| 2020 | A Flexible Framework for Expediting Bug Finding by Leveraging Past (Mis-)Behavior to Discover New Bugs. Sanjeev Das, Kedrian James, Jan Werner, Manos Antonakakis, Michalis Polychronakis, Fabian Monrose |
| 2020 | ACSAC '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020 |
| 2020 | AVclass2: Massive Malware Tag Extraction from AV Labels. Silvia Sebastián, Juan Caballero |
| 2020 | Advanced Windows Methods on Malware Detection and Classification. Dima Rabadi, Sin G. Teo |
| 2020 | App-Agnostic Post-Execution Semantic Analysis of Android In-Memory Forensics Artifacts. Aisha I. Ali-Gombe, Alexandra Tambaoan, Angela Gurfolino, Golden G. Richard III |
| 2020 | Attacking Graph-Based Classification without Changing Existing Connections. Xuening Xu, Xiaojiang Du, Qiang Zeng |
| 2020 | Betrayed by the Guardian: Security and Privacy Risks of Parental Control Solutions. Suzan Ali, Mounir Elgharabawy, Quentin Duchaussoy, Mohammad Mannan, Amr M. Youssef |
| 2020 | CAPS: Smoothly Transitioning to a More Resilient Web PKI. Stephanos Matsumoto, Jay Bosamiya, Yucheng Dai, Paul C. van Oorschot, Bryan Parno |
| 2020 | CDL: Classified Distributed Learning for Detecting Security Attacks in Containerized Applications. Yuhang Lin, Olufogorehan Tunde-Onadele, Xiaohui Gu |
| 2020 | Certified Copy? Understanding Security Risks of Wi-Fi Hotspot based Android Data Clone Services. Siqi Ma, Hehao Li, Wenbo Yang, Juanru Li, Surya Nepal, Elisa Bertino |
| 2020 | Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems. Alessandro Erba, Riccardo Taormina, Stefano Galelli, Marcello Pogliani, Michele Carminati, Stefano Zanero, Nils Ole Tippenhauer |
| 2020 | Cupid : Automatic Fuzzer Selection for Collaborative Fuzzing. Emre Güler, Philipp Görz, Elia Geretto, Andrea Jemmett, Sebastian Österlund, Herbert Bos, Cristiano Giuffrida, Thorsten Holz |
| 2020 | DPIFuzz: A Differential Fuzzing Framework to Detect DPI Elusion Strategies for QUIC. Gaganjeet Singh Reen, Christian Rossow |
| 2020 | DeepSIM: GPS Spoofing Detection on UAVs using Satellite Imagery Matching. Nian Xue, Liang Niu, Xianbin Hong, Zhen Li, Larissa Hoffaeller, Christina Pöpper |
| 2020 | Device-agnostic Firmware Execution is Possible: A Concolic Execution Approach for Peripheral Emulation. Chen Cao, Le Guan, Jiang Ming, Peng Liu |
| 2020 | Double Patterns: A Usable Solution to Increase the Security of Android Unlock Patterns. Timothy J. Forman, Adam J. Aviv |
| 2020 | Dragonblood is Still Leaking: Practical Cache-based Side-Channel in the Wild. Daniel De Almeida Braga, Pierre-Alain Fouque, Mohamed Sabt |
| 2020 | Effect of Security Controls on Patching Window: A Causal Inference based Approach. Aditya Kuppa, Lamine M. Aouad, Nhien-An Le-Khac |
| 2020 | Efficient Oblivious Substring Search via Architectural Support. Nicholas Mainardi, Davide Sampietro, Alessandro Barenghi, Gerardo Pelosi |
| 2020 | FPSelect: Low-Cost Browser Fingerprints for Mitigating Dictionary Attacks against Web Authentication Mechanisms. Nampoina Andriamilanto, Tristan Allard, Gaëtan Le Guelvouit |
| 2020 | Faulty Point Unit: ABI Poisoning Attacks on Intel SGX. Fritz Alder, Jo Van Bulck, David F. Oswald, Frank Piessens |
| 2020 | Februus: Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems. Bao Gia Doan, Ehsan Abbasnejad, Damith C. Ranasinghe |
| 2020 | FirmAE: Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis. Mingeun Kim, Dongkwan Kim, Eunsoo Kim, Suryeon Kim, Yeongjin Jang, Yongdae Kim |
| 2020 | GuardSpark++: Fine-Grained Purpose-Aware Access Control for Secure Data Sharing and Analysis in Spark. Tao Xue, Yu Wen, Bo Luo, Boyang Zhang, Yang Zheng, Yanfei Hu, Yingjiu Li, Gang Li, Dan Meng |
| 2020 | Guide Me to Exploit: Assisted ROP Exploit Generation for ActionScript Virtual Machine. Fadi Yilmaz, Meera Sridhar, Wontae Choi |
