


default search action
38th SP 2017: San Jose, CA, USA
- 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017. IEEE Computer Society 2017, ISBN 978-1-5090-5533-3

Session #1: Privacy and Learning
- Reza Shokri

, Marco Stronati, Congzheng Song, Vitaly Shmatikov:
Membership Inference Attacks Against Machine Learning Models. 3-18 - Payman Mohassel, Yupeng Zhang:

SecureML: A System for Scalable Privacy-Preserving Machine Learning. 19-38 - Nicholas Carlini, David A. Wagner:

Towards Evaluating the Robustness of Neural Networks. 39-57 - Adam D. Smith, Abhradeep Thakurta, Jalaj Upadhyay:

Is Interaction Necessary for Distributed Private Learning? 58-77 - Mathias Lécuyer, Riley Spahn, Roxana Geambasu, Tzu-Kuo Huang, Siddhartha Sen:

Pyramid: Enhancing Selectivity in Big Data Protection with Count Featurization. 78-95
Session #2: Getting Security Right
- Cormac Herley, Paul C. van Oorschot

:
SoK: Science, Security and the Elusive Goal of Security as a Scientific Pursuit. 99-120 - Felix Fischer, Konstantin Böttinger, Huang Xiao, Christian Stransky, Yasemin Acar, Michael Backes, Sascha Fahl:

Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security. 121-136 - Ruba Abu-Salma, M. Angela Sasse

, Joseph Bonneau, Anastasia Danilova, Alena Naiakshina, Matthew Smith
:
Obstacles to the Adoption of Secure Communication Tools. 137-153 - Yasemin Acar, Michael Backes, Sascha Fahl, Simson L. Garfinkel

, Doowon Kim
, Michelle L. Mazurek, Christian Stransky:
Comparing the Usability of Cryptographic APIs. 154-171 - Benjamin Fuller

, Mayank Varia, Arkady Yerukhimovich, Emily Shen, Ariel Hamlin, Vijay Gadepally, Richard Shay, John Darby Mitchell, Robert K. Cunningham:
SoK: Cryptographically Protected Database Search. 172-191
Session #3: Attacks
- Eyal Ronen, Adi Shamir, Achi-Or Weingarten, Colin O'Flynn:

IoT Goes Nuclear: Creating a ZigBee Chain Reaction. 195-212 - Jens Müller, Vladislav Mladenov, Juraj Somorovsky, Jörg Schwenk:

SoK: Exploiting Network Printers. 213-230 - Moritz Contag, Vector Guo Li, Andre Pawlowski, Felix Domke, Kirill Levchenko, Thorsten Holz

, Stefan Savage:
How They Did It: An Analysis of Emission Defeat Devices in Modern Automobiles. 231-250 - Nethanel Gelernter, Senia Kalma, Bar Magnezi, Hen Porcilan:

The Password Reset MitM Attack. 251-267 - Davide Quarta, Marcello Pogliani

, Mario Polino, Federico Maggi, Andrea Maria Zanchettin, Stefano Zanero
:
An Experimental Security Analysis of an Industrial Robot Controller. 268-286
Session #4: Systems Security and Authentication
- Abraham A. Clements, Naif Saleh Almakhdhub, Khaled Saab, Prashast Srivastava, Jinkyu Koo, Saurabh Bagchi, Mathias Payer:

Protecting Bare-Metal Embedded Systems with Privilege Overlays. 289-303 - Yaohui Chen, Dongli Zhang, Ruowen Wang, Rui Qiao, Ahmed M. Azab, Long Lu, Hayawardh Vijayakumar, Wenbo Shen:

NORAX: Enabling Execute-Only Memory for COTS Binaries on AArch64. 304-319 - Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner:

Securing Augmented Reality Output. 320-337 - Geumhwan Cho

, Jun Ho Huh, Junsung Cho
, Seongyeol Oh, Youngbae Song, Hyoungshick Kim:
SysPal: System-Guided Pattern Locks for Android. 338-356 - Yunpeng Song

, Zhongmin Cai, Zhi-Li Zhang:
Multi-touch Authentication Using Hand Geometry and Behavioral Information. 357-372
Session #5: Bitcoin and Distributed Systems
- Maria Apostolaki, Aviv Zohar, Laurent Vanbever:

Hijacking Bitcoin: Routing Attacks on Cryptocurrencies. 375-392 - Alin Tomescu, Srinivas Devadas:

Catena: Efficient Non-equivocation via Bitcoin. 393-409 - Stephanos Matsumoto, Raphael M. Reischuk:

IKP: Turning a PKI Around with Decentralized Automated Incentives. 410-426 - Paul Pearce, Roya Ensafi, Frank Li, Nick Feamster, Vern Paxson:

Augur: Internet-Wide Detection of Connectivity Disruptions. 427-443 - Ewa Syta

, Philipp Jovanovic, Eleftherios Kokoris-Kogias, Nicolas Gailly, Linus Gasser
, Ismail Khoffi, Michael J. Fischer, Bryan Ford
:
Scalable Bias-Resistant Distributed Randomness. 444-460
Session #6: TLS Session Security
- Antoine Delignat-Lavaud, Cédric Fournet, Markulf Kohlweiss

, Jonathan Protzenko, Aseem Rastogi, Nikhil Swamy, Santiago Zanella-Béguelin
, Karthikeyan Bhargavan, Jianyang Pan, Jean Karim Zinzindohoue:
Implementing and Proving the TLS 1.3 Record Layer. 463-482 - Karthikeyan Bhargavan, Bruno Blanchet, Nadim Kobeissi

:
Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate. 483-502 - Sze Yiu Chau

, Omar Chowdhury, Md. Endadul Hoque
, Huangyi Ge, Aniket Kate, Cristina Nita-Rotaru, Ninghui Li:
SymCerts: Practical Symbolic Execution for Exposing Noncompliance in X.509 Certificate Validation Implementations. 503-520 - Suphannee Sivakorn, George Argyros, Kexin Pei, Angelos D. Keromytis, Suman Jana:

HVLearn: Automated Black-Box Analysis of Hostname Verification in SSL/TLS Implementations. 521-538 - James Larisch, David R. Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo Wilson:

CRLite: A Scalable System for Pushing All TLS Revocations to All Browsers. 539-556
Session #7: Software Security
- Fraser Brown, Shravan Narayan

, Riad S. Wahby, Dawson R. Engler, Ranjit Jhala, Deian Stefan:
Finding and Preventing Bugs in JavaScript Bindings. 559-578 - Junjie Wang, Bihuan Chen, Lei Wei, Yang Liu

:
Skyfire: Data-Driven Seed Generation for Fuzzing. 579-594 - Seulbae Kim

, Seunghoon Woo
, Heejo Lee, Hakjoo Oh:
VUDDY: A Scalable Approach for Vulnerable Code Clone Discovery. 595-614 - Theofilos Petsios, Adrian Tang, Salvatore J. Stolfo, Angelos D. Keromytis, Suman Jana:

NEZHA: Efficient Domain-Independent Differential Testing. 615-632 - Sébastien Bardin

, Robin David, Jean-Yves Marion:
Backward-Bounded DSE: Targeting Infeasibility Questions on Obfuscated Codes. 633-651
Session #8: Information-Flow Channel Security
- Paul Grubbs, Kevin Sekniqi, Vincent Bindschaedler

, Muhammad Naveed, Thomas Ristenpart:
Leakage-Abuse Attacks against Order-Revealing Encryption. 655-672 - Liang Wang, Paul Grubbs, Jiahui Lu, Vincent Bindschaedler

, David Cash, Thomas Ristenpart:
Side-Channel Attacks on Shared Search Indexes. 673-692 - Mathias V. Pedersen, Aslan Askarov:

From Trash to Treasure: Timing-Sensitive Garbage Collection. 693-709 - Van Chan Ngo

, Mario Dehesa-Azuara, Matthew Fredrikson
, Jan Hoffmann:
Verifying and Synthesizing Constant-Resource Implementations with Types. 710-728 - Thomas Bauereiß, Armando Pesenti Gritti, Andrei Popescu

, Franco Raimondi
:
CoSMeDis: A Distributed Social Media Platform with Formally Verified Confidentiality Guarantees. 729-748
Session #9: Underground Economics
- Hao Yang, Xiulin Ma, Kun Du, Zhou Li

