


default search action
EuroS&P 2021: Vienna, Austria
- IEEE European Symposium on Security and Privacy, EuroS&P 2021, Vienna, Austria, September 6-10, 2021. IEEE 2021, ISBN 978-1-6654-1491-3

- Daniel Votipka, Mary Nicole Dugay Punzalan, Seth M. Rabin, Yla R. Tausczik, Michelle L. Mazurek:

An Investigation of Online Reverse Engineering Community Discussions in the Context of Ghidra. 1-20 - Jay Prakash, Clarice Chua Qing Yu, Tanvi Ravindra Thombre, Andrei Bytes, Mohammed Jubur

, Nitesh Saxena, Lucienne Blessing
, Jianying Zhou, Tony Q. S. Quek
:
Countering Concurrent Login Attacks in "Just Tap" Push-based Authentication: A Redesign and Usability Evaluations. 21-36 - Weijia He

, Valerie Zhao, Olivia Morkved, Sabeeka Siddiqui, Earlence Fernandes, Josiah D. Hester, Blase Ur:
SoK: Context Sensing for Access Control in the Adversarial Home IoT. 37-53 - Benjamin Dowling

, Britta Hale:
Secure Messaging Authentication against Active Man-in-the-Middle Attacks. 54-70 - Prakash Shrestha, Nitesh Saxena, Diksha Shukla

, Vir V. Phoha
:
Press @$@$ to Login: Strong Wearable Second Factor Authentication via Short Memorywise Effortless Typing Gestures. 71-87 - David Galindo

, Jia Liu
, Mihai Ordean
, Jin-Mann Wong
:
Fully Distributed Verifiable Random Functions and their Application to Decentralised Random Beacons. 88-102 - Christof Ferreira Torres

, Antonio Ken Iannillo, Arthur Gervais, Radu State:
ConFuzzius: A Data Dependency-Aware Hybrid Fuzzer for Smart Contracts. 103-119 - Ege Tekiner, Abbas Acar, A. Selcuk Uluagac, Engin Kirda, Ali Aydin Selçuk:

SoK: Cryptojacking Malware. 120-139 - Florian Breuer, Vipul Goyal, Giulio Malavolta

:
Cryptocurrencies with Security Policies and Two-Factor Authentication. 140-158 - Hojjat Aghakhani, Dongyu Meng, Yu-Xiang Wang, Christopher Kruegel, Giovanni Vigna:

Bullseye Polytope: A Scalable Clean-Label Poisoning Attack with Improved Transferability. 159-178 - Xinyang Zhang

, Zheng Zhang, Shouling Ji, Ting Wang:
Trojaning Language Models for Fun and Profit. 179-197 - Luca Pajola

, Mauro Conti
:
Fall of Giants: How popular text-based MLaaS fall against a simple evasion attack. 198-211 - Ilia Shumailov, Yiren Zhao, Daniel Bates, Nicolas Papernot, Robert D. Mullins

, Ross Anderson:
Sponge Examples: Energy-Latency Attacks on Neural Networks. 212-231 - Benjamin Zi Hao Zhao, Aviral Agrawal, Catisha Coburn, Hassan Jameel Asghar

, Raghav Bhaskar, Mohamed Ali Kâafar
, Darren Webb, Peter Dickinson:
On the (In)Feasibility of Attribute Inference Attacks on Machine Learning Models. 232-251 - Levente Csikor, Himanshu Singh, Min Suk Kang, Dinil Mon Divakaran:

Privacy of DNS-over-HTTPS: Requiem for a Dream? 252-271 - Xavier Boyen, Thomas Haines, Johannes Müller:

Epoque: Practical End-to-End Verifiable Post-Quantum-Secure E-Voting. 272-291 - Hongyan Chang

, Reza Shokri:
On the Privacy Risks of Algorithmic Fairness. 292-303 - Raouf Kerkouche, Gergely Ács, Claude Castelluccia, Pierre Genevès:

Compression Boosts Differentially Private Federated Learning. 304-318 - Theodor Schnitzler

, Christina Pöpper
, Markus Dürmuth
, Katharina Kohls:
We Built This Circuit: Exploring Threat Vectors in Circuit Establishment in Tor. 319-336 - Arman Noroozian, Elsa Turcios Rodriguez, Elmer Lastdrager, Takahiro Kasama, Michel van Eeten

, Carlos Gañán:
Can ISPs Help Mitigate IoT Malware? A Longitudinal Study of Broadband ISP Security Efforts. 337-352 - Abhinav Gupta, Aditi Prakash, Nolen Scaife:

Prognosis Negative: Evaluating Real-Time Behavioral Ransomware Detectors. 353-368 - Prashant Hari Narayan Rajput, Esha Sarkar, Dimitrios Tychalas, Michail Maniatakos

:
Remote Non-Intrusive Malware Detection for PLCs based on Chain of Trust Rooted in Hardware. 369-384 - Ruimin Sun

, Alejandro Mera
, Long Lu, David R. Choffnes:
SoK: Attacks on Industrial Control Logic and Formal Verification-Based Defenses. 385-402 - Tugrulcan Elmas

