SmithArno 发表于 2024-2-3 09:59:37

2024年信息安全领域顶会统计(Eurocrypt/FSE)

本帖最后由 SmithArno 于 2024-3-8 16:28 编辑

按照第一作者单位统计(信息安全四大顶会+密码三大顶会)
NDSS 2024概览
清华大学13篇,浙江大学9篇,华中科技大学3篇,南方科技大学2篇。
东南大学、中国海洋大学、北京航空航天大学、山东大学、北京大学、中山大学、武汉大学、中科大、NUDT、上海科技大学等等1篇。

CCS 2024

IEEE S&P 2024概览
清华大学10篇,浙江大学6篇,华中科技大学、复旦大学、东南大学2篇。其他重庆大学、山东大学、南开大学、西电、成电等等1篇。

Security 2024

Eurocrypt 2024
华东师大、上海交大各2篇,山东大学、清华大学、暨南大学、南科大各1篇。



获奖情况:
【1】浙江大学获得NDSS 2024杰出论文奖。






SmithArno 发表于 2024-3-4 09:47:58

Eurocrypt 2024,共接收105篇论文,国内共8篇,华东师大、上海交大各2篇,山东大学、清华大学、暨南大学、南科大各1篇。

【1】山东大学
Massive Superpoly Recovery with a Meet-in-the-middle Framework -- Improved Cube Attacks on Trivium and Kreyvium
Jiahui He, Kai Hu, Meiqin Wang, Hao Lei
Shandong University, Nanyang Technological University

【2】清华大学
Accelerating BGV Bootstrapping for Large $p$ Using Null Polynomials Over $\mathbb{Z}_{p^e}$
Shihe Ma, Tairong Huang, Anyu Wang, Xiaoyun Wang
Tsinghua University

【3】华东师大
Registered Functional Encryptions from Pairings
Ziqi Zhu, Jiangtao Li, Kai Zhang, Junqing Gong, Haifeng Qian
East China Normal University, Shanghai University, Shanghai University of Electric Power

【4】南科大
Integrating Causality in Messaging Channels
Shan Chen, Marc Fischlin
Southern University of Science and Technology, TU Darmstadt

【5】暨南大学
Probabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and Beyond
Ling Song, Qianqian Yang, Yincen Chen, Lei Hu, Jian Weng
College of Cyber Security, Jinan University, Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering

【6】上海交大
The Hardness of LPN over Any Integer Ring and Field for PCG Applications
Hanlin Liu, Xiao Wang, Kang Yang, Yu Yu
Shanghai Jiao Tong University, Shanghai Qi Zhi Institute, Northwestern University, State Key Laboratory of Cryptology

【7】上海交大
Universal Composable Password Authenticated Key Exchange for the Post-Quantum World
You Lyu, Shengli Liu, Shuai Han
Shanghai Jiao Tong University

【8】华东师大
New Records in Collision Attacks on SHA-2
Yingxin Li, Fukang Liu, Gaoli Wang
East China Normal University, Tokyo Institute of Technology

SmithArno 发表于 2024-2-3 09:59:41

本帖最后由 SmithArno 于 2024-2-3 10:06 编辑

NDSS 2024会议主页:https://www.ndss-symposium.org/ndss2024/accepted-papers/

【1】山东大学
Security-Performance Tradeoff in DAG-based Proof-of-Work Blockchain Protocols
Shichen Wu (1. School of Cyber Science and Technology, Shandong University 2. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education); Puwen Wei (1. School of Cyber Science and Technology, Shandong University 2. Quancheng Laboratory 3. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education); Ren Zhang (Cryptape Co. Ltd. and Nervos); Bowen Jiang (1. School of Cyber Science and Technology, Shandong University 2. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education)

【2】东南大学
LDR: Secure and Efficient Linux Driver Runtime for Embedded TEE Systems
Huaiyu Yan, Zhen Ling, Haobo Li (Southeast University); Lan Luo (Anhui University of Technology); Xinhui Shao, Kai Dong, Ping Jiang, Ming Yang (Southeast University); Junzhou Luo (Southeast University, Nanjing, P.R. China); Xinwen Fu (University of Massachusetts Lowell)

