MAY 22-25, 2023 AT THE HYATT REGENCY, SAN FRANCISCO, CA & ONLINE

44th IEEE Symposium on
Security and Privacy

Posters

Poster: Deanonymization of Bitcoin transactions based on network traffic analysis with semi-supervised learning  
Chuanyong Tian ( Beijing University of Posts and Telecommunications ), Ruisheng Shi ( Beijing University of Posts and Telecommunications ), Lina Lan ( Beijing University of Posts and Telecommunications ), Zhiyuan Peng ( Beijing University of Posts and Telecommunications ), Yulian Ge ( Beijing University of Posts and Telecommunications ), Yuxuan Liang ( Beijing University of Posts and Telecommunications ), Peng Liu ( The Pennsylvania State University )

Poster: No safety in numbers: traffic analysis of sealed-sender groups in Signal  
Eric Brigham ( University of Minnesota ), Nicholas Hopper ( University of Minnesota )

Poster: VIDEZZO: Dependency-aware Virtual Device Fuzzing  
Qiang Liu ( Zhejiang University; EPFL ), Flavio Toffalini ( EPFL ), Yajin Zhou ( Zhejiang University ), Mathias Payer ( EPFL )

Poster: Demystifying Exploitable Bugs in Smart Contracts  
Zhuo Zhang ( Purdue University ), Brian Zhang ( Harrison High School (Tippecanoe) ), Wen Xu ( Georgia Institute of Technology ), Zhiqiang Lin ( Ohio State University )

Poster: SecureCells: A Secure Compartmentalized Architecture  
Atri Bhattacharyya ( EPFL ), Florian Hofhammer ( EPFL ), Yuanlong Li ( EPFL ), Siddharth Gupta ( EPFL ), Andres Sanchez ( EPFL ), Babak Falsafi ( EPFL ), Mathias Payer ( EPFL )

Poster: Hand-covered PIN Authentication for Virtual Reality  
Kyle McCraine ( Louisiana State University ), Zeyu Deng ( Louisiana State University ), Chen Wang ( Louisiana State University )

Poster: WarpAttack: Bypassing CFI through Compiler-Introduced Double-Fetches  
Jianhao Xu ( Nanjing University ), Luca Di Bartolomeo ( EPFL ), Flavio Toffalini ( EPFL ), Bing Mao ( Nanjing University ), Mathias Payer ( EPFL )

Poster: “I Have Nothing to Protect”: Understanding the Factors of Adoption of 2FA in Social Media  
Yeeun Jo ( University of Illinois Urbana-Champaign ), Margie Ruffin ( University of Illinois Urbana-Champaign ), Mahnoor Jameel ( University of Illinois Urbana-Champaign ), Camille Cobb ( University of Illinois Urbana-Champaign )

Poster: Verifiable Fully Homomorphic Encryption  
Christian Knabenhans ( ETH Zurich ), Alexander Viand ( ETH Zurich ), Anwar Hithnawi ( ETH Zurich ), Christian Knabenhans ( ETHZ )

Poster: Towards Refinement Types in Rust  
Jasper Gräflich ( Agentur für Innovationen in der Cybersicherheit )

Poster: ThreatKG - A System for Automated Cyber Threat Knowledge Gathering and Management  
Zhengjie Ji ( Virginia Tech ), Xiaoyuan Liu ( UC Berkeley ), Edward Choi ( UC Berkeley ), Sibo Ma ( UC Berkeley ), Xinyu Yang ( Virginia Tech ), Dawn Song ( UC Berkeley ), Peng Gao ( Virginia Tech )

Poster: Resiliency in Low Earth Orbit Satellite Routing  
Robert Esswein ( University of Pittsburgh ), Sean O'Melia ( MIT Lincoln Laboratory ), Richard Skowyra ( MIT Lincoln Laboratory ), Mai Abdelhakim ( University of Pittsburgh ), Robert Cunningham ( University of Pittsburg )

Poster: A Self-auditing Protocol for Decentralized Cloud Storage via Trusted Hardware Components  
Josh Dafoe ( Michigan Technological University ), Niusen Chen ( PhD. candidate in Michigan Technological University ), Bo Chen ( Michigan Technological University )

Poster: TEEzz – Fuzzing Trusted Applications on COTS Android Devices  
Marcel Busch ( EPFL ), Aravind Machiry ( Purdue University ), Chad Spensky ( Allthenticate ), Giovanni Vigna ( UC Santa Barbara ), Christopher Kruegel ( University of California, Santa Barbara ), Mathias Payer ( EPFL )

