Default Cover Image

2024 IEEE Security and Privacy Workshops (SPW)

May 23 2024 to May 23 2024

San Francisco, CA, USA

ISBN: 979-8-3503-5487-4

Table of Contents

Title Page iFreely available from IEEE.pp. 1-1
Title Page iiiFreely available from IEEE.pp. 3-3
Copyright PageFreely available from IEEE.pp. 4-4
Table of ContentsFreely available from IEEE.pp. 5-8
A Public and Reproducible Assessment of the Topics API on Real DataFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
User Verification System using Location-based Dynamic Questions for Account RecoveryFull-text access may be available. Sign in or learn about subscription options.pp. 9-16
Manufactured Narratives: On the Potential of Manipulating Social Media to Politicize World EventsFull-text access may be available. Sign in or learn about subscription options.pp. 17-27
Exploring the Capabilities and Limitations of Video Stream FingerprintingFull-text access may be available. Sign in or learn about subscription options.pp. 28-39
LocalStyleFool: Regional Video Style Transfer Attack Using Segment Anything ModelFull-text access may be available. Sign in or learn about subscription options.pp. 48-56
Certifying Safety in Reinforcement Learning under Adversarial Perturbation AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 57-67
Mitigating Deep Reinforcement Learning Backdoors in the Neural Activation SpaceFull-text access may be available. Sign in or learn about subscription options.pp. 76-86
The Impact of Uniform Inputs on Activation Sparsity and Energy-Latency Attacks in Computer VisionFull-text access may be available. Sign in or learn about subscription options.pp. 104-111
Defending Language Models Against Image-Based Prompt Attacks via User-Provided SpecificationsFull-text access may be available. Sign in or learn about subscription options.pp. 112-131
Vulnerability Flow Type SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 157-168
Robust Verification of PEG Parser InterpretersFull-text access may be available. Sign in or learn about subscription options.pp. 180-191
Research Report: An Optim (l) Approach to Parsing Random-Access FormatsFull-text access may be available. Sign in or learn about subscription options.pp. 192-199
Research Report: Not All Move Specifications Are Created Equal : A Case Study on the Formally Verified Diem Payment NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 200-214
Parsing, Performance, and Pareto in Data Stream SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 215-223
Research Report: Enhanced eBPF Verification and eBPF-based Runtime Safety ProtectionFull-text access may be available. Sign in or learn about subscription options.pp. 224-230
Research Report: Testing and Evaluating Artificial Intelligence ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 231-238
Intercepting Bluetooth Traffic from Wearable Health DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 267-273
Security Analysis of Wearable Smart Health Devices and Their Companion AppsFull-text access may be available. Sign in or learn about subscription options.pp. 274-280
Seamlessly Insecure: Uncovering Outsider Access Risks in AiDot-Controlled Matter DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 281-288
Adversarial 3D Virtual Patches using Integrated GradientsFull-text access may be available. Sign in or learn about subscription options.pp. 289-295
Poster: Identity-Independent IoT for Overarching Policy EnforcementFull-text access may be available. Sign in or learn about subscription options.pp. 296-296
Poster: Towards Privacy-Preserving Federated Recommendation via Synthetic InteractionsFull-text access may be available. Sign in or learn about subscription options.pp. 297-297
Author IndexFreely available from IEEE.pp. 299-300
LayerDBA: Circumventing Similarity-Based Defenses in Federated LearningFull-text access may be available. Sign in or learn about subscription options.pp. 299-305
Showing 40 out of 40