ]& }8 h1 J3 W【12】南开大学
! w+ O8 I& a. d& @" hSpringproofs: Efficient Inner Product Arguments for Vectors of Arbitrary Lengthpp. 67-67
" n/ ]" l) y% X7 ` k a( _9 _by Jianning Zhang, Ming Su, Xiaoguang Liu, Gang Wang% f8 V: @ P& N" ~9 a, M1 l. ^! U
7 G" L4 e* n2 [5 `
【13】浙江大学7 M1 U2 p5 L3 V7 N
BounceAttack: A Query-Efficient Decision-based Adversarial Attack by Bouncing into the Wildpp. 68-68
7 H, B3 X; L' y6 i: M& uby Jie Wan, Jianhao Fu, Lijin Wang, Ziqi Yang8 v) W [ o! K: I, A8 I5 l* g4 l) f
1 [3 [2 W' ^# Q1 T! l5 ^
【14】浙江大学& d, O9 {) `$ a3 Y
SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devicespp. 70-707 o9 w T- D- T: k5 H2 A
by Qinying Wang, Boyu Chang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Gaoning Pan, Chenyang Lyu, Mathias Payer, Wenhai Wang, Raheem Beyah. P9 N( ?' l/ w2 o# i$ p3 a2 T
* ^. a/ R5 I6 m; O
【15】清华大学
% ^) }. d$ Q5 C6 G7 YTest-Time Poisoning Attacks Against Test-Time Adaptation Modelspp. 72-72
1 m( g# u9 ?( p' R, V% {by Tianshuo Cong, Xinlei He, Yun Shen, Yang Zhang
! d" Z& F' Z$ l2 @2 _) }
$ ^0 I* V: }2 ?& I【16】上海交大
5 E8 I# ?# E4 k) [& a/ _ XSrcMarker: Dual-Channel Source Code Watermarking via Scalable Code Transformationspp. 97-97
; J% z d2 t# U- ?by Borui Yang, Wei Li, Liyao Xiang, Bo Li) G, A2 T9 R: A2 z# L/ H. S E) ^* i
% V; y& S0 U7 N3 d# p& {5 P* `
【17】重庆大学/ g1 t& e1 D j5 q
From Individual Computation to Allied Optimization: Remodeling Privacy-Preserving Neural Inference with Function Input Tuningpp. 101-101
2 M" p5 x& b" }4 Z& Z( rby Qiao Zhang, Tao Xiang, Chunsheng Xin, Hongyi Wu
# b* N* ~' P% ]( t1 y% n0 \* C( i x4 m. r( D# R) i
【18】东南大学
5 w6 z% i) `1 h% e/ Y& hTransferable Multimodal Attack on Vision-Language Pre-training Modelspp. 102-102
& D3 q( ]( e* T5 X$ fby Haodi Wang, Kai Dong, Zhilei Zhu, Haotong Qin, Aishan Liu, Xiaolin Fang, Jiakai Wang, Xianglong Liu
. s2 W: ~) ~% R
5 }8 r% ^* o' Y, z【19】清华大学
! u J! O% B2 G8 R! H) [; f- jBULKOR: Enabling Bulk Loading for Path ORAMpp. 103-103( J. u+ ?& X! G$ J. F
by Xiang Li, Yunqian Luo, Mingyu Gao! B8 W2 C* c; T9 \
# j* S1 @1 F1 F) T# A# H0 e {
【20】清华大学& B1 ^, ~4 f. |) v
Chronos: Finding Timeout Bugs in Practical Distributed Systems by Deep-Priority Fuzzing with Transient Delaypp. 109-109, T3 s3 u3 t: n0 Q
by Yuanliang Chen4 K. t! j N' Z' {# r( I/ A# W
6 W9 @% {* y4 _! ]5 [【21】浙江大学) Y# i3 | |( T2 R/ c8 ?: S' y& j
Understanding and Benchmarking the Commonality of Adversarial Examplespp. 111-111: s* f1 R8 a& m; W+ f' J3 L" B3 j/ f% a
by Ruiwen He, Yushi Cheng, Junning Ze, Xiaoyu Ji, Wenyuan Xu& Q$ a4 p" K# v& N) a
! B+ f U$ Y/ |- Y【22】电子科技大学
8 N( L2 a3 H" z* S5 F( nNURGLE: Exacerbating Resource Consumption in Blockchain State Storage via MPT Manipulationpp. 125-1251 s9 r+ S z- ~* l& G: J# w
