| 2019 | " Tobias Urban, Martin Degeling, Thorsten Holz, Norbert Pohlmann |
| 2019 | A game of "Cut and Mouse": bypassing antivirus by simulating user inputs. Ziya Alper Genç, Gabriele Lenzini, Daniele Sgandurra |
| 2019 | Aegis: a context-aware security framework for smart home systems. Amit Kumar Sikder, Leonardo Babun, Hidayet Aksu, A. Selcuk Uluagac |
| 2019 | An empirical study of SMS one-time password authentication in Android apps. Siqi Ma, Runhan Feng, Juanru Li, Yang Liu, Surya Nepal, Diethelm Ostry, Elisa Bertino, Robert H. Deng, Zhuo Ma, Sanjay Jha |
| 2019 | Analyzing control flow integrity with LLVM-CFI. Paul Muntean, Matthias Neumayer, Zhiqiang Lin, Gang Tan, Jens Grossklags, Claudia Eckert |
| 2019 | AppVeto: mobile application self-defense through resource access veto. Tousif Osman, Mohammad Mannan, Urs Hengartner, Amr M. Youssef |
| 2019 | BakingTimer: privacy analysis of server-side request processing time. Iskander Sánchez-Rola, Davide Balzarotti, Igor Santos |
| 2019 | Casino royale: a deep exploration of illegal online gambling. Hao Yang, Kun Du, Yubao Zhang, Shuang Hao, Zhou Li, Mingxuan Liu, Haining Wang, Hai-Xin Duan, Yazhou Shi, Xiaodong Su, Guang Liu, Zhifeng Geng, Jianping Wu |
| 2019 | Challenge-response behavioral mobile authentication: a comparative study of graphical patterns and cognitive games. Manar Mohamed, Prakash Shrestha, Nitesh Saxena |
| 2019 | Co-evaluation of pattern matching algorithms on IoT devices with embedded GPUs. Charalampos Stylianopoulos, Simon Kindström, Magnus Almgren, Olaf Landsiedel, Marina Papatriantafilou |
| 2019 | Coordinated dataflow protection for ultra-high bandwidth science networks. Vasudevan Nagendra, Vinod Yegneswaran, Phillip A. Porras, Samir R. Das |
| 2019 | Cubismo: decloaking server-side malware via cubist program analysis. Abbas Naderi-Afooshteh, Yonghwi Kwon, Anh Nguyen-Tuong, Mandana Bagheri-Marzijarani, Jack W. Davidson |
| 2019 | D2NN: a fine-grained dual modular redundancy framework for deep neural networks. Yu Li, Yannan Liu, Min Li, Ye Tian, Bo Luo, Qiang Xu |
| 2019 | DR.SGX: automated and adjustable side-channel protection for SGX using data location randomization. Ferdinand Brasser, Srdjan Capkun, Alexandra Dmitrienko, Tommaso Frassetto, Kari Kostiainen, Ahmad-Reza Sadeghi |
| 2019 | Defeating hidden audio channel attacks on voice assistants via audio-induced surface vibrations. Chen Wang, S. Abhishek Anand, Jian Liu, Payton Walker, Yingying Chen, Nitesh Saxena |
| 2019 | Detecting (absent) app-to-app authentication on cross-device short-distance channels. Stefano Cristalli, Long Lu, Danilo Bruschi, Andrea Lanzi |
| 2019 | Detecting organized eCommerce fraud using scalable categorical clustering. Samuel Marchal, Sebastian Szyller |
| 2019 | EIGER: automated IOC generation for accurate and interpretable endpoint malware detection. Yuma Kurogome, Yuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, Syogo Hayashi, Tatsuya Mori, Koushik Sen |
| 2019 | FRAMER: a tagged-pointer capability system with memory safety applications. Myoung Jin Nam, Periklis Akritidis, David J. Greaves |
| 2019 | Function boundary detection in stripped binaries. Jim Alves-Foss, Jia Song |
| 2019 | FuzzBuilder: automated building greybox fuzzing environment for C/C++ library. Joonun Jang, Huy Kang Kim |
| 2019 | HDMI-walk: attacking HDMI distribution networks via consumer electronic control protocol. Luis Puche Rondon, Leonardo Babun, Kemal Akkaya, A. Selcuk Uluagac |
| 2019 | How to kill symbolic deobfuscation for free (or: unleashing the potential of path-oriented protections). Mathilde Ollivier, Sébastien Bardin, Richard Bonichon, Jean-Yves Marion |
| 2019 | How to prove your model belongs to you: a blind-watermark based framework to protect intellectual property of DNN. Zheng Li, Chengyu Hu, Yang Zhang, Shanqing Guo |
| 2019 | I know what you did last login: inconsistent messages tell existence of a target's account to insiders. Ayako Akiyama Hasegawa, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama |
| 2019 | Improving intrusion detectors by crook-sourcing. Frederico Araujo, Gbadebo Ayoade, Khaled Al-Naami, Yang Gao, Kevin W. Hamlen, Latifur Khan |
| 2019 | JStap: a static pre-filter for malicious JavaScript detection. Aurore Fass, Michael Backes, Ben Stock |
| 2019 | Koinonia: verifiable e-voting with long-term privacy. Huangyi Ge, Sze Yiu Chau, Victor E. Gonsalves, Huian Li, Tianhao Wang, Xukai Zou, Ninghui Li |
| 2019 | Leveraging locality of reference for certificate revocation. Luke Dickinson, Trevor Smith, Kent E. Seamons |
| 2019 | MalRank: a measure of maliciousness in SIEM-based knowledge graphs. Pejman Najafi, Alexander Mühle, Wenzel Pünter, Feng Cheng, Christoph Meinel |
| 2019 | Mining least privilege attribute based access control policies. Matthew W. Sanders, Chuan Yue |
