1

ICL-EVADER: Zero-Query Black-Box Evasion Attacks on In-Context Learning and Their Defenses

Okara: Detection and Attribution of TLS Man-in-the-Middle Vulnerabilities in Android Apps with Foundation Models

Pepper: High-bandwidth and Scalable Anonymous Broadcast with Cryptographic Privacy

Port Forwarding Services Are Forwarding Security Risks

Detecting and Understanding the Promotion of Illicit Goods and Services on Twitter

Dissecting Open Edge Computing Platforms: Ecosystem, Usage, and Security Risks

Emerging in recent years, open edge computing platforms (OECPs) claim large-scale edge nodes, the extensive usage and adoption, as well as the openness to any third parties to join as edge nodes. For instance, OneThingCloud, a major OECP operated in …

Command Hijacking on Voice-Controlled IoT in Amazon Alexa Platform

Stealthy Peers: Understanding Security and Privacy Risks of Peer-Assisted Video Streaming

Peer-assisted delivery network (PDN) can significantly reduce the bandwidth cost incurred by traditional CDN services. However, it is unclear whether they have been deployed extensively and their security implications have never been investigated …

Shining Light into the Tunnel: Understanding and Classifying Network Traffic of Residential Proxies

Reflected Search Poisoning for Illicit Promotion