42nd IEEE Symposium & Workshops on Security and Privacy
Proudly supported by
Speakers


Synthetic Data is the missing cog in the machine for financial crime controls

Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding

Invisible Perturbations: Physical Adversarial Examples Exploiting the Rolling Shutter Effect





A Novel Dynamic Analysis Infrastructure to Instrument Untrusted Execution Flow Across User-Kernel Spaces



Which Privacy and Security Attributes Most Impact Consumers‚ At Risk Perception and Willingness to Purchase IoT Devices?


CANnon: Reliable and Stealthy Remote Shutdown Attacks via Unaltered Automotive Microcontrollers


Keep the Dirt: Tainted TreeKEM, Adaptively and Actively Secure Continuous Group Key Agreement



A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer
Cross-Domain Access Control Encryption -- Arbitrary-policy, Constant-size, Efficient
Linking Bluetooth LE & Classic and Implications for Privacy-Preserving Bluetooth-Based Protocols




Zero Knowledge for Everything and Everyone: Fast ZK Processor with Cached ORAM for ANSI C Programs
Diogenes: Lightweight Scalable RSA Modulus Generation with a Dishonest Majority



Trust, But Verify: A Longitudinal Analysis Of Android OEM Compliance and Customization

Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding



DP-Sniper: Black-Box Discovery of Differential Privacy Violations using Classifiers





DIANE: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices
One Engine to Fuzz 'em All: Generic Language Processor Testing with Semantic Validation
STOCHFUZZ: Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting







Lockable Signatures for Blockchains: Scriptless Scripts for all Signatures


Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks! But We Can Fix It

Reading Between the Lines: An Extensive Evaluation of the Security and Privacy Implications of EPUB Reading Systems
Bookworm Game: Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis



Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More)
Bookworm Game: Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis





Wolverine: Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits
They Would do Better if They Worked Together: The Case of Interaction Problems Between Password Managers and Websites
Linking Bluetooth LE & Classic and Implications for Privacy-Preserving Bluetooth-Based Protocols
CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability
CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability





Response-Hiding Encrypted Ranges: Revisiting Security via Parametrized Leakage-Abuse Attacks



Journey to the Center of the Cookie Ecosystem: Unraveling Actors' Roles and Relationships



BUFFing signature schemes beyond unforgettability and the case of post-quantum signatures





Booths

Intel
Do Something Wonderful

IBM
IBM Research: Inventing What’s Next.

Apple
Join us. Be you.

Google Security and Privacy

ByteDance
bytedance.com

Palo Alto Networks
paloaltonetworks.com

The CERT Division Carnegie Mellon University Software Engineering Institute
Bringing CERTainty to your organization through advanced methods and technologies.

Technology Innovation Institute
Innovation for a better world
MIT Lincoln Laboratory
MIT Lincoln Laboratory - Technolgy in Support of National Security

Qualcomm
Qualcomm Product Security - We take security vulnerabilities very seriously and always seek to respond appropriately.