| 2019 | Mitigating data leakage by protecting memory-resident sensitive data. Tapti Palit, Fabian Monrose, Michalis Polychronakis |
| 2019 | Model inversion attacks against collaborative inference. Zecheng He, Tianwei Zhang, Ruby B. Lee |
| 2019 | My script engines know what you did in the dark: converting engines into script API tracers. Toshinori Usui, Yuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, Jun Miyoshi, Kanta Matsuura |
| 2019 | Neurlux: dynamic malware analysis without feature engineering. Chani Jindal, Christopher Salls, Hojjat Aghakhani, Keith Long, Christopher Kruegel, Giovanni Vigna |
| 2019 | Nibbler: debloating binary shared libraries. Ioannis Agadakos, Di Jin, David Williams-King, Vasileios P. Kemerlis, Georgios Portokalidis |
| 2019 | Opening Pandora's box through ATFuzzer: dynamic analysis of AT interface for Android smartphones. Imtiaz Karim, Fabrizio Cicala, Syed Rafiul Hussain, Omar Chowdhury, Elisa Bertino |
| 2019 | Out of control: stealthy attacks against robotic vehicles protected by control-based techniques. Pritam Dash, Mehdi Karimibiuki, Karthik Pattabiraman |
| 2019 | PDoT: private DNS-over-TLS with TEE support. Yoshimichi Nakatsuka, Andrew Paverd, Gene Tsudik |
| 2019 | Premadoma: an operational solution for DNS registries to prevent malicious domain registrations. Jan Spooren, Thomas Vissers, Peter Janssen, Wouter Joosen, Lieven Desmet |
| 2019 | Privacy preserving substring search protocol with polylogarithmic communication cost. Nicholas Mainardi, Alessandro Barenghi, Gerardo Pelosi |
| 2019 | Proceedings of the 35th Annual Computer Security Applications Conference, ACSAC 2019, San Juan, PR, USA, December 09-13, 2019 David M. Balenson |
| 2019 | Progressive processing of system-behavioral query. Jiaping Gui, Xusheng Xiao, Ding Li, Chung Hwan Kim, Haifeng Chen |
| 2019 | Proof of aliveness. Chenglu Jin, Zheng Yang, Marten van Dijk, Jianying Zhou |
| 2019 | Revisiting utility metrics for location privacy-preserving mechanisms. Virat Shejwalkar, Amir Houmansadr, Hossein Pishro-Nik, Dennis Goeckel |
| 2019 | Robust keystroke transcription from the acoustic side-channel. David Slater, Scott Novotney, Jessica Moore, Sean Morgan, Scott Tenaglia |
| 2019 | SIMPLE: single-frame based physical layer identification for intrusion detection and prevention on in-vehicle networks. Mahsa Foruhandeh, Yanmao Man, Ryan M. Gerdes, Ming Li, Thidapat Chantem |
| 2019 | SIP shaker: software integrity protection composition. Mohsen Ahmadvand, Dennis Fischer, Sebastian Banescu |
| 2019 | SRFuzzer: an automatic fuzzing framework for physical SOHO router devices to discover multi-type vulnerabilities. Yu Zhang, Wei Huo, Kunpeng Jian, Ji Shi, Haoliang Lu, Longquan Liu, Chen Wang, Dandan Sun, Chao Zhang, Baoxu Liu |
| 2019 | STRIP: a defence against trojan attacks on deep neural networks. Yansong Gao, Chang Xu, Derui Wang, Shiping Chen, Damith Chinthana Ranasinghe, Surya Nepal |
| 2019 | SecDATAVIEW: a secure big data workflow management system for heterogeneous computing environments. Saeid Mofrad, Ishtiaq Ahmed, Shiyong Lu, Ping Yang, Heming Cui, Fengwei Zhang |
| 2019 | Sleak: automating address space layout derandomization. Christophe Hauser, Jayakrishna Menon, Yan Shoshitaishvili, Ruoyu Wang, Giovanni Vigna, Christopher Kruegel |
| 2019 | Speculator: a tool to analyze speculative execution attacks and mitigations. Andrea Mambretti, Matthias Neugschwandtner, Alessandro Sorniotti, Engin Kirda, William K. Robertson, Anil Kurmus |
| 2019 | Survivor: a fine-grained intrusion response and recovery approach for commodity operating systems. Ronny Chevalier, David Plaquin, Chris I. Dalton, Guillaume Hiet |
| 2019 | Systematic comparison of symbolic execution systems: intermediate representation and its generation. Sebastian Poeplau, Aurélien Francillon |
| 2019 | TF-BIV: transparent and fine-grained binary integrity verification in the cloud. Fangjie Jiang, Quanwei Cai, Jingqiang Lin, Bo Luo, Le Guan, Ziqiang Ma |
| 2019 | The chatty-sensor: a provably-covert channel in cyber physical systems. Amir Herzberg, Yehonatan Kfir |
| 2019 | VPS: excavating high-level C++ constructs from low-level binaries to protect dynamic dispatching. Andre Pawlowski, Victor van der Veen, Dennis Andriesse, Erik van der Kouwe, Thorsten Holz, Cristiano Giuffrida, Herbert Bos |
| 2019 | Whisper: a unilateral defense against VoIP traffic re-identification attacks. Tavish Vaidya, Timothy Walsh, Micah Sherr |
| 2019 | Will you trust this TLS certificate?: perceptions of people working in IT. Martin Ukrop, Lydia Kraus, Vashek Matyas, Heider Ahmad Mutleq Wahsheh |
| 2019 | WooKey: designing a trusted and efficient USB device. Ryad Benadjila, Arnauld Michelizza, Mathieu Renard, Philippe Thierry, Philippe Trebuchet |