by Zheyuan He, Zihao Li, Ao Qiao, Xiapu Luo, Xiaosong Zhang, Ting Chen, Shuwei Song, Dijun Liu, Weina Niu; V! S- H4 N9 W X5 ^
" A) i: z' s8 Z7 `8 g# u: u5 _【23】清华大学
# F C f! A/ ^1 s7 u# T. LLABRADOR: Response Guided Directed Fuzzing for Black-box IoT Devicespp. 127-127
- `( s8 T6 @1 A; s( A& _1 Z8 pby Hangtian Liu, Shuitao Gan, Chao Zhang, Zicong Gao, Hongqi Zhang, Xiangzhi Wang, Guangming Gao
. d) e$ ^& n0 S4 q F
% ^% X( q8 l3 T# W& U. \【24】清华大学" q# t+ r z1 o
Break the Wall from bottom: Automated Discovery of Protocol-Level Evasion Vulnerabilities in Web Application Firewallspp. 129-129
" I, o7 S* i" nby Qi Wang, Jianjun Chen, Zheyu Jiang, Run Guo, Ximeng Liu, Chao Zhang, Haixin Duan
0 D8 K @4 {/ D9 X# } Z$ u/ P$ ^7 L4 h) c% }- `: A# x
【25】清华大学% o1 m( Q: ~* E; `3 ^2 a% ^
GAuV: A Graph-Based Automated Verification Framework for Perfect Semi-Honest Security of Multiparty Computation Protocolspp. 131-131
! {& D: _, p4 \- f) E' rby Xingyu Xie, Yifei Li, Wei Zhang, Tuowei Wang, Shizhen Xu, Jun Zhu, Yifan Song/ ~. j- A% S9 i
& j6 A4 \% G4 m9 P& T7 I8 R$ M【26】清华大学% G9 B% y9 b3 B# G. K, z$ y* z
More Haste, Less Speed: Cache Related Security Threats in Continuous Integration Servicespp. 138-138
: v3 O6 t) s" O' n( qby Yacong Gu, Lingyun Ying, Huajun Chai, Yingyuan Pu, Haixin Duan, Xing Gao& h. T* N; l5 P, f
! n7 B- u9 [* h) c- `* ?9 |$ [) }
【27】西电3 L1 ^# f; J; u+ P& c
FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledgepp. 148-1481 T c0 N7 U7 d; c7 h% n
by Jiahe Lan, Jie Wang, Baochen Yan, Zheng Yan, Elisa Bertino$ u) b' @4 Q5 F% S8 B, y
4 g6 |% z( M" }. ~( i: m9 M% @6 E
【28】清华大学( P5 Z `, m$ b/ X3 i
The Dark Side of Scale: Insecurity of Direct-to-Cell Satellite Mega-Constellationspp. 149-149+ D/ i# C4 N$ [8 V0 a, f
by Wei Li, Yuanjie Li, Hewu Li, Yimei Chen, Yufeng Wang, Jingyi Lan, Jianping Wu, Qian Wu, Jun Liu, Zeqi Lai
; B: S3 A0 B& o6 `% O( G: D
W7 W/ G2 R- e; ?' r- c【29】复旦大学/ J8 k4 j" c* C) f- X8 n
Efficient Detection of Java Deserialization Gadget Chains via Bottom-up Gadget Search and Dataflow-aided Payload Constructionpp. 150-150. J7 t- F' p, Q, L) Y& p
by Bofei Chen6 C. r0 m( a( F) N, n! L* r. e
# }. ?7 X- U, a; p6 ^【30】山东大学
& L* y# `; }7 I* t+ RAVA: Inconspicuous Attribute Variation-based Adversarial Attack bypassing DeepFake Detectionpp. 155-155
' m* H1 u" p- u, O4 Uby Xiangtao Meng, Li Wang, Shanqing Guo, Lei Ju, Qingchuan Zhao
- r1 F& X7 o1 `% T% ]
( U5 G, `1 b1 \2 O! h1 n【31】北京大学
6 C: D3 O. A5 [0 K% A, v0 ERethinking IC Layout Vulnerability: Simulation-Based Hardware Trojan Threat Assessment with High Fidelitypp. 160-1607 R( y, I9 b; k- N% t" ]7 z
by Xinming Wei, Jiaxi Zhang, Guojie Luo/ n1 r+ V% ^" P b
, ~5 c- O- H( y: B |
|