查看原文
其他

信息安全领域顶级会议IEEE S&P 2023论文收录整理


IEEE Symposium on Security and Privacy (简称 S&P)创办于1980年,是信息安全领域四大顶级学术会议之一,也是信息安全领域历史最悠久的国际顶级学术会议。第44届IEEE安全与隐私研讨会将于2023年5月22日至26日在美国旧金山举办。
本次推文将整理会议已录用的论文题目,读者可以根据兴趣进行详细阅读。
  • Examining Zero-Shot Vulnerability Repair with Large Language Models

https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00001


  • Deepfake Text Detection: Limitations and Opportunities

https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00002

  • Detection of Inconsistencies in Privacy Practices of Browser Extensions

https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00003

  • Towards a Rigorous Statistical Analysis of Empirical Password Datasets

https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00004

  • Private, Efficient, and Accurate: Protecting Models Trained by Multi-party Learning with Differential Privacy

https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00005

  • SoK: Certified Robustness for Deep Neural Networks

https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00006

  • Toss a Fault to Your Witcher: Applying Grey-box Coverage-Guided Mutational Fuzzing to Detect SQL and Command Injection Vulnerabilities

https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00007

  • SoK: Anti-Facial Recognition Technology

https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00008

  • Could you clean up the Internet with a Pit of Tar? Investigating tarpit feasibility on Internet worms

https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00009

  • SoK: Taxonomy of Attacks on Open-Source Software Supply Chains

https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00010

  • Spectre Declassified: Reading from the Right Place at the Wrong Time

https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00011

  • No One Drinks From the Firehose: How Organizations Filter and Prioritize Vulnerability Information

https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00012

  • TEEzz: Fuzzing Trusted Applications on COTS Android Devices

https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00013

  • CSI:Rowhammer - Cryptographic Security and Integrity against Rowhammer

https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00014

  • It’s (DOM) Clobbering Time: Attack Techniques, Prevalence, and Defenses

https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00015

  • WeRLman: To Tackle Whale (Transactions), Go Deep (RL)

https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00016

  • Vulnerability Discovery for All: Experiences of Marginalization in Vulnerability Discovery

https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00017

  • SoK: History is a Vast Early Warning System: Auditing the Provenance of System Intrusions

https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00018

  • FedRecover: Recovering from Poisoning Attacks in Federated Learning using Historical Information

https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00019

  • SoK: A Critical Evaluation of Efficient Website Fingerprinting Defenses

https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00020

  • SCAPHY: Detecting Modern ICS Attacks by Correlating Behaviors in SCADA and PHYsical

https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00021

  • "It's up to the Consumer to be Smart": Understanding the Security and Privacy Attitudes of Smart Home Users on Reddit

https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00022

  • Skilled or Gullible? Gender Stereotypes Related to Computer Security and Privacy

https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00023

  • IPvSeeYou: Exploiting Leaked Identifiers in IPv6 for Street-Level Geolocation

https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00024

  • D-DAE: Defense-Penetrating Model Extraction Attacks

https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00025

  • MEGA: Malleable Encryption Goes Awry

https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00026

  • SQUIP: Exploiting the Scheduler Queue Contention Side Channel

https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00027

  • Rethinking Searchable Symmetric Encryption

https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00028

  • Inducing Wireless Chargers to Voice Out for Inaudible Command Attacks

https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00029

  • Blue's Clues: Practical Discovery of Non-Discoverable Bluetooth Devices

https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00030

  • "How technical do you get? I'm an English teacher": Teaching and Learning Cybersecurity and AI Ethics in High School

https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00031

  • Shedding Light on Inconsistencies in Grid Cybersecurity: Disconnects and Recommendations

https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00032

  • PCspooF: Compromising the Safety of Time-Triggered Ethernet

https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00033

  • AEM: Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities

https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00034

  • GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics

https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00035

  • Clockwork Finance: Automated Analysis of Economic Security in Smart Contracts

https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00036

  • RAB: Provable Robustness Against Backdoor Attacks

https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00037

  • DeHiREC: Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation

https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00038

  • FIDO2, CTAP 2.1, and WebAuthn 2: Provable Security and Post-Quantum Instantiation

https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00039

  • Man-in-the-Middle Attacks without Rogue AP: When WPAs Meet ICMP Redirects

https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00040

  • PLA-LiDAR: Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle

https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00041

  • D-ARM: Disassembling ARM Binaries by Lightweight Superset Instruction Interpretation and Graph Modeling

https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00042

  • UTOPIA: Automatic Generation of Fuzz Driver using Unit Tests

https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00043

Deepfake Text Detection: Limitations and Opportunities Private, Efficient, and Accurate: Protecting Models Trained by Multi-party Learning with Differential Privacy
END

往期推荐


隐私计算机器学习中,应用MPC实验常见问题与解答
为什么不可以直接在实数上进行秘密分享?一起学MPC:(一)百万富翁问题隐私计算岗高薪酬冲上热搜!

欢迎投稿
邮箱:pet@openmpc.com
参与更多讨论,请添加小编微信加入交流群


您可能也对以下帖子感兴趣

文章有问题?点此查看未经处理的缓存