default search action
30th USENIX Security Symposium 2021
- Michael D. Bailey, Rachel Greenstadt:
30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021. USENIX Association 2021, ISBN 978-1-939133-24-3
Usability: Authentication
- Cheng Guo, Brianne Campbell, Apu Kapadia, Michael K. Reiter, Kelly Caine:
Effect of Mood, Location, Trust, and Presence of Others on Video-Based Social Authentication. 1-18 - Mary Theofanos, Yee-Yin Choong, Olivia Murphy:
'Passwords Keep Me Safe' - Understanding What Children Think about Passwords. 19-35 - Katharina Pfeffer, Alexandra Mai, Adrian Dabrowski, Matthias Gusenbauer, Philipp Schindler, Edgar R. Weippl, Michael Franz, Katharina Krombholz:
On the Usability of Authenticity Checks for Hardware Security Tokens. 37-54 - Patricia Arias Cabarcos, Thilo Habrich, Karen Becker, Christian Becker, Thorsten Strufe:
Inexpensive Brainwave Authentication: New Techniques and Insights on User Acceptance. 55-72 - Hirak Ray, Flynn Wolf, Ravi Kuber, Adam J. Aviv:
Why Older Adults (Don't) Use Password Managers. 73-90 - Leona Lassak, Annika Hildebrandt, Maximilian Golla, Blase Ur:
"It's Stored, Hopefully, on an Encrypted Server": Mitigating Users' Misconceptions About FIDO2 Biometric WebAuthn. 91-108 - Maximilian Golla, Grant Ho, Marika Lohmus, Monica Pulluri, Elissa M. Redmiles:
Driving 2FA Adoption at Scale: Optimizing Two-Factor Authentication Notification Design Patterns. 109-126
Cryptography: Attacks
- Simon Oya, Florian Kerschbaum:
Hiding the Access Pattern is Not Enough: Exploiting Search Pattern Leakage in Searchable Encryption. 127-142 - Marc Damie, Florian Hahn, Andreas Peter:
A Highly Accurate Query-Recovery Attack against Searchable Encryption using Non-Indexed Documents. 143-160 - Mathy Vanhoef:
Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation. 161-178 - David A. Basin, Ralf Sasse, Jorge Toro-Pozo:
Card Brand Mixup Attack: Bypassing the PIN in non-Visa Cards by Using Them for Visa Transactions. 179-194 - Julia Len, Paul Grubbs, Thomas Ristenpart:
Partitioning Oracle Attacks. 195-212 - Robert Merget, Marcus Brinkmann, Nimrod Aviram, Juraj Somorovsky, Johannes Mittmann, Jörg Schwenk:
Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E). 213-230 - Thomas Roche, Victor Lomné, Camille Mutschler, Laurent Imbert:
A Side Journey To Titan. 231-248
Embedded Security & SW Sec
- Taegyu Kim, Vireshwar Kumar, Junghwan Rhee, Jizhou Chen, Kyungtae Kim, Chung Hwan Kim, Dongyan Xu, Dave (Jing) Tian:
PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-Metal Embedded Applications. 249-266 - Nils Albartus, Clemens Nasenberg, Florian Stolz, Marc Fyrbiak, Christof Paar, Russell Tessier:
On the Design and Misuse of Microcoded (Embedded) Processors - A Cautionary Note. 267-284 - Arslan Khan, Hyungsub Kim, Byoungyoung Lee, Dongyan Xu, Antonio Bianchi, Dave (Jing) Tian:
M2MON: Building an MMIO-based Security Reference Monitor for Unmanned Vehicles. 285-302 - Libo Chen, Yanhao Wang, Quanpu Cai, Yunfan Zhan, Hong Hu, Jiaqi Linghu, Qinsheng Hou, Chao Zhang, Haixin Duan, Zhi Xue:
Sharing More and Checking Less: Leveraging Common Input Keywords to Detect Bugs in Embedded Systems. 303-319 - Evan Johnson, Maxwell Bland, Yifei Zhu, Joshua Mason, Stephen Checkoway, Stefan Savage, Kirill Levchenko:
Jetset: Targeted Firmware Rehosting for Embedded Systems. 321-338 - Jianliang Wu, Ruoyu Wu, Daniele Antonioli, Mathias Payer, Nils Ole Tippenhauer, Dongyan Xu, Dave (Jing) Tian, Antonio Bianchi:
LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks. 339-356 - Hans Liljestrand, Thomas Nyman, Lachlan J. Gunn, Jan-Erik Ekberg, N. Asokan:
PACStack: an Authenticated Call Stack. 357-374
Usable Security and Privacy: User Perspectives
- Allison McDonald, Catherine Barwulor, Michelle L. Mazurek, Florian Schaub, Elissa M. Redmiles:
"It's stressful having all these phones": Investigating Sex Workers' Safety Goals, Risks, and Practices Online. 375-392 - Peter Mayer, Yixin Zou, Florian Schaub, Adam J. Aviv:
"Now I'm a bit angry: " Individuals' Awareness, Perception, and Responses to Data Breaches that Affected Them. 393-410 - Julie M. Haney, Yasemin Acar, Susanne Furman:
"It's the Company, the Government, You and I": User Perceptions of Responsibility for Smart Home Privacy and Security. 411-428 - Yixin Zou, Allison McDonald, Julia Narakornpichit, Nicola Dell, Thomas Ristenpart, Kevin A. Roundy, Florian Schaub, Acar Tamersoy:
The Role of Computer Security Customer Support in Helping Survivors of Intimate Partner Violence. 429-446 - Omer Akgul, Wei Bai, Shruti Das, Michelle L. Mazurek:
Evaluating In-Workflow Messages for Improving Mental Models of End-to-End Encryption. 447-464 - Rishabh Khandelwal, Thomas Linden, Hamza Harkous, Kassem Fawaz:
PriSEC: A Privacy Settings Enforcement Controller. 465-482 - Florian M. Farke, David G. Balash, Maximilian Golla, Markus Dürmuth, Adam J. Aviv:
Are Privacy Dashboards Good for End Users? Evaluating User Perceptions and Reactions to Google's My Activity. 483-500
Cryptographic Proof Systems, Analysis, and Applications
- Chenkai Weng, Kang Yang, Xiang Xie, Jonathan Katz, Xiao Wang:
Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications to Machine Learning. 501-518 - Lorenzo Grassi, Dmitry Khovratovich, Christian Rechberger, Arnab Roy, Markus Schofnegger:
Poseidon: A New Hash Function for Zero-Knowledge Proof Systems. 519-535 - Gaspard Anthoine, Jean-Guillaume Dumas, Mélanie de Jonghe, Aude Maignan, Clément Pernet, Michael Hanling, Daniel S. Roche:
