


default search action
42nd SP 2021: San Francisco, CA, USA
- 42nd IEEE Symposium on Security and Privacy, SP 2021, San Francisco, CA, USA, 24-27 May 2021. IEEE 2021, ISBN 978-1-7281-8935-2

- James C. Davis

, Francisco Servant
, Dongyoon Lee
:
Using Selective Memoization to Defeat Regular Expression Denial of Service (ReDoS). 1-17 - Jian Xiang, Stephen Chong:

Co-Inflow: Coarse-grained Information Flow Control for Java-like Languages. 18-35 - Yan Lin, Debin Gao:

When Function Signature Recovery Meets Compiler Optimization. 36-52 - Platon Kotzias, Juan Caballero, Leyla Bilge:

How Did That Get In My Phone? Unwanted App Distribution on Android Devices. 53-69 - Rui Li, Wenrui Diao

, Zhou Li, Jianqi Du, Shanqing Guo:
Android Custom Permissions Demystified: From Privilege Escalation to Design Shortcomings. 70-86 - Andrea Possemato, Simone Aonzo

, Davide Balzarotti, Yanick Fratantonio:
Trust, But Verify: A Longitudinal Analysis Of Android OEM Compliance and Customization. 87-102 - Xiaojun Xu, Qi Wang, Huichen Li, Nikita Borisov

, Carl A. Gunter, Bo Li:
Detecting AI Trojans Using Meta Neural Analysis. 103-120 - Sahar Abdelnabi, Mario Fritz:

Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding. 121-140 - Lucas Bourtoule, Varun Chandrasekaran, Christopher A. Choquette-Choo, Hengrui Jia, Adelin Travers, Baiwu Zhang, David Lie, Nicolas Papernot:

Machine Unlearning. 141-159 - Xiaoyu Ji, Yushi Cheng, Yuepeng Zhang, Kai Wang, Chen Yan, Wenyuan Xu, Kevin Fu:

Poltergeist: Acoustic Adversarial Machine Learning against Cameras and Computer Vision. 160-175 - Yulong Cao, Ningfei Wang, Chaowei Xiao, Dawei Yang, Jin Fang, Ruigang Yang, Qi Alfred Chen, Mingyan Liu, Bo Li:

Invisible for both Camera and LiDAR: Security of Multi-Sensor Fusion based Perception in Autonomous Driving Under Physical-World Attacks. 176-194 - Sekar Kulandaivel, Shalabh Jain, Jorge Guajardo, Vyas Sekar:

CANNON: Reliable and Stealthy Remote Shutdown Attacks via Unaltered Automotive Microcontrollers. 195-210 - Daniel W. Woods, Rainer Böhme:

SoK: Quantifying Cyber Risk. 211-228 - Wanzheng Zhu, Hongyu Gong, Rohan Bansal, Zachary Weinberg

, Nicolas Christin
, Giulia Fanti, Suma Bhat
:
Self-Supervised Euphemism Detection and Identification for Content Moderation. 229-246 - Kurt Thomas, Devdatta Akhawe, Michael D. Bailey, Dan Boneh, Elie Bursztein, Sunny Consolvo, Nicola Dell, Zakir Durumeric, Patrick Gage Kelley, Deepak Kumar, Damon McCoy, Sarah Meiklejohn, Thomas Ristenpart, Gianluca Stringhini:

SoK: Hate, Harassment, and the Changing Landscape of Online Abuse. 247-267 - Karen Klein

, Guillermo Pascual-Perez, Michael Walter, Chethan Kamath
, Margarita Capretto, Miguel Cueto
, Ilia Markov, Michelle Yeo
, Joël Alwen, Krzysztof Pietrzak:
Keep the Dirt: Tainted TreeKEM, Adaptively and Actively Secure Continuous Group Key Agreement. 268-284 - Yuncong Hu, Kian Hooshmand, Harika Kalidhindi, Seung Jin Yang, Raluca Ada Popa:

Merkle2: A Low-Latency Transparency Log System. 285-303 - Andreas Hülsing

, Kai-Chun Ning, Peter Schwabe, Florian Weber, Philip R. Zimmermann:
Post-quantum WireGuard. 304-321 - Mingtian Tan, Junpeng Wan, Zhe Zhou, Zhou Li

:
Invisible Probe: Timing Attacks with PCIe Congestion Side-channel. 322-338 - Stephan van Schaik

, Marina Minkin, Andrew Kwong, Daniel Genkin, Yuval Yarom:
CacheOut: Leaking Data on Intel CPUs via Cache Evictions. 339-354 - Moritz Lipp, Andreas Kogler, David F. Oswald

