| 2021 | 2D-2FA: A New Dimension in Two-Factor Authentication. Maliheh Shirvanian, Shashank Agrawal |
| 2021 | A Cross-role and Bi-national Analysis on Security Efforts and Constraints of Software Development Projects. Fumihiro Kanei, Ayako Akiyama Hasegawa, Eitaro Shioji, Mitsuaki Akiyama |
| 2021 | A Look Back on a Function Identification Problem. Hyungjoon Koo, Soyeon Park, Taesoo Kim |
| 2021 | A formal analysis of IKEv2's post-quantum extension. Stefan-Lukas Gazdag, Sophia Grundner-Culemann, Tobias Guggemos, Tobias Heider, Daniel Loebenberger |
| 2021 | ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021 |
| 2021 | ARID: Anonymous Remote IDentification of Unmanned Aerial Vehicles. Pietro Tedeschi, Savio Sciancalepore, Roberto Di Pietro |
| 2021 | Advanced System Resiliency Based on Virtualization Techniques for IoT Devices. Jonas Röckl, Mykolai Protsenko, Monika Huber, Tilo Müller, Felix C. Freiling |
| 2021 | An Efficient Man-Machine Recognition Method Based On Mouse Trajectory Feature De-redundancy. Xiaofeng Lu, Zhenhan Feng, Jupeng Xia |
| 2021 | An Exploration of ARM System-Level Cache and GPU Side Channels. Patrick Cronin, Xing Gao, Haining Wang, Chase Cotton |
| 2021 | BAPM: Block Attention Profiling Model for Multi-tab Website Fingerprinting Attacks on Tor. Zhong Guan, Gang Xiong, Gaopeng Gou, Zhen Li, Mingxin Cui, Chang Liu |
| 2021 | BadNL: Backdoor Attacks against NLP Models with Semantic-preserving Improvements. Xiaoyi Chen, Ahmed Salem, Dingfan Chen, Michael Backes, Shiqing Ma, Qingni Shen, Zhonghai Wu, Yang Zhang |
| 2021 | Can We Leverage Predictive Uncertainty to Detect Dataset Shift and Adversarial Examples in Android Malware Detection? Deqiang Li, Tian Qiu, Shuo Chen, Qianmu Li, Shouhuai Xu |
| 2021 | Characterizing Improper Input Validation Vulnerabilities of Mobile Crowdsourcing Services. Sojhal Ismail Khan, Dominika C. Woszczyk, Chengzeng You, Soteris Demetriou, Muhammad Naveed |
| 2021 | CommanderGabble: A Universal Attack Against ASR Systems Leveraging Fast Speech. Zhaohe John Zhang, Edwin Yang, Song Fang |
| 2021 | Crypto-Chain: A Relay Resilience Framework for Smart Vehicles. Abubakar Sadiq Sani, Dong Yuan, Elisa Bertino, Zhao Yang Dong |
| 2021 | Detecting Audio Adversarial Examples with Logit Noising. Namgyu Park, Sangwoo Ji, Jong Kim |
| 2021 | Detecting and Characterizing SMS Spearphishing Attacks. Mingxuan Liu, Yiming Zhang, Baojun Liu, Zhou Li, Haixin Duan, Donghong Sun |
| 2021 | Dicos: Discovering Insecure Code Snippets from Stack Overflow Posts by Leveraging User Discussions. Hyunji Hong, Seunghoon Woo, Heejo Lee |
| 2021 | Digit Semantics based Optimization for Practical Password Cracking Tools. Haodong Zhang, Chuanwang Wang, Wenqiang Ruan, Junjie Zhang, Ming Xu, Weili Han |
| 2021 | DistAppGaurd: Distributed Application Behaviour Profiling in Cloud-Based Environment. Mohammad Mahdi Ghorbani, Fereydoun Farrahi Moghaddam, Mengyuan Zhang, Makan Pourzandi, Kim Khoa Nguyen, Mohamed Cheriet |
| 2021 | Don't hand it Over: Vulnerabilities in the Handover Procedure of Cellular Telecommunications. Evangelos Bitsikas, Christina Pöpper |
