Towards a Formally Verified Security Monitor for VM-based Confidential ComputingWojciech OzgaGuerney Huntet al.2023MICRO 2023
EdgeTorrent: Real-time Temporal Graph Representations for Intrusion DetectionIsaiah J. KingXiaokui Shuet al.2023RAID 2023
Security Analysis of the WhatsApp End-to-End Encrypted Backup ProtocolGareth T. DaviesSebastian Falleret al.2023CRYPTO 2023
Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against Data-Oriented AttacksSalman AhmedHans Liljestrandet al.2023USENIX Security 2023
SoCurity: A Design Approach for Enhancing SoC SecurityNaorin HossainAlper Buyuktosunogluet al.2023DAC 2023
Efficient Privacy-Preserving Viral Strain Classification via k-mer Signatures and FHEAdi AkaviaBen Galiliet al.2023CSF 2023
Benchmarking the Effect of Poisoning Defenses on the Security and Bias of Deep Learning ModelsNathalie Baracaldo AngelFarhan Ahmedet al.2023S&P 2023
Fashion Faux Pas: Implicit Stylistic Fingerprints for Bypassing Browsers' Anti-Fingerprinting DefensesXu LinFrederico Araujoet al.2023S&P 2023
Go or No Go: Differential Fuzzing of Native and C LibrariesAlessandro SorniottiMichael Weissbacheret al.2023S&P 2023