Loading…
SecureML: A System for Scalable Privacy-Preserving Machine Learning
Mohassel, Payman, Yupeng Zhang
Published in Proceedings - IEEE Symposium on Security and Privacy (01.05.2017)
Published in Proceedings - IEEE Symposium on Security and Privacy (01.05.2017)
Get full text
Conference Proceeding
Loading…
Poisoning Web-Scale Training Datasets is Practical
Carlini, Nicholas, Jagielski, Matthew, Choquette-Choo, Christopher A., Paleka, Daniel, Pearce, Will, Anderson, Hyrum, Terzis, Andreas, Thomas, Kurt, Tramer, Florian
Published in Proceedings - IEEE Symposium on Security and Privacy (19.05.2024)
Published in Proceedings - IEEE Symposium on Security and Privacy (19.05.2024)
Get full text
Conference Proceeding
Loading…
Hijacking Bitcoin: Routing Attacks on Cryptocurrencies
Apostolaki, Maria, Zohar, Aviv, Vanbever, Laurent
Published in Proceedings - IEEE Symposium on Security and Privacy (01.05.2017)
Published in Proceedings - IEEE Symposium on Security and Privacy (01.05.2017)
Get full text
Conference Proceeding
Loading…
SneakyPrompt: Jailbreaking Text-to-image Generative Models
Yang, Yuchen, Hui, Bo, Yuan, Haolin, Gong, Neil, Cao, Yinzhi
Published in Proceedings - IEEE Symposium on Security and Privacy (19.05.2024)
Published in Proceedings - IEEE Symposium on Security and Privacy (19.05.2024)
Get full text
Conference Proceeding
Loading…
LLMs Cannot Reliably Identify and Reason About Security Vulnerabilities (Yet?): A Comprehensive Evaluation, Framework, and Benchmarks
Ullah, Saad, Han, Mingji, Pujar, Saurabh, Pearce, Hammond, Coskun, Ayse, Stringhini, Gianluca
Published in Proceedings - IEEE Symposium on Security and Privacy (19.05.2024)
Published in Proceedings - IEEE Symposium on Security and Privacy (19.05.2024)
Get full text
Conference Proceeding
Loading…
Scalable Bias-Resistant Distributed Randomness
Syta, Ewa, Jovanovic, Philipp, Kogias, Eleftherios Kokoris, Gailly, Nicolas, Gasser, Linus, Khoffi, Ismail, Fischer, Michael J., Ford, Bryan
Published in Proceedings - IEEE Symposium on Security and Privacy (01.05.2017)
Published in Proceedings - IEEE Symposium on Security and Privacy (01.05.2017)
Get full text
Conference Proceeding
Loading…
VUDDY: A Scalable Approach for Vulnerable Code Clone Discovery
Seulbae Kim, Seunghoon Woo, Heejo Lee, Hakjoo Oh
Published in Proceedings - IEEE Symposium on Security and Privacy (01.05.2017)
Published in Proceedings - IEEE Symposium on Security and Privacy (01.05.2017)
Get full text
Conference Proceeding
Loading…
IoT Goes Nuclear: Creating a ZigBee Chain Reaction
Ronen, Eyal, O'Flynn, Colin, Shamir, Adi, Weingarten, Achi-Or
Published in Proceedings - IEEE Symposium on Security and Privacy (01.05.2017)
Published in Proceedings - IEEE Symposium on Security and Privacy (01.05.2017)
Get full text
Conference Proceeding
Loading…
Modeling and Discovering Vulnerabilities with Code Property Graphs
Yamaguchi, Fabian, Golde, Nico, Arp, Daniel, Rieck, Konrad
Published in Proceedings - IEEE Symposium on Security and Privacy (01.05.2014)
Published in Proceedings - IEEE Symposium on Security and Privacy (01.05.2014)
Get full text
Conference Proceeding
Loading…
Flash: A Comprehensive Approach to Intrusion Detection via Provenance Graph Representation Learning
Ur Rehman, Mati, Ahmadi, Hadi, Ul Hassan, Wajih
Published in Proceedings - IEEE Symposium on Security and Privacy (19.05.2024)
Published in Proceedings - IEEE Symposium on Security and Privacy (19.05.2024)
Get full text
Conference Proceeding
Loading…
Exploiting Unintended Feature Leakage in Collaborative Learning
Melis, Luca, Song, Congzheng, De Cristofaro, Emiliano, Shmatikov, Vitaly
Published in Proceedings - IEEE Symposium on Security and Privacy (01.05.2019)
Published in Proceedings - IEEE Symposium on Security and Privacy (01.05.2019)
Get full text
Conference Proceeding
Loading…
Loading…
Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks
Wang, Bolun, Yao, Yuanshun, Shan, Shawn, Li, Huiying, Viswanath, Bimal, Zheng, Haitao, Zhao, Ben Y.