, Rebekah Overdorf, Ahmed Furkan Özkalay, Karl Aberer:
Ephemeral Astroturfing Attacks: The Case of Fake Twitter Trends. 403-422 - Johannes Krupp

, Christian Rossow:
BGPeek-a-Boo: Active BGP-based Traceback for Amplification DDoS Attacks. 423-439 - Mathew Vermeer

, Jonathan West
, Alejandro Cuevas, Shuonan Niu, Nicolas Christin
, Michel van Eeten
, Tobias Fiebig
, Carlos Gañán, Tyler Moore
:
SoK: A Framework for Asset Discovery: Systematizing Advances in Network Measurements for Protecting Organizations. 440-456 - Onur Zungur, Antonio Bianchi, Gianluca Stringhini, Manuel Egele:

AppJitsu: Investigating the Resiliency of Android Applications. 457-471 - Thomas Rokicki, Clémentine Maurice, Pierre Laperdrix:

SoK: In Search of Lost Time: A Review of JavaScript Timers in Browsers. 472-486 - Ghada Dessouky, Ahmad-Reza Sadeghi, Shaza Zeitouni:

SoK: Secure FPGA Multi-Tenancy in the Cloud: Challenges and Opportunities. 487-506 - Monjur Alam, Baki Berkay Yilmaz, Frank Werner, Niels Samwel

, Alenka G. Zajic, Daniel Genkin, Yuval Yarom, Milos Prvulovic:
Nonce@Once: A Single-Trace EM Side Channel Attack on Several Constant-Time Elliptic Curve Implementations in Mobile Platforms. 507-522 - Karthikeyan Bhargavan, Abhishek Bichhawat, Quoc Huy Do, Pedram Hosseyni, Ralf Küsters, Guido Schmitz

, Tim Würtele
:
DY*: A Modular Symbolic Verification Framework for Executable Cryptographic Protocol Code. 523-542 - Mohammad M. Ahmadpanah

, Aslan Askarov, Andrei Sabelfeld:
Nontransitive Policies Transpiled. 543-561 - Yun Shen, Gianluca Stringhini:

ANDRuspex: Leveraging Graph Representation Learning to Predict Harmful App Installations on Mobile Devices. 562-577 - Jehyun Lee, Farren Tang, Pingxiao Ye, Fahim Abbasi, Phil Hay, Dinil Mon Divakaran:

D-Fence: A Flexible, Efficient, and Comprehensive Phishing Email Detection System. 578-597 - Kiavash Satvat, Rigel Gjomemo, V. N. Venkatakrishnan:

Extractor: Extracting Attack Behavior from Threat Reports. 598-615 - M. Caner Tol

, Berk Gülmezoglu, Koray Yurtseven, Berk Sunar:
FastSpec: Scalable Generation and Detection of Spectre Gadgets Using Neural Embeddings. 616-632 - Andrea Mambretti

, Alexandra Sandulescu, Alessandro Sorniotti, William Robertson, Engin Kirda, Anil Kurmus:
Bypassing memory safety mechanisms through speculative control flow hijacks. 633-649 - Markus Bauer

, Christian Rossow:
NoVT: Eliminating C++ Virtual Calls to Mitigate Vtable Hijacking. 650-666 - Hans Winderix

, Jan Tobias Mühlberg
, Frank Piessens:
Compiler-Assisted Hardening of Embedded Software Against Interrupt Latency Side-Channel Attacks. 667-682 - Samira Briongos, Ida Bruhns, Pedro Malagón, Thomas Eisenbarth

, José Manuel Moya
:
Aim, Wait, Shoot: How the CacheSniper Technique Improves Unprivileged Cache Attacks. 683-700 - Tolga Ünlü

, Lynsay A. Shepherd
, Natalie Coull
, Colin McLean:
Poster: Angry Birding: Evaluating Application Exceptions as Attack Canaries. 701-703 - Matthew Hill, Carlos E. Rubio-Medrano, Luis Claramunt, Jaejong Baek

, Gail-Joon Ahn
:
Poster: DyPolDroid: User-Centered Counter-Policies Against Android Permission-Abuse Attacks. 704-706 - Arup Mondal, Yash More, Ruthu Hulikal Rooparaghunath, Debayan Gupta:

Poster: FLATEE: Federated Learning Across Trusted Execution Environments. 707-709 - Duy-Phuc Pham

, Damien Marion
, Annelie Heuser:
Poster: Obfuscation Revealed - Using Electromagnetic Emanation to Identify and Classify Malware. 710-712 - Luis Claramunt, Larissa Pokam Epse, Carlos E. Rubio-Medrano, Jaejong Baek

, Gail-Joon Ahn
:
Poster: Preventing Spatial and Privacy Attacks in Mobile Augmented Reality Technologies. 713-715 - Robin Carpentier

, Iulian Sandu Popa, Nicolas Anciaux:
Poster: Reducing Data Leakage on Personal Data Management Systems. 716-718 - Gregor Langner

, Jerry Andriessen, Gerald Quirchmayr, Steven Furnell, Vittorio Scarano
, Teemu Tokola:
Poster: The Need for a Collaborative Approach to Cyber Security Education. 719-721 - Erik Daniel, Florian Tschorsch:

Poster: Towards Verifiable Mutability for Blockchains. 722-724

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














