USENIX Security Symposium
This year, Purdue CS faculty presented seventeen papers at the 32nd USENIX Security Symposium in Anaheim, CA from August 9-11. The The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks.
Medusa Attack: Exploring Security Hazards of In-App QR Code Scanning | Xing Han, Yuheng Zhang, and Xue Zhang, University of Electronic Science and Technology of China and Shanghai Qi Zhi Institute; Zeyuan Chen, G.O.S.S.I.P; Mingzhe Wang, Xidian University; Yiwei Zhang, Purdue University; Siqi Ma, The University of New South Wales; Yu Yu, Shanghai Qi Zhi Institute and Shanghai Jiao Tong University; Elisa Bertino, Purdue University; Juanru Li, Shanghai Qi Zhi Institute and Shanghai Jiao Tong University
That Person Moves Like A Car: Misclassification Attack Detection for Autonomous Systems Using Spatiotemporal Consistency | Yanmao Man, University of Arizona; Raymond Muller, Purdue University; Ming Li, University of Arizona; Z. Berkay Celik, Purdue University; Ryan Gerdes, Virginia Tech
Fuzz The Power: Dual-role State Guided Black-box Fuzzing for USB Power Delivery | Kyungtae Kim and Sungwoo Kim, Purdue University; Kevin R. B. Butler, University of Florida; Antonio Bianchi, Rick Kennell, and Dave (Jing) Tian, Purdue University
PatchVerif: Discovering Faulty Patches in Robotic Vehicles | Hyungsub Kim, Muslum Ozgur Ozmen, Z. Berkay Celik, Antonio Bianchi, and Dongyan Xu, Purdue University
Discovering Adversarial Driving Maneuvers against Autonomous Vehicles | Ruoyu Song, Muslum Ozgur Ozmen, Hyungsub Kim, Raymond Muller, Z. Berkay Celik, and Antonio Bianchi, Purdue University
NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems | Hui Peng, Purdue University; Zhihao Yao and Ardalan Amiri Sani, UC Irvine; Dave (Jing) Tian, Purdue University; Mathias Payer, EPFL
AIRS: Explanation for Deep Reinforcement Learning based Security Applications | Jiahao Yu, Northwestern University; Wenbo Guo, Purdue University; Qi Qin, ShanghaiTech University; Gang Wang, University of Illinois at Urbana-Champaign; Ting Wang, The Pennsylvania State University; Xinyu Xing, Northwestern University
Intender: Fuzzing Intent-Based Networking with Intent-State Transition Guidance | Jiwon Kim, Purdue University; Benjamin E. Ujcich, Georgetown University; Dave (Jing) Tian, Purdue University
Hard-label Black-box Universal Adversarial Patch Attack | Guanhong Tao, Shengwei An, Siyuan Cheng, Guangyu Shen, and Xiangyu Zhang, Purdue University
PELICAN: Exploiting Backdoors of Naturally Trained Deep Learning Models In Binary Code Analysis | Zhuo Zhang, Guanhong Tao, Guangyu Shen, Shengwei An, Qiuling Xu, Yingqi Liu, and Yapeng Ye, Purdue University; Yaoxuan Wu, University of California, Los Angeles; Xiangyu Zhang, Purdue University
ZBCAN: A Zero-Byte CAN Defense System | Khaled Serag, Rohit Bhatia, Akram Faqih, and Muslum Ozgur Ozmen, Purdue University; Vireshwar Kumar, Indian Institute of Technology, Delhi; Z. Berkay Celik and Dongyan Xu, Purdue University
ARGUS: A Framework for Staged Static Taint Analysis of GitHub Workflows and Actions | Siddharth Muralee, Purdue University; Igibek Koishybayev, Aleksandr Nahapetyan, Greg Tystahl, and Brad Reaves, North Carolina State University; Antonio Bianchi, Purdue University; William Enck and Alexandros Kapravelos, North Carolina State University; Aravind Machiry, Purdue University
Extracting Protocol Format as State Machine via Controlled Static Loop Analysis | Qingkai Shi, Xiangzhe Xu, and Xiangyu Zhang, Purdue University
