| 2020 | A Comb for Decompiled C Code. Andrea Gussoni, Alessandro Di Federico, Pietro Fezzardi, Giovanni Agosta |
| 2020 | AI and Security: Lessons, Challenges and Future Directions. Dawn Song |
| 2020 | AMSI-Based Detection of Malicious PowerShell Code Using Contextual Embeddings. Danny Hendler, Shay Kels, Amir Rubin |
| 2020 | ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020 Hung-Min Sun, Shiuh-Pyng Shieh, Guofei Gu, Giuseppe Ateniese |
| 2020 | Adversarial Attack against Deep Reinforcement Learning with Static Reward Impact Map. Patrick P. K. Chan, Yaxuan Wang, Daniel S. Yeung |
| 2020 | Adversarial Attacks on Link Prediction Algorithms Based on Graph Neural Networks. Wanyu Lin, Shengxiang Ji, Baochun Li |
| 2020 | Assessing the Impact of Script Gadgets on CSP at Scale. Sebastian Roth, Michael Backes, Ben Stock |
| 2020 | Assessing the Privacy Benefits of Domain Name Encryption. Nguyen Phong Hoang, Arian Akhavan Niaki, Nikita Borisov, Phillipa Gill, Michalis Polychronakis |
| 2020 | AuthCTC: Defending Against Waveform Emulation Attack in Heterogeneous IoT Environments. Sihan Yu, Xiaonan Zhang, Pei Huang, Linke Guo, Long Cheng, Kuang-Ching Wang |
| 2020 | BOREALIS: Building Block for Sealed Bid Auctions on Blockchains. Erik-Oliver Blass, Florian Kerschbaum |
| 2020 | BOTection: Bot Detection by Building Markov Chain Models of Bots Network Behavior. Bushra A. AlAhmadi, Enrico Mariconti, Riccardo Spolaor, Gianluca Stringhini, Ivan Martinovic |
| 2020 | Be the Phisher - Understanding Users' Perception of Malicious Domains. Florian Quinkert, Martin Degeling, Jim Blythe, Thorsten Holz |
| 2020 | CORSICA: Cross-Origin Web Service Identification. Christian Dresen, Fabian Ising, Damian Poddebniak, Tobias Kappert, Thorsten Holz, Sebastian Schinzel |
| 2020 | Can We Use Split Learning on 1D CNN Models for Privacy Preserving Training? Sharif Abuadbba, Kyuyeon Kim, Minki Kim, Chandra Thapa, Seyit Ahmet Çamtepe, Yansong Gao, Hyoungshick Kim, Surya Nepal |
| 2020 | Catch You If You Deceive Me: Verifiable and Privacy-Aware Truth Discovery in Crowdsensing Systems. Guowen Xu, Hongwei Li, Shengmin Xu, Hao Ren, Yinghui Zhang, Jianfei Sun, Robert H. Deng |
| 2020 | CoDaRR: Continuous Data Space Randomization against Data-Only Attacks. Prabhu Rajasekaran, Stephen Crane, David Gens, Yeoul Na, Stijn Volckaert, Michael Franz |
| 2020 | Contextual and Granular Policy Enforcement in Database-backed Applications. Abhishek Bichhawat, Matt Fredrikson, Jean Yang, Akash Trehan |
| 2020 | Creating Character-based Templates for Log Data to Enable Security Event Classification. Markus Wurzenberger, Georg Höld, Max Landauer, Florian Skopik, Wolfgang Kastner |
| 2020 | Cybersecurity Event Detection with New and Re-emerging Words. Hyejin Shin, Woochul Shim, Jiin Moon, Jae Woo Seo, Sol Lee, Yong Ho Hwang |
| 2020 | DISKSHIELD: A Data Tamper-Resistant Storage for Intel SGX. Jinwoo Ahn, Junghee Lee, Yungwoo Ko, Donghyun Min, Jiyun Park, Sungyong Park, Youngjae Kim |
| 2020 | DeepPower: Non-intrusive and Deep Learning-based Detection of IoT Malware Using Power Side Channels. Fei Ding, Hongda Li, Feng Luo, Hongxin Hu, Long Cheng, Hai Xiao, Rong Ge |