| 2021 | Dynamic Taint Analysis versus Obfuscated Self-Checking. Sebastian Banescu, Samuel Valenzuela, Marius Guggenmos, Mohsen Ahmadvand, Alexander Pretschner |
| 2021 | Efficient, Private and Robust Federated Learning. Meng Hao, Hongwei Li, Guowen Xu, Hanxiao Chen, Tianwei Zhang |
| 2021 | Eluding ML-based Adblockers With Actionable Adversarial Examples. Shitong Zhu, Zhongjie Wang, Xun Chen, Shasha Li, Keyu Man, Umar Iqbal, Zhiyun Qian, Kevin S. Chan, Srikanth V. Krishnamurthy, Zubair Shafiq, Yu Hao, Guoren Li, Zheng Zhang, Xiaochen Zou |
| 2021 | Evaluating the Effectiveness of Protection Jamming Devices in Mitigating Smart Speaker Eavesdropping Attacks Using Gaussian White Noise. Payton Walker, Nitesh Saxena |
| 2021 | FINN: Fingerprinting Network Flows using Neural Networks. Fatemeh Rezaei, Amir Houmansadr |
| 2021 | FlexFilt: Towards Flexible Instruction Filtering for Security. Leila Delshadtehrani, Sadullah Canakci, William Blair, Manuel Egele, Ajay Joshi |
| 2021 | Global Feature Analysis and Comparative Evaluation of Freestyle In-Air-Handwriting Passcode for User Authentication. Duo Lu, Yuli Deng, Dijiang Huang |
| 2021 | Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of Location. Zheng Yang, Chenglu Jin, Jianting Ning, Zengpeng Li, Tien Tuan Anh Dinh, Jianying Zhou |
| 2021 | Heterogeneous-PAKE: Bridging the Gap between PAKE Protocols and Their Real-World Deployment. Rong Wei, Fangyu Zheng, Lili Gao, Jiankuo Dong, Guang Fan, Lipeng Wan, Jingqiang Lin, Yuewu Wang |
| 2021 | ICS3Fuzzer: A Framework for Discovering Protocol Implementation Bugs in ICS Supervisory Software by Fuzzing. Dongliang Fang, Zhanwei Song, Le Guan, Puzhuo Liu, Anni Peng, Kai Cheng, Yaowen Zheng, Peng Liu, Hongsong Zhu, Limin Sun |
| 2021 | Improving Streaming Cryptocurrency Transaction Classification via Biased Sampling and Graph Feedback. Shaltiel Eloul, Sean J. Moran, Jacob Mendel |
| 2021 | Is Visualization Enough? Evaluating the Efficacy of MUD-Visualizer in Enabling Ease of Deployment for Manufacturer Usage Description (MUD). Vafa Andalibi, Jayati Dev, DongInn Kim, Eliot Lear, L. Jean Camp |
| 2021 | Keeping Safe Rust Safe with Galeed. Elijah Rivera, Samuel Mergendahl, Howard E. Shrobe, Hamed Okhravi, Nathan Burow |
| 2021 | LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped Systems. Niclas Kühnapfel, Stefan Preußler, Maximilian Noppel, Thomas Schneider, Konrad Rieck, Christian Wressnegger |
| 2021 | MAppGraph: Mobile-App Classification on Encrypted Network Traffic using Deep Graph Convolution Neural Networks. Thai-Dien Pham, Thien-Lac Ho, Tram Truong Huu, Tien-Dung Cao, Hong Linh Truong |
| 2021 | MISA: Online Defense of Trojaned Models using Misattributions. Panagiota Kiourti, Wenchao Li, Anirban Roy, Karan Sikka, Susmit Jha |
| 2021 | MineHunter: A Practical Cryptomining Traffic Detection Algorithm Based on Time Series Tracking. Shize Zhang, Zhiliang Wang, Jiahai Yang, Xin Cheng, Xiaoqian Ma, Hui Zhang, Bo Wang, Zimu Li, Jianping Wu |
| 2021 | Mitosis: Practically Scaling Permissioned Blockchains. Giorgia Azzurra Marson, Sébastien Andreina, Lorenzo Alluminio, Konstantin Munichev, Ghassan Karame |
