信息安全领域顶级会议IEEE S&P 2023论文收录整理
本次推文将整理会议已录用的论文题目,读者可以根据兴趣进行详细阅读。
Examining Zero-Shot Vulnerability Repair with Large Language Models
https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00001
Deepfake Text Detection: Limitations and Opportunities
https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00002
Detection of Inconsistencies in Privacy Practices of Browser Extensions
https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00003
Towards a Rigorous Statistical Analysis of Empirical Password Datasets
https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00004
Private, Efficient, and Accurate: Protecting Models Trained by Multi-party Learning with Differential Privacy
https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00005
SoK: Certified Robustness for Deep Neural Networks
https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00006
Toss a Fault to Your Witcher: Applying Grey-box Coverage-Guided Mutational Fuzzing to Detect SQL and Command Injection Vulnerabilities
https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00007
SoK: Anti-Facial Recognition Technology
https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00008
Could you clean up the Internet with a Pit of Tar? Investigating tarpit feasibility on Internet worms
https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00009
SoK: Taxonomy of Attacks on Open-Source Software Supply Chains
https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00010
Spectre Declassified: Reading from the Right Place at the Wrong Time
https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00011
No One Drinks From the Firehose: How Organizations Filter and Prioritize Vulnerability Information
https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00012
TEEzz: Fuzzing Trusted Applications on COTS Android Devices
https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00013
CSI:Rowhammer - Cryptographic Security and Integrity against Rowhammer
https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00014
It’s (DOM) Clobbering Time: Attack Techniques, Prevalence, and Defenses
https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00015
WeRLman: To Tackle Whale (Transactions), Go Deep (RL)
https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00016
Vulnerability Discovery for All: Experiences of Marginalization in Vulnerability Discovery
https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00017
SoK: History is a Vast Early Warning System: Auditing the Provenance of System Intrusions
https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00018
FedRecover: Recovering from Poisoning Attacks in Federated Learning using Historical Information
https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00019
SoK: A Critical Evaluation of Efficient Website Fingerprinting Defenses
https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00020
SCAPHY: Detecting Modern ICS Attacks by Correlating Behaviors in SCADA and PHYsical
https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00021
"It's up to the Consumer to be Smart": Understanding the Security and Privacy Attitudes of Smart Home Users on Reddit
https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00022
Skilled or Gullible? Gender Stereotypes Related to Computer Security and Privacy
https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00023
IPvSeeYou: Exploiting Leaked Identifiers in IPv6 for Street-Level Geolocation
https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00024
D-DAE: Defense-Penetrating Model Extraction Attacks
https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00025
MEGA: Malleable Encryption Goes Awry
https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00026
SQUIP: Exploiting the Scheduler Queue Contention Side Channel
https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00027
Rethinking Searchable Symmetric Encryption
https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00028
Inducing Wireless Chargers to Voice Out for Inaudible Command Attacks
https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00029
Blue's Clues: Practical Discovery of Non-Discoverable Bluetooth Devices
https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00030
"How technical do you get? I'm an English teacher": Teaching and Learning Cybersecurity and AI Ethics in High School
https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00031
Shedding Light on Inconsistencies in Grid Cybersecurity: Disconnects and Recommendations
https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00032
PCspooF: Compromising the Safety of Time-Triggered Ethernet
https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00033
AEM: Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities
https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00034
GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics
https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00035
Clockwork Finance: Automated Analysis of Economic Security in Smart Contracts
https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00036
RAB: Provable Robustness Against Backdoor Attacks
https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00037
DeHiREC: Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation
https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00038
FIDO2, CTAP 2.1, and WebAuthn 2: Provable Security and Post-Quantum Instantiation
https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00039
Man-in-the-Middle Attacks without Rogue AP: When WPAs Meet ICMP Redirects
https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00040
PLA-LiDAR: Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle
https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00041
D-ARM: Disassembling ARM Binaries by Lightweight Superset Instruction Interpretation and Graph Modeling
https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00042
UTOPIA: Automatic Generation of Fuzz Driver using Unit Tests
https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00043
往期推荐
隐私计算机器学习中,应用MPC实验常见问题与解答
为什么不可以直接在实数上进行秘密分享?一起学MPC:(一)百万富翁问题隐私计算岗高薪酬冲上热搜!