


default search action
30th USENIX Security Symposium 2021
- Michael D. Bailey, Rachel Greenstadt:

30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021. USENIX Association 2021, ISBN 978-1-939133-24-3
Usability: Authentication
- Cheng Guo, Brianne Campbell, Apu Kapadia, Michael K. Reiter, Kelly Caine:

Effect of Mood, Location, Trust, and Presence of Others on Video-Based Social Authentication. 1-18 - Mary Theofanos, Yee-Yin Choong, Olivia Murphy:

'Passwords Keep Me Safe' - Understanding What Children Think about Passwords. 19-35 - Katharina Pfeffer, Alexandra Mai, Adrian Dabrowski, Matthias Gusenbauer, Philipp Schindler, Edgar R. Weippl, Michael Franz, Katharina Krombholz:

On the Usability of Authenticity Checks for Hardware Security Tokens. 37-54 - Patricia Arias Cabarcos

, Thilo Habrich, Karen Becker, Christian Becker, Thorsten Strufe:
Inexpensive Brainwave Authentication: New Techniques and Insights on User Acceptance. 55-72 - Hirak Ray, Flynn Wolf, Ravi Kuber, Adam J. Aviv:

Why Older Adults (Don't) Use Password Managers. 73-90 - Leona Lassak, Annika Hildebrandt, Maximilian Golla, Blase Ur:

"It's Stored, Hopefully, on an Encrypted Server": Mitigating Users' Misconceptions About FIDO2 Biometric WebAuthn. 91-108 - Maximilian Golla, Grant Ho, Marika Lohmus, Monica Pulluri, Elissa M. Redmiles:

Driving 2FA Adoption at Scale: Optimizing Two-Factor Authentication Notification Design Patterns. 109-126
Cryptography: Attacks
- Simon Oya, Florian Kerschbaum:

Hiding the Access Pattern is Not Enough: Exploiting Search Pattern Leakage in Searchable Encryption. 127-142 - Marc Damie, Florian Hahn, Andreas Peter:

A Highly Accurate Query-Recovery Attack against Searchable Encryption using Non-Indexed Documents. 143-160 - Mathy Vanhoef:

Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation. 161-178 - David A. Basin, Ralf Sasse, Jorge Toro-Pozo

:
Card Brand Mixup Attack: Bypassing the PIN in non-Visa Cards by Using Them for Visa Transactions. 179-194 - Julia Len, Paul Grubbs, Thomas Ristenpart:

Partitioning Oracle Attacks. 195-212 - Robert Merget, Marcus Brinkmann

, Nimrod Aviram, Juraj Somorovsky, Johannes Mittmann, Jörg Schwenk:
Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E). 213-230 - Thomas Roche, Victor Lomné, Camille Mutschler, Laurent Imbert:

A Side Journey To Titan. 231-248
Embedded Security & SW Sec
- Taegyu Kim, Vireshwar Kumar, Junghwan Rhee, Jizhou Chen, Kyungtae Kim, Chung Hwan Kim, Dongyan Xu, Dave (Jing) Tian:

PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-Metal Embedded Applications. 249-266 - Nils Albartus

, Clemens Nasenberg, Florian Stolz, Marc Fyrbiak, Christof Paar, Russell Tessier:
On the Design and Misuse of Microcoded (Embedded) Processors - A Cautionary Note. 267-284 - Arslan Khan, Hyungsub Kim, Byoungyoung Lee, Dongyan Xu, Antonio Bianchi, Dave (Jing) Tian:

M2MON: Building an MMIO-based Security Reference Monitor for Unmanned Vehicles. 285-302 - Libo Chen, Yanhao Wang, Quanpu Cai, Yunfan Zhan, Hong Hu, Jiaqi Linghu, Qinsheng Hou, Chao Zhang, Haixin Duan, Zhi Xue:

Sharing More and Checking Less: Leveraging Common Input Keywords to Detect Bugs in Embedded Systems. 303-319 - Evan Johnson, Maxwell Bland, Yifei Zhu, Joshua Mason, Stephen Checkoway, Stefan Savage, Kirill Levchenko:

Jetset: Targeted Firmware Rehosting for Embedded Systems. 321-338 - Jianliang Wu

, Ruoyu Wu, Daniele Antonioli, Mathias Payer, Nils Ole Tippenhauer, Dongyan Xu, Dave (Jing) Tian, Antonio Bianchi:
LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks. 339-356 - Hans Liljestrand, Thomas Nyman, Lachlan J. Gunn, Jan-Erik Ekberg, N. Asokan:

PACStack: an Authenticated Call Stack. 357-374
Usable Security and Privacy: User Perspectives
- Allison McDonald, Catherine Barwulor, Michelle L. Mazurek, Florian Schaub, Elissa M. Redmiles:

"It's stressful having all these phones": Investigating Sex Workers' Safety Goals, Risks, and Practices Online. 375-392 - Peter Mayer, Yixin Zou, Florian Schaub, Adam J. Aviv

:
"Now I'm a bit angry: " Individuals' Awareness, Perception, and Responses to Data Breaches that Affected Them. 393-410 - Julie M. Haney, Yasemin Acar, Susanne Furman:

"It's the Company, the Government, You and I": User Perceptions of Responsibility for Smart Home Privacy and Security. 411-428 - Yixin Zou, Allison McDonald, Julia Narakornpichit, Nicola Dell, Thomas Ristenpart, Kevin A. Roundy, Florian Schaub, Acar Tamersoy:

The Role of Computer Security Customer Support in Helping Survivors of Intimate Partner Violence. 429-446 - Omer Akgul, Wei Bai, Shruti Das, Michelle L. Mazurek:

Evaluating In-Workflow Messages for Improving Mental Models of End-to-End Encryption. 447-464 - Rishabh Khandelwal, Thomas Linden, Hamza Harkous, Kassem Fawaz

:
PriSEC: A Privacy Settings Enforcement Controller. 465-482 - Florian M. Farke, David G. Balash, Maximilian Golla, Markus Dürmuth, Adam J. Aviv

:
Are Privacy Dashboards Good for End Users? Evaluating User Perceptions and Reactions to Google's My Activity. 483-500
Cryptographic Proof Systems, Analysis, and Applications
- Chenkai Weng, Kang Yang, Xiang Xie, Jonathan Katz, Xiao Wang:

Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications to Machine Learning. 501-518 - Lorenzo Grassi

, Dmitry Khovratovich, Christian Rechberger, Arnab Roy
, Markus Schofnegger:
Poseidon: A New Hash Function for Zero-Knowledge Proof Systems. 519-535 - Gaspard Anthoine, Jean-Guillaume Dumas, Mélanie de Jonghe, Aude Maignan, Clément Pernet, Michael Hanling, Daniel S. Roche:

Dynamic proofs of retrievability with low server storage. 537-554 - Carlo Meijer, Veelasha Moonsamy, Jos Wetzels:

Where's Crypto?: Automated Identification and Classification of Proprietary Cryptographic Primitives in Binary Code. 555-572 - Mohit Kumar Jangid, Guoxing Chen, Yinqian Zhang, Zhiqiang Lin:

Towards Formal Verification of State Continuity for Enclave Programs. 573-590 - Sarah Scheffler, Mayank Varia:

Protecting Cryptography Against Compelled Self-Incrimination. 591-608 - Fatemah Alharbi, Arwa Alrawais, Abdulrahman Bin Rabiah, Silas Richelson

, Nael B. Abu-Ghazaleh:
CSProp: Ciphertext and Signature Propagation Low-Overhead Public-Key Cryptosystem for IoT Environments. 609-626
Hardware Side Channel Attacks
- Thilo Krachenfels, Tuba Kiyan, Shahin Tajik

, Jean-Pierre Seifert:
Automatic Extraction of Secrets from the Transistor Jungle using Laser-Assisted Side-Channel Attacks. 627-644 - Riccardo Paccagnella, Licheng Luo, Christopher W. Fletcher:

Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical. 645-662 - Ivan Puddu, Moritz Schneider, Miro Haller, Srdjan Capkun:

Frontal Attack: Leaking Control-Flow in SGX via the CPU Frontend. 663-680 - Patrick Cronin, Xing Gao, Chengmo Yang, Haining Wang:

Charger-Surfing: Exploiting a Power Line Side-Channel for Smartphone Information Leakage. 681-698 - Zitai Chen, Georgios Vasilakis, Kit Murdock, Edward Dean, David F. Oswald, Flavio D. Garcia:

VoltPillager: Hardware-based fault injection attacks against Intel SGX Enclaves using the SVID voltage scaling interface. 699-716 - Mengyuan Li, Yinqian Zhang, Huibo Wang, Kang Li, Yueqiang Cheng:

CIPHERLEAKS: Breaking Constant-time Cryptography on AMD SEV via the Ciphertext Side Channel. 717-732 - Paizhuo Chen, Lei Li, Zhice Yang:

Cross-VM and Cross-Processor Covert Channels Exploiting Processor Idle Power Management. 733-750
Permissions and Passwords
- Bingyu Shen, Lili Wei, Chengcheng Xiang, Yudong Wu, Mingyao Shen, Yuanyuan Zhou, Xinxin Jin:

Can Systems Explain Permissions Better? Understanding Users' Misperceptions under Smartphone Runtime Permission Model. 751-768 - Igor Bilogrevic, Balazs Engedy, Judson L. Porter III, Nina Taft, Kamila Hasanbega, Andrew Paseltiner, Hwi Kyoung Lee, Edward Jung, Meggyn Watkins, P. J. McLachlan, Jason James:

"Shhh...be quiet!" Reducing the Unwanted Interruptions of Notification Permission Prompts on Chrome. 769-784 - Yusra Elbitar, Michael Schilling, Trung Tin Nguyen, Michael Backes, Sven Bugiel:

Explanation Beats Context: The Effect of Timing & Rationales on Users' Runtime Permission Decisions. 785-802 - Weicheng Cao, Chunqiu Xia, Sai Teja Peddinti, David Lie, Nina Taft, Lisa M. Austin:

A Large Scale Study of User Behavior, Expectations and Engagement with Android Permissions. 803-820 - Dario Pasquini, Marco Cianfriglia, Giuseppe Ateniese, Massimo Bernaschi:

Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries. 821-838 - Ke Coby Wang, Michael K. Reiter:

Using Amnesia to Detect Credential Database Breaches. 839-855 - Haibo Cheng, Wenting Li, Ping Wang, Chao-Hsien Chu, Kaitai Liang:

Incrementally Updateable Honey Password Vaults. 857-874
Private Computation and Differential Privacy
- Dmitry Kogan, Henry Corrigan-Gibbs:

Private Blocklist Lookups with Checklist. 875-892 - Anunay Kulshrestha, Jonathan R. Mayer:

Identifying Harmful Media in End-to-End Encrypted Communication: Efficient Private Membership Computation. 893-910 - Erkam Uzun, Simon P. Chung, Vladimir Kolesnikov, Alexandra Boldyreva, Wenke Lee:

Fuzzy Labeled Private Set Intersection with Applications to Private Real-Time Biometric Search. 911-928 - Zhikun Zhang, Tianhao Wang, Ninghui Li, Jean Honorio

, Michael Backes, Shibo He, Jiming Chen, Yang Zhang:
PrivSyn: Differentially Private Data Synthesis. 929-946 - Xiaoyu Cao, Jinyuan Jia, Neil Zhenqiang Gong:

Data Poisoning Attacks to Local Differential Privacy Protocols. 947-964 - Changhui Hu, Jin Li, Zheli Liu, Xiaojie Guo

, Yu Wei, Xuan Guang, Grigorios Loukides, Changyu Dong:
How to Make Private Distributed Cardinality Estimation Practical, and Get Differential Privacy for Free. 965-982 - Jacob Imola, Takao Murakami, Kamalika Chaudhuri:

Locally Differentially Private Analysis of Graph Statistics. 983-1000
Hardware Security
- Finn de Ridder, Pietro Frigo, Emanuele Vannacci, Herbert Bos, Cristiano Giuffrida, Kaveh Razavi:

SMASH: Synchronized Many-sided Rowhammer Attacks from JavaScript. 1001-1018 - Aria Shahverdi, Mahammad Shirinov, Dana Dachman-Soled:

Database Reconstruction from Noisy Volumes: A Cache Side-Channel Attack on SQLite. 1019-1035 - Reza Mirzazade Farkhani, Mansour Ahmadi, Long Lu:

PTAuth: Temporal Memory Safety via Robust Points-to Authentication. 1037-1054 - Zhaokun Han, Muhammad Yasin, Jeyavijayan (JV) Rajendran:

Does logic locking work with EDA tools? 1055-1072 - Raad Bahmani, Ferdinand Brasser, Ghada Dessouky, Patrick Jauernig, Matthias Klimmek, Ahmad-Reza Sadeghi, Emmanuel Stapf:

CURE: A Security Architecture with CUstomizable and Resilient Enclaves. 1073-1090 - Zhe Tao, Aseem Rastogi, Naman Gupta, Kapil Vaswani, Aditya V. Thakur:

DICE*: A Formally Verified Implementation of DICE Measured Boot. 1091-1107 - Chen Chen, Anrin Chakraborti, Radu Sion:

PEARL: Plausibly Deniable Flash Translation Layer using WOM coding. 1109-1126
Usable Security and Privacy: Institutional Perspectives
- Kimberly Ferguson-Walter, Maxine Major, Chelsea K. Johnson, Daniel H. Muhleman:

Examining the Efficacy of Decoy-based and Psychological Cyber Deception. 1127-1144 - Mohammad Taha Khan, Christopher Tran, Shubham Singh, Dimitri Vasilkov, Chris Kanich, Blase Ur, Elena Zheleva:

Helping Users Automatically Find and Manage Sensitive, Expendable Files in Cloud Storage. 1145-1162 - Ben Kaiser, Jerry Wei, Eli Lucherini, Kevin Lee, J. Nathan Matias, Jonathan R. Mayer:

Adapting Security Warnings to Counter Online Disinformation. 1163-1180 - Sunny Consolvo, Patrick Gage Kelley, Tara Matthews, Kurt Thomas, Lee Dunn, Elie Bursztein:

"Why wouldn't someone think of democracy as a target?": Security practices & challenges of people involved with U.S. political campaigns. 1181-1198 - Flynn Wolf, Adam J. Aviv

, Ravi Kuber:
Security Obstacles and Motivations for Small Businesses from a CISO's Perspective. 1199-1216 - Noel Warford, Collins W. Munyendo, Ashna Mediratta, Adam J. Aviv

, Michelle L. Mazurek:
Strategies and Perceived Risks of Sending Sensitive Documents. 1217-1234 - Nicolas Huaman, Bennet von Skarczinski, Christian Stransky, Dominik Wermke, Yasemin Acar, Arne Dreißigacker, Sascha Fahl

:
A Large-Scale Interview Study on Information Security in and Attacks against Small and Medium-sized Enterprises. 1235-1252
Cryptocurrencies and Smart Contracts
- Muoi Tran, Akshaye Shenoi, Min Suk Kang:

On the Routing-Aware Peering against Network-Eclipse Attacks in Bitcoin. 1253-1270 - Ningyu He, Ruiyi Zhang, Haoyu Wang, Lei Wu, Xiapu Luo, Yao Guo, Ting Yu, Xuxian Jiang:

EOSAFE: Security Analysis of EOSIO Smart Contracts. 1271-1288 - Michael Rodler, Wenting Li, Ghassan O. Karame, Lucas Davi:

EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts. 1289-1306 - Liya Su, Xinyue Shen, Xiangyu Du, Xiaojing Liao, XiaoFeng Wang, Luyi Xing, Baoxu Liu:

Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications. 1307-1324 - Daniel Perez, Benjamin Livshits:

Smart Contract Vulnerabilities: Vulnerable Does Not Imply Exploited. 1325-1341 - Christof Ferreira Torres, Ramiro Camino, Radu State:

Frontrunner Jones and the Raiders of the Dark Forest: An Empirical Study of Frontrunning on the Ethereum Blockchain. 1343-1359 - Sunbeom So, Seongjoon Hong, Hakjoo Oh:

SmarTest: Effectively Hunting Vulnerable Transaction Sequences in Smart Contracts through Language Model-Guided Symbolic Execution. 1361-1378
Hardware Side Channel Defenses
- Gururaj Saileshwar, Moinuddin K. Qureshi:

MIRAGE: Mitigating Conflict-Based Cache Attacks with a Practical Fully-Associative Design. 1379-1396 - Kevin Loughlin, Ian Neal, Jiacheng Ma, Elisa Tsai, Ofir Weisse, Satish Narayanasamy

, Baris Kasikci:
DOLMA: Securing Speculation with the Principle of Transient Non-Observability. 1397-1414 - Daniel Weber, Ahmad Ibrahim, Hamed Nemati

, Michael Schwarz, Christian Rossow:
Osiris: Automated Discovery of Microarchitectural Side Channels. 1415-1432 - Shravan Narayan, Craig Disselkoen, Daniel Moghimi, Sunjay Cauligi, Evan Johnson, Zhao Gang, Anjo Vahldiek-Oberwagner, Ravi Sahita, Hovav Shacham, Dean M. Tullsen, Deian Stefan:

Swivel: Hardening WebAssembly against Spectre. 1433-1450 - Hany Ragab, Enrico Barberis, Herbert Bos, Cristiano Giuffrida:

Rage Against the Machine Clear: A Systematic Analysis of Machine Clears and Their Implications for Transient Execution Attacks. 1451-1468 - Barbara Gigerl, Vedad Hadzic, Robert Primas, Stefan Mangard, Roderick Bloem

:
Coco: Co-Design and Co-Verification of Masked Software Implementations on CPUs. 1469-1468
Machine Learning: Backdoor and Poisoning
- Giorgio Severi, Jim Meyer, Scott E. Coull, Alina Oprea:

Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers. 1487-1504 - Eugene Bagdasaryan, Vitaly Shmatikov:

Blind Backdoors in Deep Learning Models. 1505-1521 - Zhaohan Xi, Ren Pang, Shouling Ji, Ting Wang:

Graph Backdoor. 1523-1540 - Di Tang, XiaoFeng Wang, Haixu Tang, Kehuan Zhang:

Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor Contamination Detection. 1541-1558 - Roei Schuster, Congzheng Song, Eran Tromer, Vitaly Shmatikov:

You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion. 1559-1575 - Nicholas Carlini:

Poisoning the Unlabeled Dataset of Semi-Supervised Learning. 1577-1592 - Jose Rodrigo Sanchez Vicarte, Gang Wang, Christopher W. Fletcher:

Double-Cross Attacks: Subverting Active Learning Systems. 1593-1610
Program Analysis
- Gabriel Ryan, Abhishek Shah, Dongdong She, Koustubha Bhat, Suman Jana:

Fine Grained Dataflow Tracking with Proximal Gradients. 1611-1628 - Jia-Ju Bai, Tuo Li, Kangjie Lu, Shi-Min Hu:

Static Detection of Unsafe DMA Accesses in Device Drivers. 1629-1645 - Yan Wang, Chao Zhang, Zixuan Zhao, Bolun Zhang, Xiaorui Gong, Wei Zou:

MAZE: Towards Automated Heap Feng Shui. 1647-1664 - Sanchuan Chen, Zhiqiang Lin, Yinqian Zhang:

SelectiveTaint: Efficient Data Flow Tracking With Static Binary Rewriting. 1665-1682 - Stefan Nagy

