Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
SPW
SPW 2024
Generate Citations
2024 IEEE Security and Privacy Workshops (SPW)
May 23 2024 to May 23 2024
San Francisco, CA, USA
ISBN: 979-8-3503-5487-4
Table of Contents
Title Page i
Freely available from IEEE.
pp. 1-1
Title Page iii
Freely available from IEEE.
pp. 3-3
Copyright Page
Freely available from IEEE.
pp. 4-4
Table of Contents
Freely available from IEEE.
pp. 5-8
A Public and Reproducible Assessment of the Topics API on Real Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Yohan Beugin
,
Patrick McDaniel
User Verification System using Location-based Dynamic Questions for Account Recovery
Full-text access may be available. Sign in or learn about subscription options.
pp. 9-16
by
Shuji Yamaguchi
,
Hidehito Gomi
,
Tetsutaro Uehara
Manufactured Narratives: On the Potential of Manipulating Social Media to Politicize World Events
Full-text access may be available. Sign in or learn about subscription options.
pp. 17-27
by
Chris Tsoukaladelis
,
Nick Nikiforakis
Exploring the Capabilities and Limitations of Video Stream Fingerprinting
Full-text access may be available. Sign in or learn about subscription options.
pp. 28-39
by
Tim Walsh
,
Trevor Thomas
,
Armon Barton
A Performance Analysis for Confidential Federated Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 40-47
by
Bruno Casella
,
Iacopo Colonnelli
,
Gianluca Mittone
,
Robert Birke
,
Walter Riviera
,
Antonio Sciarappa
,
Carlo Cavazzoni
,
Marco Aldinucci
LocalStyleFool: Regional Video Style Transfer Attack Using Segment Anything Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 48-56
by
Yuxin Cao
,
Jinghao Li
,
Xi Xiao
,
Derui Wang
,
Minhui Xue
,
Hao Ge
,
Wei Liu
,
Guangwu Hu
Certifying Safety in Reinforcement Learning under Adversarial Perturbation Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 57-67
by
Junlin Wu
,
Hussein Sibai
,
Yevgeniy Vorobeychik
WENDIGO: Deep Reinforcement Learning for Denial-of-Service Query Discovery in GraphQL
Full-text access may be available. Sign in or learn about subscription options.
pp. 68-75
by
Shae McFadden
,
Marcello Maugeri
,
Chris Hicks
,
Vasilios Mavroudis
,
Fabio Pierazzi
Mitigating Deep Reinforcement Learning Backdoors in the Neural Activation Space
Full-text access may be available. Sign in or learn about subscription options.
pp. 76-86
by
Sanyam Vyas
,
Chris Hicks
,
Vasilios Mavroudis
Just another copy and paste? Comparing the security vulnerabilities of ChatGPT generated code and StackOverflow answers
Full-text access may be available. Sign in or learn about subscription options.
pp. 87-94
by
Sivana Hamer
,
Marcelo d’Amorim
,
Laurie Williams
NodeGuard: A Highly Efficient Two-Party Computation Framework for Training Large-Scale Gradient Boosting Decision Tree
Full-text access may be available. Sign in or learn about subscription options.
pp. 95-103
by
Tianxiang Dai
,
Yufan Jiang
,
Yong Li
,
Fei Mei
The Impact of Uniform Inputs on Activation Sparsity and Energy-Latency Attacks in Computer Vision
Full-text access may be available. Sign in or learn about subscription options.
pp. 104-111
by
Andreas Müller
,
Erwin Quiring
Defending Language Models Against Image-Based Prompt Attacks via User-Provided Specifications
Full-text access may be available. Sign in or learn about subscription options.
pp. 112-131
by
Reshabh K Sharma
,
Vinayak Gupta
,
Dan Grossman
Exploiting Programmatic Behavior of LLMs: Dual-Use Through Standard Security Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 132-143
by
Daniel Kang
,
Xuechen Li
,
Ion Stoica
,
Carlos Guestrin
,
Matei Zaharia
,
Tatsunori Hashimoto
Pre-trained Encoders in Self-Supervised Learning Improve Secure and Privacy-preserving Supervised Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 144-156
by
Hongbin Liu
,
Wenjie Qu
,
Jinyuan Jia
,
Neil Zhenqiang Gong
Vulnerability Flow Type Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 157-168
by
Mohsen Lesani
Weird Machines in Package Managers: A Case Study of Input Language Complexity and Emergent Execution in Software Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 169-179
by
Sameed Ali
,
Michael E. Locasto
,
Sean Smith
Robust Verification of PEG Parser Interpreters
Full-text access may be available. Sign in or learn about subscription options.
