Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
NDSS.2025
papers.cool
CENSOR
: Defense Against Gradient Inversion via Orthogonal
Subspace
Bayesian Sampling
papers.cool
·
10w
PropertyGPT
: LLM-driven
Formal
Verification of Smart Contracts through Retrieval-Augmented Property Generation
papers.cool
·
10w
Exploring User
Perceptions
of Security
Auditing
in the Web3 Ecosystem
papers.cool
·
10w
type++:
Prohibiting
Type Confusion with
Inline
Type Information
papers.cool
·
10w
Was This You? Investigating the Design
Considerations
for
Suspicious
Login Notifications
papers.cool
·
10w
NodeMedic-FINE
: Automatic Detection and
Exploit
Synthesis for Node.js Vulnerabilities
papers.cool
·
10w
JBomAudit
: Assessing the Landscape, Compliance, and Security Implications of Java
SBOMs
papers.cool
·
10w
LLMPirate
: LLMs for Black-box Hardware IP
Piracy
papers.cool
·
10w
PolicyPulse
: Precision Semantic Role Extraction for Enhanced Privacy Policy
Comprehension
papers.cool
·
10w
BULKHEAD
: Secure, Scalable, and Efficient Kernel Compartmentalization with
PKS
papers.cool
·
10w
Crosstalk-induced
Side Channel Threats in Multi-Tenant
NISQ
Computers
papers.cool
·
10w
Ring of
Gyges
: Accountable Anonymous Broadcast via Secret-Shared
Shuffle
papers.cool
·
10w
Detecting Ransomware Despite I/O
Overhead
: A Practical
Multi-Staged
Approach
papers.cool
·
10w
PQConnect
: Automated Post-Quantum End-to-End
Tunnels
papers.cool
·
10w
From Large to
Mammoth
: A
Comparative
Evaluation of Large Language Models in Vulnerability Detection
papers.cool
·
10w
Recurrent Private Set Intersection for Unbalanced Databases with
Cuckoo
Hashing and Leveled
FHE
papers.cool
·
10w
Revealing the Black Box of Device Search Engine:
Scanning
Assets, Strategies, and Ethical
Consideration
papers.cool
·
10w
Moneta
: Ex-Vivo GPU Driver Fuzzing by
Recalling
In-Vivo Execution States
papers.cool
·
10w
GhostShot
: Manipulating the Image of
CCD
Cameras with Electromagnetic Interference
papers.cool
·
10w
Time-varying
Bottleneck Links in LEO Satellite Networks: Identification, Exploits, and
Countermeasures
papers.cool
·
10w
« Page 2
·
Page 4 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help