| 2021 | Morphence: Moving Target Defense Against Adversarial Examples. Abderrahmen Amich, Birhanu Eshete |
| 2021 | OPay: an Orientation-based Contactless Payment Solution Against Passive Attacks. Mahshid Mehr Nezhad, Feng Hao |
| 2021 | Obfuscation Revealed: Leveraging Electromagnetic Signals for Obfuscated Malware Classification. Duy-Phuc Pham, Damien Marion, Matthieu Mastio, Annelie Heuser |
| 2021 | On Detecting Growing-Up Behaviors of Malicious Accounts in Privacy-Centric Mobile Social Networks. Zijie Yang, Binghui Wang, Haoran Li, Dong Yuan, Zhuotao Liu, Neil Zhenqiang Gong, Chang Liu, Qi Li, Xiao Liang, Shaofeng Hu |
| 2021 | On Key Reinstallation Attacks over 4G LTE Control-Plane: Feasibility and Negative Impact. Muhammad Taqi Raza, Yunqi Guo, Songwu Lu, Fatima Muhammad Anwar |
| 2021 | Optimized Paillier's Cryptosystem with Fast Encryption and Decryption. Huanyu Ma, Shuai Han, Hao Lei |
| 2021 | Physical Logic Bombs in 3D Printers via Emerging 4D Techniques. Tuan Le, Sriharsha Etigowni, Sizhuang Liang, Xirui Peng, H. Jerry Qi, Mehdi Javanmard, Saman A. Zonouz, Raheem Beyah |
| 2021 | Platform-Oblivious Anti-Spam Gateway. Yihe Zhang, Xu Yuan, Nian-Feng Tzeng |
| 2021 | Practical Attestation for Edge Devices Running Compute Heavy Machine Learning Applications. Ismi Abidi, Vireshwar Kumar, Rijurekha Sen |
| 2021 | Program Obfuscation via ABI Debiasing. David Demicco, Rukayat Erinfolami, Aravind Prakash |
| 2021 | ReCFA: Resilient Control-Flow Attestation. Yumei Zhang, Xinzhi Liu, Cong Sun, Dongrui Zeng, Gang Tan, Xiao Kan, Siqi Ma |
| 2021 | Reinhardt: Real-time Reconfigurable Hardware Architecture for Regular Expression Matching in DPI. Taejune Park, Jaehyun Nam, Seung Ho Na, JaeWoong Chung, Seungwon Shin |
| 2021 | Repack Me If You Can: An Anti-Repackaging Solution Based on Android Virtualization. Antonio Ruggia, Eleonora Losiouk, Luca Verderame, Mauro Conti, Alessio Merlo |
| 2021 | Reproducible and Adaptable Log Data Generation for Sound Cybersecurity Experiments. Rafael Uetz, Christian Hemminghaus, Louis Hackländer, Philipp Schlipper, Martin Henze |
| 2021 | RingRAM: A Unified Hardware SecurityPrimitive for IoT Devices that Gets Better with Age. Michael Moukarzel, Matthew Hicks |
| 2021 | Rocky: Replicating Block Devices for Tamper and Failure Resistant Edge-based Virtualized Desktop Infrastructure. Beom Heyn Kim, Hyoungshick Kim |
| 2021 | Rupair: Towards Automatic Buffer Overflow Detection and Rectification for Rust. Baojian Hua, Wanrong Ouyang, Chengman Jiang, Qiliang Fan, Zhizhong Pan |
| 2021 | S2-CAN: Sufficiently Secure Controller Area Network. Mert D. Pesé, Jay W. Schauer, Junhui Li, Kang G. Shin |
| 2021 | SMap: Internet-wide Scanning for Spoofing. Tianxiang Dai, Haya Schulmann |
| 2021 | SODA: A System for Cyber Deception Orchestration and Automation. Md Sajidul Islam Sajid, Jinpeng Wei, Basel Abdeen, Ehab Al-Shaer, Md. Mazharul Islam, Walter Diong, Latifur Khan |
| 2021 | Security of Multicarrier Time-of-Flight Ranging. Patrick Leu, Martin Kotuliak, Marc Roeschlin, Srdjan Capkun |