【3】浙江大学
GhostType: The Limits of Using Contactless Electromagnetic Interference to Inject Phantom Keys into Analog Circuits of Keyboards
Qinhong Jiang, Yanze Ren (Zhejiang University); Yan Long (University of Michigan); Chen Yan (Zhejiang University); Yumai Sun (University of Michigan); Xiaoyu Ji (Zhejiang University); Kevin Fu (Northeastern University); Wenyuan Xu (Zhejiang University)

【4】浙江大学
Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time
Xinfeng Li, Chen Yan, Xuancun Lu, Zihan Zeng, Xiaoyu Ji, Wenyuan Xu (Zhejiang University)

【5】北京航空航天大学
HEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation
Song Bian, Zian Zhao, Zhou Zhang, Ran Mao (Beihang University); Kohei Suenaga (Kyoto University); Yier Jin (University of Science and Technology of China); Zhenyu Guan, Jianwei Liu (Beihang University)

【6】清华大学
Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic
Yuqi Qing (Tsinghua University); Qilei Yin (Zhongguancun Laboratory); Xinhao Deng, Yihao Chen, Zhuotao Liu (Tsinghua University); Kun Sun (George Mason University); Ke Xu, Jia Zhang, Qi Li (Tsinghua University)

【7】浙江大学
Symphony: Path Validation at Scale
Anxiao He, Jiandong Fu, Kai Bu, Ruiqi Zhou, Chenlu Miao, Kui Ren (Zhejiang University)

【8】清华大学
BreakSPF: How Shared Infrastructures Magnify SPF Vulnerabilities Across the Internet
Chuhan Wang, Yasuhiro Kuranaga, Yihang Wang (Tsinghua University); Mingming Zhang (Zhongguancun Laboratory); Linkai Zheng, Xiang Li (Tsinghua University); Jianjun Chen (Tsinghua University; Zhongguancun Laboratory); Haixin Duan (Tsinghua University; Quan Cheng Lab; Zhongguancun Laboratory); Yanzhong Lin, Qingfeng Pan (Coremail Technology Co. Ltd)

【9】浙江大学
MOCK: Optimizing Kernel Fuzzing Mutation with Context-aware Dependency
Jiacheng Xu, Xuhong Zhang, Shouling Ji (Zhejiang University); Yuan Tian (UCLA); Binbin Zhao (Georgia Institute of Technology); Qinying Wang, Peng Cheng, Jiming Chen (Zhejiang University)

【10】清华大学
ShapFuzz: Efficient Fuzzing via Shapley-Guided Byte Selection
Kunpeng Zhang (Shenzhen International Graduate School, Tsinghua University); Xiaogang Zhu (Swinburne University of Technology); Xi Xiao (Shenzhen International Graduate School, Tsinghua University); Minhui Xue (CSIRO’s Data61); Chao Zhang (Tsinghua University); Sheng Wen (Swinburne University of Technology)

【11】中国海洋大学
Enhance Stealthiness and Transferability of Adversarial Attacks with Class Activation Mapping Ensemble Attack
Hui Xia, Rui Zhang, Zi Kang, Shuliang Jiang, Shuo Xu (Ocean University of China)

【12】浙江大学
ORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning
Linkang Du (Zhejiang University); Min Chen (CISPA Helmholtz Center for Information Security); Mingyang Sun, Shouling Ji, Peng Cheng, Jiming Chen (Zhejiang University); Zhikun Zhang (Stanford University)

【13】北京大学
NODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation
Shaofei Li (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University); Feng Dong (Huazhong University of Science and Technology); Xusheng Xiao (Arizona State University); Haoyu Wang (Huazhong University of Science and Technology); Fei Shao (Case Western Reserve University); Jiedong Chen (Sangfor Technologies Inc.); Yao Guo, Xiangqun Chen (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University); Ding Li (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University)

【14】浙江大学
LMSanitator: Defending Prompt-Tuning Against Task-Agnostic Backdoors
Chengkun Wei, Wenlong Meng (Zhejiang University); Zhikun Zhang (Stanford University); Min Chen (CISPA Helmholtz Center for Information Security); Minghu Zhao (Zhejiang University); Wenjing Fang, Lei Wang (Ant Group); Zihui Zhang, Wenzhi Chen (Zhejiang University)

