| 2018 | 2MA: Verifying Voice Commands via Two Microphone Authentication. Logan Blue, Hadi Abdullah, Luis Vargas, Patrick Traynor |
| 2018 | A Data-driven Attack against Support Vectors of SVM. Shigang Liu, Jun Zhang, Yu Wang, Wanlei Zhou, Yang Xiang, Olivier Y. de Vel |
| 2018 | A Leak-Resilient Dual Stack Scheme for Backward-Edge Control-Flow Integrity. Philipp Zieris, Julian Horsch |
| 2018 | A Linear Distinguisher and its Application for Analyzing Privacy-Preserving Transformation Used in Verifiable (Outsourced) Computation. Liang Zhao, Liqun Chen |
| 2018 | Achieving Flexibility for ABE with Outsourcing via Proxy Re-Encryption. Zuoxia Yu, Man Ho Au, Rupeng Yang, Junzuo Lai, Qiuliang Xu |
| 2018 | Augmenting Telephone Spam Blacklists by Mining Large CDR Datasets. Jienan Liu, Babak Rahbarinia, Roberto Perdisci, Haitao Du, Li Su |
| 2018 | Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features. Michael Schwarz, Daniel Gruss, Moritz Lipp, Clémentine Maurice, Thomas Schuster, Anders Fogh, Stefan Mangard |
| 2018 | BCD: Decomposing Binary Code Into Components Using Graph-Based Clustering. Vishal Karande, Swarup Chandra, Zhiqiang Lin, Juan Caballero, Latifur Khan, Kevin W. Hamlen |
| 2018 | CUP: Comprehensive User-Space Protection for C/C++. Nathan Burow, Derrick Paul McKee, Scott A. Carr, Mathias Payer |
| 2018 | Can You Trust Your Encrypted Cloud?: An Assessment of SpiderOakONE's Security. Anders P. K. Dalskov, Claudio Orlandi |
| 2018 | Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications. M. Sadegh Riazi, Christian Weinert, Oleksandr Tkachenko, Ebrahim M. Songhori, Thomas Schneider, Farinaz Koushanfar |
| 2018 | Ciphertext Integrity with Misuse and Leakage: Definition and Efficient Constructions with Symmetric Primitives. Francesco Berti, François Koeune, Olivier Pereira, Thomas Peters, François-Xavier Standaert |
| 2018 | Cybercrime After the Sunrise: A Statistical Analysis of DNS Abuse in New gTLDs. Maciej Korczynski, Maarten Wullink, Samaneh Tajalizadehkhoob, Giovane C. M. Moura, Arman Noroozian, Drew Bagley, Cristian Hesselman |
| 2018 | Dazed Droids: A Longitudinal Study of Android Inter-App Vulnerabilities. Ryan Johnson, Mohamed Elsabagh, Angelos Stavrou, Jeff Offutt |
| 2018 | DeWiCam: Detecting Hidden Wireless Cameras via Smartphones. Yushi Cheng, Xiaoyu Ji, Tianyang Lu, Wenyuan Xu |
| 2018 | Detecting Malicious PowerShell Commands using Deep Neural Networks. Danny Hendler, Shay Kels, Amir Rubin |
| 2018 | Detection under Privileged Information. Z. Berkay Celik, Patrick D. McDaniel, Rauf Izmailov, Nicolas Papernot, Ryan Sheatsley, Raquel Alvarez, Ananthram Swami |
| 2018 | Direct Anonymous Attestation with Efficient Verifier-Local Revocation for Subscription System. Vireshwar Kumar, He Li, Noah Luther, Pranav Asokan, Jung-Min "Jerry" Park, Kaigui Bian, Martin B. H. Weiss, Taieb Znati |
| 2018 | Don't throw me away: Threats Caused by the Abandoned Internet Resources Used by Android Apps. Elkana Pariwono, Daiki Chiba, Mitsuaki Akiyama, Tatsuya Mori |
| 2018 | Droid M+: Developer Support for Imbibing Android's New Permission Model. Ioannis Gasparis, Azeem Aqil, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy, Rajiv Gupta, Edward Colbert |
| 2018 | Efficient Repair of Polluted Machine Learning Systems via Causal Unlearning. Yinzhi Cao, Alexander Fangxiao Yu, Andrew Aday, Eric Stahl, Jon Merwine, Junfeng Yang |
| 2018 | Efficient Two-level Homomorphic Encryption in Prime-order Bilinear Groups and A Fast Implementation in WebAssembly. Nuttapong Attrapadung, Goichiro Hanaoka, Shigeo Mitsunari, Yusuke Sakai, Kana Shimizu, Tadanori Teruya |
| 2018 | Electromagnetic Induction Attacks Against Embedded Systems. Jayaprakash Selvaraj, Gökçen Yilmaz Dayanikli, Neelam Prabhu Gaunkar, David Ware, Ryan M. Gerdes, Mani Mina |
| 2018 | Entwining Sanitization and Personalization on Databases. Sébastien Gambs, Julien Lolive, Jean-Marc Robert |
