


default search action
29th USENIX Security Symposium 2020
- Srdjan Capkun, Franziska Roesner:

29th USENIX Security Symposium, USENIX Security 2020, August 12-14, 2020. USENIX Association 2020, ISBN 978-1-939133-17-5
Wireless Security
- Cas Cremers, Benjamin Kiesl, Niklas Medinger:

A Formal Analysis of IEEE 802.11's WPA2: Countering the Kracks Caused by Cracking the Counters. 1-17 - Jan Ruge, Jiska Classen, Francesco Gringoli, Matthias Hollick:

Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets. 19-36 - Yue Zhang, Jian Weng, Rajib Dey, Yier Jin, Zhiqiang Lin, Xinwen Fu:

Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks. 37-54 - Lingjing Yu, Bo Luo, Jun Ma, Zhaoyu Zhou, Qingyun Liu:

You Are What You Broadcast: Identification of Mobile and IoT Devices from (Public) WiFi. 55-72 - David Rupprecht, Katharina Kohls, Thorsten Holz, Christina Pöpper:

Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE. 73-88
Human Factors
- Elissa M. Redmiles, Noel Warford, Amritha Jayanti, Aravind Koneru, Sean Kross, Miraida Morales, Rock Stevens, Michelle L. Mazurek:

A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web. 89-108 - Daniel Votipka, Kelsey R. Fulton, James Parker, Matthew Hou, Michelle L. Mazurek, Michael Hicks:

Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It. 109-126 - Joshua Reynolds, Nikita Samarin, Joseph D. Barnes, Taylor Judd, Joshua Mason, Michael D. Bailey, Serge Egelman:

Empirical Measurement of Systemic 2FA Usability. 127-143 - Miranda Wei, Madison Stamos, Sophie Veys, Nathan Reitinger, Justin Goodman, Margot Herman, Dorota Filipczuk, Ben Weinshel, Michelle L. Mazurek, Blase Ur:

What Twitter Knows: Characterizing Ad Targeting Practices, User Perceptions, and Ad Explanations Through Users' Own Twitter Data. 145-162 - Alisa Frik, Amelia Haviland, Alessandro Acquisti:

The Impact of Ad-Blockers on Product Search and Purchase Behavior: A Lab Experiment. 163-179
Software Security and Verification
- Sebastian Poeplau, Aurélien Francillon:

Symbolic execution with SymCC: Don't interpret, compile! 181-198 - Fraser Brown, Deian Stefan, Dawson R. Engler:

Sys: A Static/Symbolic Tool for Finding Good Bugs in Good (Browser) Code. 199-216 - Daniel Lehmann, Johannes Kinder, Michael Pradel:

Everything Old is New Again: Binary Security of WebAssembly. 217-234 - Tim Blazytko, Moritz Schlögel, Cornelius Aschermann, Ali Abbasi, Joel Frank, Simon Wörner, Thorsten Holz:

AURORA: Statistical Crash Analysis for Automated Root Cause Explanation. 235-252 - Yan Xiong, Cheng Su, Wenchao Huang, Fuyou Miao, Wansen Wang, Hengyi Ouyang:

SmartVerif: Push the Limit of Automation Capability of Verifying Security Protocols by Dynamic Strategies. 253-270
Mobile 1
- Grant Hernandez, Dave (Jing) Tian, Anurag Swarnim Yadav, Byron J. Williams, Kevin R. B. Butler:

BigMAC: Fine-Grained Policy Analysis of Android Firmware. 271-287 - Charles Weir, Ben Hermann, Sascha Fahl:

From Needs to Actions to Secure Apps? The Effect of Requirements and Developer Practices on App Security. 289-305 - Baozheng Liu, Chao Zhang, Guang Gong, Yishun Zeng, Haifeng Ruan, Jianwei Zhuge:

FANS: Fuzzing Android Native System Services via Automated Interface Analysis. 307-323 - Jiayi Chen, Urs Hengartner, Hassan Khan, Mohammad Mannan:

