CCS A*

199 papers

YearTitle / Authors
2018"What was that site doing with my Facebook password?": Designing Password-Reuse Notifications.
Maximilian Golla, Miranda Wei, Juliette Hainline, Lydia Filipe, Markus Dürmuth, Elissa M. Redmiles, Blase Ur
201811th International Workshop on Artificial Intelligence and Security (AISec 2018).
Sadia Afroz, Battista Biggio, Yuval Elovici, David Freeman, Asaf Shabtai
201817th Workshop on Privacy in the Electronic Society (WPES 2018).
Aaron Johnson, Ryan Henry
20182nd International Workshop on Multimedia Privacy and Security.
Roger A. Hallman, Shujun Li, Victor Chang
2018A Better Method to Analyze Blockchain Consistency.
Lucianna Kiffer, Rajmohan Rajaraman, Abhi Shelat
2018A Bitstream Reverse Engineering Tool for FPGA Hardware Trojan Detection.
Junghwan Yoon, Yezee Seo, Jaedong Jang, Mingi Cho, Jingoog Kim, Hyeonsook Kim, Taekyoung Kwon
2018A Discussion on Security Education in Academia.
Kevin R. B. Butler, Robert K. Cunningham, Paul C. van Oorschot, Reihaneh Safavi-Naini, Ashraf Matrawy, Jeremy Clark
2018A Formal Analysis of 5G Authentication.
David A. Basin, Jannik Dreier, Lucca Hirschi, Sasa Radomirovic, Ralf Sasse, Vincent Stettler
2018A Guided Approach to Behavioral Authentication.
Yeeun Ku, Leo Hyun Park, Sooyeon Shin, Taekyoung Kwon
2018A Markov Decision Process to Determine Optimal Policies in Moving Target.
Jianjun Zheng, Akbar Siami Namin
2018A Re-evaluation of Intrusion Detection Accuracy: Alternative Evaluation Strategy.
Said Al-Riyami, Frans Coenen, Alexei Lisitsa
2018A Robust and Efficient Defense against Use-after-Free Exploits via Concurrent Pointer Sweeping.
Daiping Liu, Mingwei Zhang, Haining Wang
2018A Storage-level Detection Mechanism against Crypto-Ransomware.
Joon-Young Paik, Joong-Hyun Choi, Rize Jin, Jianming Wang, Eun-Sun Cho
2018ABY
Payman Mohassel, Peter Rindal
2018AIM-SDN: Attacking Information Mismanagement in SDN-datastores.
Vaibhav Hemant Dixit, Adam Doupé, Yan Shoshitaishvili, Ziming Zhao, Gail-Joon Ahn
2018ALCHEMY: A Language and Compiler for Homomorphic Encryption Made easY.
Eric Crockett, Chris Peikert, Chad Sharp
2018ASHES 2018- Workshop on Attacks and Solutions in Hardware Security.
Chip-Hong Chang, Jorge Guajardo, Daniel E. Holcomb, Francesco Regazzoni, Ulrich Rührmair
2018AST-Based Deep Learning for Detecting Malicious PowerShell.
Gili Rusak, Abdullah Al-Dujaili, Una-May O'Reilly
2018Achieving Meaningful Privacy in Digital Systems.
Helen Nissenbaum
2018Advanced Cryptography: Promise and Challenges.
Shai Halevi
2018Adversarial Product Review Generation with Word Replacements.
Yimin Zhu, Simon S. Woo
2018Adversarial Traces for Website Fingerprinting Defense.
Mohsen Imani, Mohammad Saidur Rahman, Matthew Wright
2018Aggregated Machine Learning on Indicators of Compromise in Android Devices.
John M. San Miguel, Megan E. M. Kline, Roger A. Hallman, Scott M. Slayback, Alexis Rogers, Stefanie S. F. Chang
2018An Effective Android Code Coverage Tool.
Aleksandr Pilgun, Olga Gadyatskaya, Stanislav Dashevskyi, Yury Zhauniarovich, Artsiom Kushniarou
2018An End-to-End System for Large Scale P2P MPC-as-a-Service and Low-Bandwidth MPC for Weak Participants.
Assi Barak, Martin Hirt, Lior Koskas, Yehuda Lindell
2018An Exploratory Analysis of Microcode as a Building Block for System Defenses.
