| 2019 | A Closer Look Tells More: A Facial Distortion Based Liveness Detection for Face Authentication. Yan Li, Zilong Wang, Yingjiu Li, Robert H. Deng, Binbin Chen, Weizhi Meng, Hui Li |
| 2019 | A Data Life Cycle Modeling Proposal by Means of Formal Methods. Madalina G. Ciobanu, Fausto Fasano, Fabio Martinelli, Francesco Mercaldo, Antonella Santone |
| 2019 | A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists. Benjamin Zi Hao Zhao, Muhammad Ikram, Hassan Jameel Asghar, Mohamed Ali Kâafar, Abdelberi Chaabane, Kanchana Thilakarathna |
| 2019 | A Feature-Oriented Corpus for Understanding, Evaluating and Improving Fuzz Testing. Xiaogang Zhu, Xiaotao Feng, Tengyun Jiao, Sheng Wen, Yang Xiang, Seyit Camtepe, Jingling Xue |
| 2019 | A Hybrid Approach to Secure Function Evaluation using SGX. Joseph I. Choi, Dave (Jing) Tian, Grant Hernandez, Christopher Patton, Benjamin Mood, Thomas Shrimpton, Kevin R. B. Butler, Patrick Traynor |
| 2019 | A New Blind ECDSA Scheme for Bitcoin Transaction Anonymity. Xun Yi, Kwok-Yan Lam |
| 2019 | A Pilot Study on Consumer IoT Device Vulnerability Disclosure and Patch Release in Japan and the United States. Asuka Nakajima, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Maverick Woo |
| 2019 | Alexa Lied to Me: Skill-based Man-in-the-Middle Attacks on Virtual Assistants. Richard Mitev, Markus Miettinen, Ahmad-Reza Sadeghi |
| 2019 | An Empirical Study of Prioritizing JavaScript Engine Crashes via Machine Learning. Sunnyeo Park, Dohyeok Kim, Sooel Son |
| 2019 | AndrEnsemble: Leveraging API Ensembles to Characterize Android Malware Families. Omid Mirzaei, Guillermo Suarez-Tangil, José María de Fuentes, Juan Tapiador, Gianluca Stringhini |
| 2019 | Can I Opt Out Yet?: GDPR and the Global Illusion of Cookie Control. Iskander Sánchez-Rola, Matteo Dell'Amico, Platon Kotzias, Davide Balzarotti, Leyla Bilge, Pierre-Antoine Vervier, Igor Santos |
| 2019 | Characterizing Adversarial Subspaces by Mutual Information. Chia-Yi Hsu, Pin-Yu Chen, Chia-Mu Yu |
| 2019 | Control-Flow Carrying Code. Yan Lin, Xiaoyang Cheng, Debin Gao |
| 2019 | Cracking the Graph Routes in WirelessHART Networks. Xia Cheng, Junyang Shi, Mo Sha |
| 2019 | DeClassifier: Class-Inheritance Inference Engine for Optimized C++ Binaries. Rukayat Ayomide Erinfolami, Aravind Prakash |
| 2019 | Delegatable Order-Revealing Encryption. Yuan Li, HongBing Wang, Yunlei Zhao |
| 2019 | Design Procedure of Knowledge Base for Practical Attack Graph Generation. Masaki Inokuchi, Yoshinobu Ohta, Shunichi Kinoshita, Tomohiko Yagyu, Orly Stan, Ron Bitton, Yuval Elovici, Asaf Shabtai |
| 2019 | E-Spion: A System-Level Intrusion Detection System for IoT Devices. Anand Mudgerikar, Puneet Sharma, Elisa Bertino |
| 2019 | EPISODE: Efficient Privacy-PreservIng Similar Sequence Queries on Outsourced Genomic DatabasEs. Thomas Schneider, Oleksandr Tkachenko |
| 2019 | Establishing and Maintaining Root of Trust on Commodity Computer Systems. Virgil D. Gligor |
| 2019 | Examining DES-based Cipher Suite Support within the TLS Ecosystem. Vanessa Frost, Dave (Jing) Tian, Christie Ruales, Vijay Prakash, Patrick Traynor, Kevin R. B. Butler |
| 2019 | Exploiting Determinism in Lattice-based Signatures: Practical Fault Attacks on pqm4 Implementations of NIST Candidates. Prasanna Ravi, Mahabir Prasad Jhanwar, James Howe, Anupam Chattopadhyay, Shivam Bhasin |
| 2019 | Exploiting Sound Masking for Audio Privacy in Smartphones. Yu-Chih Tung, Kang G. Shin |
| 2019 | Fidelity: A Property of Deep Neural Networks to Measure the Trustworthiness of Prediction Results. Ziqi Yang |