, Michael Schwarz, Catherine Easdon
, Claudio Canella, Daniel Gruss
:
PLATYPUS: Software-based Power Side-Channel Attacks on x86. 355-371 - Alaa Daffalla, Lucy Simko, Tadayoshi Kohno, Alexandru G. Bardas:

Defensive Technology Use by Political Activists During the Sudanese Revolution. 372-390 - Benjamin Bichsel, Samuel Steffen, Ilija Bogunovic, Martin T. Vechev:

DP-Sniper: Black-Box Discovery of Differential Privacy Violations using Classifiers. 391-409 - Nicholas Carlini, Samuel Deng, Sanjam Garg

, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Abhradeep Thakurta, Florian Tramèr
:
Is Private Learning Possible with Instance Encoding? 410-427 - Liyi Zhou, Kaihua Qin

, Christof Ferreira Torres
, Duc Viet Le, Arthur Gervais:
High-Frequency Trading on Decentralized On-Chain Exchanges. 428-445 - Joachim Neu, Ertem Nusret Tas, David Tse:

Ebb-and-Flow Protocols: A Resolution of the Availability-Finality Dilemma. 446-465 - Tyler Crain, Christopher Natoli, Vincent Gramoli:

Red Belly: A Secure, Fair and Scalable Open Blockchain. 466-483 - Nilo Redini, Andrea Continella, Dipanjan Das

, Giulio De Pasquale, Noah Spahn
, Aravind Machiry, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna:
Diane: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices. 484-500 - Yunang Chen, Amrita Roy Chowdhury, Ruizhe Wang, Andrei Sabelfeld, Rahul Chatterjee, Earlence Fernandes:

Data Privacy in Trigger-Action Systems. 501-518 - Pardis Emami Naeini

, Janarth Dheenadhayalan, Yuvraj Agarwal, Lorrie Faith Cranor
:
Which Privacy and Security Attributes Most Impact Consumers' Risk Perception and Willingness to Purchase IoT Devices? 519-536 - David Baelde, Stéphanie Delaune, Charlie Jacomme, Adrien Koutsos

, Solène Moreau:
An Interactive Prover for Protocol Verification in the Computational Model. 537-554 - Jon Stephens

, Kostas Ferles, Benjamin Mariano, Shuvendu K. Lahiri, Isil Dillig:
SmartPulse: Automated Checking of Temporal Properties in Smart Contracts. 555-571 - Miao Yu, Virgil D. Gligor, Limin Jia

:
An I/O Separation Model for Formal Verification of Kernel Implementations. 572-589 - Megan Chen, Carmit Hazay, Yuval Ishai, Yuriy Kashnikov, Daniele Micciancio

, Tarik Riviere, Abhi Shelat, Muthuramakrishnan Venkitasubramaniam
, Ruihan Wang:
Diogenes: Lightweight Scalable RSA Modulus Generation with a Dishonest Majority. 590-607 - Yashvanth Kondi, Bernardo Magri

, Claudio Orlandi, Omer Shlomovits:
Refresh When You Wake Up: Proactive Threshold Wallets with Offline Devices. 608-625 - Silvio Micali, Leonid Reyzin, Georgios Vlachos, Riad S. Wahby, Nickolai Zeldovich:

Compact Certificates of Collective Knowledge. 626-641 - Yongheng Chen, Rui Zhong, Hong Hu, Hangfan Zhang, Yupeng Yang, Dinghao Wu, Wenke Lee:

One Engine to Fuzz 'em All: Generic Language Processor Testing with Semantic Validation. 642-658 - Zhuo Zhang

, Wei You, Guanhong Tao, Yousra Aafer, Xuwei Liu
, Xiangyu Zhang:
StochFuzz: Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting. 659-676 - Jaeseung Choi

, Kangsu Kim, Daejin Lee, Sang Kil Cha:
NtFuzz: Enabling Type-Aware Kernel Fuzzing on Windows with Static Binary Analysis. 677-693 - Guangke Chen

, Sen Chen, Lingling Fan, Xiaoning Du, Zhe Zhao, Fu Song, Yang Liu
:
Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. 694-711 - Hadi Abdullah, Muhammad Sajidur Rahman

, Washington Garcia, Kevin Warren, Anurag Swarnim Yadav, Tom Shrimpton, Patrick Traynor:
Hear "No Evil", See "Kenansville"*: Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems. 712-729 - Hadi Abdullah, Kevin Warren, Vincent Bindschaedler

, Nicolas Papernot, Patrick Traynor:
SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems. 730-747 - Xiuhua Wang, Sherman S. M. Chow