pp. 180-191
by
Natarajan Shankar
,
Zephyr Lucas
Research Report: An Optim (l) Approach to Parsing Random-Access Formats
Full-text access may be available. Sign in or learn about subscription options.
pp. 192-199
by
Mark Tullsen
,
Sam Cowger
,
Mike Dodds
,
Peter Wyatt
Research Report: Not All Move Specifications Are Created Equal : A Case Study on the Formally Verified Diem Payment Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 200-214
by
Meng Xu
Parsing, Performance, and Pareto in Data Stream Security
Full-text access may be available. Sign in or learn about subscription options.
pp. 215-223
by
J. Peter Brady
,
Sean W. Smith
Research Report: Enhanced eBPF Verification and eBPF-based Runtime Safety Protection
Full-text access may be available. Sign in or learn about subscription options.
pp. 224-230
by
Guang Jin
,
Jason Li
,
Greg Briskin
Research Report: Testing and Evaluating Artificial Intelligence Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 231-238
by
Paul Lintilhac
,
Joshua Ackerman
,
George Cybenko
PrivacyOracle: Configuring Sensor Privacy Firewalls with Large Language Models in Smart Built Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 239-245
by
Brian Wang
,
Luis Antonio Garcia
,
Mani Srivastava
Towards Cyber-Physical Representation and Cyber-Resilience Against Attack and Failure within a Hydraulic Network Simulation Toolkit
Full-text access may be available. Sign in or learn about subscription options.
pp. 246-252
by
Sean O’Toole
,
Hoda Mehrpouyan
SideGuard: Non-Invasive On-Chip Malware Detection in Heterogeneous IoT Systems by Leveraging Side-Channels
Full-text access may be available. Sign in or learn about subscription options.
pp. 253-259
by
Fatemeh Arkannezhad
,
Pooya Aghanoury
,
Justin Feng
,
Hossein Khalili
,
Nader Sehatbakhsh
Virtual Keymysteries Unveiled: Detecting Keystrokes in VR with External Side-Channels
Full-text access may be available. Sign in or learn about subscription options.
pp. 260-266
by
Hossein Khalili
,
Alexander Chen
,
Theodoros Papaiakovou
,
Timothy Jacques
,
Hao-Jen Chien
,
Changwei Liu
,
Aolin Ding
,
Amin Hass
,
Saman Zonouz
,
Nader Sehatbakhsh
Intercepting Bluetooth Traffic from Wearable Health Devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 267-273
by
Qi Liu
,
Yizhe Zhang
,
Yixin Sun
Security Analysis of Wearable Smart Health Devices and Their Companion Apps
Full-text access may be available. Sign in or learn about subscription options.
pp. 274-280
by
Daniel Timko
,
Mike Sharko
,
Yanyan Li
Seamlessly Insecure: Uncovering Outsider Access Risks in AiDot-Controlled Matter Devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 281-288
by
Narmeen Shafqat
,
Aanjhan Ranganathan
Adversarial 3D Virtual Patches using Integrated Gradients
Full-text access may be available. Sign in or learn about subscription options.
pp. 289-295
by
Chengzeng You
,
Zhongyuan Hau
,
Binbin Xu
,
Soteris Demetriou
Poster: Identity-Independent IoT for Overarching Policy Enforcement
Full-text access may be available. Sign in or learn about subscription options.
pp. 296-296
by
Luoyao Hao
,
Henning Schulzrinne
Poster: Towards Privacy-Preserving Federated Recommendation via Synthetic Interactions
Full-text access may be available. Sign in or learn about subscription options.
pp. 297-297
by
Thirasara Ariyarathna
,
Salil S. Kanhere
,
Hye-Young Paik
Author Index
Freely available from IEEE.
pp. 299-300
Device Discovery in the Smart Home Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 298-304
by
Mounib Khanafer
,
Logan Kostick
,
Chixiang Wang
,
Wondimu Zegeye
,
Weijia He
,
Berkay Kaplan
,
Nurzaman Ahmed
,
Kevin Kornegay
,
David Kotz
,
Timothy J. Pierson
LayerDBA: Circumventing Similarity-Based Defenses in Federated Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 299-305
by
Javor Nikolov
,
Alessandro Pegoraro
,
Phillip Rieger
,
Ahmad-Reza Sadeghi
Showing 40 out of 40