, Hai-Xin Duan
, XiaoDong Su, Guang Liu, Zhifeng Geng, Jianping Wu:
How to Learn Klingon without a Dictionary: Detection and Measurement of Black Keywords Used by the Underground Economy. 751-769 - Brown Farinholt, Mohammad Rezaeirad, Paul Pearce, Hitesh Dharmdasani, Haikuo Yin, Stevens Le Blond, Damon McCoy, Kirill Levchenko:

To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild. 770-787 - Chaz Lever, Platon Kotzias, Davide Balzarotti, Juan Caballero, Manos Antonakakis:

A Lustrum of Malware Network Communication: Evolution and Insights. 788-804 - Sumayah A. Alrwais, Xiaojing Liao, Xianghang Mi

, Peng Wang, Xiaofeng Wang, Feng Qian, Raheem A. Beyah
, Damon McCoy:
Under the Shadow of Sunshine: Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider Networks. 805-823 - Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, David Brumley

:
Your Exploit is Mine: Automatic Shellcode Transplant for Remote Exploits. 824-839
Session #10: Cryptography
- Toshinori Araki, Assi Barak, Jun Furukawa

, Tamar Lichter, Yehuda Lindell
, Ariel Nof, Kazuma Ohara
, Adi Watzman, Or Weinstein:
Optimized Honest-Majority MPC for Malicious Adversaries - Breaking the 1 Billion-Gate Per Second Barrier. 843-862 - Yupeng Zhang, Daniel Genkin, Jonathan Katz, Dimitrios Papadopoulos

, Charalampos Papamanthou:
vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases. 863-880 - Ralf Küsters, Daniel Rausch:

A Framework for Universally Composable Diffie-Hellman Key Exchange. 881-900 - Jan Camenisch, Liqun Chen

, Manu Drijvers, Anja Lehmann, David Novick, Rainer Urian:
One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation. 901-920 - Dongpeng Xu

, Jiang Ming, Dinghao Wu:
Cryptographic Function Detection in Obfuscated Binaries via Bit-Precise Symbolic Loop Mapping. 921-937
Session #11: Privacy
- Oleksii Starov, Nick Nikiforakis:

XHOUND: Quantifying the Fingerprintability of Browser Extensions. 941-956 - Michael Backes, Pascal Berrang, Matthias Bieg, Roland Eils

, Carl Herrmann
, Mathias Humbert, Irina Lehmann:
Identifying Personal DNA Methylation Profiles by Genotype Inference. 957-976 - Yixin Sun, Anne Edmundson, Nick Feamster, Mung Chiang, Prateek Mittal:

Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks. 977-992 - Véronique Cortier, Constantin Catalin Dragan

, François Dupressoir
, Benedikt Schmidt, Pierre-Yves Strub, Bogdan Warinschi:
Machine-Checked Proofs of Privacy for Electronic Voting Protocols. 993-1008 - Najmeh Miramirkhani, Mahathi Priya Appini, Nick Nikiforakis, Michalis Polychronakis:

Spotless Sandboxes: Evading Malware Analysis Systems Using Wear-and-Tear Artifacts. 1009-1024
Session #12: Authorization
- Philipp Holzinger, Ben Hermann

, Johannes Lerch, Eric Bodden
, Mira Mezini:
Hardening Java's Access Control by Abolishing Implicit Privilege Elevation. 1027-1040 - Yanick Fratantonio, Chenxiong Qian, Simon P. Chung, Wenke Lee:

Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop. 1041-1057 - Katarzyna Olejnik, Italo Dacosta, Joana Soares Machado, Kévin Huguenin

, Mohammad Emtiyaz Khan, Jean-Pierre Hubaux:
SmarPer: Context-Aware and Automatic Runtime-Permissions for Mobile Devices. 1058-1076 - Primal Wijesekera

, Arjun Baokar, Lynn Tsai, Joel Reardon, Serge Egelman
, David A. Wagner, Konstantin Beznosov:
The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences. 1077-1093 - Paul Marinescu, Chad Parry, Marjori Pomarole, Yuan Tian, Patrick Tague, Ioannis Papagiannis:

IVD: Automatic Learning and Enforcement of Authorization Rules in Online Social Networks. 1094-1109

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