【15】湖南大学
Eavesdropping on Black-box Mobile Devices via Audio Amplifier’s EMR
Huiling Chen, Wenqiang Jin, Yupeng Hu, Zhenyu Ning (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Kenli Li (College of Computer Science and Electronic Engineering, National Supercomputing Center in Changsha, Hunan University); Zheng Qin (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Mingxing Duan (College of Computer Science and Electronic Engineering, National Supercomputing Center in Changsha, Hunan University); Yong Xie (Nanjing University of Posts and Telecommunications, Nanjing, China); Daibo Liu (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Ming Li (The University of Texas at Arlington, USA)

【16】上海交大
Crafter: Facial Feature Crafting against Inversion-based Identity Theft on Deep Models
Shiming Wang, Zhe Ji, Liyao Xiang, Hao Zhang, Xinbing Wang (Shanghai Jiao Tong University); Chenghu Zhou (Chinese Academy of Sciences); Bo Li (Hong Kong University of Science and Technology)

【17】清华大学
Exploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi Networks
Yuxiang Yang, Xuewei Feng, Qi Li (Tsinghua University); Kun Sun (George Mason University); Ziqiang Wang (Southeast University); Ke Xu (Tsinghua University)

【18】清华大学
CP-IoT: A Cross-Platform Monitoring System for Smart Home
Hai Lin, Chenglong Li, Jiahai Yang, Zhiliang Wang (Tsinghua University); Linna Fan (National University of Defense Technology); Chenxin Duan (Tsinghua University)

【19】清华大学
LoRDMA: A New Low-Rate DoS Attack in RDMA Networks
Shicheng Wang (Tsinghua University); Menghao Zhang (Beihang University & Infrawaves); Yuying Du (Information Engineering University); Ziteng Chen (Southeast University); Zhiliang Wang, Mingwei Xu (Tsinghua University & Zhongguancun Laboratory); Renjie Xie (Tsinghua University); Jiahai Yang (Tsinghua University & Zhongguancun Laboratory)

【20】清华大学
ReqsMiner: Automated Discovery of CDN Forwarding Request Inconsistencies and DoS Attacks with Grammar-based Fuzzing
Linkai Zheng, Xiang Li, Chuhan Wang, Run Guo (Tsinghua University); Haixin Duan (Tsinghua University; Quancheng Laboratory); Jianjun Chen, Chao Zhang (Tsinghua University; Zhongguancun Laboratory); Kaiwen Shen (Tsinghua University)

【21】清华大学
Automatic Policy Synthesis and Enforcement for Protecting Untrusted Deserialization
Quan Zhang, Yiwen Xu, Zijing Yin, Chijin Zhou, Yu Jiang (Tsinghua University)

【22】清华大学
DynPRE: Protocol Reverse Engineering via Dynamic Inference
Zhengxiong Luo (Tsinghua University); Kai Liang (Central South University); Yanyang Zhao, Feifan Wu, Junze Yu (Tsinghua University); Heyuan Shi (Central South University); Yu Jiang (Tsinghua University)

【23】浙江大学
Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention
Lujia Shen, Yuwen Pu, Shouling Ji (Zhejiang University); Changjiang Li (Penn State); Xuhong Zhang (Zhejiang University); Chunpeng Ge (Shandong University); Ting Wang (Penn State)

【24】中山大学
Leaking the Privacy of Groups and More: Understanding Privacy Risks of Cross-App Content Sharing in Mobile Ecosystem
Jiangrong Wu, Yuhong Nan (Sun Yat-sen University); Luyi Xing (Indiana University Bloomington); Jiatao Cheng (Sun Yat-sen University); Zimin Lin (Alibaba Group); Zibin Zheng (Sun Yat-sen University); Min Yang (Fudan University)

【25】浙江大学
CamPro: Camera-based Anti-Facial Recognition
Wenjun Zhu, Yuan Sun, Jiani Liu, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu (Zhejiang University)

【26】中国科学技术大学
Detecting Voice Cloning Attacks via Timbre Watermarking
Chang Liu (University of Science and Technology of China); Jie Zhang, Tianwei Zhang (Nanyang Technological University); Xi Yang, Weiming Zhang, NengHai Yu (University of Science and Technology of China)

【27】清华大学
Understanding Route Origin Validation (ROV) Deployment in the Real World and Why MANRS Action 1 Is Not Followed
Lancheng Qin (Tsinghua University, BNRist); Li Chen (Zhongguancun Laboratory); Dan Li (Tsinghua University, Zhongguancun Laboratory); Honglin Ye, Yutian Wang (Tsinghua University)