Chaperone: Real-time Locking and Loss Prevention for Smartphones. 325-342 - Andrea Possemato, Yanick Fratantonio:

Towards HTTPS Everywhere on Android: We Are Not There Yet. 343-360
Phishing, Spam, and Threat Intelligence
- Adam Oest, Penghui Zhang, Brad Wardman, Eric Nunes, Jakub Burgis, Ali Zand, Kurt Thomas, Adam Doupé, Gail-Joon Ahn:

Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale. 361-377 - Adam Oest, Yeganeh Safaei, Penghui Zhang, Brad Wardman, Kevin Tyers, Yan Shoshitaishvili, Adam Doupé:

PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists. 379-396 - Sathvik Prasad, Elijah Robert Bouma-Sims, Athishay Kiran Mylappan, Bradley Reaves:

Who's Calling? Characterizing Robocalls through Audio and Metadata Analysis. 397-414 - Güliz Seray Tuncay, Jingyu Qian, Carl A. Gunter:

See No Evil: Phishing for Permissions with False Transparency. 415-432 - Xander Bouwman, Harm Griffioen, Jelle Egbers, Christian Doerr, Bram Klievink, Michel van Eeten:

A different cup of TI? The added value of commercial threat intelligence. 433-450
Trusted Execution Environments 1
- Ghada Dessouky, Tommaso Frassetto, Ahmad-Reza Sadeghi:

HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments. 451-468 - Daniel Moghimi, Jo Van Bulck, Nadia Heninger, Frank Piessens, Berk Sunar:

CopyCat: Controlled Instruction-Level Attacks on Enclaves. 469-486 - Dayeol Lee, Dongha Jung, Ian T. Fang, Chia-Che Tsai, Raluca Ada Popa:

An Off-Chip Attack on Hardware Enclaves via the Memory Bus. 487-504 - Chia-Che Tsai, Jeongseok Son, Bhushan Jain, John McAvey, Raluca Ada Popa, Donald E. Porter:

Civet: An Efficient Java Partitioning Framework for Hardware Enclaves. 505-522 - Shweta Shinde, Shengyi Wang, Pinghai Yuan, Aquinas Hobor, Abhik Roychoudhury, Prateek Saxena:

BesFS: A POSIX Filesystem for Enclaves with a Mechanized Safety Proof. 523-540
Network Security
- Markus Legner, Tobias Klenze, Marc Wyss, Christoph Sprenger

, Adrian Perrig:
EPIC: Every Packet Is Checked in the Data Plane of a Path-Aware Internet. 541-558 - Amirreza Niakanlahiji, Jinpeng Wei, Md Rabbi Alam, Qingyang Wang, Bei-Tseng Chu:

ShadowMove: A Stealthy Lateral Movement Strategy. 559-576 - Xiaofeng Zheng, Chaoyi Lu, Jian Peng, Qiushi Yang, Dongjie Zhou, Baojun Liu, Keyu Man, Shuang Hao, Haixin Duan, Zhiyun Qian:

Poison Over Troubled Forwarders: A Cache Poisoning Attack Targeting DNS Forwarding Devices. 577-593 - Qiao Kang, Lei Xue, Adam Morrison, Yuxin Tang, Ang Chen, Xiapu Luo:

Programmable In-Network Security for Context-aware BYOD Policies. 595-612 - Hyeonmin Lee, Aniketh Gireesh, Roland van Rijswijk-Deij, Taekyoung Kwon, Taejoong Chung:

A Longitudinal and Comprehensive Study of the DANE Ecosystem in Email. 613-630 - Yehuda Afek, Anat Bremler-Barr, Lior Shafir:

NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities. 631-648
Web Security and Privacy
- Frank Li:

Shim Shimmeny: Evaluating the Security and Privacy Contributions of Link Shimming in the Modern Web. 649-664 - Seyed Ali Mirheidari, Sajjad Arshad, Kaan Onarlioglu, Bruno Crispo, Engin Kirda, William Robertson:

Cached and Confused: Web Cache Deception in the Wild. 665-682 - Stefano Calzavara, Sebastian Roth, Alvise Rabitti, Michael Backes, Ben Stock:

A Tale of Two Headers: A Formal Analysis of Inconsistent Click-Jacking Protection on the Web. 683-697 - Shravan Narayan, Craig Disselkoen, Tal Garfinkel, Nathan Froyd, Eric Rahm, Sorin Lerner, Hovav Shacham, Deian Stefan:

Retrofitting Fine Grain Isolation in the Firefox Renderer. 699-716 - Jiajun Gong, Tao Wang:

Zero-delay Lightweight Defenses against Website Fingerprinting. 717-734 - Stephen Herwig, Christina Garman, Dave Levin:

Achieving Keyless CDNs with Conclaves. 735-751
Trusted Execution Environments 2
- Fabian Schwarz, Christian Rossow:

SENG, the SGX-Enforcing Network Gateway: Authorizing Communication from Shielded Clients. 753-770 - Ivan De Oliveira Nunes, Karim Eldefrawy, Norrathep Rattanavipanon, Gene Tsudik:

APEX: A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise. 771-788 - Lee Harrison, Hayawardh Vijayakumar, Rohan Padhye, Koushik Sen, Michael Grace:

PARTEMU: Enabling Dynamic Analysis of Real-World TrustZone Software Using Emulation. 789-806 - Leila Delshadtehrani, Sadullah Canakci, Boyou Zhou, Schuyler Eldridge, Ajay Joshi, Manuel Egele:

PHMon: A Programmable Hardware Monitor and Its Security Use Cases. 807-824 - Darius Suciu, Stephen E. McLaughlin, Laurent Simon, Radu Sion:

Horizontal Privilege Escalation in Trusted Applications. - Tobias Cloosters, Michael Rodler, Lucas Davi:

TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves. 841-858
Panel
- Avi Rubin:

The 2020 Election: Remote Voting, Disinformation, and Audit.
Automotive and Drone Security
- Mulong Luo, Andrew C. Myers, G. Edward Suh:

Stealthy Tracking of Autonomous Vehicles with Cache Side Channels. 859-876 - Jiachen Sun, Yulong Cao, Qi Alfred Chen, Z. Morley Mao:

Towards Robust LiDAR-based Perception in Autonomous Driving: General Black-box Adversarial Sensor Attack and Countermeasures. 877-894 - Raul Quinonez, Jairo Giraldo, Luis E. Salazar, Erick Bauman, Alvaro A. Cárdenas, Zhiqiang Lin:

SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants. 895-912 - Taegyu Kim, Chung Hwan Kim, Altay Ozen, Fan Fei, Zhan Tu, Xiangyu Zhang, Xinyan Deng, Dave (Jing) Tian, Dongyan Xu:

From Control Model to Program: Investigating Robotic Aerial Vehicle Accidents with MAYDAY. 913-930 - Junjie Shen, Jun Yeon Won, Zeyuan Chen, Qi Alfred Chen:

Drift with Devil: Security of Multi-Sensor Fusion based Localization in High-Level Autonomous Driving under GPS Spoofing. 931-948 - Haohuang Wen, Qi Alfred Chen, Zhiqiang Lin:

Plug-N-Pwned: Comprehensive Vulnerability Analysis of OBD-II Dongles as A New Over-the-Air Attack Surface in Automotive IoT. 949-965
Privacy Enhancing Technologies
- Xiaolan Gu, Ming Li, Yueqiang Cheng, Li Xiong, Yang Cao:

PCKV: Locally Differentially Private Correlated Key-Value Data Collection with Optimized Utility. 967-984 - Benjamin Andow, Samin Yaseer Mahmud, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, Serge Egelman:

Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheck. 985-1002 - Chelsea Komlo, Nick Mathewson, Ian Goldberg:

Walking Onions: Scaling Anonymity Networks while Protecting Users. 1003-1020 - Hailong Zhang, Sufian Latif, Raef Bassily, Atanas Rountev:

Differentially-Private Control-Flow Node Coverage for Software Usage Analysis. 1021-1038 - Rishabh Poddar, Ganesh Ananthanarayanan, Srinath T. V. Setty, Stavros Volos, Raluca Ada Popa:

Visor: Privacy-Preserving Video Analytics as a Cloud Service. 1039-1056 - Katriel Cohn-Gordon, Georgios Damaskinos, Divino Neto, Joshi Cordova, Benoît Reitz, Benjamin Strahs, Daniel Obenshain, Paul Pearce, Ioannis Papagiannis, Available Media:

DELF: Safeguarding deletion correctness in Online Social Networks.
Software Security
- Antonio Flores-Montoya, Eric M. Schulte:

Datalog Disassembly. 1075-1092 - Weiteng Chen, Xiaochen Zou, Guoren Li, Zhiyun Qian:

KOOBE: Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities. 1093-1110 - Insu Yun, Dhaval Kapil, Taesoo Kim:

Automatic Techniques to Systematically Discover New Heap Exploitation Primitives. 1111-1128 - Timothy Nosco, Jared Ziegler, Zechariah Clark, Davy Marrero, Todd Finkler, Andrew Barbarello, W. Michael Petullo:

The Industrial Age of Hacking. 1129-1146 - Jiarun Dai, Yuan Zhang, Zheyue Jiang, Yingtian Zhou, Junyan Chen, Xinyu Xing, Xiaohan Zhang, Xin Tan, Min Yang, Zhemin Yang:

BScout: Direct Whole Patch Presence Test for Java Executables. 1147-1164 - Yang Xiao, Bihuan Chen, Chendong Yu, Zhengzi Xu, Zimu Yuan, Feng Li, Binghong Liu, Yang Liu, Wei Huo, Wei Zou, Wenchang Shi:

MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures. 1165-1182
Embedded/IoT Security
- Bin Yuan, Yan Jia, Luyi Xing, Dongfang Zhao, XiaoFeng Wang, Deqing Zou, Hai Jin, Yuqing Zhang:

Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation. 1183-1200 - Abraham A. Clements, Eric Gustafson, Tobias Scharnowski, Paul Grosen, David Fritz, Christopher Kruegel, Giovanni Vigna, Saurabh Bagchi, Mathias Payer:

HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation. 1201-1218 - Jie Zhou, Yufei Du, Zhuojia Shen, Lele Ma, John Criswell, Robert J. Walls:

Silhouette: Efficient Protected Shadow Stacks for Embedded Systems. 1219-1236 - Bo Feng, Alejandro Mera, Long Lu:

P2IM: Scalable and Hardware-independent Firmware Testing via Automatic Peripheral Interface Modeling. 1237-1254 - Siva Nishok Dhanuskodi, Xiang Li, Daniel E. Holcomb:

COUNTERFOIL: Verifying Provenance of Integrated Circuits using Intrinsic Package Fingerprints and Inexpensive Cameras. 1255-1272 - Anomadarshi Barua, Mohammad Abdullah Al Faruque:

Hall Spoofing: A Non-Invasive DoS Attack on Grid-Tied Solar Inverter. 1273-1290
Machine Learning 1
- Ahmed Salem, Apratim Bhattacharya, Michael Backes, Mario Fritz, Yang Zhang:

Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning. 1291-1308 - Varun Chandrasekaran, Kamalika Chaudhuri, Irene Giacomelli, Somesh Jha, Songbai Yan:

Exploring Connections Between Active Learning and Model Extraction. 1309-1326 - Fnu Suya, Jianfeng Chi, David Evans, Yuan Tian:

Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries. 1327-1344 - Matthew Jagielski, Nicholas Carlini, David Berthelot, Alex Kurakin, Nicolas Papernot:

High Accuracy and High Fidelity Extraction of Neural Networks. 1345-1362 - Erwin Quiring, David Klein, Daniel Arp, Martin Johns, Konrad Rieck:

Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks in Machine Learning. 1363-1380 - Jinfeng Li, Tianyu Du, Shouling Ji, Rong Zhang, Quan Lu, Min Yang, Ting Wang:

TextShield: Robust Text Classification Based on Multimodal Embedding and Neural Machine Translation. 1381-1398
Microarchitectural Attacks
- Md. Mehedi Hasan, Biswajit Ray:

Data Recovery from "Scrubbed" NAND Flash Storage: Need for Analog Sanitization. 1399-1408 - R. Joseph Connor, Tyler McDaniel, Jared M. Smith, Max Schuchard:

PKU Pitfalls: Attacks on PKU-based Memory Isolation Systems. 1409-1426 - Daniel Moghimi, Moritz Lipp, Berk Sunar, Michael Schwarz:

Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis. 1427-1444 - Zijo Kenjar, Tommaso Frassetto, David Gens, Michael Franz, Ahmad-Reza Sadeghi:

V0LTpwn: Attacking x86 Processor Integrity from Software. 1445-1461 - Fan Yao, Adnan Siraj Rakin, Deliang Fan:

DeepHammer: Depleting the Intelligence of Deep Neural Networks through Targeted Chain of Bit Flips. 1463-1480 - Oleksii Oleksenko, Bohdan Trach, Mark Silberstein, Christof Fetzer:

SpecFuzz: Bringing Spectre-type vulnerabilities to the surface. 1481-1498
Panel
- Srdjan Capkun:

Digital Contact Tracing.
Financial Tech and Voting
- Renuka Kumar, Sreesh Kishore, Hao Lu, Atul Prakash

:
Security Analysis of Unified Payments Interface and Payment Apps in India. 1499-1516 - Samin Yaseer Mahmud, Akhil Acharya, Benjamin Andow, William Enck, Bradley Reaves:

Cardpliance: PCI DSS Compliance of Android Applications. 1517-1533 - Michael A. Specter, James Koppel, Daniel J. Weitzner:

The Ballot is Busted Before the Blockchain: A Security Analysis of Voatz, the First Internet Voting Application Used in U.S. Federal Elections. 1535-1553 - Wouter Lueks, Iñigo Querejeta-Azurmendi, Carmela Troncoso:

VoteAgain: A scalable coercion-resistant voting system. 1553-1570 - Zain ul Abi Din, Hari Venugopalan, Jaime Park, Andy Li, Weisu Yin, Haohui Mai, Yong Jae Lee, Steven Liu, Samuel T. King:

Boxer: Preventing fraud by scanning credit cards. 1571-1588
Machine Learning 2
- Shawn Shan, Emily Wenger, Jiayun Zhang, Huiying Li, Haitao Zheng, Ben Y. Zhao:

Fawkes: Protecting Privacy against Unauthorized Deep Learning Models. 1589-1604 - Klas Leino, Matt Fredrikson:

Stolen Memories: Leveraging Model Memorization for Calibrated White-Box Membership Inference. 1605-1622 - Minghong Fang, Xiaoyu Cao, Jinyuan Jia, Neil Zhenqiang Gong:

Local Model Poisoning Attacks to Byzantine-Robust Federated Learning. 1605-1622 - Xudong Pan, Mi Zhang, Duocai Wu, Qifan Xiao, Shouling Ji, Min Yang:

Justinian's GAAvernor: Robust Distributed Learning with Gradient Aggregation Agent. 1641-1658 - Xinyang Zhang, Ningfei Wang, Hua Shen, Shouling Ji, Xiapu Luo, Ting Wang:

Interpretable Deep Learning under Fire. 1659-1676
Systems Security
- David Schrammel, Samuel Weiser, Stefan Steinegger, Martin Schwarzl, Michael Schwarz, Stefan Mangard, Daniel Gruss:

Donky: Domain Keys - Efficient In-Process Isolation for RISC-V and x86. 1677-1694 - Zeyu Mi, Dingji Li, Haibo Chen, Binyu Zang, Haibing Guan:

(Mostly) Exitless VM Protection from Untrusted Hypervisor through Disaggregated Nested Virtualization. 1695-1712 - Jake Christensen, Ionut Mugurel Anghel, Rob Taglang, Mihai Chiroiu, Radu Sion:

DECAF: Automatic, Adaptive De-bloating and Hardening of COTS Firmware. 1713-1730 - Daniel J. Bernstein, Tanja Lange:

McTiny: Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers. 1731-1748 - Seyedhamed Ghavamnia, Tapti Palit, Shachee Mishra, Michalis Polychronakis:

Temporal System Call Specialization for Attack Surface Reduction. 1749-1766
Analysis of Crypto
- Samuel Weiser, David Schrammel, Lukas Bodner, Raphael Spreitzer

:
Big Numbers - Big Troubles: Systematically Analyzing Nonce Leakage in (EC)DSA Implementations. 1767-1784 - Arnis Parsovs:

Estonian Electronic Identity Card: Security Flaws in Key Management. 1785-1802 - Maik Ender, Amir Moradi, Christof Paar:

The Unpatchable Silicon: A Full Break of the Bitstream Encryption of Xilinx 7-Series FPGAs. 1803-1819 - Gabrielle Beck, Maximilian Zinkus, Matthew Green:

Automating the Development of Chosen Ciphertext Attacks. 1821-1837 - Gaëtan Leurent, Thomas Peyrin:

SHA-1 is a Shambles: First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust. 1839-1856 - Guillaume Girol, Lucca Hirschi, Ralf Sasse, Dennis Jackson, Cas Cremers, David A. Basin:

A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols. 1857-1874
Specific User Populations
- Daniel Votipka, Seth M. Rabin, Kristopher K. Micinski, Jeffrey S. Foster, Michelle L. Mazurek:

An Observational Investigation of Reverse Engineers' Processes. 1875-1892 - Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart:

The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums. 1893-1909 - Kasra Edalatnejad, Wouter Lueks, Julien Pierre Martin, Soline Ledésert, Anne L'Hôte, Bruno Thomas, Laurent Girod, Carmela Troncoso:

DatashareNetwork: A Decentralized Privacy-Preserving Search Engine for Investigative Journalists. 1911-1927 - Taslima Akter, Bryan Dosono, Tousif Ahmed, Apu Kapadia, Bryan C. Semaan:

"I am uncomfortable sharing what I can't see": Privacy Concerns of the Visually Impaired with Camera Based Assistive Applications. 1929-1948 - Jake Reichel, Fleming C. Peck, Mikako Inaba, Bisrat Moges, Brahmnoor Singh Chawla, Marshini Chetty:

'I have too much respect for my elders': Understanding South African Mobile Users' Perceptions of Privacy and Current Behaviors on Facebook and WhatsApp. 1949-1966
Side Channel Attacks
- Samira Briongos, Pedro Malagón, José Manuel Moya, Thomas Eisenbarth:

RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks. 1967-1984 - Tom van Goethem, Christina Pöpper, Wouter Joosen, Mathy Vanhoef

:
Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections. 1985-2002 - Mengjia Yan, Christopher W. Fletcher, Josep Torrellas:

Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures. 2003-2020 - Cesar Pereida García, Sohaib ul Hassan, Nicola Tuveri, Iaroslav Gridin, Alejandro Cabrera Aldaya, Billy Bob Brumley

:
Certified Side Channels. 2021-2038 - Jiarong Xing, Qiao Kang, Ang Chen:

NetWarden: Mitigating Network Covert Channels while Preserving Performance. 2039-2056 - Daniel Moghimi, Berk Sunar, Thomas Eisenbarth, Nadia Heninger:

TPM-FAIL: TPM meets Timing and Lattice Attacks. 2057-2073
Implementations of Crypto
- Alex Ozdemir, Riad S. Wahby, Barry Whitehat, Dan Boneh:

Scaling Verifiable Computation Using Efficient Set Accumulators. 2075-2092 - Manu Drijvers, Sergey Gorbunov, Gregory Neven, Hoeteck Wee:

Pixel: Multi-signatures for Consensus. 2093-2110 - Hao Chen, Ilaria Chillotti, Yihe Dong, Oxana Poburinnaya, Ilya P. Razenshteyn, M. Sadegh Riazi:

SANNS: Scaling Up Secure Approximate k-Nearest Neighbors Search. 2111-2128 - Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Dawn Song:

MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs. 2129-2146 - Jonas Böhler, Florian Kerschbaum:

Secure Multi-party Computation of Differentially Private Median. 2147-2164
Authentication
- Sean Oesch, Scott Ruoti

:
That Was Then, This Is Now: A Security Evaluation of Password Generation, Storage, and Autofill in Browser-Based Password Managers. 2165-2182 - Jianjun Chen, Vern Paxson, Jian Jiang:

Composition Kills: A Case Study of Email Sender Authentication. 2183-2199 - Ke Coby Wang, Michael K. Reiter:

Detecting Stuffing of a User's Credentials at Her Own Accounts. 2201-2218 - Cong Wu, Kun He, Jing Chen, Ziming Zhao, Ruiying Du:

Liveness is Not Enough: Enhancing Fingerprint Authentication with Behavioral Biometrics to Defeat Puppet Attacks. 2219-2236 - Mozhgan Azimpourkivi, Umut Topkara, Bogdan Carbunar:

Human Distinguishable Visual Key Fingerprints. 2237-2254
Fuzzing 1
- Peiyuan Zong, Tao Lv, Dawei Wang, Zizhuang Deng, Ruigang Liang, Kai Chen:

FuzzGuard: Filtering out Unreachable Inputs in Directed Grey-box Fuzzing through Deep Learning. 2255-2269 - Kyriakos K. Ispoglou, Daniel Austin, Vishwath Mohan, Mathias Payer:

FuzzGen: Automatic Fuzzer Generation. 2271-2287 - Sebastian Österlund, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida:

ParmeSan: Sanitizer-guided Greybox Fuzzing. 2289-2306 - Tai Yue, Pengfei Wang, Yong Tang, Enze Wang, Bo Yu, Kai Lu, Xu Zhou:

EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed Bandit. 2307-2324 - Hongxu Chen, Shengjian Guo, Yinxing Xue, Yulei Sui, Cen Zhang, Yuekang Li, Haijun Wang, Yang Liu:

MUZZ: Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded Programs. 2325-2342
Mobile 2 and Malware
- Yizheng Chen, Shiqi Wang, Dongdong She, Suman Jana:

On Training Robust PDF Malware Classifiers. 2343-2360 - Shuofei Zhu, Jianjun Shi, Limin Yang, Boqin Qin, Ziyi Zhang, Linhai Song, Gang Wang:

Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines. 2361-2378 - Mohamed Elsabagh, Ryan Johnson, Angelos Stavrou

, Chaoshun Zuo, Qingchuan Zhao, Zhiqiang Lin
:
FIRMSCOPE: Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware. 2379-2396 - Zhengzi Xu, Yulong Zhang, Longri Zheng, Liangzhao Xia, Chenfu Bao, Zhi Wang, Yang Liu:

Automatic Hot Patch Generation for Android Kernels. 2397-2414 - Zhushou Tang, Ke Tang, Minhui Xue, Yuan Tian, Sen Chen, Muhammad Ikram, Tielei Wang, Haojin Zhu:

iOS, Your OS, Everybody's OS: Vetting and Analyzing Network Services of iOS Applications. 2415-2432
Data Security/Secure Computation
- Ioannis Demertzis