| 2020 | HeapExpo: Pinpointing Promoted Pointers to Prevent Use-After-Free Vulnerabilities. Zekun Shen, Brendan Dolan-Gavitt |
| 2020 | Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech Recognition Systems. Lea Schönherr, Thorsten Eisenhofer, Steffen Zeiler, Thorsten Holz, Dorothea Kolossa |
| 2020 | IvoriWatch: Exploring Transparent Integrity Verification of Remote User Input Leveraging Wearables. Prakash Shrestha, Zengrui Liu, Nitesh Saxena |
| 2020 | LeakyPick: IoT Audio Spy Detector. Richard Mitev, Anna Pazii, Markus Miettinen, William Enck, Ahmad-Reza Sadeghi |
| 2020 | Measurements of the Most Significant Software Security Weaknesses. Carlos Cardoso Galhardo, Peter Mell, Irena Bojanova, Assane Gueye |
| 2020 | Measuring the Effectiveness of Privacy Policies for Voice Assistant Applications. Song Liao, Christin Wilson, Long Cheng, Hongxin Hu, Huixing Deng |
| 2020 | More Than Just Good Passwords? A Study on Usability and Security Perceptions of Risk-based Authentication. Stephan Wiefling, Markus Dürmuth, Luigi Lo Iacono |
| 2020 | NoSQL Breakdown: A Large-scale Analysis of Misconfigured NoSQL Services. Dario Ferrari, Michele Carminati, Mario Polino, Stefano Zanero |
| 2020 | NoiseScope: Detecting Deepfake Images in a Blind Setting. Jiameng Pu, Neal Mangaokar, Bolun Wang, Chandan K. Reddy, Bimal Viswanath |
| 2020 | On the Feasibility of Automating Stock Market Manipulation. Carter Yagemann, Simon P. Chung, Erkam Uzun, Sai Ragam, Brendan Saltaformaggio, Wenke Lee |
| 2020 | On the Forensic Validity of Approximated Audit Logs. Noor Michael, Jaron Mink, Jason Liu, Sneha Gaur, Wajih Ul Hassan, Adam Bates |
| 2020 | Policy-based Chameleon Hash for Blockchain Rewriting with Black-box Accountability. Yangguang Tian, Nan Li, Yingjiu Li, Pawel Szalachowski, Jianying Zhou |
| 2020 | Practical Fine-Grained Binary Code Randomization†. Soumyakant Priyadarshan, Huan Nguyen, R. Sekar |
| 2020 | Practical Over-Threshold Multi-Party Private Set Intersection. Rasoul Akhavan Mahdavi, Thomas Humphries, Bailey Kacsmar, Simeon Krastnikov, Nils Lukas, John A. Premkumar, Masoumeh Shafieinejad, Simon Oya, Florian Kerschbaum, Erik-Oliver Blass |
| 2020 | Privacy-Preserving Production Process Parameter Exchange. Jan Pennekamp, Erik Buchholz, Yannik Lockner, Markus Dahlmanns, Tiandong Xi, Marcel Fey, Christian Brecher, Christian Hopmann, Klaus Wehrle |
| 2020 | Probabilistic Naming of Functions in Stripped Binaries. James Patrick-Evans, Lorenzo Cavallaro, Johannes Kinder |
| 2020 | Quantifying measurement quality and load distribution in Tor. André Greubel, Steffen Pohl, Samuel Kounev |
| 2020 | Query-Efficient Black-Box Attack Against Sequence-Based Malware Classifiers. Ishai Rosenberg, Asaf Shabtai, Yuval Elovici, Lior Rokach |
| 2020 | Reboot-Oriented IoT: Life Cycle Management in Trusted Execution Environment for Disposable IoT devices. Kuniyasu Suzaki, Akira Tsukamoto, Andy Green, Mohammad Mannan |
| 2020 | RusTEE: Developing Memory-Safe ARM TrustZone Applications. Shengye Wan, Mingshen Sun, Kun Sun, Ning Zhang, Xu He |
| 2020 | SAIBERSOC: Synthetic Attack Injection to Benchmark and Evaluate the Performance of Security Operation Centers. Martin Rosso, Michele Campobasso, Ganduulga Gankhuyag, Luca Allodi |
| 2020 | SEEF-ALDR: A Speaker Embedding Enhancement Framework via Adversarial Learning based Disentangled Representation. Jianwei Tai, Xiaoqi Jia, Qingjia Huang, Weijuan Zhang, Haichao Du, Shengzhi Zhang |
| 2020 | SERENIoT: Distributed Network Security Policy Management and Enforcement for Smart Homes. Corentin Thomasset, David Barrera |
| 2020 | Secure and Verifiable Inference in Deep Neural Networks. Guowen Xu, Hongwei Li, Hao Ren, Jianfei Sun, Shengmin Xu, Jianting Ning, Haomiao Yang, Kan Yang, Robert H. Deng |