【28】清华大学
dRR: A Decentralized, Scalable, and Auditable Architecture for RPKI Repository
Yingying Su, Dan Li (Tsinghua University); Li Chen (Zhongguancun Laboratory); Qi Li (Tsinghua university); Sitong Ling (Tsinghua University)

【29】清华大学
Pencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption
Xuanqi Liu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu (Tsinghua University)

【30】NUDT
DeepGo: Predictive Directed Greybox Fuzzing
Peihong Lin, Pengfei Wang, Xu Zhou, Wei Xie, Kai Lu, Gen Zhang (National University of Defense Technology)

【31】上海交大
ActiveDaemon: Unconscious DNN Dormancy and Waking Up via User-specific Invisible Token
Ge Ren, Gaolei Li, Shenghong Li, Libo Chen (Shanghai Jiao Tong University); Kui Ren (Zhejiang University)

【32】华中科技大学
PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound
Man Zhou, Shuao Su (Huazhong University of Science and Technology); Qian Wang (Wuhan University); Qi Li (Tsinghua University); Yuting Zhou, Xiaojing Ma (Huazhong University of Science and Technology); Zhengxiong Li (University of Colorado Denver)

【33】南方科技大学
Separation is Good: A Faster Order-Fairness Byzantine Consensus
Ke Mu (Southern University of Science and Technology, China); Bo Yin (Changsha University of Science and Technology, China); Alia Asheralieva (Loughborough University, UK); Xuetao Wei (Southern University of Science and Technology, China & Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation, SUSTech, China)

【34】南方科技大学
CAGE: Complementing Arm CCA with GPU Extensions
Chenxu Wang (Southern University of Science and Technology (SUSTech) and The Hong Kong Polytechnic University); Fengwei Zhang, Yunjie Deng (Southern University of Science and Technology (SUSTech)); Kevin Leach (Vanderbilt University); Jiannong Cao (The Hong Kong Polytechnic University); Zhenyu Ning (Hunan University); Shoumeng Yan, Zhengyu He (Ant Group)

【35】华中科技大学
DorPatch: Distributed and Occlusion-Robust Adversarial Patch to Evade Certifiable Defenses
Chaoxiang He, Xiaojing Ma (Huazhong University of Science and Technology); Bin Benjamin Zhu (Microsoft Research Asia); Yimiao Zeng, Hanqing Hu, Xiaofan Bai, Hai Jin (Huazhong University of Science and Technology); Dongmei Zhang (Microsoft Research)

【36】华中科技大学
Abusing the Ethereum Smart Contract Verification Services for Fun and Profit
Pengxiang Ma (Huazhong University of Science and Technology); Ningyu He (Peking University); Yuhua Huang, Haoyu Wang (Huazhong University of Science and Technology); Xiapu Luo (The Hong Kong Polytechnic University)

【37】浙江大学
UniID: Spoofing Face Authentication System by Universal Identity
Zhihao Wu, Yushi Cheng, Shibo Zhang, Xiaoyu Ji (Zhejiang University); Wenyuan Xu (Zhejing University)

【38】武汉大学
From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices
Yue Xiao (Wuhan University); Yi He (Tsinghua University); Xiaoli Zhang (Zhejiang University of Technology); Qian Wang (Wuhan University); Renjie Xie (Tsinghua University); Kun Sun (George Mason University); Ke Xu, Qi Li (Tsinghua University)

【39】上海科技大学
SLMIA-SR: Speaker-Level Membership Inference Attacks against Speaker Recognition Systems
Guangke Chen (ShanghaiTech University); Yedi Zhang (National University of Singapore); Fu Song (Institute of Software, Chinese Academy of Sciences; University of Chinese Academy of Sciences)

【40】清华大学
You Can Use But Cannot Recognize: Preserving Visual Privacy in Deep Neural Networks
Qiushi Li (Tsinghua University); Yan Zhang (China Agricultural University); Ju Ren, Qi Li, Yaoxue Zhang (Tsinghua University)

