Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
NDSS.2025
papers.cool
Hitchhiking
Vaccine: Enhancing Botnet
Remediation
With Remote Code Deployment Reuse
papers.cool
·
10w
KernelSnitch
: Side Channel-Attacks on Kernel Data
Structures
papers.cool
·
10w
Revisiting EM-based Estimation for Locally
Differentially
Private
Protocols
papers.cool
·
10w
Beyond Classification:
Inferring
Function Names in Stripped
Binaries
via Domain Adapted LLMs
papers.cool
·
10w
Cascading
Spy Sheets: Exploiting the Complexity of Modern CSS for Email and Browser
Fingerprinting
papers.cool
·
10w
I Know What You Asked: Prompt
Leakage
via
KV-Cache
Sharing in Multi-Tenant LLM Serving
papers.cool
·
10w
Automated Mass Malware Factory: The
Convergence
of
Piggybacking
and Adversarial Example in Android Malicious Software Generation
papers.cool
·
10w
Eclipse
Attacks on
Monero
's Peer-to-Peer Network
papers.cool
·
10w
Revisiting
Physical-World
Adversarial
Attack on Traffic Sign Recognition: A Commercial Systems Perspective
papers.cool
·
10w
VeriBin
: Adaptive Verification of
Patches
at the Binary Level
papers.cool
·
10w
Density Boosts Everything: A One-stop Strategy for Improving Performance,
Robustness
, and Sustainability of Malware
Detectors
papers.cool
·
10w
BumbleBee
: Secure Two-party Inference Framework for Large
Transformers
papers.cool
·
10w
Do (Not) Follow the White Rabbit: Challenging the Myth of
Harmless
Open
Redirection
papers.cool
·
10w
Too
Subtle
to Notice: Investigating
Executable
Stack Issues in Linux Systems
papers.cool
·
10w
On the
Realism
of LiDAR
Spoofing
Attacks against Autonomous Driving Vehicle at High Speed and Long Distance
papers.cool
·
10w
The (Un)
usual
Suspects – Studying Reasons for
Lacking
Updates in WordPress
papers.cool
·
10w
Rondo
: Scalable and
Reconfiguration-Friendly
Randomness Beacon
papers.cool
·
10w
The Power of Words: A Comprehensive Analysis of
Rationales
and Their Effects on Users'
Permission
Decisions
papers.cool
·
10w
The Skeleton Keys: A Large Scale Analysis of
Credential
Leakage
in Mini-apps
papers.cool
·
10w
CLIBE
: Detecting Dynamic
Backdoors
in Transformer-based NLP Models
papers.cool
·
10w
« Page 8
·
Page 10 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help