Poster: Extracting Insights from Censorship Measurement Data Using Statistical Techniques  
Anna Crowder ( University of Florida ), Kevin Butler ( University of Florida )

Poster: Attendee Survey of an Educational Threat Hunting Exercise  
Mahnoor Jameel ( University of Illinois Urbana-Champaign ), Adam Bates ( University of Illinois Urbana-Champaign )

Poster: Towards Continual Learning for Malware Classification  
Mohammad Saidur Rahman ( Rochester Institute of Technology ), Scott E. Coull ( Mandiant ), Matthew Wright ( Rochester Institute of Technology )

Poster: Committee Moderation on Encrypted Messaging Platforms  
Alistair Pattison ( Carleton College and University of Minnesota ), Nicholas Hopper ( University of Minnesota )

Poster: A Template for developing NIST CSF Profiles  
Shreenandan Rajarathnam ( University of Tennessee, Knoxville ), Vandana Singh ( University of Tennessee, Knoxville )

Poster: Intellectual Property Infringement Assessment of Code Language Models  
Zhiyuan Yu ( Washington University in St. Louis ), Yuhao Wu ( Washington University in St. Louis ), Ning Zhang ( Washington University in St. Louis ), Chenguang Wang ( Washington University in St. Louis ), Yevgeniy Vorobeychik ( Washington University in St. Louis ), Chaowei Xiao ( Arizona State University )

Poster: What Behaviors Are in Your System Log Dataset?  
Jason Liu ( University of Illinois at Urbana-Champaign ), Andy Riddle ( University of Illinois at Urbana-Champaign ), Kim Westfall ( University of Illinois at Urbana-Champaign ), Adam Bates ( University of Illinois at Urbana-Champaign )

Poster: Snooping Online Form Choice Privacy in Video Calls  
Steven Seiden ( Louisiana State University ), Long Huang ( Louisiana State University ), Chen Wang ( Louisiana State University )

Poster: Packing-aware Pruning for Efficient Private Inference based on Homomorphic Encryption  
Parsa Ghazvinian ( Georgia State University ), Robert Podschwadt ( Georgia State University ), Prajwal Panzade ( Georgia State University ), Mohammad H. Rafiei ( Georgia State University ), Daniel Takabi ( Georgia State University )

Poster: Your Access Control List Is Recoverable Even if Your OS Is Compromised  
Caleb Rother ( Michigan Technological University ), Bo Chen ( Michigan Technological University )

Poster: OCTAL: Data Oblivious Programming Language  
Biniyam Mengist Tiruye ( University of Michigan ), Lauren Biernacki ( University of Michigan ), Todd Austin ( University of Michigan )

Poster: Assisting Static Analysis with Large Language Models: A ChatGPT Experiment  
Haonan Li ( UC Riverside ), Yu Hao ( UC Riverside ), Yizhuo Zhai ( University of California, Riverside ), Zhiyun Qian ( UC Riverside )

Poster: Sometimes, You Aren’t What You Do: Mimicry Attacks against Provenance Graph Host Intrusion Detection Systems  
Akul Goyal ( University of Illinois at Urbana-Champaign ), Xueyuan Han ( Wake Forest University ), Gang Wang ( University of Illinois at Urbana-Champaign ), Adam Bates ( University of Illinois at Urbana-Champaign )

Poster: How do Endpoint Detection Products Make Use of MITRE ATT&CK?  
Apurva Virkud ( University of Illinois Urbana-Champaign ), Muhammad Adil Inam ( University of Illinois Urbana-Champaign ), Andy Riddle ( University of Illinois Urbana-Champaign ), Gang Wang ( University of Illinois Urbana-Champaign ), Adam Bates ( University of Illinois Urbana-Champaign )

Poster: Foundational Approaches to Formalizing Cryptography can be both Powerful and Usable  
Devon Tuma ( University of Minnesota ), Nick Hopper ( University of Minnesota )

Poster: BLEDiff : Scalable and Property-Agnostic Noncompliance Checking for BLE Implementations
Imtiaz Karim ( Purdue University ), Abdullah Al Ishtiaq ( Pennsylvania State University ), Syed Rafiul Hussain ( Pennsylvania State University ), Elisa Bertino ( Purdue University )