| 2021 | (Mis)managed: A Novel TLB-based Covert Channel on GPUs. Ajay Nayak, Pratheek B, Vinod Ganapathy, Arkaprava Basu |
| 2021 | A Diversity Index based Scoring Framework for Identifying Smart Meters Launching Stealthy Data Falsification Attacks. Shameek Bhattacharjee, Venkata Praveen Kumar Madhavarapu, Sajal K. Das |
| 2021 | AMEBA: An Adaptive Approach to the Black-Box Evasion of Machine Learning Models. Stefano Calzavara, Lorenzo Cazzaro, Claudio Lucchese |
| 2021 | ARGUS: Assessing Unpatched Vulnerable Devices on the Internet via Efficient Firmware Recognition. Wei Xie, Chao Zhang, Pengfei Wang, Zhenhua Wang, Qiang Yang |
| 2021 | ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, June 7-11, 2021. Jiannong Cao, Man Ho Au, Zhiqiang Lin, Moti Yung |
| 2021 | Accelerating Secure (2+1)-Party Computation by Insecure but Efficient Building Blocks. Keitaro Hiwatashi, Ken Ogura, Satsuya Ohata, Koji Nuida |
| 2021 | Analysis and Takeover of the Bitcoin-Coordinated Pony Malware. Tsuyoshi Taniguchi, Harm Griffioen, Christian Doerr |
| 2021 | Analyzing Spatial Differences in the TLS Security of Delegated Web Services. Joonhee Lee, Hyunwoo Lee, Jongheon Jeong, Doowon Kim, Ted Taekyoung Kwon |
| 2021 | Analyzing the Overhead of File Protection by Linux Security Modules. Wenhui Zhang, Peng Liu, Trent Jaeger |
| 2021 | Bran: Reduce Vulnerability Search Space in Large Open Source Repositories by Learning Bug Symptoms. Dongyu Meng, Michele Guerriero, Aravind Machiry, Hojjat Aghakhani, Priyanka Bose, Andrea Continella, Christopher Kruegel, Giovanni Vigna |
| 2021 | BugGraph: Differentiating Source-Binary Code Similarity with Graph Triplet-Loss Network. Yuede Ji, Lei Cui, H. Howie Huang |
| 2021 | Bypassing Push-based Second Factor and Passwordless Authentication with Human-Indistinguishable Notifications. Mohammed Jubur, Prakash Shrestha, Nitesh Saxena, Jay Prakash |
| 2021 | Cali: Compiler-Assisted Library Isolation. Markus Bauer, Christian Rossow |
| 2021 | Camoufler: Accessing The Censored Web By Utilizing Instant Messaging Channels. Piyush Kumar Sharma, Devashish Gosain, Sambuddho Chakravarty |
| 2021 | Careful Who You Trust: Studying the Pitfalls of Cross-Origin Communication. Gordon Meiser, Pierre Laperdrix, Ben Stock |
| 2021 | Click This, Not That: Extending Web Authentication with Deception. Timothy Barron, Johnny So, Nick Nikiforakis |
| 2021 | ConAML: Constrained Adversarial Machine Learning for Cyber-Physical Systems. Jiangnan Li, Yingyuan Yang, Jinyuan Stella Sun, Kevin Tomsovic, Hairong Qi |
| 2021 | Conware: Automated Modeling of Hardware Peripherals. Chad Spensky, Aravind Machiry, Nilo Redini, Colin Unger, Graham Foster, Evan Blasband, Hamed Okhravi, Christopher Kruegel, Giovanni Vigna |
| 2021 | CrypTag: Thwarting Physical and Logical Memory Vulnerabilities using Cryptographically Colored Memory. Pascal Nasahl, Robert Schilling, Mario Werner, Jan Hoogerbrugge, Marcel Medwed, Stefan Mangard |
| 2021 | Cryptographic Key Derivation from Biometric Inferences for Remote Authentication. Erkam Uzun, Carter Yagemann, Simon P. Chung, Vladimir Kolesnikov, Wenke Lee |
| 2021 | DeepSweep: An Evaluation Framework for Mitigating DNN Backdoor Attacks using Data Augmentation. Han Qiu, Yi Zeng, Shangwei Guo, Tianwei Zhang, Meikang Qiu, Bhavani Thuraisingham |
| 2021 | DySan: Dynamically Sanitizing Motion Sensor Data Against Sensitive Inferences through Adversarial Networks. Antoine Boutet, Carole Frindel, Sébastien Gambs, Théo Jourdan, Rosin Claude Ngueveu |
| 2021 | EchoVib: Exploring Voice Authentication via Unique Non-Linear Vibrations of Short Replayed Speech. S. Abhishek Anand, Jian Liu, Chen Wang, Maliheh Shirvanian, Nitesh Saxena, Yingying Chen |