| 2020 | Security Study of Service Worker Cross-Site Scripting. Phakpoom Chinprutthiwong, Raj Vardhan, Guangliang Yang, Guofei Gu |
| 2020 | Session Key Distribution Made Practical for CAN and CAN-FD Message Authentication. Yang Xiao, Shanghao Shi, Ning Zhang, Wenjing Lou, Y. Thomas Hou |
| 2020 | Set It and Forget It! Turnkey ECC for Instant Integration. Dmitry Belyavsky, Billy Bob Brumley, Jesús-Javier Chi-Domínguez, Luis Rivera-Zamarripa, Igor Ustinov |
| 2020 | Spotlight: Malware Lead Generation at Scale. Fabian Kaczmarczyck, Bernhard Grill, Luca Invernizzi, Jennifer Pullman, Cecilia M. Procopiuc, David Tao, Borbala Benko, Elie Bursztein |
| 2020 | StegoNet: Turn Deep Neural Network into a Stegomalware. Tao Liu, Zihao Liu, Qi Liu, Wujie Wen, Wenyao Xu, Ming Li |
| 2020 | Talek: Private Group Messaging with Hidden Access Patterns. Raymond Cheng, William Scott, Elisaweta Masserova, Irene Zhang, Vipul Goyal, Thomas E. Anderson, Arvind Krishnamurthy, Bryan Parno |
| 2020 | The Tangled Genealogy of IoT Malware. Emanuele Cozzi, Pierre-Antoine Vervier, Matteo Dell'Amico, Yun Shen, Leyla Bilge, Davide Balzarotti |
| 2020 | This is Why We Can't Cache Nice Things: Lightning-Fast Threat Hunting using Suspicion-Based Hierarchical Storage. Wajih Ul Hassan, Ding Li, Kangkook Jee, Xiao Yu, Kexuan Zou, Dawei Wang, Zhengzhang Chen, Zhichun Li, Junghwan Rhee, Jiaping Gui, Adam Bates |
| 2020 | Towards Realistic Membership Inferences: The Case of Survey Data. Luke A. Bauer, Vincent Bindschaedler |
| 2020 | Towards a Practical Differentially Private Collaborative Phone Blacklisting System. Daniele Ucci, Roberto Perdisci, Jaewoo Lee, Mustaque Ahamad |
| 2020 | Understanding Promotion-as-a-Service on GitHub. Kun Du, Hao Yang, Yubao Zhang, Haixin Duan, Haining Wang, Shuang Hao, Zhou Li, Min Yang |
| 2020 | Understanding User Perceptions of Security and Privacy for Group Chat: A Survey of Users in the US and UK. Sean Oesch, Ruba Abu-Salma, Oumar Diallo, Juliane Krämer, James Simmons, Justin Wu, Scott Ruoti |
| 2020 | Up2Dep: Android Tool Support to Fix Insecure Code Dependencies. Duc Cuong Nguyen, Erik Derr, Michael Backes, Sven Bugiel |
| 2020 | Verify&Revive: Secure Detection and Recovery of Compromised Low-end Embedded Devices. Mahmoud Ammar, Bruno Crispo |
| 2020 | VibLive: A Continuous Liveness Detection for Secure Voice User Interface in IoT Environment. Linghan Zhang, Sheng Tan, Zi Wang, Yili Ren, Zhi Wang, Jie Yang |
| 2020 | Voicefox: Leveraging Inbuilt Transcription to Enhance the Security of Machine-Human Speaker Verification against Voice Synthesis Attacks. Maliheh Shirvanian, Manar Mohamed, Nitesh Saxena, S. Abhishek Anand |
| 2020 | WearID: Low-Effort Wearable-Assisted Authentication of Voice Commands via Cross-Domain Comparison without Training. Cong Shi, Yan Wang, Yingying Chen, Nitesh Saxena, Chen Wang |
| 2020 | Widely Reused and Shared, Infrequently Updated, and Sometimes Inherited: A Holistic View of PIN Authentication in Digital Lives and Beyond. Hassan Khan, Jason Ceci, Jonah Stegman, Adam J. Aviv, Rozita Dara, Ravi Kuber |
| 2020 | Workflow Integration Alleviates Identity and Access Management in Serverless Computing. Arnav Sankaran, Pubali Datta, Adam Bates |
| 2020 | ZeroAUDIT. Aman Luthra, James Cavanaugh, Hugo Renzzo Olcese, Rina M. Hirsch, Xiang Fu |
| 2020 | dStyle-GAN: Generative Adversarial Network based on Writing and Photography Styles for Drug Identification in Darknet Markets. Yiming Zhang, Yiyue Qian, Yujie Fan, Yanfang Ye, Xin Li, Qi Xiong, Fudong Shao |
| 2020 | ρFEM: Efficient Backward-edge Protection Using Reversed Forward-edge Mappings. Paul Muntean, Matthias Neumayer, Zhiqiang Lin, Gang Tan, Jens Grossklags, Claudia Eckert |