| 2018 | FBSleuth: Fake Base Station Forensics via Radio Frequency Fingerprinting. Zhou Zhuang, Xiaoyu Ji, Taimin Zhang, Juchuan Zhang, Wenyuan Xu, Zhenhua Li, Yunhao Liu |
| 2018 | Hardware Performance Counters Can Detect Malware: Myth or Fact? Boyou Zhou, Anmol Gupta, Rasoul Jahanshahi, Manuel Egele, Ajay Joshi |
| 2018 | Highly-Efficient Fully-Anonymous Dynamic Group Signatures. David Derler, Daniel Slamanig |
| 2018 | HlcAuth: Key-free and Secure Communications via Home-Limited Channel. Chaohao Li, Xiaoyu Ji, Xinyan Zhou, Juchuan Zhang, Jing Tian, Yanmiao Zhang, Wenyuan Xu |
| 2018 | Investigating Web Defacement Campaigns at Large. Federico Maggi, Marco Balduzzi, Ryan Flores, Lion Gu, Vincenzo Ciancaglini |
| 2018 | Isogrammic-Fusion ORAM: Improved Statistically Secure Privacy-Preserving Cloud Data Access for Thin Clients. Michael T. Goodrich |
| 2018 | Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies. Oleksandr Tkachenko, Christian Weinert, Thomas Schneider, Kay Hamacher |
| 2018 | Leaky Wires: Information Leakage and Covert Communication Between FPGA Long Wires. Ilias Giechaskiel, Kasper Bonne Rasmussen, Ken Eguro |
| 2018 | Leveraging Hardware Transactional Memory for Cache Side-Channel Defenses. Sanchuan Chen, Fangfei Liu, Zeyu Mi, Yinqian Zhang, Ruby B. Lee, Haibo Chen, Xiaofeng Wang |
| 2018 | No One In The Middle: Enabling Network Access Control Via Transparent Attribution. Jeremy Erickson, Qi Alfred Chen, Xiaochen Yu, Erinjen Lin, Robert Levy, Zhuoqing Morley Mao |
| 2018 | Non-interactive and Output Expressive Private Comparison from Homomorphic Encryption. Wenjie Lu, Jun-Jie Zhou, Jun Sakuma |
| 2018 | On the Memory-Hardness of Data-Independent Password-Hashing Functions. Joël Alwen, Peter Gazi, Chethan Kamath, Karen Klein, Georg Osang, Krzysztof Pietrzak, Leonid Reyzin, Michal Rolínek, Michal Rybár |
| 2018 | On the Strategy and Behavior of Bitcoin Mining with N-attackers. Hanqing Liu, Na Ruan, Rongtian Du, Weijia Jia |
| 2018 | POSTER: A Framework for Phylogenetic Analysis in Mobile Environment. Fabio Martinelli, Francesco Mercaldo, Andrea Saracino |
| 2018 | POSTER: Address Authentication Based on Location History. Hosung Park, Daeyong Kwon, Seungsoo Nam, Daeseon Choi |
| 2018 | POSTER: Authenticated Key-Exchange Protocol for Heterogeneous CPS. Harishma Boyapally, Sikhar Patranabis, Urbi Chatterjee, Debdeep Mukhopadhyay |
| 2018 | POSTER: CPS Security Testbed Development Using Controller-in-the-Middle. Seungoh Choi, Woomyo Lee, Hyeok-Ki Shin, Jeong-Han Yun, Sin-Kyu Kim |
| 2018 | POSTER: Can We Use Biometric Authentication on Cloud?: Fingerprint Authentication Using Homomorphic Encryption. Taeyun Kim, Hyoungshick Kim |
| 2018 | POSTER: DeepCRACk: Using Deep Learning to Automatically CRack Audio CAPTCHAs. William Aiken, Hyoungshick Kim |
| 2018 | POSTER: Deterring DDoS Attacks on Blockchain-based Cryptocurrencies through Mempool Optimization. Muhammad Saad, My T. Thai, Aziz Mohaisen |
| 2018 | POSTER: Evaluating Privacy Metrics for Graph Anonymization and De-anonymization. Yuchen Zhao, Isabel Wagner |
| 2018 | POSTER: I Can't Hear This Because I Am Human: A Novel Design of Audio CAPTCHA System. Jusop Choi, Taekkyung Oh, William Aiken, Simon S. Woo, Hyoungshick Kim |
| 2018 | POSTER: Mining with Proof-of-Probability in Blockchain. Sungmin Kim, Joongheon Kim |
| 2018 | POSTER: On Compressing PKI Certificates for Resource Limited Internet of Things Devices. HyukSang Kwon, Shahid Raza, JeongGil Ko |
| 2018 | POSTER: Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions. Afsah Anwar, Aminollah Khormali, Aziz Mohaisen |
| 2018 | POSTER: Undetectable Task Bypassing OS Scheduler via Hardware Task Switching. Kyeong Joo Jung, Bang Hun Lee, Yeon Nam Gung, Jun Seok Kim, Hyung Suk Kim, Ju Seong Han, Tomaspeter Kim, Bong Jun Choi |
| 2018 | POSTER: Zero-Day Evasion Attack Analysis on Race between Attack and Defense. Hyun Kwon, Hyunsoo Yoon, Daeseon Choi |
