Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
NDSS.2025
papers.cool
Distributed
Function
Secret Sharing and Applications
papers.cool
·
10w
DUMPLING
: Fine-grained Differential JavaScript Engine
Fuzzing
papers.cool
·
10w
URVFL
:
Undetectable
Data Reconstruction Attack on Vertical Federated Learning
papers.cool
·
10w
Welcome to
Jurassic
Park: A Comprehensive Study of Security Risks in
Deno
and its Ecosystem
papers.cool
·
10w
Blackbox
Fuzzing
of Distributed Systems with Multi-Dimensional Inputs and Symmetry-Based Feedback Pruning
papers.cool
·
10w
SCAMMAGNIFIER
:
Piercing
the Veil of Fraudulent Shopping Website Campaigns
papers.cool
·
10w
Be
Careful
of What You Embed:
Demystifying
OLE Vulnerabilities
papers.cool
·
10w
SongBsAb
: A Dual Prevention Approach against
Singing
Voice Conversion based Illegal Song Covers
papers.cool
·
10w
Secure
Transformer
Inference Made
Non-interactive
papers.cool
·
10w
LAMP: Lightweight Approaches for Latency
Minimization
in
Mixnets
with Practical Deployment Considerations
papers.cool
·
10w
Automatic
Insecurity
: Exploring Email
Auto-configuration
in the Wild
papers.cool
·
10w
Defending Against Membership Inference Attacks on
Iteratively
Pruned
Deep Neural Networks
papers.cool
·
10w
EMIRIS
:
Eavesdropping
on Iris Information via Electromagnetic Side Channel
papers.cool
·
10w
Siniel
: Distributed Privacy-Preserving
zkSNARK
papers.cool
·
10w
Sheep
's Clothing, Wolf's Data: Detecting Server-Induced Client Vulnerabilities in Windows Remote
IPC
papers.cool
·
10w
BinEnhance
: An Enhancement Framework Based on External Environment
Semantics
for Binary Code Search
papers.cool
·
10w
ProvGuard
: Detecting
SDN
Control Policy Manipulation via Contextual Semantics of Provenance Graphs
papers.cool
·
10w
IsolateGPT
: An Execution
Isolation
Architecture for LLM-Based Agentic Systems
papers.cool
·
10w
Power-Related
Side-Channel Attacks using the Android
Sensor
Framework
papers.cool
·
10w
ASGARD
: Protecting On-Device Deep Neural Networks with
Virtualization-Based
Trusted Execution Environments
papers.cool
·
10w
Page 2 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help