**This is an old revision of the document!**
二进制代码分析
安全防护
-
- No Privacy Left Outside: On the (In-)Security of TEE-Shielded DNN Partition for On-Device ML @ IEEE S&P 2024
-
- DOPE: DOmain Protection Enforcement with PKS @ ACSAC 2023
Network Security
Web Security
-
- WEBRR: A Forensic System for Replaying and Investigating Web-Based Attacks in The Modern Web @ USENIX Security 2024
-
- Chrowned by an Extension: Abusing the Chrome DevTools Protocol through the Debugger API @ Euro S&P 2023
-
- RøB: Ransomware over Modern Web Browsers @ USENIX Security 2023
物联网安全
-
- SoK: The Long Journey of Exploiting and Defending the Legacy of King Harald Bluetooth @ IEEE S&P 2024
-
- Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities @ USENIX Security 2024
-
- Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations @ CCS 2023
现实世界的密码学安全问题
-
- Injection Attacks Against End-to-End Encrypted Applications @ IEEE S&P 2024
-
- Passive SSH Key Compromise via Lattices @ CCS 2023
-
- ReSolveD: Shorter Signatures from Regular Syndrome Decoding and VOLE-in-the-Head @ PKC 2024
- Revisiting the Constant-sum Winternitz One-time Signature with Applications to SPHINCS+ and XMSS @ CRYPTO 2023
AI安全
-
- No Privacy Left Outside: On the (In-)Security of TEE-Shielded DNN Partition for On-Device ML @ IEEE S&P 2024
-
- DeMistify: Identifying On-device Machine Learning Models Stealing and Reuse Vulnerabilities in Mobile Apps @ ICSE 2024
-
- The Janus Interface: How Fine-Tuning in Large Language Models Amplifies the Privacy Risks
-
- Crafter: Facial Feature Crafting against Inversion-based Identity Theft on Deep Models @ NDSS 2024