| 2021 | Efficient Graph Encryption Scheme for Shortest Path Queries. Esha Ghosh, Seny Kamara, Roberto Tamassia |
| 2021 | Efficient Verifiable Image Redacting based on zk-SNARKs. Hankyung Ko, Ingeun Lee, Seunghwa Lee, Jihye Kim, Hyunok Oh |
| 2021 | Encrypted Databases: Progresses and Challenges. Kui Ren |
| 2021 | Evaluating Synthetic Bugs. Joshua Bundt, Andrew Fasano, Brendan Dolan-Gavitt, William Robertson, Tim Leek |
| 2021 | Exploiting the Sensitivity of L2 Adversarial Examples to Erase-and-Restore. Fei Zuo, Qiang Zeng |
| 2021 | Fact and Fiction: Challenging the Honest Majority Assumption of Permissionless Blockchains. Runchao Han, Zhimei Sui, Jiangshan Yu, Joseph K. Liu, Shiping Chen |
| 2021 | Filtering DDoS Attacks from Unlabeled Network Traffic Data Using Online Deep Learning. Wesley Joon-Wie Tann, Jackie Tan Jin Wei, Joanna Purba, Ee-Chien Chang |
| 2021 | HECTOR-V: A Heterogeneous CPU Architecture for a Secure RISC-V Execution Environment. Pascal Nasahl, Robert Schilling, Mario Werner, Stefan Mangard |
| 2021 | HVAC: Evading Classifier-based Defenses in Hidden Voice Attacks. Yi Wu, Xiangyu Xu, Payton R. Walker, Jian Liu, Nitesh Saxena, Yingying Chen, Jiadi Yu |
| 2021 | Hash-Enabled Garbling and the Insecurity of Free-Hashing Garbled Circuits. Ruiyu Zhu, Yan Huang |
| 2021 | HoneyGen: Generating Honeywords Using Representation Learning. Antreas Dionysiou, Vassilis Vassiliades, Elias Athanasopoulos |
| 2021 | Horizontal Privacy-Preserving Linear Regression Which is Highly Efficient for Dataset of Low Dimension. Linpeng Lu, Ning Ding |
| 2021 | How to Take Over Drones. Sebastian Plotz, Frederik Armknecht, Christian Bunse |
| 2021 | IPGuard: Protecting Intellectual Property of Deep Neural Networks via Fingerprinting the Classification Boundary. Xiaoyu Cao, Jinyuan Jia, Neil Zhenqiang Gong |
| 2021 | Identifying Behavior Dispatchers for Malware Analysis. Kyuhong Park, Burak Sahin, Yongheng Chen, Jisheng Zhao, Evan Downing, Hong Hu, Wenke Lee |
| 2021 | Localizing Vulnerabilities Statistically From One Exploit. Shiqi Shen, Aashish Kolluri, Zhen Dong, Prateek Saxena, Abhik Roychoudhury |
| 2021 | Look Before You Leap: Secure Connection Bootstrapping for 5G Networks to Defend Against Fake Base-Stations. Ankush Singla, Rouzbeh Behnia, Syed Rafiul Hussain, Attila A. Yavuz, Elisa Bertino |
| 2021 | Low-Cost Hiding of the Query Pattern. Maryam Sepehri, Florian Kerschbaum |
| 2021 | MalPhase: Fine-Grained Malware Detection Using Network Flow Data. Michal Piskozub, Fabio De Gaspari, Freddie Barr-Smith, Luigi V. Mancini, Ivan Martinovic |
| 2021 | Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes. Keane Lucas, Mahmood Sharif, Lujo Bauer, Michael K. Reiter, Saurabh Shintre |
| 2021 | Measuring User Perception for Detecting Unexpected Access to Sensitive Resource in Mobile Apps. Trung Tin Nguyen, Duc Cuong Nguyen, Michael Schilling, Gang Wang, Michael Backes |
| 2021 | Morshed: Guiding Behavioral Decision-Makers towards Better Security Investment in Interdependent Systems. Mustafa Abdallah, Daniel Woods, Parinaz Naghizadeh, Issa Khalil, Timothy N. Cason, Shreyas Sundaram, Saurabh Bagchi |
| 2021 | Multi-User Collusion-Resistant Searchable Encryption with Optimal Search Time. Yun Wang, Dimitrios Papadopoulos |
| 2021 | Non-Equivocation in Blockchain: Double-Authentication-Preventing Signatures Gone Contractual. Yannan Li, Willy Susilo, Guomin Yang, Yong Yu, Tran Viet Xuan Phuong, Dongxi Liu |
| 2021 | Non-Intrusive and High-Efficient Balance Tomography in the Lightning Network. Yan Qiao, Kui Wu, Majid Khabbazian |
| 2021 | On Detecting Deception in Space Situational Awareness. James Pavur, Ivan Martinovic |