董老师 发表于 2024-2-3 10:15:02

Wenyuan Xu (Zhejiang University)
徐文元好几篇
:@

0000 发表于 2024-2-3 11:53:22

有2023年的数据吗

SmithArno 发表于 2024-2-3 12:26:14

0000 发表于 2024-2-3 11:53
有2023年的数据吗

https://bbs.netbig.top/thread-26427-1-1.html

yxy 发表于 2024-2-3 12:49:02

徐文渊老师太强了…

SmithArno 发表于 2024-2-3 12:50:55

yxy 发表于 2024-2-3 12:49
徐文渊老师太强了…

国内现在这几个顶会发文量虽然多了,但头部高校断层明显,基本都是浙大清华屠榜。
其他高校偶尔有个一篇两篇的。

徐文渊老师不仅输出稳定,而且还有best paper

SmithArno 发表于 2024-2-3 14:55:15

本帖最后由 SmithArno 于 2024-3-8 16:25 编辑

IEEE S&P 2024

【1】华中科技大学
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferabilitypp. 10-10
by Yechao Zhang, Shengshan Hu, Leo Yu Zhang, Junyu Shi, Minghui Li, Xiaogeng Liu, Wei Wan, Hai Jin

【2】华中科技大学
MQTTactic: Security Analysis and Verification for Logic Flaws in MQTT Implementationspp. 13-13
by Bin Yuan, Zhanxiang Song, Yan Jia, Zhenyu Lu, Deqing Zou, Hai Jin, Luyi Xing

【3】复旦大学
Withdrawing is believing? Detecting Inconsistencies Between Withdrawal Choices and Third-party Data Collections in Mobile Appspp. 14-14
by Xiaolin Du, Zhemin Yang, Jiapeng Lin, Yinzhi Cao, Min Yang

【4】浙江大学
PIRANA: Faster Multi-query PIR via Constant-weight Codespp. 39-39
by Jian Liu, Jingyu Li, Di Wu, Kui Ren

【5】东南大学
Predecessor-aware Directed Greybox Fuzzingpp. 40-40
by Yujian Zhang, Yaokun Liu, Jinyu Xu, Yanhao Wang

【6】中南大学
Guessing on Dominant Paths: Understanding the Limitation of Wireless Authentication Using Channel State Informationpp. 42-42
by Zhe Qu, Rui Duan, Xiao Han, Shangqing Zhao, Yao Liu, Zhuo Lu

【7】清华大学
TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packetspp. 46-46
by Xiang Li, Wei Xu, Baojun Liu, Mingming Zhang, Zhou Li, Jia Zhang, Deliang Chang, Xiaofeng Zheng, Chuhan Wang, Jianjun Chen, Haixin Duan, Qi Li

【8】清华大学
SATURN: Host-Gadget Synergistic USB Driver Fuzzingpp. 51-51
by Yiru Xu, Hao Sun, Jianzhong Liu, Yuheng Shen, Yu Jiang

【9】北京大学
No Privacy Left Outside: On the (In-)Security of TEE-Shielded DNN Partition for On-Device MLpp. 52-52
by Ziqi Zhang, Chen Gong, Yifeng Cai, Yuanyuan Yuan, Bingyan Liu, Ding Li, Yao Guo, Xiangqun Chen

【10】浙江大学
Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attackspp. 53-53
by Xinyu Zhang, Hanbin Hong, Yuan Hong, Peng Huang, Binghui Wang, Zhongjie Ba, Kui Ren

【11】浙江大学
ALIF: Low-Cost Adversarial Audio Attacks on Black-Box Speech Platforms using Linguistic Featurespp. 56-56
by Peng Cheng, Yuwei Wang, Peng Huang, Zhongjie Ba, Xiaodong Lin, Feng Lin, Li Lu, Kui Ren

【12】南开大学
Springproofs: Efficient Inner Product Arguments for Vectors of Arbitrary Lengthpp. 67-67
by Jianning Zhang, Ming Su, Xiaoguang Liu, Gang Wang

【13】浙江大学
BounceAttack: A Query-Efficient Decision-based Adversarial Attack by Bouncing into the Wildpp. 68-68
by Jie Wan, Jianhao Fu, Lijin Wang, Ziqi Yang

【14】浙江大学
SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devicespp. 70-70
by Qinying Wang, Boyu Chang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Gaoning Pan, Chenyang Lyu, Mathias Payer, Wenhai Wang, Raheem Beyah

【15】清华大学
Test-Time Poisoning Attacks Against Test-Time Adaptation Modelspp. 72-72
by Tianshuo Cong, Xinlei He, Yun Shen, Yang Zhang

【16】上海交大
SrcMarker: Dual-Channel Source Code Watermarking via Scalable Code Transformationspp. 97-97
by Borui Yang, Wei Li, Liyao Xiang, Bo Li

