国际信息安全顶级会议ACM CCS 2022论文合集整理(上)
Updatable Public Key Encryption from DCR: Efficient Constructions With Stronger Security
https://doi.org/10.1145/3548606.3559376
Helping or Hindering?: How Browser Extensions Undermine Security
https://doi.org/10.1145/3548606.3560685
Practical, Round-Optimal Lattice-Based Blind Signatures
https://doi.org/10.1145/3548606.3560650
Blacktooth: Breaking through the Defense of Bluetooth in Silence
https://doi.org/10.1145/3548606.3560668
Server-Aided Continuous Group Key Agreement
https://doi.org/10.1145/3548606.3560632
Enforcing Fine-grained Constant-time Policies
https://doi.org/10.1145/3548606.3560689
Post Quantum Noise
https://doi.org/10.1145/3548606.3560577
Laconic Private Set-Intersection From Pairings
https://doi.org/10.1145/3548606.3560642
Efficient Secure Three-Party Sorting with Applications to Data Analysis and Heavy Hitters
https://doi.org/10.1145/3548606.3560691
Chaghri - A FHE-friendly Block Ciphe
https://doi.org/10.1145/3548606.3559364
Secure Parallel Computation on Privately Partitioned Data and Applications
https://doi.org/10.1145/3548606.3560695
Thora: Atomic and Privacy-Preserving Multi-Channel Updates
https://doi.org/10.1145/3548606.3560556
Sleepy Channels: Bi-directional Payment Channels without Watchtowers
https://doi.org/10.1145/3548606.3559370
On the Adaptive Security of the Threshold BLS Signature Scheme
https://doi.org/10.1145/3548606.3560656
Secret-Shared Joins with Multiplicity from Aggregation Trees
https://doi.org/10.1145/3548606.3560670
META-BTS: Bootstrapping Precision Beyond the Limit
https://doi.org/10.1145/3548606.3560696
i-TiRE: Incremental Timed-Release Encryption or How to use Timed-Release Encryption on Blockchains?
https://doi.org/10.1145/3548606.3560704
Membership Inference Attacks and Generalization: A Causal Perspective
https://doi.org/10.1145/3548606.3560694
Tidy: Symbolic Verification of Timed Cryptographic Protocols
https://doi.org/10.1145/3548606.3559343
A Wolf in Sheep's Clothing: Spreading Deadly Pathogens Under the Disguise of Popular Music
https://doi.org/10.1145/3548606.3560643
Feta: Efficient Threshold Designated-Verifier Zero-Knowledge Proofs
https://doi.org/10.1145/3548606.3559354
Distributed, Private, Sparse Histograms in the Two-Server Model
https://doi.org/10.1145/3548606.3559383
Threshold Cryptography as a Service (in the Multiserver and YOSO Models)
https://doi.org/10.1145/3548606.3559397
Privacy Limitations of Interest-based Advertising on The Web: A Post-mortem Empirical Analysis of Google's FLoC
https://doi.org/10.1145/3548606.3560626
JIT-Picking: Differential Fuzzing of JavaScript Engines
https://doi.org/10.1145/3548606.3560624
A Symbolic Analysis of Privacy for TLS 1.3 with Encrypted Client Hello
https://doi.org/10.1145/3548606.3559360
Power Contracts: Provably Complete Power Leakage Models for Processors
https://doi.org/10.1145/3548606.3560600
Themis: An On-Site Voting System with Systematic Cast-as-intended Verification and Partial Accountability
https://doi.org/10.1145/3548606.3560563
Victory by KO: Attacking OpenPGP Using Key Overwriting
https://doi.org/10.1145/3548606.3559363
Do Opt-Outs Really Opt Me Out?