, Anh Nguyen-Tuong, Jason D. Hiser, Jack W. Davidson, Matthew Hicks:
Breaking Through Binaries: Compiler-quality Instrumentation for Better Binary-only Fuzzing. 1683-1700 - Binbin Liu, Junfu Shen, Jiang Ming, Qilong Zheng, Jing Li, Dongpeng Xu:

MBA-Blast: Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation. 1701-1718 - Kaixiang Chen, Chao Zhang, Tingting Yin, Xingman Chen, Lei Zhao:

VScape: Assessing and Escaping Virtual Call Protections. 1719-1736
Privacy Enhancing Technologies
- Paul Schmitt, Barath Raghavan:

Pretty Good Phone Privacy. 1737-1754 - Michael A. Specter, Sunoo Park, Matthew Green:

KeyForge: Non-Attributable Email from Forward-Forgeable Signatures. 1755-1773 - Saba Eskandarian, Henry Corrigan-Gibbs, Matei Zaharia, Dan Boneh:

Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic Privacy. 1775-1792 - Jingjie Li, Amrita Roy Chowdhury, Kassem Fawaz

, Younghyun Kim:
Kalεido: Real-Time Privacy Control for Eye-Tracking Systems. 1793-1810 - Asra Ali, Tancrède Lepoint, Sarvar Patel, Mariana Raykova, Phillipp Schoppmann, Karn Seth, Kevin Yeo:

Communication-Computation Trade-offs in PIR. 1811-1828 - Akash Deep Singh, Luis Garcia, Joseph Noor, Mani B. Srivastava:

I Always Feel Like Somebody's Sensing Me! A Framework to Detect, Identify, and Localize Clandestine Wireless Sensors. 1829-1846 - Cas Cremers, Britta Hale, Konrad Kohbrok:

The Complexities of Healing in Secure Group Messaging: Why Cross-Group Effects Matter. 1847-1864
Machine Learning: Adversarial Examples and Model Extraction
- Giulio Lovisotto, Henry Turner, Ivo Sluganovic, Martin Strohmeier, Ivan Martinovic:

SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations. 1865-1882 - Xian Wu, Wenbo Guo, Hua Wei, Xinyu Xing:

Adversarial Policy Training against Deep Reinforcement Learning. 1883-1900 - Yingzhe He, Guozhu Meng, Kai Chen, Xingbo Hu, Jinwen He:

DRMI: A Dataset Reduction Technology based on Mutual Information for Black-box Attacks. 1901-1918 - Adnan Siraj Rakin, Yukui Luo, Xiaolin Xu, Deliang Fan:

Deep-Dup: An Adversarial Weight Duplication Attack Framework to Crush Deep Neural Network in Multi-Tenant FPGA. 1919-1936 - Hengrui Jia, Christopher A. Choquette-Choo, Varun Chandrasekaran, Nicolas Papernot:

Entangled Watermarks as a Defense against Model Extraction. 1937-1954 - Zhichuang Sun, Ruimin Sun, Long Lu, Alan Mislove:

Mind Your Weight(s): A Large-scale Study on Insufficient Machine Learning Model Protection in Mobile Apps. 1955-1972 - Yuankun Zhu, Yueqiang Cheng, Husheng Zhou, Yantao Lu:

Hermes Attack: Steal DNN Models with Lossless Inference Accuracy. 1973-1988
Automated Security Analysis of Source Code and Binaries
- Carter Yagemann, Matthew Pruett, Simon P. Chung, Kennon Bittick, Brendan Saltaformaggio, Wenke Lee:

ARCUS: Symbolic Root Cause Analysis of Exploits in Production Systems. 1989-2006 - Wei Zhou, Le Guan, Peng Liu, Yuqing Zhang:

Automatic Firmware Emulation through Invalidity-guided Knowledge Inference. 2007-2024 - Mansour Ahmadi, Reza Mirzazade Farkhani, Ryan Williams, Long Lu:

Finding Bugs Using Your Own Code: Detecting Functionally-similar yet Inconsistent Code. 2025-2040 - Qiushi Wu, Aditya Pakki, Navid Emamdoost, Stephen McCamant, Kangjie Lu:

Understanding and Detecting Disordered Error Handling with Precise Function Pairing. 2041-2058 - HyungSeok Han, Andrew Wesie, Brian Pak:

Precise and Scalable Detection of Use-after-Compacting-Garbage-Collection Bugs. 2059-2074 - Xing Zhang, Jiongyi Chen, Chao Feng, Ruilin Li, Yunfei Su, Bin Zhang, Jing Lei, Chaojing Tang:

Reducing Test Cases with Attention Mechanism of Neural Networks. 2075-2092 - Xiaoqin Fu, Haipeng Cai:

FlowDist: Multi-Staged Refinement-Based Dynamic Information Flow Analysis for Distributed Software Systems. 2093-2110
Secure Multiparty Computation
- Sylvain Chatel, Apostolos Pyrgelis, Juan Ramón Troncoso-Pastoriza, Jean-Pierre Hubaux:

Privacy and Integrity Preserving Computations with CRISP. 2111-2128 - Rishabh Poddar, Sukrit Kalra, Avishay Yanai, Ryan Deng, Raluca Ada Popa, Joseph M. Hellerstein:

Senate: A Maliciously-Secure MPC Platform for Collaborative Analytics. 2129-2146 - Lucien K. L. Ng, Sherman S. M. Chow:

GForce: GPU-Friendly Oblivious and Rapid Neural Network Inference. 2147-2164 - Arpita Patra, Thomas Schneider, Ajith Suresh, Hossein Yalame:

ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation. 2165-2182 - Anders P. K. Dalskov, Daniel Escudero, Marcel Keller:

Fantastic Four: Honest-Majority Four-Party Secure Computation With Malicious Security. 2183-2200 - Ryan Lehmkuhl, Pratyush Mishra, Akshayaram Srinivasan, Raluca Ada Popa:

Muse: Secure Inference Resilient to Malicious Clients. 2201-2218 - Jeongseok Son, Griffin Prechter, Rishabh Poddar, Raluca Ada Popa, Koushik Sen:

ObliCheck: Efficient Verification of Oblivious Algorithms with Unobservable State. 2219-2236
Adversarial Machine Learning: Defenses
- Chong Xiang, Arjun Nitin Bhagoji, Vikash Sehwag, Prateek Mittal:

PatchGuard: A Provably Robust Defense against Adversarial Patches via Small Receptive Fields and Masking. 2237-2254 - Ahmadreza Azizi, Ibrahim Asadullah Tahmid, Asim Waheed, Neal Mangaokar, Jiameng Pu, Mobin Javed, Chandan K. Reddy, Bimal Viswanath:

T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-based Text Classification. 2255-2272 - Shehzeen Hussain, Paarth Neekhara, Shlomo Dubnov, Julian J. McAuley, Farinaz Koushanfar:

WaveGuard: Understanding and Mitigating Audio Adversarial Examples. 2273-2290 - Yizheng Chen, Shiqi Wang, Weifan Jiang, Asaf Cidon, Suman Jana:

Cost-Aware Robust Tree Ensembles for Security Applications. 2291-2308 - Thorsten Eisenhofer, Lea Schönherr, Joel Frank, Lars Speckemeier, Dorothea Kolossa, Thorsten Holz:

Dompteur: Taming Audio Adversarial Examples. 2309-2326 - Limin Yang, Wenbo Guo, Qingying Hao, Arridhana Ciptadi, Ali Ahmadzadeh, Xinyu Xing, Gang Wang:

CADE: Detecting and Explaining Concept Drift Samples for Security Applications. 2327-2344 - Xueyuan Han, Xiao Yu, Thomas F. J.-M. Pasquier, Ding Li, Junghwan Rhee, James W. Mickens, Margo I. Seltzer, Haifeng Chen:

SIGL: Securing Software Installations Through Deep Graph Learning. 2345-2362
Operating Systems Security
- Yoochan Lee, Changwoo Min, Byoungyoung Lee:

ExpRace: Exploiting Kernel Races through Raising Interrupts. 2363-2380 - Seyed Mohammadjavad Seyed Talebi, Zhihao Yao, Ardalan Amiri Sani, Zhiyun Qian, Daniel Austin:

Undo Workarounds for Kernel Bugs. 2381-2398 - Ofek Kirzner, Adam Morrison:

An Analysis of Speculative Type Confusion Vulnerabilities in the Wild. 2399-2416 - Man-Ki Yoon, Mengqi Liu, Hao Chen, Jung-Eun Kim, Zhong Shao

:
Blinder: Partition-Oblivious Hierarchical Scheduling. 2417-2434 - Muhammad Abubakar, Adil Ahmad, Pedro Fonseca, Dongyan Xu:

SHARD: Fine-Grained Kernel Specialization with Context-Aware Hardening. 2435-2452 - Brian Wickman, Hong Hu, Insu Yun, Daehee Jang, Jungwon Lim, Sanidhya Kashyap, Taesoo Kim:

Preventing Use-After-Free Attacks with Fast Forward Allocation. 2453-2470 - Xin Tan, Yuan Zhang, Xiyu Yang, Kangjie Lu, Min Yang:

Detecting Kernel Refcount Bugs with Two-Dimensional Consistency Checking. 2471-2488
Web Security 1; Software Security
- Max Maass, Alina Stöver, Henning Pridöhl, Sebastian Bretthauer, Dominik Herrmann, Matthias Hollick, Indra Spiecker:

Effective Notification Campaigns on the Web: A Matter of Trust, Framing, and Support. 2489-2506 - Pierre Laperdrix, Oleksii Starov, Quan Chen, Alexandros Kapravelos, Nick Nikiforakis:

Fingerprinting in Style: Detecting Browser Extensions via Injected Style Sheets. 2507-2524 - Soheil Khodayari, Giancarlo Pellegrino:

JAW: Studying Client-side CSRF with Hybrid Property Graphs and Declarative Traversals. 2525-2542 - Hyunjoo Lee, Jiyeon Lee, Daejun Kim, Suman Jana, Insik Shin, Sooel Son:

AdCube: WebVR Ad Fraud and Practical Confinement of Third-Party Ads. 2543-2560 - Yoshimichi Nakatsuka, Ercan Ozturk, Andrew Paverd, Gene Tsudik:

CACTI: Captcha Avoidance via Client-side TEE Integration. 2561-2578 - Yu Tsung Lee, William Enck, Haining Chen, Hayawardh Vijayakumar, Ninghui Li, Zhiyun Qian, Daimeng Wang, Giuseppe Petracca, Trent Jaeger:

PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack Operations in Android Systems. 2579-2596 - Sergej Schumilo, Cornelius Aschermann, Ali Abbasi, Simon Wörner, Thorsten Holz:

Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types. 2597-2614
Machine Learning: Privacy Issues
- Liwei Song, Prateek Mittal:

Systematic Evaluation of Privacy Risks of Machine Learning Models. 2615-2632 - Nicholas Carlini, Florian Tramèr

, Eric Wallace, Matthew Jagielski, Ariel Herbert-Voss, Katherine Lee, Adam Roberts, Tom B. Brown, Dawn Song, Úlfar Erlingsson, Alina Oprea, Colin Raffel:
Extracting Training Data from Large Language Models. 2633-2650 - Nishat Koti, Mahak Pancholi, Arpita Patra, Ajith Suresh:

SWIFT: Super-fast and Robust Privacy-Preserving Machine Learning. 2651-2668 - Xinlei He, Jinyuan Jia, Michael Backes, Neil Zhenqiang Gong, Yang Zhang:

Stealing Links from Graph Neural Networks. 2669-2686 - Wanrong Zhang, Shruti Tople, Olga Ohrimenko

:
Leakage of Dataset Properties in Multi-Party Machine Learning. 2687-2704 - Milad Nasr, Alireza Bahramali, Amir Houmansadr:

Defeating DNN-Based Traffic Analysis Systems in Real-Time With Blind Adversarial Perturbations. 2705-2722 - Wenting Zheng, Ryan Deng, Weikeng Chen, Raluca Ada Popa, Aurojit Panda, Ion Stoica:

Cerebro: A Platform for Multi-Party Cryptographic Collaborative Learning. 2723-2740
Fuzzing
- Daimeng Wang, Zheng Zhang, Hang Zhang, Zhiyun Qian, Srikanth V. Krishnamurthy, Nael B. Abu-Ghazaleh:

SyzVegas: Beating Kernel Fuzzing Odds with Reinforcement Learning. 2741-2758 - Yousra Aafer, Wei You, Yi Sun, Yu Shi, Xiangyu Zhang, Heng Yin:

Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing. 2759-2776 - Yuwei Li, Shouling Ji, Yuan Chen, Sizhuang Liang, Wei-Han Lee, Yueyao Chen, Chenyang Lyu, Chunming Wu, Raheem Beyah, Peng Cheng, Kangjie Lu, Ting Wang:

UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers. 2777-2794 - Christopher Salls, Chani Jindal, Jake Corina, Christopher Kruegel, Giovanni Vigna:

Token-Level Fuzzing. 2795-2809 - Cen Zhang, Xingwei Lin, Yuekang Li, Yinxing Xue, Jundong Xie, Hongxu Chen, Xinlei Ying, Jiashui Wang, Yang Liu:

APICraft: Fuzz Driver Generation for Closed-source SDK Libraries. 2811-2828 - Andrea Fioraldi, Daniele Cono D'Elia, Davide Balzarotti:

The Use of Likely Invariants as Feedback for Fuzzers. 2829-2846 - Dimitrios Tychalas, Hadjer Benkraouda, Michail Maniatakos:

ICSFuzz: Manipulating I/Os and Repurposing Binary Code to Enable Instrumented Fuzzing in ICS Control Applications. 2847-2862
Web Security 2
- Anatoly Shusterman, Ayush Agarwal, Sioli O'Connell, Daniel Genkin, Yossi Oren, Yuval Yarom:

Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses. 2863-2880 - Alexander Bulekov, Rasoul Jahanshahi, Manuel Egele:

Saphire: Sandboxing PHP Applications with Tailored System Call Allowlists. 2881-2898 - Mohammad M. Ahmadpanah, Daniel Hedin, Musard Balliu, Lars Eric Olsson, Andrei Sabelfeld:

SandTrap: Securing JavaScript-driven Trigger-Action Platforms. 2899-2916 - Marco Squarcina, Mauro Tempesta, Lorenzo Veronese, Stefano Calzavara, Matteo Maffei:

Can I Take Your Subdomain? Exploring Same-Site Attacks in the Modern Web. 2917-2934 - Marius Musch, Martin Johns:

U Can't Debug This: Detecting JavaScript Anti-Debugging Techniques in the Wild. 2935-2950 - Feng Xiao, Jianwei Huang, Yichang Xiong, Guangliang Yang, Hong Hu, Guofei Gu, Wenke Lee:

Abusing Hidden Properties to Attack the Node.js Ecosystem. 2951-2968
Keynote Address
- Susan Landau:

Susan Landau, Tufts University.
Forensics and Diagnostics for Security and Voting
- Yushi Cheng, Xiaoyu Ji, Lixu Wang, Qi Pang, Yi-Chao Chen, Wenyuan Xu:

mID: Tracing Screen Photos via Moiré Patterns. 2969-2986 - Peng Fei, Zhou Li

, Zhiying Wang, Xiao Yu, Ding Li, Kangkook Jee:
SEAL: Storage-efficient Causality Analysis on Enterprise Logs with Query-friendly Compression. 2987-3004 - Abdulellah Alsaheel, Yuhong Nan, Shiqing Ma, Le Yu, Gregory Walkup, Z. Berkay Celik, Xiangyu Zhang, Dongyan Xu:

ATLAS: A Sequence-based Learning Approach for Attack Investigation. 3005-3022 - Hailun Ding, Shenao Yan, Juan Zhai

, Shiqing Ma:
ELISE: A Storage Efficient Logging System Powered by Redundancy Reduction and Representation Learning. 3023-3040 - Seunghoon Woo, Dongwook Lee, Sunghan Park, Heejo Lee, Sven Dietrich:

V0Finder: Discovering the Correct Origin of Publicly Reported Software Vulnerabilities. 3041-3058 - Filip Zagórski, Grant McClearn, Sarah Morin, Neal McBurnett, Poorvi L. Vora:

Minerva- An Efficient Risk-Limiting Ballot Polling Audit. 3059-3076 - Michael A. Specter, J. Alex Halderman:

Security Analysis of the Democracy Live Online Voting System. 3077-3092
Internet and Network Security
- Grant Ho, Mayank Dhiman, Devdatta Akhawe, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David A. Wagner:

Hopper: Modeling and Detecting Lateral Movement. 3093-3110 - Liz Izhikevich, Renata Teixeira, Zakir Durumeric:

LZR: Identifying Unexpected Internet Services. 3111-3128 - William J. Tolley, Beau Kujath, Mohammad Taha Khan, Narseo Vallina-Rodriguez

, Jedidiah R. Crandall:
Blind In/On-Path Attacks and Applications to VPNs. 3129-3146 - Tianxiang Dai, Philipp Jeitner, Haya Schulmann, Michael Waidner:

The Hijackers Guide To The Galaxy: Off-Path Taking Over Internet Resources. 3147-3164 - Philipp Jeitner, Haya Schulmann:

Injection Attacks Reloaded: Tunnelling Malicious Payloads over DNS. 3165-3182 - Benjamin E. Ujcich, Samuel Jero, Richard Skowyra, Adam Bates, William H. Sanders, Hamed Okhravi:

Causal Analysis for Software-Defined Networking Attacks. 3183-3200
Attacks
- Kaiwen Shen, Chuhan Wang

, Minglei Guo, Xiaofeng Zheng, Chaoyi Lu, Baojun Liu, Yuxuan Zhao, Shuang Hao, Haixin Duan, Qingfeng Pan, Min Yang:
Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks. 3201-3217 - Shengtuo Hu, Qi Alfred Chen, Jiachen Sun, Yiheng Feng, Z. Morley Mao, Henry X. Liu:

Automated Discovery of Denial-of-Service Vulnerabilities in Connected Vehicle Protocols. 3219-3236 - Pengfei Jing, Qiyi Tang, Yuefeng Du, Lei Xue, Xiapu Luo, Ting Wang, Sen Nie, Shi Wu:

Too Good to Be Safe: Tricking Lane Detection in Autonomous Driving with Crafted Perturbations. 3237-3254 - Soundarya Ramesh, Rui Xiao, Anindya Maiti, Jong Taek Lee, Harini Ramprasad, Ananda Kumar, Murtuza Jadliwala, Jun Han:

Acoustics to the Rescue: Physical Key Inference Attack Revisited. 3255-3272 - Jiadong Lou, Xu Yuan, Ning Zhang:

Messy States of Wiring: Vulnerabilities in Emerging Personal Payment Systems. 3273-3289 - Yipeng Gao, Haichang Gao, Sainan Luo, Yang Zi, Shudong Zhang, Wenjie Mao, Ping Wang, Yulong Shen, Jeff Yan:

Research on the Security of Visual Reasoning CAPTCHA. 3291-3308 - Takami Sato, Junjie Shen, Ningfei Wang, Yunhan Jia, Xue Lin, Qi Alfred Chen:

Dirty Road Can Attack: Security of Deep Learning based Automated Lane Centering under Physical-World Attack. 3309-3326
Research on Surveillance and Censorship
- Mingkui Wei:

Domain Shadowing: Leveraging Content Delivery Networks for Robust Blocking-Resistant Communications. 3327-3343 - Kevin Bock, Abdulrahman Alaraj, Yair Fax, Kyle Hurley, Eric Wustrow, Dave Levin:

Weaponizing Middleboxes for TCP Reflected Amplification. 3345-3361 - Martin R. Albrecht, Jorge Blasco, Rikke Bjerg Jensen, Lenka Mareková:

Collective Information Security in Large-Scale Urban Protests: the Case of Hong Kong. 3363-3380 - Nguyen Phong Hoang, Arian Akhavan Niaki, Jakub Dalek, Jeffrey Knockel, Pellaeon Lin, Bill Marczak, Masashi Crete-Nishihata, Phillipa Gill, Michalis Polychronakis:

How Great is the Great Firewall? Measuring China's DNS Censorship. 3381-3398 - Marc B. Rosen, James Parker, Alex J. Malozemoff:

Balboa: Bobbing and Weaving around Network Censorship. 3399-3413 - Rob Jansen, Justin Tracey, Ian Goldberg:

Once is Never Enough: Foundations for Sound Statistical Inference in Tor Network Experimentation. 3415-3432 - Daniel Hugenroth, Martin Kleppmann, Alastair R. Beresford:

Rollercoaster: An Efficient Group-Multicast Scheme for Mix Networks. 3433-3450
Malware and Program Analysis 1
- Binlin Cheng, Jiang Ming, Erika A. Leal, Haotian Zhang, Jianming Fu, Guojun Peng, Jean-Yves Marion:

Obfuscation-Resilient Executable Payload Extraction From Packed Malware. 3451-3468 - Evan Downing, Yisroel Mirsky, Kyuhong Park, Wenke Lee:

DeepReflect: Discovering Malicious Functionality through Binary Reconstruction. 3469-3486 - Erin Avllazagaj, Ziyun Zhu, Leyla Bilge, Davide Balzarotti, Tudor Dumitras:

When Malware Changed Its Mind: An Empirical Study of Variable Program Behaviors in the Real World. 3487-3504 - Omar Alrawi, Charles Lever, Kevin Valakuzhy, Ryan Court, Kevin Z. Snow, Fabian Monrose, Manos Antonakakis:

The Circle Of Life: A Large-Scale Study of The IoT Malware Lifecycle. 3505-3522 - Omar Alrawi, Moses Ike, Matthew Pruett, Ranjita Pai Kasturi, Srimanta Barua, Taleb Hirani, Brennan Hill, Brendan Saltaformaggio:

Forecasting Malware Capabilities From Cyber Attack Memory Images. 3523-3540 - Michael Brengel, Christian Rossow:

YARIX: Scalable YARA-based Malware Intelligence. 3541-3558 - Gwangmu Lee, Woochul Shim, Byoungyoung Lee:

Constraint-guided Directed Greybox Fuzzing. 3559-3576
Mobile System Security and Privacy
- Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, Christian Weinert:

PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop. 3577-3594 - Yuchen Wang, Zhenfeng Zhang, Yongquan Xie:

Privacy-Preserving and Standard-Compatible AKA Protocol for 5G. 3595-3612 - Matthew Rossi, Dario Facchinetti, Enrico Bacis, Marco Rosa, Stefano Paraboschi:

SEApp: Bringing Mandatory Access Control to Android Apps. 3613-3630 - Jie Huang, Michael Backes, Sven Bugiel:

A11y and Privacy don't have to be mutually exclusive: Constraining Accessibility Service Misuse on Android. 3631-3648 - Zheng Zhang, Hang Zhang, Zhiyun Qian, Billy Lau:

An Investigation of the Android Kernel Patch Ecosystem. 3649-3666 - Trung Tin Nguyen, Michael Backes, Ninja Marnau, Ben Stock:

Share First, Ask Later (or Never?) Studying Violations of GDPR's Explicit Consent in Android Apps. 3667-3684 - Yuede Ji, Mohamed Elsabagh, Ryan Johnson, Angelos Stavrou:

DEFInit: An Analysis of Exposed Android Init Routines. 3685-3702
Phishing and the Malicious Web
- Ronghai Yang, Xianbo Wang

, Cheng Chi, Dawei Wang, Jiawei He, Siming Pang, Wing Cheong Lau:
Scalable Detection of Promotional Website Defacements in Black Hat SEO Campaigns. 3703-3720 - Ravindu De Silva, Mohamed Nabeel, Charith Elvitigala, Issa Khalil, Ting Yu, Chamath Keppitiyagama:

Compromised or Attacker-Owned: A Large Scale Classification and Study of Hosting Domains of Malicious URLs. 3721-3738 - Hang Hu, Steve T. K. Jan, Yang Wang, Gang Wang:

Assessing Browser-level Defense against IDN-based Phishing. 3739-3756 - Hugo L. J. Bijmans, Tim M. Booij, Anneke Schwedersky, Aria Nedgabat, Rolf van Wegberg:

Catching Phishers By Their Bait: Investigating the Dutch Phishing Landscape through Phishing Kit Detection. 3757-3774 - Bhupendra Acharya, Phani Vadrevu

:
PhishPrint: Evading Phishing Detection Crawlers by Prior Profiling. 3775-3792 - Yun Lin, Ruofan Liu, Dinil Mon Divakaran, Jun Yang Ng, Qing Zhou Chan, Yiwen Lu, Yuxuan Si, Fan Zhang, Jin Song Dong:

Phishpedia: A Hybrid Deep Learning Based Approach to Visually Identify Phishing Webpages. 3793-3810 - Enis Ulqinaku, Hala Assal, AbdelRahman Abdou, Sonia Chiasson, Srdjan Capkun:

Is Real-time Phishing Eliminated with FIDO? Social Engineering Downgrade Attacks against FIDO Protocols. 3811-3828
DDOS; Wireless Security
- Zaoxing Liu, Hun Namkung, Georgios Nikolaidis, Jeongkeun Lee, Changhoon Kim, Xin Jin, Vladimir Braverman, Minlan Yu, Vyas Sekar:

Jaqen: A High-Performance Switch-Native Approach for Detecting and Mitigating Volumetric DDoS Attacks with Programmable Switches. 3829-3846 - Yeting Li, Zixuan Chen, Jialun Cao, Zhiwu Xu, Qiancheng Peng, Haiming Chen, Liyuan Chen, Shing-Chi Cheung:

ReDoSHunter: A Combined Static and Dynamic Approach for Regular Expression DoS Detection. 3847-3864 - Jiarong Xing, Wenqing Wu, Ang Chen:

Ripple: A Programmable, Decentralized Link-Flooding Defense Against Adaptive Adversaries. 3865-3881 - Soo-Jin Moon, Yucheng Yin, Rahul Anand Sharma, Yifei Yuan, Jonathan M. Spring, Vyas Sekar:

Accurately Measuring Global Risk of Amplification Attacks using AmpMap. 3881-3898 - Nitya Lakshmanan, Nishant Budhdev, Min Suk Kang, Mun Choon Chan, Jun Han:

A Stealthy Location Identification Attack Exploiting Carrier Aggregation in Cellular Networks. 3899-3916 - Milan Stute, Alexander Heinrich, Jannik Lorenz, Matthias Hollick:

Disrupting Continuity of Apple's Wireless Ecosystem Security: New Tracking, DoS, and MitM Attacks on iOS and macOS Through Bluetooth Low Energy, AWDL, and Wi-Fi. 3917-3934 - Shinan Liu, Xiang Cheng, Hanchao Yang, Yuanchao Shu, Xiaoran Weng, Ping Guo, Kexiong Curtis Zeng, Gang Wang, Yaling Yang:

Stars Can Tell: A Robust Method to Defend against GPS Spoofing Attacks using Off-the-shelf Chipset. 3935-3952
Cryptography and the Cloud
- Shih-Wei Li, Xupeng Li, Ronghui Gu, Jason Nieh, John Zhuang Hui:

Formally Verified Memory Protection for a Commodity Multiprocessor Hypervisor. 3953-3970 - Xing Li, Yan Chen, Zhiqiang Lin, Xiao Wang, Jim Hao Chen:

Automatic Policy Generation for Inter-Service Access Control of Microservices. 3971-3988 - Xutong Chen, Hassaan Irshad, Yan Chen, Ashish Gehani, Vinod Yegneswaran:

CLARION: Sound and Clear Provenance Tracking for Microservice Deployments. 3989-4006 - Kotaro Matsuoka, Ryotaro Banno, Naoki Matsumoto, Takashi Sato, Song Bian:

Virtual Secure Platform: A Five-Stage Pipeline Processor over TFHE. 4007-4024 - Min Xu, Armin Namavari, David Cash, Thomas Ristenpart:

Searching Encrypted Data with Size-Locked Indexes. 4025-4042 - Lukas Aumayr, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei:

Blitz: Secure Multi-Hop Payments Without Two-Phase Commits. 4043-4060 - Sivanarayana Gaddam, Atul Luykx, Rohit Sinha, Gaven J. Watson:

Reducing HSM Reliance in Payments through Proxy Re-Encryption. 4061-4078
Measurements of Fraud, Malware, Spam, and Other Abuse
- Jochem van de Laarschot, Rolf van Wegberg:

Risky Business? Investigating the Security Practices of Vendors on an Online Anonymous Market using Ground-Truth Data. 4079-4095 - Teng Xu, Gerard Goossen, Huseyin Kerem Cevahir, Sara Khodeir, Yingyezhe Jin, Frank Li, Shawn Shan, Sagar Patel, David Freeman, Paul Pearce:

Deep Entity Classification: Abusive Account Detection for Online Social Networks. 4097-4114 - Jeremiah Onaolapo, Nektarios Leontiadis, Despoina Magka, Gianluca Stringhini:

SocialHEISTing: Understanding Stolen Facebook Accounts. 4115-4132 - Jice Wang, Yue Xiao, Xueqiang Wang, Yuhong Nan, Luyi Xing, Xiaojing Liao, Jinwei Dong, Nicolás Serrano, Haoran Lu, XiaoFeng Wang, Yuqing Zhang:

Understanding Malicious Cross-library Data Harvesting on Android. 4133-4150 - Maxwell Aliapoulios, Cameron Ballard, Rasika Bhalerao, Tobias Lauinger, Damon McCoy:

Swiped: Analyzing Ground-truth Data of a Marketplace for Stolen Debit and Credit Cards. 4151-4168 - Zhibo Sun, Adam Oest, Penghui Zhang, Carlos E. Rubio-Medrano, Tiffany Bao, Ruoyu Wang, Ziming Zhao, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:

Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service. 4169-4186
IoT; Specialty Networking
- Han Zhang, Abhijith Anilkumar, Matt Fredrikson, Yuvraj Agarwal:

Capture: Centralized Library Management for Heterogeneous IoT Devices. 4187-4204 - Qinying Wang

, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Yuhong Kan, Zhaowei Lin, Changting Lin, Shuiguang Deng, Alex X. Liu, Raheem Beyah:
MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols. 4205-4222 - Chenglong Fu, Qiang Zeng, Xiaojiang Du:

HAWatcher: Semantics-Aware Anomaly Detection for Appified Smart Homes. 4223-4240 - Khaled Serag, Rohit Bhatia, Vireshwar Kumar, Z. Berkay Celik, Dongyan Xu:

Exposing New Vulnerabilities of Error Handling Mechanism in CAN. 4241-4258 - Bogdan Groza, Lucian Popa, Pal-Stefan Murvay, Yuval Elovici, Asaf Shabtai:

CANARY - a reactive defense mechanism for Controller Area Networks based on Active RelaYs. 4259-4276 - Benjamin Rothenberger, Konstantin Taranov, Adrian Perrig, Torsten Hoefler:

ReDMArk: Bypassing RDMA Security Mechanisms. 4277-4292
TLS
- Marcus Brinkmann, Christian Dresen, Robert Merget, Damian Poddebniak, Jens Müller, Juraj Somorovsky, Jörg Schwenk, Sebastian Schinzel:

ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS Authentication. 4293-4310 - Henry Birge-Lee, Liang Wang, Daniel McCarney, Roland Shoemaker, Jennifer Rexford, Prateek Mittal:

Experiences Deploying Multi-Vantage-Point Domain Validation at Let's Encrypt. 4311-4327 - Tianyu Cui

, Gaopeng Gou, Gang Xiong, Zhen Li, Mingxin Cui, Chang Liu:
SiamHAN: IPv6 Address Correlation Attacks on TLS Encrypted Traffic via Siamese Heterogeneous Graph Attention Network. 4329-4346 - Marten Oltrogge, Nicolas Huaman, Sabrina Amft

, Yasemin Acar, Michael Backes, Sascha Fahl:
Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications. 4347-4364 - Damian Poddebniak, Fabian Ising, Hanno Böck, Sebastian Schinzel:

Why TLS is better without STARTTLS: A Security Analysis of STARTTLS in the Email Context. 4365-4382 - Zane Ma, Joshua Mason, Manos Antonakakis, Zakir Durumeric, Michael D. Bailey:

What's in a Name? Exploring CA Certificate Control. 4383-4400

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














