COBBL: Dynamic Constraint Generation for SNARKs
Kunming Jiang, Fraser Brown, Riad Wahby
Carnegie Mellon University
Transport Layer Obscurity: Circumventing SNI Censorship on the TLS Layer
Niklas Niere1, Felix Lange1, Juraj Somorovsky1, Robert Merget2
1: Paderborn University, 2: Technology Innovation Institute
Follow My Flow: Unveiling Client-Side Prototype Pollution Gadgets from One Million Real-World Websites
Zifeng Kang1, Muxi Lyu1, Zhengyu Liu1, Jianjia Yu1, Runqi Fan2, Song Li2, Yinzhi Cao1
1: Johns Hopkins University, 2: Zhejiang University
CipherSteal: Stealing Input Data from TEE-Shielded Neural Networks with Ciphertext Side Channels
Yuanyuan Yuan1, Zhibo Liu1, Sen Deng1, Yanzuo Chen1, Shuai Wang1, Yinqian Zhang2, Zhendong Su3
1: Hong Kong University of Science and Technology, 2: Southern University of Science and Technology, 3: ETH Zurich
Characterizing Robocalls with Multiple Vantage Points
Sathvik Prasad, Aleksandr Nahapetyan, Bradley Reaves
North Carolina State University
Verifiable Boosted Tree Ensembles
Stefano Calzavara, Lorenzo Cazzaro, Claudio Lucchese, Giulio Ermanno Pibiri
Università Ca' Foscari Venezia
Breaking the Barrier: Post-Barrier Spectre Attacks
Johannes Wikner, Kaveh Razavi
ETH Zurich
Unveiling Security Vulnerabilities in Git Large File Storage Protocol
Yuan Chen1, Qinying Wang1, Yong Yang1, Yuanchao Chen2, Yuwei Li2, Shouling Ji1
1: Zhejiang University, 2: National University of Defense Technology
The Inadequacy of Similarity-based Privacy Metrics: Privacy Attacks against “Truly Anonymous” Synthetic Datasets
Georgi Ganev1,2, Emiliano De Cristofaro3
1: UCL, 2: SAS, 3: UC Riverside
Empc: Effective Path Prioritization for Symbolic Execution with Path Cover
Shuangjie Yao, Dongdong She
Hong Kong University of Science and Technology
SLAP: Data Speculation Attacks via Load Address Prediction on Apple Silicon
Jason Kim1, Daniel Genkin1, Yuval Yarom2
1: Georgia Institute of Technology, 2: Ruhr University Bochum
Detecting Taint-Style Vulnerabilities in Microservice-Structured Web Applications
Fengyu Liu1, Yuan Zhang1, Tian Chen1, Youkun Shi1, Guangliang Yang1, Zihan Lin1, Min Yang1, Junyao He2, Qi Li2
1: Fudan University, 2: Alibaba Group
DataSentinel: A Game-Theoretic Detection of Prompt Injection Attacks
Yupei Liu1, Yuqi Jia2, Jinyuan Jia1, Dawn Song3, Neil Zhenqiang Gong2
1: The Pennsylvania State University, 2: Duke University, 3: UC Berkeley