| 2020 | Detecting Insecure Code Patterns in Industrial Robot Programs. Marcello Pogliani, Federico Maggi, Marco Balduzzi, Davide Quarta, Stefano Zanero |
| 2020 | EchoLock: Towards Low-effort Mobile User Identification Leveraging Structure-borne Echos. Yilin Yang, Yan Wang, Yingying Chen, Chen Wang |
| 2020 | Efficient Secure Computation of Order-Preserving Encryption. Anselme Tueno, Florian Kerschbaum |
| 2020 | Exploring Architectures for Cryptographic Access Control Enforcement in the Cloud for Fun and Optimization. Stefano Berlato, Roberto Carbone, Adam J. Lee, Silvio Ranise |
| 2020 | Fail-safe Watchtowers and Short-lived Assertions for Payment Channels. Bowen Liu, Pawel Szalachowski, Siwei Sun |
| 2020 | Formal Analysis and Implementation of a TPM 2.0-based Direct Anonymous Attestation Scheme. Stephan Wesemeyer, Christopher J. P. Newton, Helen Treharne, Liqun Chen, Ralf Sasse, Jorden Whitefield |
| 2020 | Global Communication Guarantees in the Presence of Adversaries. Adrian Perrig |
| 2020 | Hidden in Plain Sight: Obfuscated Strings Threatening Your Privacy. Leonid Glanz, Patrick Müller, Lars Baumgärtner, Michael Reif, Sven Amann, Pauline Anthonysamy, Mira Mezini |
| 2020 | Hunting Sybils in Participatory Mobile Consensus-Based Networks. Nickolai Verchok, Alex Orailoglu |
| 2020 | I came, I saw, I hacked: Automated Generation of Process-independent Attacks for Industrial Control Systems. Esha Sarkar, Hadjer Benkraouda, Michail Maniatakos |
| 2020 | In-Network Filtering of Distributed Denial-of-Service Traffic with Near-Optimal Rule Selection. Devkishen Sisodia, Jun Li, Lei Jiao |
| 2020 | Inspecting TLS Anytime Anywhere: A New Approach to TLS Interception. Joonsang Baek, Jongkil Kim, Willy Susilo |
| 2020 | Investigating MMM Ponzi Scheme on Bitcoin. Yazan Boshmaf, Charitha Elvitigala, Husam Al Jawaheri, Primal Wijesekera, Mashael Al Sabah |
| 2020 | It all Started with Compression: Another Look at Reconciliation Mechanism. Tianyuan Xie, Yanbin Pan |
| 2020 | KASLR: Break It, Fix It, Repeat. Claudio Canella, Michael Schwarz, Martin Haubenwallner, Martin Schwarzl, Daniel Gruss |
| 2020 | Lattice Klepto Revisited. Zhaomin Yang, Tianyuan Xie, Yanbin Pan |
| 2020 | LiS: Lightweight Signature Schemes for Continuous Message Authentication in Cyber-Physical Systems. Zheng Yang, Chenglu Jin, Yangguang Tian, Junyu Lai, Jianying Zhou |
| 2020 | Measuring the Impact of the GDPR on Data Sharing in Ad Networks. Tobias Urban, Dennis Tatang, Martin Degeling, Thorsten Holz, Norbert Pohlmann |
| 2020 | Membership Encoding for Deep Learning. Congzheng Song, Reza Shokri |
| 2020 | ModFalcon: Compact Signatures Based On Module-NTRU Lattices. Chitchanok Chuengsatiansup, Thomas Prest, Damien Stehlé, Alexandre Wallet, Keita Xagawa |
| 2020 | NativeX: Native Executioner Freezes Android. Qinsheng Hou, Yao Cheng, Lingyun Ying |
| 2020 | On the Security of Randomized Defenses Against Adversarial Samples. Kumar Sharad, Giorgia Azzurra Marson, Hien Thi Thu Truong, Ghassan Karame |
| 2020 | OptiSwap: Fast Optimistic Fair Exchange. Lisa Eckey, Sebastian Faust, Benjamin Schlosser |
| 2020 | PISKES: Pragmatic Internet-Scale Key-Establishment System. Benjamin Rothenberger, Dominik Roos, Markus Legner, Adrian Perrig |