, Dimitrios Papadopoulos, Charalampos Papamanthou, Saurabh Shintre:
SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage. 2433-2450 - Paul Grubbs, Anurag Khandelwal, Marie-Sarah Lacharité, Lloyd Brown, Lucy Li, Rachit Agarwal, Thomas Ristenpart:

Pancake: Frequency Smoothing for Encrypted Data Stores. 2451-2468 - Hossein Shafagh, Lukas Burkhalter, Sylvia Ratnasamy, Anwar Hithnawi:

Droplet: Decentralized Authorization and Access Control for Encrypted Data Streams. 2469-2486 - Sahar Mazloom, Phi Hung Le, Samuel Ranellucci, S. Dov Gordon:

Secure parallel computation on national scale volumes of data. 2487-2504 - Pratyush Mishra, Ryan Lehmkuhl, Akshayaram Srinivasan, Wenting Zheng, Raluca Ada Popa:

Delphi: A Cryptographic Inference Service for Neural Networks. 2505-2522
Fuzzing 2
- Paul Fiterau-Brostean, Bengt Jonsson, Robert Merget, Joeri de Ruiter, Konstantinos Sagonas, Juraj Somorovsky:

Analysis of DTLS Implementations Using Protocol State Fuzzing. 2523-2540 - Dokyung Song, Felicitas Hetzelt, Jonghwan Kim, Brent ByungHoon Kang, Jean-Pierre Seifert, Michael Franz:

Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints. 2541-2557 - Hui Peng, Mathias Payer:

USBFuzz: A Framework for Fuzzing USB Drivers by Device Emulation. 2559-2575 - Shuitao Gan, Chao Zhang, Peng Chen, Bodong Zhao, Xiaojun Qin, Dong Wu, Zuoning Chen:

GREYONE: Data Flow Sensitive Fuzzing. 2577-2594 - Zu-Ming Jiang, Jia-Ju Bai, Kangjie Lu, Shi-Min Hu:

Fuzzing Error Handling Code using Context-Sensitive Software Fault Injection. 2595-2612 - Suyoung Lee, HyungSeok Han, Sang Kil Cha, Sooel Son:

Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer. 2613-2630
Voice and Speech
- Takeshi Sugawara, Benjamin Cyr, Sara Rampazzi, Daniel Genkin, Kevin Fu:

Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems. 2631-2648 - Zhixiu Guo, Zijin Lin, Pan Li, Kai Chen:

SkillExplorer: Understanding the Behavior of Skills in Large Scale. 2649-2666 - Yuxuan Chen, Xuejing Yuan, Jiangshan Zhang, Yue Zhao, Shengzhi Zhang, Kai Chen, XiaoFeng Wang:

Devil's Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices. 2667-2684 - Muhammad Ejaz Ahmed, Il-Youp Kwak, Jun Ho Huh, Iljoo Kim, Taekkyung Oh, Hyoungshick Kim:

Void: A fast and light voice liveness detection system. 2685-2702 - Shimaa Ahmed, Amrita Roy Chowdhury, Kassem Fawaz, Parmesh Ramanathan:

Preech: A System for Privacy-Preserving Speech Transcription. 2703-2720
Blockchains
- Harry A. Kalodner, Malte Möser, Kevin Lee, Steven Goldfeder, Martin Plattner, Alishah Chator, Arvind Narayanan:

BlockSci: Design and applications of a blockchain analysis platform. 2721-2738 - Florian Tramèr

, Dan Boneh, Kenny Paterson:
Remote Side-Channel Attacks on Anonymous Transactions. 2739-2756 - Joel Frank, Cornelius Aschermann, Thorsten Holz:

ETHBMC: A Bounded Model Checker for Smart Contracts. 2757-2774 - Mengya Zhang, Xiaokuan Zhang, Yinqian Zhang, Zhiqiang Lin:

TXSPECTOR: Uncovering Attacks in Ethereum from Transactions. 2775-2792 - Shunfan Zhou, Zhemin Yang, Jie Xiang, Yinzhi Cao, Min Yang, Yuan Zhang:

An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem. 2793-2810

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














