|

楼主 |
发表于 2024-2-3 14:55:15
|
显示全部楼层
本帖最后由 SmithArno 于 2024-3-8 16:25 编辑 Y3 \+ n. ?! u0 w2 i
! q9 J# e9 t) x' H# xIEEE S&P 2024
! n$ n( ~. V+ |5 L1 X( \
) v7 k! o3 m# h; J8 c( J6 K【1】华中科技大学
' E) \' K t! ^8 WWhy Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferabilitypp. 10-104 f: j% Q+ A0 j) x7 g1 j# z
by Yechao Zhang, Shengshan Hu, Leo Yu Zhang, Junyu Shi, Minghui Li, Xiaogeng Liu, Wei Wan, Hai Jin
' g4 ?+ D/ f) x0 M1 y$ q5 x" Q7 w/ ]% m7 V5 y$ R) m3 ` p
【2】华中科技大学% c( Z! K R$ ]( w# w2 a+ w1 n+ x
MQTTactic: Security Analysis and Verification for Logic Flaws in MQTT Implementationspp. 13-139 v. w/ ~. g- U, V3 B
by Bin Yuan, Zhanxiang Song, Yan Jia, Zhenyu Lu, Deqing Zou, Hai Jin, Luyi Xing
0 H5 i( k' ~2 B/ o+ E) @
* I! ^4 s$ ~) ^" A# o, c【3】复旦大学
; i' H- F% F5 QWithdrawing is believing? Detecting Inconsistencies Between Withdrawal Choices and Third-party Data Collections in Mobile Appspp. 14-14: w, r$ t. p u M$ A/ Z
by Xiaolin Du, Zhemin Yang, Jiapeng Lin, Yinzhi Cao, Min Yang/ c# Z$ P- L# P2 G! Z
; n8 V8 {: ]+ a$ f- _6 A; {【4】浙江大学( Q$ d/ l. X% ?4 d5 F& c
PIRANA: Faster Multi-query PIR via Constant-weight Codespp. 39-398 G8 i {2 t8 K8 | Y1 k9 H( ^) R
by Jian Liu, Jingyu Li, Di Wu, Kui Ren- W Z: M5 U, [; S, w
$ L4 R4 ~ _- j) N" n. C
【5】东南大学& a0 c+ {% {" g7 v, t3 O
Predecessor-aware Directed Greybox Fuzzingpp. 40-40% y5 e# ]/ z ?) y, ]
by Yujian Zhang, Yaokun Liu, Jinyu Xu, Yanhao Wang0 `2 c0 B4 ^6 \" E7 H2 o6 B
' {" N# x. x) l) U5 ]9 x* X3 t
【6】中南大学
6 A+ a" u7 f6 v" }5 p$ WGuessing on Dominant Paths: Understanding the Limitation of Wireless Authentication Using Channel State Informationpp. 42-42
- m" U8 O/ ?7 E% g! oby Zhe Qu, Rui Duan, Xiao Han, Shangqing Zhao, Yao Liu, Zhuo Lu
: i6 ` D' ^ r. i8 e
, c0 g7 G* g& K【7】清华大学9 V5 }6 q9 L( |* ^7 P- k% E" U
TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packetspp. 46-46
% F! X" I, c% p; G& ]( l" nby Xiang Li, Wei Xu, Baojun Liu, Mingming Zhang, Zhou Li, Jia Zhang, Deliang Chang, Xiaofeng Zheng, Chuhan Wang, Jianjun Chen, Haixin Duan, Qi Li0 [) m6 y% q* F4 b9 n, Q; i+ Y
* j- o! x0 B$ q" e( _5 Q/ F7 Q【8】清华大学6 h% e2 f# @; u7 k" a
SATURN: Host-Gadget Synergistic USB Driver Fuzzingpp. 51-51
0 U# Q O# H9 }- A8 fby Yiru Xu, Hao Sun, Jianzhong Liu, Yuheng Shen, Yu Jiang
, N6 U( \4 F5 [! V& U8 N* q; Z" ~, F$ t0 K* F* u
【9】北京大学
- a! E2 F( e% m; w' A8 eNo Privacy Left Outside: On the (In-)Security of TEE-Shielded DNN Partition for On-Device MLpp. 52-52. W6 E" a; |9 C* X5 k) j7 [# _
by Ziqi Zhang, Chen Gong, Yifeng Cai, Yuanyuan Yuan, Bingyan Liu, Ding Li, Yao Guo, Xiangqun Chen. z. N/ ^0 u& e
7 X1 ^8 w4 |" l
【10】浙江大学
3 }5 K$ T- {, j3 b( NText-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attackspp. 53-53* v0 W& a" U; ^+ A9 _) B
by Xinyu Zhang, Hanbin Hong, Yuan Hong, Peng Huang, Binghui Wang, Zhongjie Ba, Kui Ren