| 2018 | Poster: Physics-Based Attack Detection for an Insider Threat Model in a Cyber-Physical System. Anand Agrawal, Chuadhry Mujeeb Ahmed, Ee-Chien Chang |
| 2018 | ProcHarvester: Fully Automated Analysis of Procfs Side-Channel Leaks on Android. Raphael Spreitzer, Felix Kirchengast, Daniel Gruss, Stefan Mangard |
| 2018 | Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018 Jong Kim, Gail-Joon Ahn, Seungjoo Kim, Yongdae Kim, Javier López, Taesoo Kim |
| 2018 | Protecting Intellectual Property of Deep Neural Networks with Watermarking. Jialong Zhang, Zhongshu Gu, Jiyong Jang, Hui Wu, Marc Ph. Stoecklin, Heqing Huang, Ian M. Molloy |
| 2018 | Pseudoentropic Isometries: A New Framework for Fuzzy Extractor Reusability. Quentin Alamélou, Paul-Edmond Berthier, Chloé Cachet, Stéphane Cauchie, Benjamin Fuller, Philippe Gaborit, Sailesh Simhadri |
| 2018 | SALAD: Secure and Lightweight Attestation of Highly Dynamic and Disruptive Networks. Florian Kohnhäuser, Niklas Büscher, Stefan Katzenbeisser |
| 2018 | SecSAKE: Towards Secure and Efficient Outsourcing of Clinical MRI Reconstruction. Zihao Shan, Zhan Qin, Leslie Ying, Kui Ren |
| 2018 | Secure Similar Sequence Query on Outsourced Genomic Data. Ke Cheng, Yantian Hou, Liangmin Wang |
| 2018 | Sensor CON-Fusion: Defeating Kalman Filter in Signal Injection Attack. Shoei Nashimoto, Daisuke Suzuki, Takeshi Sugawara, Kazuo Sakiyama |
| 2018 | Single Trace Attack Against RSA Key Generation in Intel SGX SSL. Samuel Weiser, Raphael Spreitzer, Lukas Bodner |
| 2018 | Software-Defined Firewall: Enabling Malware Traffic Detection and Programmable Security Control. Shang Gao, Zecheng Li, Yuan Yao, Bin Xiao, Songtao Guo, Yuanyuan Yang |
| 2018 | Source Attribution of Cryptographic API Misuse in Android Applications. Ildar Muslukhov, Yazan Boshmaf, Konstantin Beznosov |
| 2018 | TABOR: A Graphical Model-based Approach for Anomaly Detection in Industrial Control Systems. Qin Lin, Sridhar Adepu, Sicco Verwer, Aditya Mathur |
| 2018 | Temporal Consistency of Integrity-Ensuring Computations and Applications to Embedded Systems Security. Xavier Carpent, Karim Eldefrawy, Norrathep Rattanavipanon, Gene Tsudik |
| 2018 | The Personal Identification Chord: A Four ButtonAuthentication System for Smartwatches. Ian Oakley, Jun Ho Huh, Junsung Cho, Geumhwan Cho, Md. Rasel Islam, Hyoungshick Kim |
| 2018 | To Intercept or Not to Intercept: Analyzing TLS Interception in Network Appliances. Louis Waked, Mohammad Mannan, Amr M. Youssef |
| 2018 | Towards Fast and Semi-supervised Identification of Smart Meters Launching Data Falsification Attacks. Shameek Bhattacharjee, Aditya Thakur, Sajal K. Das |
| 2018 | Towards Measuring the Role of Phone Numbers in Twitter-Advertised Spam. Payas Gupta, Roberto Perdisci, Mustaque Ahamad |
| 2018 | Towards Sustainable Evolution for the TLS Public-Key Infrastructure. Taeho Lee, Christos Pappas, Pawel Szalachowski, Adrian Perrig |
| 2018 | Use-After-FreeMail: Generalizing the Use-After-Free Problem and Applying it to Email Services. Daniel Gruss, Michael Schwarz, Matthias Wübbeling, Simon Guggi, Timo Malderle, Stefan More, Moritz Lipp |
| 2018 | Where's Wally?: How to Privately Discover your Friends on the Internet. Panagiotis Papadopoulos, Antonios A. Chariton, Elias Athanasopoulos, Evangelos P. Markatos |
| 2018 | Who is knocking on the Telnet Port: A Large-Scale Empirical Study of Network Scanning. Hwanjo Heo, Seungwon Shin |
| 2018 | You Are Your Photographs: Detecting Multiple Identities of Vendors in the Darknet Marketplaces. Xiangwen Wang, Peng Peng, Chun Wang, Gang Wang |
| 2018 | iOracle: Automated Evaluation of Access Control Policies in iOS. Luke Deshotels, Razvan Deaconescu, Costin Carabas, Iulia Manda, William Enck, Mihai Chiroiu, Ninghui Li, Ahmad-Reza Sadeghi |
| 2018 | le-git-imate: Towards Verifiable Web-based Git Repositories. Hammad Afzali, Santiago Torres-Arias, Reza Curtmola, Justin Cappos |