:
Cross-Domain Access Control Encryption: Arbitrary-policy, Constant-size, Efficient. 748-761 - Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai:

Lightweight Techniques for Private Heavy Hitters. 762-776 - Manuel Barbosa, Gilles Barthe, Karthik Bhargavan, Bruno Blanchet, Cas Cremers, Kevin Liao, Bryan Parno:

SoK: Computer-Aided Cryptography. 777-795 - Xueling Zhang, Xiaoyin Wang, Rocky Slavin

, Jianwei Niu:
ConDySTA: Context-Aware Dynamic Supplement to Static Taint Analysis. 796-812 - Zhuo Zhang

, Yapeng Ye
, Wei You, Guanhong Tao, Wen-Chuan Lee, Yonghwi Kwon, Yousra Aafer, Xiangyu Zhang:
OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary. 813-832 - Chengbin Pang, Ruotong Yu, Yaohui Chen, Eric Koskinen, Georgios Portokalidis

, Bing Mao, Jun Xu:
SoK: All You Ever Wanted to Know About x86/x64 Binary Disassembly But Were Afraid to Ask. 833-851 - Subhajit Roy, Justin Hsu, Aws Albarghouthi:

Learning Differentially Private Mechanisms. 852-865 - Milad Nasr, Shuang Song, Abhradeep Thakurta, Nicolas Papernot, Nicholas Carlini:

Adversary Instantiation: Lower Bounds for Differentially Private Machine Learning. 866-882 - Albert Cheu

, Adam D. Smith, Jonathan R. Ullman:
Manipulation Attacks in Local Differential Privacy. 883-900 - Lukas Aumayr, Matteo Maffei, Oguzhan Ersoy, Andreas Erwig, Sebastian Faust, Siavash Riahi, Kristina Hostáková, Pedro Moreno-Sanchez:

Bitcoin-Compatible Virtual Channels. 901-918 - Liyi Zhou, Kaihua Qin

, Antoine Cully, Benjamin Livshits, Arthur Gervais:
On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols. 919-936 - Sri Aravinda Krishnan Thyagarajan

, Giulio Malavolta
:
Lockable Signatures for Blockchains: Scriptless Scripts for All Signatures. 937-954 - Wei Song

, Boya Li, Zihan Xue, Zhenzhen Li, Wenhao Wang, Peng Liu:
Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks! But We Can Fix It. 955-969 - Timothy Trippel, Kang G. Shin, Kevin B. Bush, Matthew Hicks:

Bomberman: Defining and Defeating Hardware Ticking Timebombs at Design-time. 970-986 - Antoon Purnal, Lukas Giner

, Daniel Gruss
, Ingrid Verbauwhede
:
Systematic Analysis of Randomization-based Protected Cache Architectures. 987-1002 - Deevashwer Rathee, Mayank Rathee, Rahul Kranti Kiran Goli, Divya Gupta, Rahul Sharma, Nishanth Chandran, Aseem Rastogi:

SiRnn: A Math Library for Secure RNN Inference. 1003-1020 - Sijun Tan, Brian Knott, Yuan Tian, David J. Wu:

CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU. 1021-1038 - Hengrui Jia, Mohammad Yaghini, Christopher A. Choquette-Choo, Natalie Dullerud, Anvith Thudi, Varun Chandrasekaran, Nicolas Papernot:

Proof-of-Learning: Definitions and Practice. 1039-1056 - Wen-jie Lu

, Zhicong Huang, Cheng Hong
, Yiping Ma, Hunter Qu:
PEGASUS: Bridging Polynomial and Non-polynomial Evaluations in Homomorphic Encryption. 1057-1073 - Chenkai Weng

, Kang Yang, Jonathan Katz, Xiao Wang
:
Wolverine: Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits. 1074-1091 - Alexander Viand

, Patrick Jattke, Anwar Hithnawi:
SoK: Fully Homomorphic Encryption Compilers. 1092-1108 - Penghui Zhang, Adam Oest, Haehyun Cho, Zhibo Sun

, RC Johnson, Brad Wardman, Shaown Sarker, Alexandros Kapravelos, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn
:
CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing. 1109-1124 - Benjamin Eriksson, Giancarlo Pellegrino, Andrei Sabelfeld:

Black Widow: Blackbox Data-driven Web Scanning. 1125-1142 - Umar Iqbal, Steven Englehardt, Zubair Shafiq:

Fingerprinting the Fingerprinters: Learning to Detect Browser Fingerprinting Behaviors. 1143-1161 - Antoine Delignat-Lavaud, Cédric Fournet, Bryan Parno, Jonathan Protzenko, Tahina Ramananandro