+ L1 W& I5 ~' Y# U: l/ \+ Q; J# K' J" a2 b% {' G: G
【11】浙江大学1 C& s6 [# h0 o. p* k/ c
ALIF: Low-Cost Adversarial Audio Attacks on Black-Box Speech Platforms using Linguistic Featurespp. 56-56
/ W+ _" G, D) K: F# J& \0 `by Peng Cheng, Yuwei Wang, Peng Huang, Zhongjie Ba, Xiaodong Lin, Feng Lin, Li Lu, Kui Ren
! ~) y0 G) P5 {, ?* ]7 I
7 C# ]: B: Y8 t1 C! l$ }【12】南开大学( n7 o7 ]& p+ l/ u( g- V3 f) E
Springproofs: Efficient Inner Product Arguments for Vectors of Arbitrary Lengthpp. 67-67% I. l I2 Y$ A* @, W
by Jianning Zhang, Ming Su, Xiaoguang Liu, Gang Wang9 `, q+ i; D7 S! k9 K
6 g2 p" W, `. w- k: ^8 M
【13】浙江大学% ] y1 t3 ?( Q1 o& H( {# B
BounceAttack: A Query-Efficient Decision-based Adversarial Attack by Bouncing into the Wildpp. 68-68 g! J# M2 j. r
by Jie Wan, Jianhao Fu, Lijin Wang, Ziqi Yang& `; R# x+ W, J
' s0 N( W0 S4 U. U( i【14】浙江大学! x+ Y7 q3 b% L0 X4 t& k
SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devicespp. 70-70) {9 {" g7 \2 `' l' j% |
by Qinying Wang, Boyu Chang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Gaoning Pan, Chenyang Lyu, Mathias Payer, Wenhai Wang, Raheem Beyah* k, E' b/ V! p9 W5 i) c
[# V c6 r" o5 K) U! l【15】清华大学
' T8 g4 r: r4 wTest-Time Poisoning Attacks Against Test-Time Adaptation Modelspp. 72-720 C0 z. I0 N! ]5 g0 T- b/ i% Z7 U
by Tianshuo Cong, Xinlei He, Yun Shen, Yang Zhang" ?3 V2 K9 j. m2 a7 f; j7 u
& o+ D4 c4 _8 W5 b
【16】上海交大
+ T$ U& w Q9 f, Q+ PSrcMarker: Dual-Channel Source Code Watermarking via Scalable Code Transformationspp. 97-97 e) K+ O' `: c0 V# Y
by Borui Yang, Wei Li, Liyao Xiang, Bo Li
$ ^) W/ ~/ J c- a+ q' h! P3 A: P$ e- R4 H3 t f2 V
【17】重庆大学
3 k. L C! [$ _( q& B: `" B) |$ z* t8 NFrom Individual Computation to Allied Optimization: Remodeling Privacy-Preserving Neural Inference with Function Input Tuningpp. 101-101! o+ o: r" z( p5 |/ x, \
by Qiao Zhang, Tao Xiang, Chunsheng Xin, Hongyi Wu+ l, c; A' f) p; n* `4 w
" u& a. l W& g! n$ d& A7 ?" w- N
【18】东南大学; ?2 F5 \" Z) K" v P% W
Transferable Multimodal Attack on Vision-Language Pre-training Modelspp. 102-102
9 r# L, X- w8 V8 q. u! {: Bby Haodi Wang, Kai Dong, Zhilei Zhu, Haotong Qin, Aishan Liu, Xiaolin Fang, Jiakai Wang, Xianglong Liu
( O# Y/ |) D) f3 u1 a# a9 ? p/ g4 W; b
【19】清华大学
7 X7 r& f5 E% A- T. A6 y. i; U, tBULKOR: Enabling Bulk Loading for Path ORAMpp. 103-103. j7 e/ H; G5 e' k# F
by Xiang Li, Yunqian Luo, Mingyu Gao
" H( k: V+ q( _/ x) Q6 `3 r( N3 I3 o# d' V2 |+ C; U
【20】清华大学8 H2 z* z: V9 } s0 t% o7 P
Chronos: Finding Timeout Bugs in Practical Distributed Systems by Deep-Priority Fuzzing with Transient Delaypp. 109-109: J6 e6 w+ y: d3 @, Y- T9 ]
by Yuanliang Chen. z4 X3 p6 n0 R, l- u5 }
. s6 B) i9 K! |& j) }9 u) X$ M
【21】浙江大学
3 f# p+ D" ~" a9 FUnderstanding and Benchmarking the Commonality of Adversarial Examplespp. 111-111
2 z# ], [1 f0 i9 w8 _by Ruiwen He, Yushi Cheng, Junning Ze, Xiaoyu Ji, Wenyuan Xu0 r+ A: ~9 | z6 r