| 2020 | POSTER: Attacks to Federated Learning: Responsive Web User Interface to Recover Training Data from User Gradients. Hans Albert Lianto, Yang Zhao, Jun Zhao |
| 2020 | POSTER: Blockchain-Based Differential Privacy Cost Management System. Leong Mei Han, Yang Zhao, Jun Zhao |
| 2020 | POSTER: Construct macOS Cyber Range for Red/Blue Teams. Yi-Hsien Chen, Yen-Da Lin, Chung-Kuan Chen, Chin-Laung Lei, Chun-Ying Huang |
| 2020 | POSTER: Content-Agnostic Identification of Cryptojacking in Network Traffic. Yebo Feng, Devkishen Sisodia, Jun Li |
| 2020 | POSTER: Data Collection via Local Differential Privacy with Secret Parameters. Shun Takagi, Yang Cao, Masatoshi Yoshikawa |
| 2020 | POSTER: Data Leakage Detection for Health Information System based on Memory Introspection. Sanoop Mallissery, Min-Chieh Wu, Chun-An Bau, Guan-Zhang Huang, Chen-Yu Yang, Wei-Chun Lin, Yu-Sung Wu |
| 2020 | POSTER: Detecting Suspicious Processes from Log-Data via a Bayesian Block Model. Daniel Andrade, Yusuke Takahashi, Daichi Hasumi |
| 2020 | POSTER: Distributed SSH Bruteforce Attack Detection with Flow Content Similarity and Login Failure Reputation. Neminath Hubballi, Namrata Tiwari, Pratibha Khandait |
| 2020 | POSTER: Dynamic Software Vulnerabilities Threat Prediction through Social Media Contextual Analysis. Shin-Ying Huang, Yiju Wu |
| 2020 | POSTER: Expanding a Programmable CPS Testbed for Network Attack Analysis. Seungoh Choi, Jeong-Han Yun, Byung-gil Min, HyoungChun Kim |
| 2020 | POSTER: How Do Suspicious Accounts Participate in Online Political Discussions? A Preliminary Study in Taiwan. Ming-Hung Wang, Yu-Chen Dai |
| 2020 | POSTER: Mitigating Memory Sharing-based Side-channel Attack by Embedding Random Values in Binary for Cloud Environment. Taehun Kim, Youngjoo Shin |
| 2020 | POSTER: Oblivious Access System on Decentralized Database over Parallel Smart Contract Model. Zhong-Yi Guo, Yu-Chi Chen, Hsiu-Ping Lin |
| 2020 | POSTER: Protecting Location Privacy on Road Networks. Shun Takagi, Yang Cao, Yasuhito Asano, Masatoshi Yoshikawa |
| 2020 | POSTER: SecretSVM - Secret Sharing-Based SVM for Preventing Collusion in IoT Data Analysis. Song-Yi Hsu, Xin Xie, Yu-Chi Chen |
| 2020 | POSTER: Towards Automating Detection of Anomalous HTTP Requests with Joint Probability Estimation of Characters. Pratibha Khandait, Neminath Hubballi, Katrin Franke |
| 2020 | PassTag: A Graphical-Textual Hybrid Fallback Authentication System. Joon Kuy Han, Xiaojun Bi, Hyoungshick Kim, Simon S. Woo |
| 2020 | PathAFL: Path-Coverage Assisted Fuzzing. Shengbo Yan, Chenlu Wu, Hang Li, Wei Shao, Chunfu Jia |
| 2020 | Post-Quantum TLS on Embedded Systems: Integrating and Evaluating Kyber and SPHINCS+ with mbed TLS. Kevin Bürstinghaus-Steinbach, Christoph Krauß, Ruben Niederhagen, Michael Schneider |
| 2020 | Poster: Challenges in Stopping Ticket Scalping Bots. Hao-Cheng Yang, Hsun Lee, Hsu-Chun Hsiao |
| 2020 | Preparing Network Intrusion Detection Deep Learning Models with Minimal Data Using Adversarial Domain Adaptation. Ankush Singla, Elisa Bertino, Dinesh C. Verma |
| 2020 | Privacy-Preserving Incentive Systems with Highly Efficient Point-Collection. Jan Bobolz, Fabian Eidens, Stephan Krenn, Daniel Slamanig, Christoph Striecks |
