


default search action
EuroS&P 2019: Stockholm, Sweden
- IEEE European Symposium on Security and Privacy, EuroS&P 2019, Stockholm, Sweden, June 17-19, 2019. IEEE 2019, ISBN 978-1-7281-1148-3

Smartphones and Embedded Systems
- Ansgar Kellner, Micha Horlboge

, Konrad Rieck, Christian Wressnegger:
False Sense of Security: A Study on the Effectivity of Jailbreak Detection in Banking Apps. 1-14 - Jie Huang, Nataniel P. Borges Jr.

, Sven Bugiel, Michael Backes:
Up-To-Crash: Evaluating Third-Party Library Updatability on Android. 15-30 - Ali Abbasi, Jos Wetzels, Thorsten Holz, Sandro Etalle:

Challenges in Designing Exploit Mitigations for Deeply Embedded Systems. 31-46 - Ke Xu, Yingjiu Li, Robert H. Deng

, Kai Chen, Jiayun Xu:
DroidEvolver: Self-Evolving Android Malware Detection System. 47-62
Programming Languages and Flow Control
- Mathias Vorreiter Pedersen, Stephen Chong:

Programming with Flow-Limited Authorization: Coarser is Better. 63-78 - Marco Guarnieri

, Musard Balliu, Daniel Schoepe, David A. Basin, Andrei Sabelfeld:
Information-Flow Control for Database-Backed Applications. 79-94 - Mustakimur Khandaker

, Abu Naser, Wenqing Liu, Zhi Wang, Yajin Zhou, Yueqiang Cheng:
Adaptive Call-Site Sensitive Control Flow Integrity. 95-110 - Jannik Pewny, Philipp Koppe, Thorsten Holz:

STEROIDS for DOPed Applications: A Compiler for Automated Data-Oriented Programming. 111-126
Trusted Systems
- Jorden Whitefield, Liqun Chen

, Ralf Sasse, Steve A. Schneider
, Helen Treharne
, Stephan Wesemeyer
:
A Symbolic Analysis of ECC-Based Direct Anonymous Attestation. 127-141 - Guoxing Chen, Sanchuan Chen

, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, Ten-Hwang Lai:
SgxPectre: Stealing Intel Secrets from SGX Enclaves Via Speculative Execution. 142-157 - Claudio Soriente

, Ghassan Karame, Wenting Li, Sergey Fedorov:
ReplicaTEE: Enabling Seamless Replication of SGX Enclaves in the Cloud. 158-171
Cryptocurrency, Blockchain and Cybercrime
- Alex Biryukov

, Sergei Tikhomirov:
Deanonymization and Linkability of Cryptocurrency Transactions Based on Network Analysis. 172-184 - Raymond Cheng, Fan Zhang

, Jernej Kos, Warren He, Nicholas Hynes, Noah M. Johnson, Ari Juels, Andrew Miller, Dawn Song:
Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts. 185-200 - Alice Hutchings, Sergio Pastrana

:
Understanding eWhoring. 201-214
Crypto 1: Schemes and Protocols
- Zhen Liu, Guomin Yang

, Duncan S. Wong, Khoa Nguyen
, Huaxiong Wang:
Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key. 215-230 - Benjamin Lipp

, Bruno Blanchet, Karthikeyan Bhargavan:
A Mechanised Cryptographic Proof of the WireGuard Virtual Private Network Protocol. 231-246
More Protocols
- Evgenios M. Kornaropoulos

, Petros Efstathopoulos:
The Case of Adversarial Inputs for Secure Similarity Approximation Protocols. 247-262 - Florian Kohnhäuser, Niklas Büscher, Stefan Katzenbeisser:

A Practical Attestation Protocol for Autonomous Embedded Systems. 263-278 - Eric R. Verheul, Christopher Hicks, Flavio D. Garcia:

IFAL: Issue First Activate Later Certificates for V2X. 279-293 - Olivier Blazy, Angèle Bossuat, Xavier Bultel, Pierre-Alain Fouque

, Cristina Onete
, Elena Pagnin
:
SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting. 294-309
Benchmarking and Modelling
- Erik van der Kouwe