& k- J9 q) { N
【22】电子科技大学
E+ I- M d2 g/ ENURGLE: Exacerbating Resource Consumption in Blockchain State Storage via MPT Manipulationpp. 125-125
3 h8 F! q% k! j/ j4 \( Z. K0 Tby Zheyuan He, Zihao Li, Ao Qiao, Xiapu Luo, Xiaosong Zhang, Ting Chen, Shuwei Song, Dijun Liu, Weina Niu
8 u9 A- T: Y1 I' \! @- k. _2 u! t! P6 p$ w: o2 ^. j
【23】清华大学9 g E! `0 T' B2 V
LABRADOR: Response Guided Directed Fuzzing for Black-box IoT Devicespp. 127-127* C( |+ {9 y% w) U; [
by Hangtian Liu, Shuitao Gan, Chao Zhang, Zicong Gao, Hongqi Zhang, Xiangzhi Wang, Guangming Gao3 y- G" C: K' n' b( f0 ~; x
$ ^1 V4 C* R; W' L! V2 |8 _1 L
【24】清华大学8 v/ y) R- O, ^
Break the Wall from bottom: Automated Discovery of Protocol-Level Evasion Vulnerabilities in Web Application Firewallspp. 129-129
) A3 z( B1 t( F5 u5 E/ {by Qi Wang, Jianjun Chen, Zheyu Jiang, Run Guo, Ximeng Liu, Chao Zhang, Haixin Duan
% {- X# P6 R/ M! O) H% h7 n) o; Z
【25】清华大学
' V& v# Q2 ?+ o& DGAuV: A Graph-Based Automated Verification Framework for Perfect Semi-Honest Security of Multiparty Computation Protocolspp. 131-131
9 j8 I5 B6 K% pby Xingyu Xie, Yifei Li, Wei Zhang, Tuowei Wang, Shizhen Xu, Jun Zhu, Yifan Song
0 P8 B4 A- \. Z
# |" L& r- Y( |. a6 ]0 i【26】清华大学
1 Z% P; r, P9 w) c' ]) [More Haste, Less Speed: Cache Related Security Threats in Continuous Integration Servicespp. 138-138! q8 K; W; M+ q& Z, U# j
by Yacong Gu, Lingyun Ying, Huajun Chai, Yingyuan Pu, Haixin Duan, Xing Gao
: M3 }3 N& v! D) }
5 I( P6 N' a: u. r; Q2 P0 D" E) w, O【27】西电6 o0 A9 c4 O+ P/ b6 Q
FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledgepp. 148-148; A6 I8 g, D2 Z, ?
by Jiahe Lan, Jie Wang, Baochen Yan, Zheng Yan, Elisa Bertino
6 N6 d' M+ K0 a1 {$ U7 d: P, g# _* c s' K% A
【28】清华大学
7 z9 D9 y u" a- ~$ PThe Dark Side of Scale: Insecurity of Direct-to-Cell Satellite Mega-Constellationspp. 149-1495 ~; x( o& t8 B
by Wei Li, Yuanjie Li, Hewu Li, Yimei Chen, Yufeng Wang, Jingyi Lan, Jianping Wu, Qian Wu, Jun Liu, Zeqi Lai- \7 w1 j2 h- |
$ w3 E' D+ a! o: d5 U) K. Z: F
【29】复旦大学5 L4 c; I; H+ G9 _: Q
Efficient Detection of Java Deserialization Gadget Chains via Bottom-up Gadget Search and Dataflow-aided Payload Constructionpp. 150-150
# a# s0 Q0 b' l! }! {by Bofei Chen6 J: \' [4 S9 `$ H, y: L) Y; C% @1 Q/ L3 v
5 l3 r& f6 F/ C3 B【30】山东大学
* Z8 w. @) {. q! IAVA: Inconspicuous Attribute Variation-based Adversarial Attack bypassing DeepFake Detectionpp. 155-1556 |* o0 c3 j6 h- Y7 b' g0 f' |
by Xiangtao Meng, Li Wang, Shanqing Guo, Lei Ju, Qingchuan Zhao4 S% S5 y6 B0 W' i0 v
$ h: S% ^) L$ }2 E8 E, K. v
【31】北京大学& p7 |. Q' ^: w: \
Rethinking IC Layout Vulnerability: Simulation-Based Hardware Trojan Threat Assessment with High Fidelitypp. 160-160; d. X1 c$ [! g4 [* J+ R
by Xinming Wei, Jiaxi Zhang, Guojie Luo c, b6 Z; y0 ]: e
, ~% }) z: `) |; i |
|