| 2020 | Privacy-Preserving OpenID Connect. Sven Hammann, Ralf Sasse, David A. Basin |
| 2020 | Proofs or Remote Execution and Mitigation of TOCTOU Attacks. Gene Tsudik |
| 2020 | Provable-Security Model for Strong Proximity-based Attacks: With Application to Contactless Payments. Ioana Boureanu, Liqun Chen, Sam Ivey |
| 2020 | Rational Manager in Bitcoin Mining Pool: Dynamic Strategies to Gain Extra Rewards. Feifan Yu, Na Ruan, Siyuan Cheng |
| 2020 | Return-Oriented Programming on RISC-V. Georges-Axel Jaloyan, Konstantinos Markantonakis, Raja Naeem Akram, David Robin, Keith Mayes, David Naccache |
| 2020 | Revisiting Shared Data Protection Against Key Exposure. Katarzyna Kapusta, Matthieu Rambaud, Gérard Memmi |
| 2020 | Scam Augmentation and Customization: Identifying Vulnerable Users and Arming Defenders. Shahryar Baki, Rakesh M. Verma, Omprakash Gnawali |
| 2020 | SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems. Tianyu Du, Shouling Ji, Jinfeng Li, Qinchen Gu, Ting Wang, Raheem Beyah |
| 2020 | Skeptic: Automatic, Justified and Privacy-Preserving Password Composition Policy Selection. Saul A. Johnson, João F. Ferreira, Alexandra Mendes, Julien Cordry |
| 2020 | Social Botnet Community Detection: A Novel Approach based on Behavioral Similarity in Twitter Network using Deep Learning. Greeshma Lingam, Rashmi Ranjan Rout, Durvasula V. L. N. Somayajulu, Sajal K. Das |
| 2020 | Take A Way: Exploring the Security Implications of AMD's Cache Way Predictors. Moritz Lipp, Vedad Hadzic, Michael Schwarz, Arthur Perais, Clémentine Maurice, Daniel Gruss |
| 2020 | The Lazarus Effect: Healing Compromised Devices in the Internet of Small Things. Manuel Huber, Stefan Hristozov, Simon Ott, Vasil Sarafov, Marcus Peinado |
| 2020 | The Taint Rabbit: Optimizing Generic Taint Analysis with Dynamic Fast Path Generation. John Galea, Daniel Kroening |
| 2020 | To Get Lost is to Learn the Way: Automatically Collecting Multi-step Social Engineering Attacks on the Web. Takashi Koide, Daiki Chiba, Mitsuaki Akiyama |
| 2020 | Uranus: Simple, Efficient SGX Programming and its Applications. Jianyu Jiang, Xusheng Chen, Tsz On Li, Cheng Wang, Tianxiang Shen, Shixiong Zhao, Heming Cui, Cho-Li Wang, Fengwei Zhang |
| 2020 | Utilizing Public Blockchains for the Sybil-Resistant Bootstrapping of Distributed Anonymity Services. Roman Matzutt, Jan Pennekamp, Erik Buchholz, Klaus Wehrle |
| 2020 | What risk? I don't understand. An Empirical Study on Users' Understanding of the Terms Used in Security Texts. Tingmin Wu, Rongjunchen Zhang, Wanlun Ma, Sheng Wen, Xin Xia, Cécile Paris, Surya Nepal, Yang Xiang |
| 2020 | XSS Vulnerabilities in Cloud-Application Add-Ons. Thanh Bui, Siddharth Prakash Rao, Markku Antikainen, Tuomas Aura |
| 2020 | You shall not pass: Mitigating SQL Injection Attacks on Legacy Web Applications. Rasoul Jahanshahi, Adam Doupé, Manuel Egele |
| 2020 | Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic. Shuaike Dong, Zhou Li, Di Tang, Jiongyi Chen, Menghan Sun, Kehuan Zhang |
| 2020 | ÆGIS: Shielding Vulnerable Smart Contracts Against Attacks. Christof Ferreira Torres, Mathis Baden, Robert Norvill, Beltran Borja Fiz Pontiveros, Hugo Jonker, Sjouke Mauw |