Fine-grained Poisoning Attack to Local Differential Privacy Protocols for Mean and Variance Estimation | Xiaoguang Li, Xidian University and Purdue University; Ninghui Li and Wenhai Sun, Purdue University; Neil Zhenqiang Gong, Duke University; Hui Li, Xidian University
Your Exploit is Mine: Instantly Synthesizing Counterattack Smart Contract | Zhuo Zhang, Purdue University; Zhiqiang Lin and Marcelo Morales, Ohio State University; Xiangyu Zhang and Kaiyuan Zhang, Purdue University
LocIn: Inferring Semantic Location from Spatial Maps in Mixed Reality | Habiba Farrukh, Reham Mohamed, Aniket Nare, Antonio Bianchi, and Z. Berkay Celik, Purdue University
Purdue CS faculty presented 2 papers at the 50th conference of ACM SIGGRAPH, the premier conference for computer graphics and interactive techniques worldwide. The conference was held in Los Angeles, Aug 6-12. Siggraph is the premier annual conference and exhibition on computer graphics and interactive techniques. Professor Bedrich Benes has two accepted papers. Benes is a Siggraph technical program committee member, a member of the technical papers awards committee, and a session chair.
Rhizomorph: The Coordinated Function of Shoots and Roots | Guillaume Cordonnier (Inria), Guillaume Jouvet (University of Lausanne), Adrien Peytavie (Univ Lyon), Jean Braun (Helmholtz Centre Potsdam), Marie-Paule Cani (École Polytechnique), Bedrich Benes (Purdue University), Eric Galin (Univ Lyon), Eric Guerin (Univ Lyon), James Gain (University of Cape Town)
Forming Terrains by Glacial Erosion | Bosheng Li (Purdue University), Jonathan Klein (Kaust), Dominik Michels (Kaust), Bedrich Benes (Purdue University), Soren Pirk (Adobe Research), Wojtek Palubicki (Adam Mickiewicz University)
Crypto 2023 is the 43rd International Cryptology Conference and will take place in Santa Barbara, USA on August 19-24, 2023. The academic program covers all aspects of cryptology. Crypto 2023 is organized by the International Association for Cryptologic Research (IACR).
Completeness Theorems for Adaptively Secure Broadcast | Ran Cohen (Reichman University), Juan Garay (Texas A&M University), Vassilis Zikas (Purdue University)
Purdue CS Faculty had three accepted papers at the 49th International Conference on Very Large Databases in Vancouver, Canada on August 28 to September 1. VLDB is a premier annual international forum for data management and database researchers, vendors, practitioners, application developers, and users.
The Case for Distributed Shared-Memory Databases with RDMA-Enabled Memory Disaggregation | Ruihong Wang (Purdue University); Jianguo Wang (Purdue University)*; Stratos Idreos (Harvard); Tamer Özsu (University of Waterloo); Walid G Aref (Purdue)
Differentially Private Vertical Federated Clustering | Zitao Li (Alibaba Group)*; Tianhao Wang (University of Virginia); Ninghui Li (Purdue University)
SUREL+: Moving from Walks to Sets for Scalable Subgraph-based Graph Representation Learning | Haoteng Yin (Purdue University); Muhan Zhang (Peking University); Jianguo Wang (Purdue University); Pan Li (Georgia Tech.)
ACM SIGKDD 2023
The annual ACM SIGKDD conference on knowledge discovery and data mining is the premier international forum for data mining researchers and practitioners from academia, industry, and government to share their ideas, research results and experiences.
Rapid Image Labeling via Neuro-Symbolic Learning | Yifeng Wang (The Hong Kong Polytechnic University), Zhi Tu (Purdue University), Yiwen Xiang (Chongqing University), Shiyuan Zhou (University of Toronto), Xiyuan Chen (University of Toronto), Bingxuan Li (Purdue University), Tianyi Zhang (Purdue University)