| 2021 | Oversharing Is Not Caring: How CNAME Cloaking Can Expose Your Session Cookies. Assel Aliyeva, Manuel Egele |
| 2021 | P2DPI: Practical and Privacy-Preserving Deep Packet Inspection. Jongkil Kim, Seyit Camtepe, Joonsang Baek, Willy Susilo, Josef Pieprzyk, Surya Nepal |
| 2021 | PLI-TDC: Super Fine Delay-Time Based Physical-Layer Identification with Time-to-Digital Converter for In-Vehicle Networks. Shuji Ohira, Araya Kibrom Desta, Ismail Arai, Kazutoshi Fujikawa |
| 2021 | PSec: Programming Secure Distributed Systems using Enclaves. Shivendra Kushwah, Ankush Desai, Pramod Subramanyan, Sanjit A. Seshia |
| 2021 | Pipa: Privacy-preserving Password Checkup via Homomorphic Encryption. Jie Li, Yamin Liu, Shuang Wu |
| 2021 | Privacy-preserving Density-based Clustering. Beyza Bozdemir, Sébastien Canard, Orhan Ermis, Helen Möllering, Melek Önen, Thomas Schneider |
| 2021 | Privilege-Escalation Vulnerability Discovery for Large-scale RPC Services: Principle, Design, and Deployment. Zhuotao Liu, Hao Zhao, Sainan Li, Qi Li, Tao Wei, Yu Wang |
| 2021 | REFIT: A Unified Watermark Removal Framework For Deep Learning Systems With Limited Data. Xinyun Chen, Wenxiao Wang, Chris Bender, Yiming Ding, Ruoxi Jia, Bo Li, Dawn Song |
| 2021 | Recompose Event Sequences vs. Predict Next Events: A Novel Anomaly Detection Approach for Discrete Event Logs. Lun-Pin Yuan, Peng Liu, Sencun Zhu |
| 2021 | Red Alert for Power Leakage: Exploiting Intel RAPL-Induced Side Channels. Zhenkai Zhang, Sisheng Liang, Fan Yao, Xing Gao |
| 2021 | Redactable Blockchain Supporting Supervision and Self-Management. Yanxue Jia, Shifeng Sun, Yi Zhang, Zhiqiang Liu, Dawu Gu |
| 2021 | Robust Roadside Physical Adversarial Attack Against Deep Learning in Lidar Perception Modules. Kaichen Yang, Tzungyu Tsai, Honggang Yu, Max Panoff, Tsung-Yi Ho, Yier Jin |
| 2021 | Robust and Verifiable Information Embedding Attacks to Deep Neural Networks via Error-Correcting Codes. Jinyuan Jia, Binghui Wang, Neil Zhenqiang Gong |
| 2021 | Scanning the Cycle: Timing-based Authentication on PLCs. Chuadhry Mujeeb Ahmed, Martín Ochoa, Jianying Zhou, Aditya Mathur |
| 2021 | Secure Role and Rights Management for Automotive Access and Feature Activation. Christian Plappert, Lukas Jäger, Andreas Fuchs |
| 2021 | Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem. Doowon Kim, Haehyun Cho, Yonghwi Kwon, Adam Doupé, Sooel Son, Gail-Joon Ahn, Tudor Dumitras |
| 2021 | See through Walls: Detecting Malware in SGX Enclaves with SGX-Bouncer. Zeyu Zhang, Xiaoli Zhang, Qi Li, Kun Sun, Yinqian Zhang, Songsong Liu, Yukun Liu, Xiaoning Li |
| 2021 | SoK: Enabling Security Analyses of Embedded Systems via Rehosting. Andrew Fasano, Tiemoko Ballo, Marius Muench, Tim Leek, Alexander Bulekov, Brendan Dolan-Gavitt, Manuel Egele, Aurélien Francillon, Long Lu, Nick Gregory, Davide Balzarotti, William Robertson |
| 2021 | Stealing Deep Reinforcement Learning Models for Fun and Profit. Kangjie Chen, Shangwei Guo, Tianwei Zhang, Xiaofei Xie, Yang Liu |
| 2021 | Streamlet: An Absurdly Simple, Textbook Blockchain Protocol. Elaine Shi |
| 2021 | Targeting the Weakest Link: Social Engineering Attacks in Ethereum Smart Contracts. Nikolay Ivanov, Jianzhi Lou, Ting Chen, Jin Li, Qiben Yan |
| 2021 | Transduction Shield: A Low-Complexity Method to Detect and Correct the Effects of EMI Injection Attacks on Sensors. Yazhou Tu, Vijay Srinivas Tida, Zhongqi Pan, Xiali Hei |
| 2021 | Trustworthy Machine Learning: Past, Present, and Future. Somesh Jha |
| 2021 | UltraPIN: Inferring PIN Entries via Ultrasound. Ximing Liu, Yingjiu Li, Robert H. Deng |
| 2021 | Understanding the Privacy Implications of Adblock Plus's Acceptable Ads. Ahsan Zafar, Aafaq Sabir, Dilawer Ahmed, Anupam Das |