| 2021 | Sipster: Settling IOU Privately and Quickly with Smart Meters. Sherman S. M. Chow, Ming Li, Yongjun Zhao, Wenqiang Jin |
| 2021 | SoftMark: Software Watermarking via a Binary Function Relocation. Honggoo Kang, Yonghwi Kwon, Sangjin Lee, Hyungjoon Koo |
| 2021 | SolSaviour: A Defending Framework for Deployed Defective Smart Contracts. Zecheng Li, Yu Zhou, Songtao Guo, Bin Xiao |
| 2021 | Stealing Machine Learning Models: Attacks and Countermeasures for Generative Adversarial Networks. Hailong Hu, Jun Pang |
| 2021 | Systematization of Password ManagerUse Cases and Design Paradigms. James Simmons, Oumar Diallo, Sean Oesch, Scott Ruoti |
| 2021 | TEEKAP: Self-Expiring Data Capsule using Trusted Execution Environment. Mingyuan Gao, Hung Dang, Ee-Chien Chang |
| 2021 | TLB Poisoning Attacks on AMD Secure Encrypted Virtualization. Mengyuan Li, Yinqian Zhang, Huibo Wang, Kang Li, Yueqiang Cheng |
| 2021 | The Emperor's New Autofill Framework: A Security Analysis of Autofill on iOS and Android. Sean Oesch, Anuj Gautam, Scott Ruoti |
| 2021 | The Many-faced God: Attacking Face Verification System with Embedding and Image Recovery. Mingtian Tan, Zhe Zhou, Zhou Li |
| 2021 | They See Me Rollin': Inherent Vulnerability of the Rolling Shutter in CMOS Image Sensors. Sebastian Köhler, Giulio Lovisotto, Simon Birnbach, Richard Baker, Ivan Martinovic |
| 2021 | Time to Rethink the Design of Qi Standard? Security and Privacy Vulnerability Analysis of Qi Wireless Charging. Yi Wu, Zhuohang Li, Nicholas Van Nostrand, Jian Liu |
| 2021 | Towards Practical Post-quantum Signatures for Resource-Limited Internet of Things. Rouzbeh Behnia, Attila Altay Yavuz |
| 2021 | Towards Stalkerware Detection with Precise Warnings. Yufei Han, Kevin Alejandro Roundy, Acar Tamersoy |
| 2021 | Try before You Buy: Privacy-preserving Data Evaluation on Cloud-based Machine Learning Data Marketplace. Qiyang Song, Jiahao Cao, Kun Sun, Qi Li, Ke Xu |
| 2021 | Two Souls in an Adversarial Image: Towards Universal Adversarial Example Detection using Multi-view Inconsistency. Sohaib Kiani, Sana Awan, Chao Lan, Fengjun Li, Bo Luo |
| 2021 | Understanding the Threats of Trojaned Quantized Neural Network in Model Supply Chains. Xudong Pan, Mi Zhang, Yifan Yan, Min Yang |
| 2021 | VASA: Vector AES Instructions for Security Applications. Jean-Pierre Münch, Thomas Schneider, Hossein Yalame |
| 2021 | VIA: Analyzing Device Interfaces of Protected Virtual Machines. Felicitas Hetzelt, Martin Radev, Robert Buhren, Mathias Morbitzer, Jean-Pierre Seifert |
| 2021 | Westworld: Fuzzing-Assisted Remote Dynamic Symbolic Execution of Smart Apps on IoT Cloud Platforms. Lannan Luo, Qiang Zeng, Bokai Yang, Fei Zuo, Junzhe Wang |
| 2021 | What's in a Cyber Threat Intelligence sharing platform?: A mixed-methods user experience investigation of MISP. Borce Stojkovski, Gabriele Lenzini, Vincent Koenig, Salvador Rivas |
| 2021 | argXtract: Deriving IoT Security Configurations via Automated Static Analysis of Stripped ARM Cortex-M Binaries. Pallavi Sivakumaran, Jorge Blasco |