pith. sign in

hub Canonical reference

Proceedings of the 42nd IEEE Symposium on Security and Privacy (SP) , year =

Canonical reference. 100% of citing Pith papers cite this work as background.

21 Pith papers citing it
Background 100% of classified citations

hub tools

citation-role summary

background 8

citation-polarity summary

years

2026 15 2025 6

roles

background 7

polarities

background 7

representative citing papers

Defense against Poisoning Attacks under Shuffle-DP

cs.CR · 2026-05-01 · unverdicted · novelty 8.0

A general framework defends any shuffle-DP protocol against poisoning attacks on union-preserving queries, retaining asymptotically equivalent error without attacks and only polylogarithmic increase with constant attackers.

SuperDP: Differential Privacy Refutation via Supermartingales

cs.PL · 2026-03-27 · unverdicted · novelty 8.0

SuperDP refutes ε-DP via simultaneous synthesis of input pairs and witness functions using upper expectation supermartingales and lower expectation submartingales, delivering the first fully automated, sound, and semi-complete method applicable to both discrete and continuous stochastic mechanisms.

Open-World Assertion Checking for Smart Contracts via Game Semantics

cs.PL · 2025-12-27 · unverdicted · novelty 8.0

A game semantics framework delivers the first sound and complete open-world assertion checking for Ethereum smart contracts, implemented as YulTracer which achieves perfect recall and precision on reentrancy benchmarks and real-world exploits.

OverrideFuzz: Semantic-Aware Grammar Fuzzing for Script-Runtime Vulnerabilities

cs.CR · 2026-05-12 · conditional · novelty 7.0

OverrideFuzz uses semantic-aware grammar fuzzing with reflection to model override hooks and dynamic rebinding, producing coverage growth and inputs that match known vulnerability patterns on CPython, Lua, and QuickJS without discovering new bugs in the evaluation window.

Your Loss is My Gain: Low Stake Attacks on Liquid Staking Pools

cs.GT · 2026-05-01 · unverdicted · novelty 7.0 · 2 refs

A low-stake adversary can degrade a liquid staking pool's performance via consensus manipulation and profit from the resulting drop in its LST value through application-layer financial positions.

Persistent BitTorrent Trackers

cs.CR · 2025-11-21 · conditional · novelty 7.0

Persistent BitTorrent Trackers use smart contracts and aggregated cryptographic attestations to make reputation verifiable and resilient to tracker shutdowns, with a hybrid signature scheme and authenticated DHT fallback for decentralized access control.

Interpretability Can Be Actionable

cs.LG · 2026-05-11 · conditional · novelty 6.0

Interpretability research should be judged by actionability—the degree to which its insights support concrete decisions and interventions—rather than explanatory power alone.

CuLifter: Lifting GPU Binaries to Typed IR

cs.AR · 2026-04-30 · unverdicted · novelty 6.0

CuLifter recovers types from untyped GPU register files via constraint propagation to lift 99.98% of 24,437 functions across 919 cubins to valid LLVM IR.

citing papers explorer

Showing 21 of 21 citing papers.