【17】重庆大学
From Individual Computation to Allied Optimization: Remodeling Privacy-Preserving Neural Inference with Function Input Tuningpp. 101-101
by Qiao Zhang, Tao Xiang, Chunsheng Xin, Hongyi Wu

【18】东南大学
Transferable Multimodal Attack on Vision-Language Pre-training Modelspp. 102-102
by Haodi Wang, Kai Dong, Zhilei Zhu, Haotong Qin, Aishan Liu, Xiaolin Fang, Jiakai Wang, Xianglong Liu

【19】清华大学
BULKOR: Enabling Bulk Loading for Path ORAMpp. 103-103
by Xiang Li, Yunqian Luo, Mingyu Gao

【20】清华大学
Chronos: Finding Timeout Bugs in Practical Distributed Systems by Deep-Priority Fuzzing with Transient Delaypp. 109-109
by Yuanliang Chen

【21】浙江大学
Understanding and Benchmarking the Commonality of Adversarial Examplespp. 111-111
by Ruiwen He, Yushi Cheng, Junning Ze, Xiaoyu Ji, Wenyuan Xu

【22】电子科技大学
NURGLE: Exacerbating Resource Consumption in Blockchain State Storage via MPT Manipulationpp. 125-125
by Zheyuan He, Zihao Li, Ao Qiao, Xiapu Luo, Xiaosong Zhang, Ting Chen, Shuwei Song, Dijun Liu, Weina Niu

【23】清华大学
LABRADOR: Response Guided Directed Fuzzing for Black-box IoT Devicespp. 127-127
by Hangtian Liu, Shuitao Gan, Chao Zhang, Zicong Gao, Hongqi Zhang, Xiangzhi Wang, Guangming Gao

【24】清华大学
Break the Wall from bottom: Automated Discovery of Protocol-Level Evasion Vulnerabilities in Web Application Firewallspp. 129-129
by Qi Wang, Jianjun Chen, Zheyu Jiang, Run Guo, Ximeng Liu, Chao Zhang, Haixin Duan

【25】清华大学
GAuV: A Graph-Based Automated Verification Framework for Perfect Semi-Honest Security of Multiparty Computation Protocolspp. 131-131
by Xingyu Xie, Yifei Li, Wei Zhang, Tuowei Wang, Shizhen Xu, Jun Zhu, Yifan Song

【26】清华大学
More Haste, Less Speed: Cache Related Security Threats in Continuous Integration Servicespp. 138-138
by Yacong Gu, Lingyun Ying, Huajun Chai, Yingyuan Pu, Haixin Duan, Xing Gao

【27】西电
FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledgepp. 148-148
by Jiahe Lan, Jie Wang, Baochen Yan, Zheng Yan, Elisa Bertino

【28】清华大学
The Dark Side of Scale: Insecurity of Direct-to-Cell Satellite Mega-Constellationspp. 149-149
by Wei Li, Yuanjie Li, Hewu Li, Yimei Chen, Yufeng Wang, Jingyi Lan, Jianping Wu, Qian Wu, Jun Liu, Zeqi Lai

【29】复旦大学
Efficient Detection of Java Deserialization Gadget Chains via Bottom-up Gadget Search and Dataflow-aided Payload Constructionpp. 150-150
by Bofei Chen

【30】山东大学
AVA: Inconspicuous Attribute Variation-based Adversarial Attack bypassing DeepFake Detectionpp. 155-155
by Xiangtao Meng, Li Wang, Shanqing Guo, Lei Ju, Qingchuan Zhao

【31】北京大学
Rethinking IC Layout Vulnerability: Simulation-Based Hardware Trojan Threat Assessment with High Fidelitypp. 160-160
by Xinming Wei, Jiaxi Zhang, Guojie Luo

qsxtydf 发表于 2024-2-3 16:05:18

清浙遥遥领先

憨大 发表于 2024-2-3 16:22:26

浙大威武

不知而已 发表于 2024-2-4 23:36:20

华师大王高丽老师更新主页,接收了一篇2024欧密会 ​ ​Yingxin Li, Fukang Liu, Gaoli Wang*. New Records in Collision Attacks on SHA-2. Accepted by EUROCRYPT 2024, Zurich, Switzerland, May 26-30, 2024.   