, Jay Bosamiya, Joseph Lallemand, Itsaka Rakotonirina, Yi Zhou:
A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer. 1162-1178 - Amit Klein

:
Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More). 1179-1196 - Yi Chen, Yepeng Yao, XiaoFeng Wang, Dandan Xu, Chang Yue, Xiaozhong Liu, Kai Chen, Haixu Tang, Baoxu Liu:

Bookworm Game: Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis. 1197-1214 - Tai D. Nguyen

, Long H. Pham, Jun Sun:
SGUARD: Towards Fixing Vulnerable Smart Contracts Automatically. 1215-1229 - Itay Tsabary, Matan Yechieli, Alex Manuskin, Ittay Eyal:

MAD-HTLC: Because HTLC is Crazy-Cheap to Attack. 1230-1248 - Ethan Cecchetti

, Siqiu Yao, Haobin Ni, Andrew C. Myers:
Compositional Security for Reentrant Applications. 1249-1267 - Daniel Votipka, Eric Zhang, Michelle L. Mazurek:

HackEd: A Pedagogical Analysis of Online Vulnerability Discovery Exercises. 1268-1285 - Jaewon Hur, Suhwan Song

, Dongup Kwon, Eunjin Baek, Jangwoo Kim, Byoungyoung Lee
:
DifuzzRTL: Differential Fuzz Testing to Find CPU Bugs. 1286-1303 - Cheng Shen, Tian Liu, Jun Huang

, Rui Tan:
When LoRa Meets EMR: Electromagnetic Covert Channels Can Be Super Resilient. 1304-1317 - Norbert Ludant, Tien Dang Vo-Huu, Sashank Narain, Guevara Noubir:

Linking Bluetooth LE & Classic and Implications for Privacy-Preserving Bluetooth-Based Protocols. 1318-1331 - Maximilian von Tschirschnitz, Ludwig Peuckert, Fabian Franzen, Jens Grossklags:

Method Confusion Attack on Bluetooth Pairing. 1332-1347 - Deepak Maram

, Harjasleen Malvai, Fan Zhang
, Nerla Jean-Louis, Alexander Frolov, Tyler Kell
, Tyrone Lobban, Christine Moy, Ari Juels, Andrew Miller:
CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability. 1348-1366 - Nicolas Huaman, Sabrina Amft, Marten Oltrogge, Yasemin Acar, Sascha Fahl:

They Would do Better if They Worked Together: The Case of Interaction Problems Between Password Managers and Websites. 1367-1381 - Dario Pasquini, Ankit Gangwal

, Giuseppe Ateniese
, Massimo Bernaschi, Mauro Conti
:
Improving Password Guessing via Representation Learning. 1382-1399 - Ziyang Li, Aravind Machiry, Binghong Chen, Mayur Naik, Ke Wang, Le Song:

ARBITRAR: User-Guided API Misuse Detection. 1400-1415 - Dan Frumin, Robbert Krebbers, Lars Birkedal

:
Compositional Non-Interference for Fine-Grained Concurrent Programs. 1416-1433 - Ben Nassi, Ron Bitton, Ryusuke Masuoka, Asaf Shabtai, Yuval Elovici:

SoK: Security and Privacy in the Age of Commercial Drones. 1434-1451 - Chen Ling, Utkucan Balci, Jeremy Blackburn, Gianluca Stringhini:

A First Look at Zoombombing. 1452-1467 - Yinxi Liu

, Mingxue Zhang, Wei Meng:
Revealer: Detecting and Exploiting Regular Expression Denial-of-Service Vulnerabilities. 1468-1484 - Simon Rohlmann, Vladislav Mladenov

, Christian Mainka
, Jörg Schwenk:
Breaking the Specification: PDF Certification. 1485-1501 - Evgenios M. Kornaropoulos

, Charalampos Papamanthou, Roberto Tamassia
:
Response-Hiding Encrypted Ranges: Revisiting Security via Parametrized Leakage-Abuse Attacks. 1502-1519 - Seny Kamara, Tarik Moataz, Andrew Park, Lucy Qin:

A Decentralized and Encrypted National Gun Registry. 1520-1537 - David Heath, Yibin Yang, David Devecsery, Vladimir Kolesnikov:

Zero Knowledge for Everything and Everyone: Fast ZK Processor with Cached ORAM for ANSI C Programs. 1538-1556 - Frederick Barr-Smith, Xabier Ugarte-Pedrero, Mariano Graziano, Riccardo Spolaor, Ivan Martinovic:

Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land. 1557-1574 - Zhihao Bai, Ke Wang