Dynamic proofs of retrievability with low server storage. 537-554 - Carlo Meijer, Veelasha Moonsamy, Jos Wetzels:
Where's Crypto?: Automated Identification and Classification of Proprietary Cryptographic Primitives in Binary Code. 555-572 - Mohit Kumar Jangid, Guoxing Chen, Yinqian Zhang, Zhiqiang Lin:
Towards Formal Verification of State Continuity for Enclave Programs. 573-590 - Sarah Scheffler, Mayank Varia:
Protecting Cryptography Against Compelled Self-Incrimination. 591-608 - Fatemah Alharbi, Arwa Alrawais, Abdulrahman Bin Rabiah, Silas Richelson, Nael B. Abu-Ghazaleh:
CSProp: Ciphertext and Signature Propagation Low-Overhead Public-Key Cryptosystem for IoT Environments. 609-626
Hardware Side Channel Attacks
- Thilo Krachenfels, Tuba Kiyan, Shahin Tajik, Jean-Pierre Seifert:
Automatic Extraction of Secrets from the Transistor Jungle using Laser-Assisted Side-Channel Attacks. 627-644 - Riccardo Paccagnella, Licheng Luo, Christopher W. Fletcher:
Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical. 645-662 - Ivan Puddu, Moritz Schneider, Miro Haller, Srdjan Capkun:
Frontal Attack: Leaking Control-Flow in SGX via the CPU Frontend. 663-680 - Patrick Cronin, Xing Gao, Chengmo Yang, Haining Wang:
Charger-Surfing: Exploiting a Power Line Side-Channel for Smartphone Information Leakage. 681-698 - Zitai Chen, Georgios Vasilakis, Kit Murdock, Edward Dean, David F. Oswald, Flavio D. Garcia:
VoltPillager: Hardware-based fault injection attacks against Intel SGX Enclaves using the SVID voltage scaling interface. 699-716 - Mengyuan Li, Yinqian Zhang, Huibo Wang, Kang Li, Yueqiang Cheng:
CIPHERLEAKS: Breaking Constant-time Cryptography on AMD SEV via the Ciphertext Side Channel. 717-732 - Paizhuo Chen, Lei Li, Zhice Yang:
Cross-VM and Cross-Processor Covert Channels Exploiting Processor Idle Power Management. 733-750
Permissions and Passwords
- Bingyu Shen, Lili Wei, Chengcheng Xiang, Yudong Wu, Mingyao Shen, Yuanyuan Zhou, Xinxin Jin:
Can Systems Explain Permissions Better? Understanding Users' Misperceptions under Smartphone Runtime Permission Model. 751-768 - Igor Bilogrevic, Balazs Engedy, Judson L. Porter III, Nina Taft, Kamila Hasanbega, Andrew Paseltiner, Hwi Kyoung Lee, Edward Jung, Meggyn Watkins, P. J. McLachlan, Jason James:
"Shhh...be quiet!" Reducing the Unwanted Interruptions of Notification Permission Prompts on Chrome. 769-784 - Yusra Elbitar, Michael Schilling, Trung Tin Nguyen, Michael Backes, Sven Bugiel:
Explanation Beats Context: The Effect of Timing & Rationales on Users' Runtime Permission Decisions. 785-802 - Weicheng Cao, Chunqiu Xia, Sai Teja Peddinti, David Lie, Nina Taft, Lisa M. Austin:
A Large Scale Study of User Behavior, Expectations and Engagement with Android Permissions. 803-820 - Dario Pasquini, Marco Cianfriglia, Giuseppe Ateniese, Massimo Bernaschi:
Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries. 821-838 - Ke Coby Wang, Michael K. Reiter:
Using Amnesia to Detect Credential Database Breaches. 839-855 - Haibo Cheng, Wenting Li, Ping Wang, Chao-Hsien Chu, Kaitai Liang:
Incrementally Updateable Honey Password Vaults. 857-874
Private Computation and Differential Privacy
- Dmitry Kogan, Henry Corrigan-Gibbs:
Private Blocklist Lookups with Checklist. 875-892 - Anunay Kulshrestha, Jonathan R. Mayer:
Identifying Harmful Media in End-to-End Encrypted Communication: Efficient Private Membership Computation. 893-910 - Erkam Uzun, Simon P. Chung, Vladimir Kolesnikov, Alexandra Boldyreva, Wenke Lee:
Fuzzy Labeled Private Set Intersection with Applications to Private Real-Time Biometric Search. 911-928 - Zhikun Zhang, Tianhao Wang, Ninghui Li, Jean Honorio, Michael Backes, Shibo He, Jiming Chen, Yang Zhang:
PrivSyn: Differentially Private Data Synthesis. 929-946 - Xiaoyu Cao, Jinyuan Jia, Neil Zhenqiang Gong:
Data Poisoning Attacks to Local Differential Privacy Protocols. 947-964 - Changhui Hu, Jin Li, Zheli Liu, Xiaojie Guo, Yu Wei, Xuan Guang, Grigorios Loukides, Changyu Dong:
How to Make Private Distributed Cardinality Estimation Practical, and Get Differential Privacy for Free. 965-982 - Jacob Imola, Takao Murakami, Kamalika Chaudhuri:
Locally Differentially Private Analysis of Graph Statistics. 983-1000
Hardware Security
- Finn de Ridder, Pietro Frigo, Emanuele Vannacci, Herbert Bos, Cristiano Giuffrida, Kaveh Razavi:
SMASH: Synchronized Many-sided Rowhammer Attacks from JavaScript. 1001-1018 - Aria Shahverdi, Mahammad Shirinov, Dana Dachman-Soled:
Database Reconstruction from Noisy Volumes: A Cache Side-Channel Attack on SQLite. 1019-1035 - Reza Mirzazade Farkhani, Mansour Ahmadi, Long Lu:
PTAuth: Temporal Memory Safety via Robust Points-to Authentication. 1037-1054 - Zhaokun Han, Muhammad Yasin, Jeyavijayan (JV) Rajendran:
Does logic locking work with EDA tools? 1055-1072 - Raad Bahmani, Ferdinand Brasser, Ghada Dessouky, Patrick Jauernig, Matthias Klimmek, Ahmad-Reza Sadeghi, Emmanuel Stapf:
CURE: A Security Architecture with CUstomizable and Resilient Enclaves. 1073-1090 - Zhe Tao, Aseem Rastogi, Naman Gupta, Kapil Vaswani, Aditya V. Thakur:
DICE*: A Formally Verified Implementation of DICE Measured Boot. 1091-1107 - Chen Chen, Anrin Chakraborti, Radu Sion:
PEARL: Plausibly Deniable Flash Translation Layer using WOM coding. 1109-1126
Usable Security and Privacy: Institutional Perspectives
- Kimberly Ferguson-Walter, Maxine Major, Chelsea K. Johnson, Daniel H. Muhleman:
Examining the Efficacy of Decoy-based and Psychological Cyber Deception. 1127-1144 - Mohammad Taha Khan, Christopher Tran, Shubham Singh, Dimitri Vasilkov, Chris Kanich, Blase Ur, Elena Zheleva:
Helping Users Automatically Find and Manage Sensitive, Expendable Files in Cloud Storage. 1145-1162 - Ben Kaiser, Jerry Wei, Eli Lucherini, Kevin Lee, J. Nathan Matias, Jonathan R. Mayer:
Adapting Security Warnings to Counter Online Disinformation. 1163-1180 - Sunny Consolvo, Patrick Gage Kelley, Tara Matthews, Kurt Thomas, Lee Dunn, Elie Bursztein:
"Why wouldn't someone think of democracy as a target?": Security practices & challenges of people involved with U.S. political campaigns. 1181-1198 - Flynn Wolf, Adam J. Aviv, Ravi Kuber:
Security Obstacles and Motivations for Small Businesses from a CISO's Perspective. 1199-1216 - Noel Warford, Collins W. Munyendo, Ashna Mediratta, Adam J. Aviv, Michelle L. Mazurek:
Strategies and Perceived Risks of Sending Sensitive Documents. 1217-1234 - Nicolas Huaman, Bennet von Skarczinski, Christian Stransky, Dominik Wermke, Yasemin Acar, Arne Dreißigacker, Sascha Fahl:
A Large-Scale Interview Study on Information Security in and Attacks against Small and Medium-sized Enterprises. 1235-1252
Cryptocurrencies and Smart Contracts
- Muoi Tran, Akshaye Shenoi, Min Suk Kang:
On the Routing-Aware Peering against Network-Eclipse Attacks in Bitcoin. 1253-1270 - Ningyu He, Ruiyi Zhang, Haoyu Wang, Lei Wu, Xiapu Luo, Yao Guo, Ting Yu, Xuxian Jiang:
EOSAFE: Security Analysis of EOSIO Smart Contracts. 1271-1288 - Michael Rodler, Wenting Li, Ghassan O. Karame, Lucas Davi:
EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts. 1289-1306 - Liya Su, Xinyue Shen, Xiangyu Du, Xiaojing Liao, XiaoFeng Wang, Luyi Xing, Baoxu Liu:
Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications. 1307-1324 - Daniel Perez, Benjamin Livshits:
Smart Contract Vulnerabilities: Vulnerable Does Not Imply Exploited. 1325-1341 - Christof Ferreira Torres, Ramiro Camino, Radu State:
Frontrunner Jones and the Raiders of the Dark Forest: An Empirical Study of Frontrunning on the Ethereum Blockchain. 1343-1359 - Sunbeom So, Seongjoon Hong, Hakjoo Oh:
SmarTest: Effectively Hunting Vulnerable Transaction Sequences in Smart Contracts through Language Model-Guided Symbolic Execution. 1361-1378
Hardware Side Channel Defenses
- Gururaj Saileshwar, Moinuddin K. Qureshi:
MIRAGE: Mitigating Conflict-Based Cache Attacks with a Practical Fully-Associative Design. 1379-1396 - Kevin Loughlin, Ian Neal, Jiacheng Ma, Elisa Tsai, Ofir Weisse, Satish Narayanasamy, Baris Kasikci:
DOLMA: Securing Speculation with the Principle of Transient Non-Observability. 1397-1414 - Daniel Weber, Ahmad Ibrahim, Hamed Nemati, Michael Schwarz, Christian Rossow:
Osiris: Automated Discovery of Microarchitectural Side Channels. 1415-1432 - Shravan Narayan, Craig Disselkoen, Daniel Moghimi, Sunjay Cauligi, Evan Johnson, Zhao Gang, Anjo Vahldiek-Oberwagner, Ravi Sahita, Hovav Shacham, Dean M. Tullsen, Deian Stefan:
Swivel: Hardening WebAssembly against Spectre. 1433-1450 - Hany Ragab, Enrico Barberis, Herbert Bos, Cristiano Giuffrida:
Rage Against the Machine Clear: A Systematic Analysis of Machine Clears and Their Implications for Transient Execution Attacks. 1451-1468 - Barbara Gigerl, Vedad Hadzic, Robert Primas, Stefan Mangard, Roderick Bloem:
Coco: Co-Design and Co-Verification of Masked Software Implementations on CPUs. 1469-1468
Machine Learning: Backdoor and Poisoning
- Giorgio Severi, Jim Meyer, Scott E. Coull, Alina Oprea:
Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers. 1487-1504 - Eugene Bagdasaryan, Vitaly Shmatikov:
Blind Backdoors in Deep Learning Models. 1505-1521 - Zhaohan Xi, Ren Pang, Shouling Ji, Ting Wang:
Graph Backdoor. 1523-1540 - Di Tang, XiaoFeng Wang, Haixu Tang, Kehuan Zhang:
Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor Contamination Detection. 1541-1558 - Roei Schuster, Congzheng Song, Eran Tromer, Vitaly Shmatikov:
You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion. 1559-1575 - Nicholas Carlini:
Poisoning the Unlabeled Dataset of Semi-Supervised Learning. 1577-1592 - Jose Rodrigo Sanchez Vicarte, Gang Wang, Christopher W. Fletcher:
Double-Cross Attacks: Subverting Active Learning Systems. 1593-1610
Program Analysis
- Gabriel Ryan, Abhishek Shah, Dongdong She, Koustubha Bhat, Suman Jana:
Fine Grained Dataflow Tracking with Proximal Gradients. 1611-1628 - Jia-Ju Bai, Tuo Li, Kangjie Lu, Shi-Min Hu:
Static Detection of Unsafe DMA Accesses in Device Drivers. 1629-1645 - Yan Wang, Chao Zhang, Zixuan Zhao, Bolun Zhang, Xiaorui Gong, Wei Zou:
MAZE: Towards Automated Heap Feng Shui. 1647-1664 - Sanchuan Chen, Zhiqiang Lin, Yinqian Zhang:
SelectiveTaint: Efficient Data Flow Tracking With Static Binary Rewriting. 1665-1682 - Stefan Nagy, Anh Nguyen-Tuong, Jason D. Hiser, Jack W. Davidson, Matthew Hicks:
Breaking Through Binaries: Compiler-quality Instrumentation for Better Binary-only Fuzzing. 1683-1700 - Binbin Liu, Junfu Shen, Jiang Ming, Qilong Zheng, Jing Li, Dongpeng Xu:
MBA-Blast: Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation. 1701-1718 - Kaixiang Chen, Chao Zhang, Tingting Yin, Xingman Chen, Lei Zhao:
VScape: Assessing and Escaping Virtual Call Protections. 1719-1736
Privacy Enhancing Technologies
- Paul Schmitt, Barath Raghavan:
Pretty Good Phone Privacy. 1737-1754 - Michael A. Specter, Sunoo Park, Matthew Green:
KeyForge: Non-Attributable Email from Forward-Forgeable Signatures. 1755-1773 - Saba Eskandarian, Henry Corrigan-Gibbs, Matei Zaharia, Dan Boneh:
Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic Privacy. 1775-1792 - Jingjie Li, Amrita Roy Chowdhury, Kassem Fawaz, Younghyun Kim:
Kalεido: Real-Time Privacy Control for Eye-Tracking Systems. 1793-1810 - Asra Ali, Tancrède Lepoint, Sarvar Patel, Mariana Raykova, Phillipp Schoppmann, Karn Seth, Kevin Yeo:
Communication-Computation Trade-offs in PIR. 1811-1828 - Akash Deep Singh, Luis Garcia, Joseph Noor, Mani B. Srivastava:
I Always Feel Like Somebody's Sensing Me! A Framework to Detect, Identify, and Localize Clandestine Wireless Sensors. 1829-1846 - Cas Cremers, Britta Hale, Konrad Kohbrok:
The Complexities of Healing in Secure Group Messaging: Why Cross-Group Effects Matter. 1847-1864
Machine Learning: Adversarial Examples and Model Extraction
- Giulio Lovisotto, Henry Turner, Ivo Sluganovic, Martin Strohmeier, Ivan Martinovic:
SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations. 1865-1882 - Xian Wu, Wenbo Guo, Hua Wei, Xinyu Xing:
Adversarial Policy Training against Deep Reinforcement Learning. 1883-1900 - Yingzhe He, Guozhu Meng, Kai Chen, Xingbo Hu, Jinwen He:
DRMI: A Dataset Reduction Technology based on Mutual Information for Black-box Attacks. 1901-1918 - Adnan Siraj Rakin, Yukui Luo, Xiaolin Xu, Deliang Fan:
Deep-Dup: An Adversarial Weight Duplication Attack Framework to Crush Deep Neural Network in Multi-Tenant FPGA. 1919-1936 - Hengrui Jia, Christopher A. Choquette-Choo, Varun Chandrasekaran, Nicolas Papernot:
Entangled Watermarks as a Defense against Model Extraction. 1937-1954 - Zhichuang Sun, Ruimin Sun, Long Lu, Alan Mislove:
Mind Your Weight(s): A Large-scale Study on Insufficient Machine Learning Model Protection in Mobile Apps. 1955-1972 - Yuankun Zhu, Yueqiang Cheng, Husheng Zhou, Yantao Lu:
Hermes Attack: Steal DNN Models with Lossless Inference Accuracy. 1973-1988
Automated Security Analysis of Source Code and Binaries
- Carter Yagemann, Matthew Pruett, Simon P. Chung, Kennon Bittick, Brendan Saltaformaggio, Wenke Lee:
ARCUS: Symbolic Root Cause Analysis of Exploits in Production Systems. 1989-2006 - Wei Zhou, Le Guan, Peng Liu, Yuqing Zhang:
Automatic Firmware Emulation through Invalidity-guided Knowledge Inference. 2007-2024 - Mansour Ahmadi, Reza Mirzazade Farkhani, Ryan Williams, Long Lu:
Finding Bugs Using Your Own Code: Detecting Functionally-similar yet Inconsistent Code. 2025-2040 - Qiushi Wu, Aditya Pakki, Navid Emamdoost, Stephen McCamant, Kangjie Lu:
Understanding and Detecting Disordered Error Handling with Precise Function Pairing. 2041-2058 - HyungSeok Han, Andrew Wesie, Brian Pak:
Precise and Scalable Detection of Use-after-Compacting-Garbage-Collection Bugs. 2059-2074 - Xing Zhang, Jiongyi Chen, Chao Feng, Ruilin Li, Yunfei Su, Bin Zhang, Jing Lei, Chaojing Tang:
Reducing Test Cases with Attention Mechanism of Neural Networks. 2075-2092 - Xiaoqin Fu, Haipeng Cai:
FlowDist: Multi-Staged Refinement-Based Dynamic Information Flow Analysis for Distributed Software Systems. 2093-2110
Secure Multiparty Computation
- Sylvain Chatel, Apostolos Pyrgelis, Juan Ramón Troncoso-Pastoriza, Jean-Pierre Hubaux:
Privacy and Integrity Preserving Computations with CRISP. 2111-2128 - Rishabh Poddar, Sukrit Kalra, Avishay Yanai, Ryan Deng, Raluca Ada Popa, Joseph M. Hellerstein:
Senate: A Maliciously-Secure MPC Platform for Collaborative Analytics. 2129-2146 - Lucien K. L. Ng, Sherman S. M. Chow:
GForce: GPU-Friendly Oblivious and Rapid Neural Network Inference. 2147-2164 - Arpita Patra, Thomas Schneider, Ajith Suresh, Hossein Yalame:
ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation. 2165-2182 - Anders P. K. Dalskov, Daniel Escudero, Marcel Keller:
Fantastic Four: Honest-Majority Four-Party Secure Computation With Malicious Security. 2183-2200 - Ryan Lehmkuhl, Pratyush Mishra, Akshayaram Srinivasan, Raluca Ada Popa:
Muse: Secure Inference Resilient to Malicious Clients. 2201-2218 - Jeongseok Son, Griffin Prechter, Rishabh Poddar, Raluca Ada Popa, Koushik Sen:
ObliCheck: Efficient Verification of Oblivious Algorithms with Unobservable State. 2219-2236
Adversarial Machine Learning: Defenses
- Chong Xiang, Arjun Nitin Bhagoji, Vikash Sehwag, Prateek Mittal:
PatchGuard: A Provably Robust Defense against Adversarial Patches via Small Receptive Fields and Masking. 2237-2254 - Ahmadreza Azizi, Ibrahim Asadullah Tahmid, Asim Waheed, Neal Mangaokar, Jiameng Pu, Mobin Javed, Chandan K. Reddy, Bimal Viswanath:
T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-based Text Classification. 2255-2272 - Shehzeen Hussain, Paarth Neekhara, Shlomo Dubnov, Julian J. McAuley, Farinaz Koushanfar:
WaveGuard: Understanding and Mitigating Audio Adversarial Examples. 2273-2290 - Yizheng Chen, Shiqi Wang, Weifan Jiang, Asaf Cidon, Suman Jana:
Cost-Aware Robust Tree Ensembles for Security Applications. 2291-2308 - Thorsten Eisenhofer, Lea Schönherr, Joel Frank, Lars Speckemeier, Dorothea Kolossa, Thorsten Holz:
Dompteur: Taming Audio Adversarial Examples. 2309-2326 - Limin Yang, Wenbo Guo, Qingying Hao, Arridhana Ciptadi, Ali Ahmadzadeh, Xinyu Xing, Gang Wang:
CADE: Detecting and Explaining Concept Drift Samples for Security Applications. 2327-2344 - Xueyuan Han, Xiao Yu, Thomas F. J.-M. Pasquier, Ding Li, Junghwan Rhee, James W. Mickens, Margo I. Seltzer, Haifeng Chen:
SIGL: Securing Software Installations Through Deep Graph Learning. 2345-2362