Published in Proceedings - IEEE Symposium on Security and Privacy (01.05.2019)
Published in Proceedings - IEEE Symposium on Security and Privacy (01.05.2019)
Get full text
Conference Proceeding
Loading…
Leakage-Abuse Attacks against Order-Revealing Encryption
Grubbs, Paul, Sekniqi, Kevin, Bindschaedler, Vincent, Naveed, Muhammad, Ristenpart, Thomas
Published in Proceedings - IEEE Symposium on Security and Privacy (01.05.2017)
Published in Proceedings - IEEE Symposium on Security and Privacy (01.05.2017)
Get full text
Conference Proceeding
Loading…
Kairos: Practical Intrusion Detection and Investigation using Whole-system Provenance
Cheng, Zijun, Lv, Qiujian, Liang, Jinyuan, Wang, Yan, Sun, Degang, Pasquier, Thomas, Han, Xueyuan
Published in Proceedings - IEEE Symposium on Security and Privacy (19.05.2024)
Published in Proceedings - IEEE Symposium on Security and Privacy (19.05.2024)
Get full text
Conference Proceeding
Loading…
Loki: Large-scale Data Reconstruction Attack against Federated Learning through Model Manipulation
Zhao, Joshua C., Sharma, Atul, Elkordy, Ahmed Roushdy, Ezzeldin, Yahya H., Avestimehr, Salman, Bagchi, Saurabh
Published in Proceedings - IEEE Symposium on Security and Privacy (19.05.2024)
Published in Proceedings - IEEE Symposium on Security and Privacy (19.05.2024)
Get full text
Conference Proceeding
Loading…
Spectre Attacks: Exploiting Speculative Execution
Kocher, Paul, Horn, Jann, Fogh, Anders, Genkin, Daniel, Gruss, Daniel, Haas, Werner, Hamburg, Mike, Lipp, Moritz, Mangard, Stefan, Prescher, Thomas, Schwarz, Michael, Yarom, Yuval
Published in Proceedings - IEEE Symposium on Security and Privacy (01.05.2019)
Published in Proceedings - IEEE Symposium on Security and Privacy (01.05.2019)
Get full text
Conference Proceeding
Loading…
IKP: Turning a PKI Around with Decentralized Automated Incentives
Matsumoto, Stephanos, Reischuk, Raphael M.
Published in Proceedings - IEEE Symposium on Security and Privacy (01.05.2017)
Published in Proceedings - IEEE Symposium on Security and Privacy (01.05.2017)
Get full text
Conference Proceeding
Loading…
Certified Robustness to Adversarial Examples with Differential Privacy
Lecuyer, Mathias, Atlidakis, Vaggelis, Geambasu, Roxana, Hsu, Daniel, Jana, Suman
Published in Proceedings - IEEE Symposium on Security and Privacy (01.05.2019)
Published in Proceedings - IEEE Symposium on Security and Privacy (01.05.2019)
Get full text
Conference Proceeding
Loading…
Membership Inference Attacks From First Principles
Carlini, Nicholas, Chien, Steve, Nasr, Milad, Song, Shuang, Terzis, Andreas, Tramer, Florian
Published in Proceedings - IEEE Symposium on Security and Privacy (01.05.2022)
Published in Proceedings - IEEE Symposium on Security and Privacy (01.05.2022)
Get full text
Conference Proceeding