| 2019 | Flexibly and Securely Shape Your Data Disclosed to Others. Qing-Qing Xie, Yantian Hou, Ke Cheng, Gaby G. Dagher, Liangmin Wang, Shucheng Yu |
| 2019 | From Attacker Models to Reliable Security. Heiko Mantel |
| 2019 | GraphSE²: An Encrypted Graph Database for Privacy-Preserving Social Search. Shangqi Lai, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Yuhong Liu, Dongxi Liu |
| 2019 | HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices. Dominik Breitenbacher, Ivan Homoliak, Yan Lin Aung, Nils Ole Tippenhauer, Yuval Elovici |
| 2019 | High Efficiency, Low-noise Meltdown Attack by using a Return Stack Buffer. Taehyun Kim, Youngjoo Shin |
| 2019 | How to Securely Record Logs based on ARM TrustZone. Seungho Lee, Wonsuk Choi, Hyo Jin Jo, Dong Hoon Lee |
| 2019 | Identity-Based Broadcast Encryption with Outsourced Partial Decryption for Hybrid Security Models in Edge Computing. Jongkil Kim, Seyit Camtepe, Willy Susilo, Surya Nepal, Joonsang Baek |
| 2019 | IoT Application-Centric Access Control (ACAC). Mohammed Al-Shaboti, Ian Welch, Aaron Chen |
| 2019 | K2SN-MSS: An Efficient Post-Quantum Signature. Sabyasachi Karati, Reihaneh Safavi-Naini |
| 2019 | MPC Joins The Dark Side. John Cartlidge, Nigel P. Smart, Younes Talibi Alaoui |
| 2019 | MagAttack: Guessing Application Launching and Operation via Smartphone. Yushi Cheng, Xiaoyu Ji, Wenyuan Xu, Hao Pan, Zhuangdi Zhu, Chuang-Wen You, Yi-Chao Chen, Lili Qiu |
| 2019 | Misbinding Attacks on Secure Device Pairing and Bootstrapping. Mohit Sethi, Aleksi Peltonen, Tuomas Aura |
| 2019 | MoSSOT: An Automated Blackbox Tester for Single Sign-On Vulnerabilities in Mobile Applications. Shangcheng Shi, Xianbo Wang, Wing Cheong Lau |
| 2019 | Mobile Friendly or Attacker Friendly?: A Large-scale Security Evaluation of Mobile-first Websites. Tom van Goethem, Victor Le Pochat, Wouter Joosen |
| 2019 | Multi-Writer Searchable Encryption: An LWE-based Realization and Implementation. Lei Xu, Xingliang Yuan, Ron Steinfeld, Cong Wang, Chungen Xu |
| 2019 | ObliDC: An SGX-based Oblivious Distributed Computing Framework with Formal Proof. Pengfei Wu, Qingni Shen, Robert H. Deng, Ximeng Liu, Yinghui Zhang, Zhonghai Wu |
| 2019 | On The Unforkability of Monero. Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu, Jiangshan Yu |
| 2019 | On the Difficulty of Hiding the Balance of Lightning Network Channels. Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas, Alejandro Ranchal-Pedrosa, Cristina Pérez-Solà, Joaquín García-Alfaro |
| 2019 | PTrix: Efficient Hardware-Assisted Fuzzing for COTS Binary. Yaohui Chen, Dongliang Mu, Jun Xu, Zhichuang Sun, Wenbo Shen, Xinyu Xing, Long Lu, Bing Mao |
| 2019 | Pinpoint Rowhammer: Suppressing Unwanted Bit Flips on Rowhammer Attacks. Sangwoo Ji, Youngjoo Ko, Saeyoung Oh, Jong Kim |
| 2019 | Practical Aggregate Signature from General Elliptic Curves, and Applications to Blockchain. Yunlei Zhao |
| 2019 | Practical Side-Channel Attacks against WPA-TKIP. Domien Schepers, Aanjhan Ranganathan, Mathy Vanhoef |
| 2019 | Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019 Steven D. Galbraith, Giovanni Russello, Willy Susilo, Dieter Gollmann, Engin Kirda, Zhenkai Liang |
| 2019 | Process-Aware Cyberattacks for Thermal Desalination Plants. Prashant Hari Narayan Rajput, Pankaj Rajput, Marios Sazos, Michail Maniatakos |
| 2019 | Proper Usage of the Group Signature Scheme in ISO/IEC 20008-2. Ai Ishida, Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Keisuke Tanaka |