, Gernot Heiser, Dennis Andriesse, Herbert Bos
, Cristiano Giuffrida
:
SoK: Benchmarking Flaws in Systems Security. 310-325 - Orçun Çetin, Carlos Gañán, Lisette Altena, Samaneh Tajalizadehkhoob, Michel van Eeten

:
Tell Me You Fixed It: Evaluating Vulnerability Notifications via Quarantine Networks. 326-339 - Nadim Kobeissi, Georgio Nicolas, Karthikeyan Bhargavan:

Noise Explorer: Fully Automated Modeling and Verification for Arbitrary Noise Protocols. 356-370
Crypto 2: Side Channels and Users
- Akira Takahashi

, Mehdi Tibouchi:
Degenerate Fault Attacks on Elliptic Curve Parameters in OpenSSL. 371-386 - Itsaka Rakotonirina, Boris Köpf:

On Aggregation of Information in Timing Attacks. 387-400 - Sergej Dechand, Alena Naiakshina, Anastasia Danilova, Matthew Smith

:
In Encryption We Don't Trust: The Effect of End-to-End Encryption to the Masses on User Perception. 401-415
Privacy
- Simon Oya, Carmela Troncoso, Fernando Pérez-González:

Rethinking Location Privacy for Unknown Mobility Behaviors. 416-431 - Daniel Kales, Olamide Omolola, Sebastian Ramacher

:
Revisiting User Privacy for Certificate Transparency. 432-447 - Kimmo Järvinen, Helena Leppäkoski

, Elena Simona Lohan
, Philipp Richter, Thomas Schneider
, Oleksandr Tkachenko, Zheng Yang:
PILOT: Practical Privacy-Preserving Indoor Localization Using OuTsourcing. 448-463 - Adrien Koutsos

:
The 5G-AKA Authentication Protocol Privacy. 464-479
Machine Learning
- Jiefeng Chen, Xi Wu, Vaibhav Rastogi, Yingyu Liang, Somesh Jha:

Towards Understanding Limitations of Pixel Discretization Against Adversarial Attacks. 480-495 - Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma, Shardul Tripathi:

EzPC: Programmable and Efficient Secure Two-Party Computation for Machine Learning. 496-511 - Mika Juuti, Sebastian Szyller

, Samuel Marchal
, N. Asokan
:
PRADA: Protecting Against DNN Model Stealing Attacks. 512-527 - Stefano Calzavara

, Mauro Conti
, Riccardo Focardi
, Alvise Rabitti, Gabriele Tolomei:
Mitch: A Machine Learning Approach to the Black-Box Detection of CSRF Vulnerabilities. 528-543
Internet, Passwords and Malware
- Lorenz Schwittmann, Matthäus Wander, Torben Weis:

Domain Impersonation is Feasible: A Study of CA Domain Validation Vulnerabilities. 544-559 - Baojun Liu, Zhou Li

, Peiyuan Zong, Chaoyi Lu
, Hai-Xin Duan, Ying Liu, Sumayah A. Alrwais, XiaoFeng Wang, Shuang Hao, Yaoqi Jia, Yiming Zhang, Kai Chen, Zaifeng Zhang:
TraffickStop: Detecting and Measuring Illicit Traffic Monetization Through Large-Scale DNS Analysis. 560-575 - Stuart E. Schechter, Yuan Tian, Cormac Herley:

StopGuessing: Using Guessed Passwords to Thwart Online Guessing. 576-589 - Walla Sebastian, Christian Rossow:

MALPITY: Automatic Identification and Exploitation of Tarpit Vulnerabilities in Malware. 590-605
Voting
- Sergiu Bursuc, Constantin Catalin Dragan

, Steve Kremer
:
Private Votes on Untrusted Platforms: Models, Attacks and Provable Scheme. 606-620 - Kristjan Krips, Jan Willemson

, Sebastian Värv:
Is Your Vote Overheard? A New Scalable Side-Channel Attack Against Paper Voting. 621-634 - Lucca Hirschi, Cas Cremers:

Improving Automated Symbolic Analysis of Ballot Secrecy for E-Voting Protocols: A Method Based on Sufficient Conditions. 635-650

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