Operating Systems Security
- Yoochan Lee, Changwoo Min, Byoungyoung Lee:
ExpRace: Exploiting Kernel Races through Raising Interrupts. 2363-2380 - Seyed Mohammadjavad Seyed Talebi, Zhihao Yao, Ardalan Amiri Sani, Zhiyun Qian, Daniel Austin:
Undo Workarounds for Kernel Bugs. 2381-2398 - Ofek Kirzner, Adam Morrison:
An Analysis of Speculative Type Confusion Vulnerabilities in the Wild. 2399-2416 - Man-Ki Yoon, Mengqi Liu, Hao Chen, Jung-Eun Kim, Zhong Shao:
Blinder: Partition-Oblivious Hierarchical Scheduling. 2417-2434 - Muhammad Abubakar, Adil Ahmad, Pedro Fonseca, Dongyan Xu:
SHARD: Fine-Grained Kernel Specialization with Context-Aware Hardening. 2435-2452 - Brian Wickman, Hong Hu, Insu Yun, Daehee Jang, Jungwon Lim, Sanidhya Kashyap, Taesoo Kim:
Preventing Use-After-Free Attacks with Fast Forward Allocation. 2453-2470 - Xin Tan, Yuan Zhang, Xiyu Yang, Kangjie Lu, Min Yang:
Detecting Kernel Refcount Bugs with Two-Dimensional Consistency Checking. 2471-2488
Web Security 1; Software Security
- Max Maass, Alina Stöver, Henning Pridöhl, Sebastian Bretthauer, Dominik Herrmann, Matthias Hollick, Indra Spiecker:
Effective Notification Campaigns on the Web: A Matter of Trust, Framing, and Support. 2489-2506 - Pierre Laperdrix, Oleksii Starov, Quan Chen, Alexandros Kapravelos, Nick Nikiforakis:
Fingerprinting in Style: Detecting Browser Extensions via Injected Style Sheets. 2507-2524 - Soheil Khodayari, Giancarlo Pellegrino:
JAW: Studying Client-side CSRF with Hybrid Property Graphs and Declarative Traversals. 2525-2542 - Hyunjoo Lee, Jiyeon Lee, Daejun Kim, Suman Jana, Insik Shin, Sooel Son:
AdCube: WebVR Ad Fraud and Practical Confinement of Third-Party Ads. 2543-2560 - Yoshimichi Nakatsuka, Ercan Ozturk, Andrew Paverd, Gene Tsudik:
CACTI: Captcha Avoidance via Client-side TEE Integration. 2561-2578 - Yu Tsung Lee, William Enck, Haining Chen, Hayawardh Vijayakumar, Ninghui Li, Zhiyun Qian, Daimeng Wang, Giuseppe Petracca, Trent Jaeger:
PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack Operations in Android Systems. 2579-2596 - Sergej Schumilo, Cornelius Aschermann, Ali Abbasi, Simon Wörner, Thorsten Holz:
Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types. 2597-2614
Machine Learning: Privacy Issues
- Liwei Song, Prateek Mittal:
Systematic Evaluation of Privacy Risks of Machine Learning Models. 2615-2632 - Nicholas Carlini, Florian Tramèr, Eric Wallace, Matthew Jagielski, Ariel Herbert-Voss, Katherine Lee, Adam Roberts, Tom B. Brown, Dawn Song, Úlfar Erlingsson, Alina Oprea, Colin Raffel:
Extracting Training Data from Large Language Models. 2633-2650 - Nishat Koti, Mahak Pancholi, Arpita Patra, Ajith Suresh:
SWIFT: Super-fast and Robust Privacy-Preserving Machine Learning. 2651-2668 - Xinlei He, Jinyuan Jia, Michael Backes, Neil Zhenqiang Gong, Yang Zhang:
Stealing Links from Graph Neural Networks. 2669-2686 - Wanrong Zhang, Shruti Tople, Olga Ohrimenko:
Leakage of Dataset Properties in Multi-Party Machine Learning. 2687-2704 - Milad Nasr, Alireza Bahramali, Amir Houmansadr:
Defeating DNN-Based Traffic Analysis Systems in Real-Time With Blind Adversarial Perturbations. 2705-2722 - Wenting Zheng, Ryan Deng, Weikeng Chen, Raluca Ada Popa, Aurojit Panda, Ion Stoica:
Cerebro: A Platform for Multi-Party Cryptographic Collaborative Learning. 2723-2740
Fuzzing
- Daimeng Wang, Zheng Zhang, Hang Zhang, Zhiyun Qian, Srikanth V. Krishnamurthy, Nael B. Abu-Ghazaleh:
SyzVegas: Beating Kernel Fuzzing Odds with Reinforcement Learning. 2741-2758 - Yousra Aafer, Wei You, Yi Sun, Yu Shi, Xiangyu Zhang, Heng Yin:
Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing. 2759-2776 - Yuwei Li, Shouling Ji, Yuan Chen, Sizhuang Liang, Wei-Han Lee, Yueyao Chen, Chenyang Lyu, Chunming Wu, Raheem Beyah, Peng Cheng, Kangjie Lu, Ting Wang:
UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers. 2777-2794 - Christopher Salls, Chani Jindal, Jake Corina, Christopher Kruegel, Giovanni Vigna:
Token-Level Fuzzing. 2795-2809 - Cen Zhang, Xingwei Lin, Yuekang Li, Yinxing Xue, Jundong Xie, Hongxu Chen, Xinlei Ying, Jiashui Wang, Yang Liu:
APICraft: Fuzz Driver Generation for Closed-source SDK Libraries. 2811-2828 - Andrea Fioraldi, Daniele Cono D'Elia, Davide Balzarotti:
The Use of Likely Invariants as Feedback for Fuzzers. 2829-2846 - Dimitrios Tychalas, Hadjer Benkraouda, Michail Maniatakos:
ICSFuzz: Manipulating I/Os and Repurposing Binary Code to Enable Instrumented Fuzzing in ICS Control Applications. 2847-2862
Web Security 2
- Anatoly Shusterman, Ayush Agarwal, Sioli O'Connell, Daniel Genkin, Yossi Oren, Yuval Yarom:
Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses. 2863-2880 - Alexander Bulekov, Rasoul Jahanshahi, Manuel Egele:
Saphire: Sandboxing PHP Applications with Tailored System Call Allowlists. 2881-2898 - Mohammad M. Ahmadpanah, Daniel Hedin, Musard Balliu, Lars Eric Olsson, Andrei Sabelfeld:
SandTrap: Securing JavaScript-driven Trigger-Action Platforms. 2899-2916 - Marco Squarcina, Mauro Tempesta, Lorenzo Veronese, Stefano Calzavara, Matteo Maffei:
Can I Take Your Subdomain? Exploring Same-Site Attacks in the Modern Web. 2917-2934 - Marius Musch, Martin Johns:
U Can't Debug This: Detecting JavaScript Anti-Debugging Techniques in the Wild. 2935-2950 - Feng Xiao, Jianwei Huang, Yichang Xiong, Guangliang Yang, Hong Hu, Guofei Gu, Wenke Lee:
Abusing Hidden Properties to Attack the Node.js Ecosystem. 2951-2968
Keynote Address
- Susan Landau:
Susan Landau, Tufts University.
