MAY 23-26, 2022 AT THE HYATT REGENCY, SAN FRANCISCO, CA, & ONLINE
43rd IEEE Symposium on
Security and Privacy
Poster 6: ARLIF-IDS --- Attention augmented Real-Time Isolation Forest Intrusion Detection System
Aman Priyanshu, Sarthak Shastri, Sai Sravan Medicherla
Poster 8: ART-assisted App Diffing: Defeating Dalvik Bytecode Shrinking, Obfuscation, and Optimization with Android's OAT Compiler
Jakob Bleier, Martina Lindorfer
Poster 4: Are Trusted-Types the Panacea for XSS?
Sebastian Roth, Lea Gröber, Katharina Krombholz, Ben Stock
Poster 10: Automatic Identification and Protection of Memory-resident Sensitive Data to Defend Against Data-Oriented Attacks
Salman Ahmed, Hans Liljestrand, N. Asokan, Danfeng (Daphne) Yao
Poster 12: Azeroth: Auditable Zero-knowledge Transaction in Smart Contracts
Gweonho Jeong, Nuri Lee, Jihye Kim, Hyunok Oh
Poster 14: Blacksmith -- Scalable Rowhammering in the Frequency Domain
Patrick Jattke, Victor van der Veen, Pietro Frigo, Stijn Gunter, Kaveh Razavi
Poster 16: Characterizing Deceptive Affiliate Marketing Offers
Victor Le Pochat, Cameron Ballard, Tom Van Goethem, Wouter Joosen, Damon McCoy, Tobias Lauinger
Poster 18: Committed by Accident -- Prevention and Remediation Strategies Against Secret Leakage
Alexander Krause, Jan H. Klemmer, Nicolas Human, Dominik Wermke, Yasemin Acar, Sascha Fahl
Poster 22: DP-SGD vs PATE: Which Has Less Disparate Impact on Model Accuracy?
Archit Uniyal, Rakshit Naidu, Sasikanth Kotti, Sahib Singh, Patrik Joslin Kenfack, Fatemehsadat Mireshghallah, Andrew Trask
Poster 20: Denial of Wallet Preemptive Defence - Attack Simulation and Vulnerability Scouting
Daniel Kelly, Frank G Glavin, Enda Barrett
Poster 24: Efficient Hyperparameter Optimization for Differentially Private Deep Learning
Aman Priyanshu, Rakshit Naidu, Fatemehsadat Mireshghallah, Mohammad Malekzadeh
Poster 28: Exploring User Perceptions and Expectations of Privacy in City-wide WiFi Services
Prianka Mandal, Tu Le, Yuan Tian, Adwait Nadkarni
Poster 30: Feasibility of Malware Visualization Techniques against Adversarial Machine Learning Attacks
H. Oz, F. Naseem, A. Aris, A. Acar, G. Tuncay, S. Uluagac
Poster 32: Improved Website Fingerprinting Attacks based on Tor Network Protocols
Loc Ho, Jongwook Lee, Won-gyum Kim, Donghoon Kim, Doosung Hwang
Poster 34: LPEES: Lightweight Policy Enforcement and Evaluation for SDN-based Multi-Domain Communication
Abdulhakim Sabur, Ankur Chowdhary, Kritshekhar Jha, and Ming Zhao
Poster 38: Leveraging Interpersonal Dynamics for IoT Privacy
Nathan Malkin, Alan F. Luo, Julio Poveda, Michelle Mazurek
Poster 40: PhisherCop - An Automated Tool Using NLP for Phishing Detection and Mitigation
Naheem Noah, Abebe Tayachew, Stuart Ryan, Sanchari Das
Poster 42: PluginPermCheck: Preventing Permission Escalation in App Virtualization
Shou-Ching Hsiao, Hsu-Chun Hsiao
Poster 44: Privacy-preserving Neural Network with Functional Encryption
Prajwal Panzade, Daniel Takabi
Poster 46: Quantifying Privacy Risks of Masked Language Models Using Membership Inference Attacks
Fatemeh Mireshghallah, Kartik Goyal, Archit Uniyal, Taylor Berg-Kirkpatrick, Reza Shokri
Poster 48: Scientific Comparison on Accuracy and Scalability of Cryptographic API Misuse Detection
Sharmin Afrose, Ya Xiao, Sazzadur Rahaman, Barton P. Miller, Danfeng (Daphne) Yao
Poster 50: Secure SqueezeNet inference in 4 minutes
E. Aharoni, M. Baruch, N. Drucker, G. Ezov, E. Kushnir, G. Moshkowich, O. Soceanu
Poster 51: Style Pooling: Automatic Text Style Obfuscation for Hiding Sensitive Attributes
Fatemehsadat Mireshghallah, Taylor Berg-Kirkpatrick
Poster 26: Unintended Consequences of Security and Privacy Software
Harshini Sri Ramulu, Yasemin Acar