https://doi.org/10.1145/3548606.3560574
Vizard: A Metadata-hiding Data Analytic System with End-to-End Policy Controls
https://doi.org/10.1145/3548606.3559349
Succinct Zero-Knowledge Batch Proofs for Set Accumulators
https://doi.org/10.1145/3548606.3560677
Widespread Underestimation of Sensitivity in Differentially Private Libraries and How to Fix It
https://doi.org/10.1145/3548606.3560708
SFuzz: Slice-based Fuzzing for Real-Time Operating Systems
https://doi.org/10.1145/3548606.3559367
Graph Unlearning
https://doi.org/10.1145/3548606.3559352
MetaEmu: An Architecture Agnostic Rehosting Framework for Automotive Firmware
https://doi.org/10.1145/3548606.3559338
PSI from Ring-OLE
https://doi.org/10.1145/3548606.3559378
HammerScope: Observing DRAM Power Consumption Using Rowhammer
https://doi.org/10.1145/3548606.3560688
SortingHat: Efficient Private Decision Tree Evaluation via Homomorphic Encryption and Transciphering
https://doi.org/10.1145/3548606.3560702
SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders
https://doi.org/10.1145/3548606.3559355
The Generals' Scuttlebutt: Byzantine-Resilient Gossip Protocols
https://doi.org/10.1145/3548606.3560638
Sharp: Short Relaxed Range Proofs
https://doi.org/10.1145/3548606.3560628
QuerySnout: Automating the Discovery of Attribute Inference Attacks against Query-Based Systems
https://doi.org/10.1145/3548606.3560581
VRust: Automated Vulnerability Detection for Solana Smart Contracts
https://doi.org/10.1145/3548606.3560552
Fast Fully Secure Multi-Party Computation over Any Ring with Two-Thirds Honest Majority
https://doi.org/10.1145/3548606.3559389
Understanding Security Issues in the NFT Ecosystem
https://doi.org/10.1145/3548606.3559342
GearBox: Optimal-size Shard Committees by Leveraging the Safety-Liveness Dichotomy
https://doi.org/10.1145/3548606.3559375
STAR: Secret Sharing for Private Threshold Aggregation Reporting
https://doi.org/10.1145/3548606.3560631
CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks
https://doi.org/10.1145/3548606.3560618
Two-Client Inner-Product Functional Encryption with an Application to Money-Laundering Detection
https://doi.org/10.1145/3548606.3559374
On the (In)Security of Secure ROS2
https://doi.org/10.1145/3548606.3560681
FenceSitter: Black-box, Content-Agnostic, and Synchronization-Free Enrollment-Phase Attacks on Speaker Recognition Systems
https://doi.org/10.1145/3548606.3559357
StrongBox: A GPU TEE on Arm Endpoints
https://doi.org/10.1145/3548606.3560627
Understanding Real-world Threats to Deep Learning Models in Android Apps
https://doi.org/10.1145/3548606.3559388
A Run a Day Won't Keep the Hacker Away: Inference Attacks on Endpoint Privacy Zones in Fitness Tracking Social Networks
Second-Order Low-Randomness d + 1 Hardware Sharing of the AES
Improving Line-Point Zero Knowledge: Two Multiplications for the Price of One
Shorter Signatures Based on Tailor-Made Minimalist Symmetric-Key Crypto
Leakage and Tamper Resilient Permutation-Based Cryptography
Exposing the Rat in the Tunnel: Using Traffic Analysis for Tor-based Malware Detection
Watch Out for Race Condition Attacks When Using Android External Storage
Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception
Towards Automated Safety Vetting of Smart Contracts in Decentralized Applications
Poirot: Probabilistically Recommending Protections for the Android Framework
TurboPack: Honest Majority MPC with Constant Online Communication
Automatic Detection of Speculative Execution Combinations
When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer
NFGen: Automatic Non-linear Function Evaluation Code Generator for General-purpose MPC Platforms
Shifted Inverse: A General Mechanism for Monotonic Functions under User Differential Privacy
CINI MINIS: Domain Isolation for Fault and Combined Security
Adversarial Correctness and Privacy for Probabilistic Data Structures
LibAFL: A Framework to Build Modular and Reusable Fuzzers
Efficient Zero-Knowledge Proofs on Signed Data with Applications to Verifiable Computation on Data Streams
Minotaur: Multi-Resource Blockchain Consensus
Squirrel: Efficient Synchronized Multi-Signatures from Lattices
Am I Private and If So, how Many?: Communicating Privacy Guarantees of Differential Privacy with Risk Communication Formats
Understanding the How and the Why: Exploring Secure Development Practices through a Course Competition
"Is your explanation stable?": A Robustness Evaluation Framework for Feature Attribution
Secure Auctions in the Presence of Rational Adversaries
https://doi.org/10.1145/3548606.3560706
Dumbo-NG: Fast Asynchronous BFT Consensus with Throughput-Oblivious Latency
Succinct Zero Knowledge for Floating Point Computations
Practical Settlement Bounds for Proof-of-Work Blockchains
Hecate: Lifting and Shifting On-Premises Workloads to an Untrusted Cloud
C2C: Fine-grained Configuration-driven System Call Filtering
Foundations of Coin Mixing Services
ATTRITION: Attacking Static Hardware Trojan Detection Techniques Using Reinforcement Learning
Watch Your Back: Identifying Cybercrime Financial Relationships in Bitcoin through Back-and-Forth Exploration
DangZero: Efficient Use-After-Free Detection via Direct Page Table Access
Reinforced Concrete: A Fast Hash Function for Verifiable Computation
Proof-of-Possession for KEM Certificates using Verifiable Generation
SPECPATCH: Human-In-The-Loop Adversarial Audio Spectrogram Patch Attack on Speech Recognition
Identifying a Training-Set Attack's Target Using Renormalized Influence Estimation
Location Heartbleeding: The Rise of Wi-Fi Spoofing Attack Via Geolocation API
How to Hide MetaData in MLS-Like Secure Group Messaging: Simple, Modular, and Post-Quantum
Behind the Scenes of RPKI
On the Privacy Risks of Cell-Based NAS Architectures
Kryvos: Publicly Tally-Hiding Verifiable E-Voting
Selective MPC: Distributed Computation of Differentially Private Key-Value Statistics
SpecDoctor: Differential Fuzz Testing to Find Transient Execution Vulnerabilities
Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels
Differentially Private Triangle and 4-Cycle Counting in the Shuffle Model
注:转载时请说明 “本文转自隐私计算研习社公众号”
往期推荐
隐私并集计算 Shuffle-based Private Set Union:Faster and more secure
同态加密开源框架整理
综述分享|神经网络安全推理