| 2019 | Purchased Fame: Exploring the Ecosystem of Private Blog Networks. Tom van Goethem, Najmeh Miramirkhani, Wouter Joosen, Nick Nikiforakis |
| 2019 | R2Q: A Risk Quantification Framework to Authorize Requests in Web-based Collaborations. Nirnay Ghosh, Rishabh Singhal, Sajal K. Das |
| 2019 | RIP-RH: Preventing Rowhammer-based Inter-Process Attacks. Carsten Bock, Ferdinand Brasser, David Gens, Christopher Liebchen, Ahmad-Reza Sadeghi |
| 2019 | Revisiting Assumptions for Website Fingerprinting Attacks. Weiqi Cui, Tao Chen, Christian Fields, Julianna Chen, Anthony Sierra, Eric Chan-Tin |
| 2019 | Robust Watermarking of Neural Network with Exponential Weighting. Ryota Namba, Jun Sakuma |
| 2019 | Running Language Interpreters Inside SGX: A Lightweight, Legacy-Compatible Script Code Hardening Approach. Huibo Wang, Erick Bauman, Vishal Karande, Zhiqiang Lin, Yueqiang Cheng, Yinqian Zhang |
| 2019 | ScriptProtect: Mitigating Unsafe Third-Party JavaScript Practices. Marius Musch, Marius Steffens, Sebastian Roth, Ben Stock, Martin Johns |
| 2019 | Security is the Weakest Link: Prevalent Culture of Victim Blaming in Cyberattacks. Surya Nepal |
| 2019 | Smart Contract-based Miner Registration and Block Validation. Shijie Zhang, Jong-Hyouk Lee |
| 2019 | SoK: On DFA Vulnerabilities of Substitution-Permutation Networks. Mustafa Khairallah, Xiaolu Hou, Zakaria Najm, Jakub Breier, Shivam Bhasin, Thomas Peyrin |
| 2019 | SoK: Using Dynamic Binary Instrumentation for Security (And How You May Get Caught Red Handed). Daniele Cono D'Elia, Emilio Coppa, Simone Nicchi, Federico Palmaro, Lorenzo Cavallaro |
| 2019 | The SEVerESt Of Them All: Inference Attacks Against Secure Virtual Enclaves. Jan Werner, Joshua Mason, Manos Antonakakis, Michalis Polychronakis, Fabian Monrose |
| 2019 | Thermanator: Thermal Residue-Based Post Factum Attacks on Keyboard Data Entry. Tyler Kaczmarek, Ercan Ozturk, Gene Tsudik |
| 2019 | Towards Identifying Early Indicators of a Malware Infection. Sareena Karapoola, Chester Rebeiro, Unnati Parekh, Kamakoti Veezhinathan |
| 2019 | Towards Understanding Android System Vulnerabilities: Techniques and Insights. Daoyuan Wu, Debin Gao, Eric K. T. Cheng, Yichen Cao, Jintao Jiang, Robert H. Deng |
| 2019 | TweetScore: Scoring Tweets via Social Attribute Relationships for Twitter Spammer Detection. Yihe Zhang, Hao Zhang, Xu Yuan, Nian-Feng Tzeng |
| 2019 | Undermining User Privacy on Mobile Devices Using AI. Berk Gülmezoglu, Andreas Zankl, M. Caner Tol, Saad Islam, Thomas Eisenbarth, Berk Sunar |
| 2019 | Understanding Users' Risk Perceptions about Personal Health Records Shared on Social Networking Services. Yuri Son, Geumhwan Cho, Hyoungshick Kim, Simon S. Woo |
| 2019 | Unveiling Systematic Biases in Decisional Processes: An Application to Discrimination Discovery. Laura Genga, Luca Allodi, Nicola Zannone |
| 2019 | Vendor-Independent Monitoring on Programmable Logic Controller Status for ICS Security Log Management. Jongwon Choi, HyungKwan Kim, Seungoh Choi, Jeong-Han Yun, Byung-gil Min, HyoungChun Kim |
| 2019 | Waves of Malice: A Longitudinal Measurement of the Malicious File Delivery Ecosystem on the Web. Colin C. Ife, Yun Shen, Steven J. Murdoch, Gianluca Stringhini |
| 2019 | What Happens After You Leak Your Password: Understanding Credential Sharing on Phishing Sites. Peng Peng, Chao Xu, Luke Quinn, Hang Hu, Bimal Viswanath, Gang Wang |
| 2019 | eHIFS: An Efficient History Independent File System. Biao Gao, Bo Chen, Shijie Jia, Luning Xia |