Forensics and Diagnostics for Security and Voting
- Yushi Cheng, Xiaoyu Ji, Lixu Wang, Qi Pang, Yi-Chao Chen, Wenyuan Xu:
mID: Tracing Screen Photos via Moiré Patterns. 2969-2986 - Peng Fei, Zhou Li, Zhiying Wang, Xiao Yu, Ding Li, Kangkook Jee:
SEAL: Storage-efficient Causality Analysis on Enterprise Logs with Query-friendly Compression. 2987-3004 - Abdulellah Alsaheel, Yuhong Nan, Shiqing Ma, Le Yu, Gregory Walkup, Z. Berkay Celik, Xiangyu Zhang, Dongyan Xu:
ATLAS: A Sequence-based Learning Approach for Attack Investigation. 3005-3022 - Hailun Ding, Shenao Yan, Juan Zhai, Shiqing Ma:
ELISE: A Storage Efficient Logging System Powered by Redundancy Reduction and Representation Learning. 3023-3040 - Seunghoon Woo, Dongwook Lee, Sunghan Park, Heejo Lee, Sven Dietrich:
V0Finder: Discovering the Correct Origin of Publicly Reported Software Vulnerabilities. 3041-3058 - Filip Zagórski, Grant McClearn, Sarah Morin, Neal McBurnett, Poorvi L. Vora:
Minerva- An Efficient Risk-Limiting Ballot Polling Audit. 3059-3076 - Michael A. Specter, J. Alex Halderman:
Security Analysis of the Democracy Live Online Voting System. 3077-3092
Internet and Network Security
- Grant Ho, Mayank Dhiman, Devdatta Akhawe, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David A. Wagner:
Hopper: Modeling and Detecting Lateral Movement. 3093-3110 - Liz Izhikevich, Renata Teixeira, Zakir Durumeric:
LZR: Identifying Unexpected Internet Services. 3111-3128 - William J. Tolley, Beau Kujath, Mohammad Taha Khan, Narseo Vallina-Rodriguez, Jedidiah R. Crandall:
Blind In/On-Path Attacks and Applications to VPNs. 3129-3146 - Tianxiang Dai, Philipp Jeitner, Haya Schulmann, Michael Waidner:
The Hijackers Guide To The Galaxy: Off-Path Taking Over Internet Resources. 3147-3164 - Philipp Jeitner, Haya Schulmann:
Injection Attacks Reloaded: Tunnelling Malicious Payloads over DNS. 3165-3182 - Benjamin E. Ujcich, Samuel Jero, Richard Skowyra, Adam Bates, William H. Sanders, Hamed Okhravi:
Causal Analysis for Software-Defined Networking Attacks. 3183-3200
Attacks
- Kaiwen Shen, Chuhan Wang, Minglei Guo, Xiaofeng Zheng, Chaoyi Lu, Baojun Liu, Yuxuan Zhao, Shuang Hao, Haixin Duan, Qingfeng Pan, Min Yang:
Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks. 3201-3217 - Shengtuo Hu, Qi Alfred Chen, Jiachen Sun, Yiheng Feng, Z. Morley Mao, Henry X. Liu:
Automated Discovery of Denial-of-Service Vulnerabilities in Connected Vehicle Protocols. 3219-3236 - Pengfei Jing, Qiyi Tang, Yuefeng Du, Lei Xue, Xiapu Luo, Ting Wang, Sen Nie, Shi Wu:
Too Good to Be Safe: Tricking Lane Detection in Autonomous Driving with Crafted Perturbations. 3237-3254 - Soundarya Ramesh, Rui Xiao, Anindya Maiti, Jong Taek Lee, Harini Ramprasad, Ananda Kumar, Murtuza Jadliwala, Jun Han:
Acoustics to the Rescue: Physical Key Inference Attack Revisited. 3255-3272 - Jiadong Lou, Xu Yuan, Ning Zhang:
Messy States of Wiring: Vulnerabilities in Emerging Personal Payment Systems. 3273-3289 - Yipeng Gao, Haichang Gao, Sainan Luo, Yang Zi, Shudong Zhang, Wenjie Mao, Ping Wang, Yulong Shen, Jeff Yan:
Research on the Security of Visual Reasoning CAPTCHA. 3291-3308 - Takami Sato, Junjie Shen, Ningfei Wang, Yunhan Jia, Xue Lin, Qi Alfred Chen:
Dirty Road Can Attack: Security of Deep Learning based Automated Lane Centering under Physical-World Attack. 3309-3326
Research on Surveillance and Censorship
- Mingkui Wei:
Domain Shadowing: Leveraging Content Delivery Networks for Robust Blocking-Resistant Communications. 3327-3343 - Kevin Bock, Abdulrahman Alaraj, Yair Fax, Kyle Hurley, Eric Wustrow, Dave Levin:
Weaponizing Middleboxes for TCP Reflected Amplification. 3345-3361 - Martin R. Albrecht, Jorge Blasco, Rikke Bjerg Jensen, Lenka Mareková:
Collective Information Security in Large-Scale Urban Protests: the Case of Hong Kong. 3363-3380 - Nguyen Phong Hoang, Arian Akhavan Niaki, Jakub Dalek, Jeffrey Knockel, Pellaeon Lin, Bill Marczak, Masashi Crete-Nishihata, Phillipa Gill, Michalis Polychronakis:
How Great is the Great Firewall? Measuring China's DNS Censorship. 3381-3398 - Marc B. Rosen, James Parker, Alex J. Malozemoff:
Balboa: Bobbing and Weaving around Network Censorship. 3399-3413 - Rob Jansen, Justin Tracey, Ian Goldberg:
Once is Never Enough: Foundations for Sound Statistical Inference in Tor Network Experimentation. 3415-3432 - Daniel Hugenroth, Martin Kleppmann, Alastair R. Beresford:
Rollercoaster: An Efficient Group-Multicast Scheme for Mix Networks. 3433-3450
Malware and Program Analysis 1
- Binlin Cheng, Jiang Ming, Erika A. Leal, Haotian Zhang, Jianming Fu, Guojun Peng, Jean-Yves Marion:
Obfuscation-Resilient Executable Payload Extraction From Packed Malware. 3451-3468 - Evan Downing, Yisroel Mirsky, Kyuhong Park, Wenke Lee:
DeepReflect: Discovering Malicious Functionality through Binary Reconstruction. 3469-3486 - Erin Avllazagaj, Ziyun Zhu, Leyla Bilge, Davide Balzarotti, Tudor Dumitras:
When Malware Changed Its Mind: An Empirical Study of Variable Program Behaviors in the Real World. 3487-3504 - Omar Alrawi, Charles Lever, Kevin Valakuzhy, Ryan Court, Kevin Z. Snow, Fabian Monrose, Manos Antonakakis:
The Circle Of Life: A Large-Scale Study of The IoT Malware Lifecycle. 3505-3522 - Omar Alrawi, Moses Ike, Matthew Pruett, Ranjita Pai Kasturi, Srimanta Barua, Taleb Hirani, Brennan Hill, Brendan Saltaformaggio:
Forecasting Malware Capabilities From Cyber Attack Memory Images. 3523-3540 - Michael Brengel, Christian Rossow:
YARIX: Scalable YARA-based Malware Intelligence. 3541-3558 - Gwangmu Lee, Woochul Shim, Byoungyoung Lee:
Constraint-guided Directed Greybox Fuzzing. 3559-3576
Mobile System Security and Privacy
- Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, Christian Weinert:
PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop. 3577-3594 - Yuchen Wang, Zhenfeng Zhang, Yongquan Xie:
Privacy-Preserving and Standard-Compatible AKA Protocol for 5G. 3595-3612 - Matthew Rossi, Dario Facchinetti, Enrico Bacis, Marco Rosa, Stefano Paraboschi:
SEApp: Bringing Mandatory Access Control to Android Apps. 3613-3630 - Jie Huang, Michael Backes, Sven Bugiel:
A11y and Privacy don't have to be mutually exclusive: Constraining Accessibility Service Misuse on Android. 3631-3648 - Zheng Zhang, Hang Zhang, Zhiyun Qian, Billy Lau:
An Investigation of the Android Kernel Patch Ecosystem. 3649-3666 - Trung Tin Nguyen, Michael Backes, Ninja Marnau, Ben Stock:
Share First, Ask Later (or Never?) Studying Violations of GDPR's Explicit Consent in Android Apps. 3667-3684 - Yuede Ji, Mohamed Elsabagh, Ryan Johnson, Angelos Stavrou:
DEFInit: An Analysis of Exposed Android Init Routines. 3685-3702
Phishing and the Malicious Web
- Ronghai Yang, Xianbo Wang, Cheng Chi, Dawei Wang, Jiawei He, Siming Pang, Wing Cheong Lau:
Scalable Detection of Promotional Website Defacements in Black Hat SEO Campaigns. 3703-3720 - Ravindu De Silva, Mohamed Nabeel, Charith Elvitigala, Issa Khalil, Ting Yu, Chamath Keppitiyagama:
Compromised or Attacker-Owned: A Large Scale Classification and Study of Hosting Domains of Malicious URLs. 3721-3738 - Hang Hu, Steve T. K. Jan, Yang Wang, Gang Wang:
Assessing Browser-level Defense against IDN-based Phishing. 3739-3756 - Hugo L. J. Bijmans, Tim M. Booij, Anneke Schwedersky, Aria Nedgabat, Rolf van Wegberg:
Catching Phishers By Their Bait: Investigating the Dutch Phishing Landscape through Phishing Kit Detection. 3757-3774 - Bhupendra Acharya, Phani Vadrevu:
PhishPrint: Evading Phishing Detection Crawlers by Prior Profiling. 3775-3792 - Yun Lin, Ruofan Liu, Dinil Mon Divakaran, Jun Yang Ng, Qing Zhou Chan, Yiwen Lu, Yuxuan Si, Fan Zhang, Jin Song Dong:
Phishpedia: A Hybrid Deep Learning Based Approach to Visually Identify Phishing Webpages. 3793-3810 - Enis Ulqinaku, Hala Assal, AbdelRahman Abdou, Sonia Chiasson, Srdjan Capkun:
Is Real-time Phishing Eliminated with FIDO? Social Engineering Downgrade Attacks against FIDO Protocols. 3811-3828
DDOS; Wireless Security
- Zaoxing Liu, Hun Namkung, Georgios Nikolaidis, Jeongkeun Lee, Changhoon Kim, Xin Jin, Vladimir Braverman, Minlan Yu, Vyas Sekar:
Jaqen: A High-Performance Switch-Native Approach for Detecting and Mitigating Volumetric DDoS Attacks with Programmable Switches. 3829-3846 - Yeting Li, Zixuan Chen, Jialun Cao, Zhiwu Xu, Qiancheng Peng, Haiming Chen, Liyuan Chen, Shing-Chi Cheung:
ReDoSHunter: A Combined Static and Dynamic Approach for Regular Expression DoS Detection. 3847-3864 - Jiarong Xing, Wenqing Wu, Ang Chen:
Ripple: A Programmable, Decentralized Link-Flooding Defense Against Adaptive Adversaries. 3865-3881 - Soo-Jin Moon, Yucheng Yin, Rahul Anand Sharma, Yifei Yuan, Jonathan M. Spring, Vyas Sekar:
Accurately Measuring Global Risk of Amplification Attacks using AmpMap. 3881-3898 - Nitya Lakshmanan, Nishant Budhdev, Min Suk Kang, Mun Choon Chan, Jun Han:
A Stealthy Location Identification Attack Exploiting Carrier Aggregation in Cellular Networks. 3899-3916 - Milan Stute, Alexander Heinrich, Jannik Lorenz, Matthias Hollick:
Disrupting Continuity of Apple's Wireless Ecosystem Security: New Tracking, DoS, and MitM Attacks on iOS and macOS Through Bluetooth Low Energy, AWDL, and Wi-Fi. 3917-3934 - Shinan Liu, Xiang Cheng, Hanchao Yang, Yuanchao Shu, Xiaoran Weng, Ping Guo, Kexiong Curtis Zeng, Gang Wang, Yaling Yang:
Stars Can Tell: A Robust Method to Defend against GPS Spoofing Attacks using Off-the-shelf Chipset. 3935-3952
Cryptography and the Cloud
- Shih-Wei Li, Xupeng Li, Ronghui Gu, Jason Nieh, John Zhuang Hui:
Formally Verified Memory Protection for a Commodity Multiprocessor Hypervisor. 3953-3970 - Xing Li, Yan Chen, Zhiqiang Lin, Xiao Wang, Jim Hao Chen:
Automatic Policy Generation for Inter-Service Access Control of Microservices. 3971-3988 - Xutong Chen, Hassaan Irshad, Yan Chen, Ashish Gehani, Vinod Yegneswaran:
CLARION: Sound and Clear Provenance Tracking for Microservice Deployments. 3989-4006 - Kotaro Matsuoka, Ryotaro Banno, Naoki Matsumoto, Takashi Sato, Song Bian:
Virtual Secure Platform: A Five-Stage Pipeline Processor over TFHE. 4007-4024 - Min Xu, Armin Namavari, David Cash, Thomas Ristenpart:
Searching Encrypted Data with Size-Locked Indexes. 4025-4042 - Lukas Aumayr, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei:
Blitz: Secure Multi-Hop Payments Without Two-Phase Commits. 4043-4060 - Sivanarayana Gaddam, Atul Luykx, Rohit Sinha, Gaven J. Watson:
Reducing HSM Reliance in Payments through Proxy Re-Encryption. 4061-4078
Measurements of Fraud, Malware, Spam, and Other Abuse
- Jochem van de Laarschot, Rolf van Wegberg:
Risky Business? Investigating the Security Practices of Vendors on an Online Anonymous Market using Ground-Truth Data. 4079-4095 - Teng Xu, Gerard Goossen, Huseyin Kerem Cevahir, Sara Khodeir, Yingyezhe Jin, Frank Li, Shawn Shan, Sagar Patel, David Freeman, Paul Pearce:
Deep Entity Classification: Abusive Account Detection for Online Social Networks. 4097-4114 - Jeremiah Onaolapo, Nektarios Leontiadis, Despoina Magka, Gianluca Stringhini:
SocialHEISTing: Understanding Stolen Facebook Accounts. 4115-4132 - Jice Wang, Yue Xiao, Xueqiang Wang, Yuhong Nan, Luyi Xing, Xiaojing Liao, Jinwei Dong, Nicolás Serrano, Haoran Lu, XiaoFeng Wang, Yuqing Zhang:
Understanding Malicious Cross-library Data Harvesting on Android. 4133-4150 - Maxwell Aliapoulios, Cameron Ballard, Rasika Bhalerao, Tobias Lauinger, Damon McCoy:
Swiped: Analyzing Ground-truth Data of a Marketplace for Stolen Debit and Credit Cards. 4151-4168 - Zhibo Sun, Adam Oest, Penghui Zhang, Carlos E. Rubio-Medrano, Tiffany Bao, Ruoyu Wang, Ziming Zhao, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service. 4169-4186
IoT; Specialty Networking
- Han Zhang, Abhijith Anilkumar, Matt Fredrikson, Yuvraj Agarwal:
Capture: Centralized Library Management for Heterogeneous IoT Devices. 4187-4204 - Qinying Wang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Yuhong Kan, Zhaowei Lin, Changting Lin, Shuiguang Deng, Alex X. Liu, Raheem Beyah:
MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols. 4205-4222 - Chenglong Fu, Qiang Zeng, Xiaojiang Du:
HAWatcher: Semantics-Aware Anomaly Detection for Appified Smart Homes. 4223-4240 - Khaled Serag, Rohit Bhatia, Vireshwar Kumar, Z. Berkay Celik, Dongyan Xu:
Exposing New Vulnerabilities of Error Handling Mechanism in CAN. 4241-4258 - Bogdan Groza, Lucian Popa, Pal-Stefan Murvay, Yuval Elovici, Asaf Shabtai:
CANARY - a reactive defense mechanism for Controller Area Networks based on Active RelaYs. 4259-4276 - Benjamin Rothenberger, Konstantin Taranov, Adrian Perrig, Torsten Hoefler:
ReDMArk: Bypassing RDMA Security Mechanisms. 4277-4292
TLS
- Marcus Brinkmann, Christian Dresen, Robert Merget, Damian Poddebniak, Jens Müller, Juraj Somorovsky, Jörg Schwenk, Sebastian Schinzel:
ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS Authentication. 4293-4310 - Henry Birge-Lee, Liang Wang, Daniel McCarney, Roland Shoemaker, Jennifer Rexford, Prateek Mittal:
Experiences Deploying Multi-Vantage-Point Domain Validation at Let's Encrypt. 4311-4327 - Tianyu Cui, Gaopeng Gou, Gang Xiong, Zhen Li, Mingxin Cui, Chang Liu:
SiamHAN: IPv6 Address Correlation Attacks on TLS Encrypted Traffic via Siamese Heterogeneous Graph Attention Network. 4329-4346 - Marten Oltrogge, Nicolas Huaman, Sabrina Amft, Yasemin Acar, Michael Backes, Sascha Fahl:
Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications. 4347-4364 - Damian Poddebniak, Fabian Ising, Hanno Böck, Sebastian Schinzel:
Why TLS is better without STARTTLS: A Security Analysis of STARTTLS in the Email Context. 4365-4382 - Zane Ma, Joshua Mason, Manos Antonakakis, Zakir Durumeric, Michael D. Bailey:
What's in a Name? Exploring CA Certificate Control. 4383-4400
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.