, Hang Zhu, Yinzhi Cao, Xin Jin:
Runtime Recovery of Web Applications under Zero-Day ReDoS Attacks. 1575-1588 - Xigao Li

, Babak Amin Azad, Amir Rahmati, Nick Nikiforakis:
Good Bot, Bad Bot: Characterizing Automated Browsing Activity. 1589-1605 - Eduardo Blázquez, Sergio Pastrana

, Álvaro Feal, Julien Gamba, Platon Kotzias, Narseo Vallina-Rodriguez
, Juan Tapiador:
Trouble Over-The-Air: An Analysis of FOTA Apps in the Android Ecosystem. 1606-1622 - Zain ul Abi Din, Hari Venugopalan, Henry Lin, Adam Wushensky, Steven Liu, Samuel T. King:

Doing good by fighting fraud: Ethical anti-fraud systems for mobile payments. 1623-1640 - Lei Xue, Hao Zhou

, Xiapu Luo, Yajin Zhou, Yang Shi, Guofei Gu, Fengwei Zhang, Man Ho Au:
Happer: Unpacking Android Apps via a Hardware-Assisted Approach. 1641-1658 - Jacqueline Brendel, Cas Cremers, Dennis Jackson, Mang Zhao:

The Provable Security of Ed25519: Theory and Practice. 1659-1676 - Andreas Hülsing

, Florian Weber:
Epochal Signatures for Deniable Group Chats. 1677-1695 - Cas Cremers, Samed Düzlü

, Rune Fiedler, Marc Fischlin, Christian Janson:
BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures. 1696-1714 - Quan Chen, Peter Snyder, Ben Livshits, Alexandros Kapravelos:

Detecting Filter List Evasion with Event-Loop-Turn Granularity JavaScript Signatures. 1715-1729 - Gertjan Franken

, Tom van Goethem, Wouter Joosen:
Reading Between the Lines: An Extensive Evaluation of the Security and Privacy Implications of EPUB Reading Systems. 1730-1747 - Thomas Haines, Rajeev Goré, Bhavesh Sharma:

Did you mix me? Formally Verifying Verifiable Mix Nets in Electronic Voting. 1748-1765 - David A. Basin, Ralf Sasse, Jorge Toro-Pozo

:
The EMV Standard: Break, Fix, Verify. 1766-1781 - Shih-Wei Li

, Xupeng Li, Ronghui Gu, Jason Nieh
, John Zhuang Hui:
A Secure and Formally Verified Linux KVM Hypervisor. 1782-1799 - Benjamin E. Diamond:

Many-out-of-Many Proofs and Applications to Anonymous Zether. 1800-1817 - Markulf Kohlweiss

, Varun Madathil, Kartik Nayak, Alessandra Scafuro:
On the Anonymity Guarantees of Anonymous Proof-of-Stake Protocols. 1818-1833 - Erkan Tairi

, Pedro Moreno-Sanchez, Matteo Maffei:
A2L: Anonymous Atomic Locks for Scalability in Payment Channel Hubs. 1834-1851 - Hany Ragab

, Alyssa Milburn, Kaveh Razavi, Herbert Bos
, Cristiano Giuffrida
:
CrossTalk: Speculative Data Leaks Across Cores Are Real. 1852-1867 - Marco Guarnieri

, Boris Köpf
, Jan Reineke, Pepe Vila:
Hardware-Software Contracts for Secure Speculation. 1868-1883 - Gilles Barthe, Sunjay Cauligi, Benjamin Grégoire, Adrien Koutsos

, Kevin Liao, Tiago Oliveira
, Swarn Priya
, Tamara Rezk, Peter Schwabe:
High-Assurance Cryptography in the Spectre Era. 1884-1901 - Jiaqi Hong, Xuhua Ding

:
A Novel Dynamic Analysis Infrastructure to Instrument Untrusted Execution Flow Across User-Kernel Spaces. 1902-1918 - Tapti Palit

, Jarin Firose Moon, Fabian Monrose, Michalis Polychronakis
:
DynPTA: Combining Static and Dynamic Analysis for Practical Selective Data Protection. 1919-1937 - Alejandro Mera

, Bo Feng, Long Lu, Engin Kirda:
DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis. 1938-1954 - Thilo Krachenfels

, Fatemeh Ganji, Amir Moradi
, Shahin Tajik
, Jean-Pierre Seifert:
Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model. 1955-1971 - Luca Piccolboni, Giuseppe Di Guglielmo, Luca P. Carloni

, Simha Sethumadhavan:
CRYLOGGER: Detecting Crypto Misuses Dynamically. 1972-1989

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