SmithArno 发表于 2024-2-4 23:43:26

不知而已 发表于 2024-2-4 23:36
华师大王高丽老师更新主页,接收了一篇2024欧密会 ​ ​Yingxin Li, Fukang Liu, Gaoli Wang*. New Records ...

哈这位是我学姐,王院士的学生。
23年她在欧密会就有文章,在SHA-2方面做得很好。

大师大楼 发表于 2024-2-19 16:46:34

usenix security 2024 accepted papers
https://www.usenix.org/conference/usenixsecurity24/summer-accepted-papers

大师大楼 发表于 2024-2-19 16:57:35

本帖最后由 大师大楼 于 2024-2-19 16:59 编辑

usenix security 2024
浙大 东南2
武大北邮等 1
包括清华上交在内,大部分都是空白?

SmithArno 发表于 2024-2-19 16:58:58

大师大楼 发表于 2024-2-19 16:57
usenix security 2024
浙大 2
武大北邮等 1


还有一轮应该没出来

大师大楼 发表于 2024-2-19 17:08:00

SmithArno 发表于 2024-2-19 16:58
还有一轮应该没出来

嗯,耐心等待

学在东大 发表于 2024-2-19 19:29:03

清华浙大太牛了!

杭州长生 发表于 2024-2-19 23:24:43

南京大学三项0蛋啊。1篇都没有啊

ecnuking 发表于 2024-2-20 10:41:54

三大密码顶会算信息安全的成果吗

SmithArno 发表于 2024-2-20 10:48:29

ecnuking 发表于 2024-2-20 10:41
三大密码顶会算信息安全的成果吗

密码方向主要统计三大顶会和密码学顶级期刊JoC。
目前有零星的信息,IACR还没出Accepted papers。

academic818 发表于 2024-2-21 12:23:18

浙大徐文渊:连续三年担任网安四大顶会的大会联合主席
USENIX Security 2024
NDSS 2023
NDSS 2022

academic818 发表于 2024-2-21 12:24:27

近日,浙江大学共有12位教师担任国际信息安全顶级会议ACM CCS 2024的程序委员会委员,入选总人数排名全球高校第一。其中巴钟杰、申文博、冯博、刘金飞、罗梦、周亚金、娄坚、姚培森、秦湛(按姓氏笔画排序)9位教师来自浙江大学区块链与数据安全全国重点实验室。

congyun 发表于 2024-2-21 14:20:26

乡下 发表于 2024-2-19 23:29
郑州信大,网安国家队核心队员之一,0蛋?

能发吗??

御风行者 发表于 2024-2-23 11:18:14

没有军信,都是假榜
看看邬院士的程控交换机,才有后来的巨大中华
信息安全,缺了军信,可信度太低

大师大楼 发表于 2024-2-23 11:49:38

本帖最后由 大师大楼 于 2024-2-23 11:51 编辑

如果军方还是继续画地为牢,固步自封,不借助世界一流高校和院所的力量,那么俄罗斯就是前车之鉴。

大师大楼 发表于 2024-2-23 11:51:14

academic818 发表于 2024-2-21 12:23
浙大徐文渊:连续三年担任网安四大顶会的大会联合主席
USENIX Security 2024
NDSS 2023


水平是特别高啦,但在中国现行体制下,还有待被发掘

newton27 发表于 2024-2-23 12:09:24

大师大楼 发表于 2024-2-23 11:51
水平是特别高啦,但在中国现行体制下,还有待被发掘

她好像比较低调的,待在电气学院内,好像还拒绝提拔副院长

kissingfire 发表于 2024-2-23 12:09:52

academic818 发表于 2024-2-21 12:23
浙大徐文渊:连续三年担任网安四大顶会的大会联合主席
USENIX Security 2024
NDSS 2023


这么多卖点,宣传太差,差不多的年龄,颜宁都院士了

吴思齐 发表于 2024-2-23 12:26:05

也不是每个人都适合做领导哈哈哈

不知而已 发表于 2024-2-25 19:07:24

不知而已 发表于 2024-2-4 23:36
华师大王高丽老师更新主页,接收了一篇2024欧密会 ​ ​Yingxin Li, Fukang Liu, Gaoli Wang*. New Records ...

华师大软院通讯今年还accepted一篇欧密 《Registered Functional Encryptions from Pairings》
页: [1] 2 3
查看完整版本: 2024年信息安全领域顶会统计(Eurocrypt/FSE)