Benjamin Kollenda, Philipp Koppe, Marc Fyrbiak, Christian Kison, Christof Paar, Thorsten Holz
2018Asking for a Friend: Evaluating Response Biases in Security User Studies.
Elissa M. Redmiles, Ziyun Zhu, Sean Kross, Dhruv Kuchhal, Tudor Dumitras, Michelle L. Mazurek
2018Assessing Non-Visual SSL Certificates with Desktop and Mobile Screen Readers.
Daniela Napoli, Sonia Chiasson
2018Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams.
Ryo Iijima, Shota Minami, Yunao Zhou, Tatsuya Takehisa, Takeshi Takahashi, Yasuhiro Oikawa, Tatsuya Mori
2018BEAT: Asynchronous BFT Made Practical.
Sisi Duan, Michael K. Reiter, Haibin Zhang
2018Bandwidth-Hard Functions: Reductions and Lower Bounds.
Jeremiah Blocki, Ling Ren, Samson Zhou
2018BitML: A Calculus for Bitcoin Smart Contracts.
Massimo Bartoletti, Roberto Zunino
2018Block Oriented Programming: Automating Data-Only Attacks.
Kyriakos K. Ispoglou, Bader AlBassam, Trent Jaeger, Mathias Payer
2018Building Applications with Homomorphic Encryption.
Roger A. Hallman, Kim Laine, Wei Dai, Nicolas Gama, Alex J. Malozemoff, Yuriy Polyakov, Sergiu Carpov
2018CALM: Consistent Adaptive Local Marginal for Marginal Release under Local Differential Privacy.
Zhikun Zhang, Tianhao Wang, Ninghui Li, Shibo He, Jiming Chen
2018CPS-SPC 2018: Fourth Workshop on Cyber-Physical Systems Security and PrivaCy.
Awais Rashid, Nils Ole Tippenhauer
2018Can Browser Add-Ons Protect Your Children from Online Tracking?
Zachary Matthews, Natalija Vlajic
2018Cashing in on the File-System Cache.
Trishita Tiwari, Ari Trachtenberg
2018Check It Again: Detecting Lacking-Recheck Bugs in OS Kernels.
Wenwen Wang, Kangjie Lu, Pen-Chung Yew
2018CipherLocker: Encrypted File Sharing with Ranked Search https: //cipherlocker.com.
Jan Kasiak, Bogdan Carbunar, Jake Christensen, Maria Lyukova, Sumeet Bajaj, Mike Boruta, Radu Sion, Viorel Popescu, Alex Sorodoc, Gabriel Stan
2018Circular AON: A Very Fast Scheme to Protect Encrypted Data Against Key Exposure.
Katarzyna Kapusta, Gérard Memmi
2018ClickShield: Are You Hiding Something? Towards Eradicating Clickjacking on Android.
Andrea Possemato, Andrea Lanzi, Simon Pak Ho Chung, Wenke Lee, Yanick Fratantonio
2018Clock Around the Clock: Time-Based Device Fingerprinting.
Iskander Sánchez-Rola, Igor Santos, Davide Balzarotti
2018Compressing Vector OLE.
Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai
2018Cracking the TSCH Channel Hopping in IEEE 802.15.4e.
Xia Cheng, Mo Sha
2018Cross-App Poisoning in Software-Defined Networking.
Benjamin E. Ujcich, Samuel Jero, Anne Edmundson, Qi Wang, Richard Skowyra, James Landry, Adam Bates, William H. Sanders, Cristina Nita-Rotaru, Hamed Okhravi
2018Cryptographically Secure Detection of Injection Attacks.
Yun Lu, Konstantinos Mitropoulos, Rafail Ostrovsky, Avraham Weinstock, Vassilis Zikas
2018DP-Finder: Finding Differential Privacy Violations by Sampling and Optimization.
Benjamin Bichsel, Timon Gehr, Dana Drachsler-Cohen, Petar Tsankov, Martin T. Vechev
2018Debin: Predicting Debug Information in Stripped Binaries.
Jingxuan He, Pesho Ivanov, Petar Tsankov, Veselin Raychev, Martin T. Vechev
2018Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning.
Payap Sirinam, Mohsen Imani, Marc Juarez, Matthew Wright
2018DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning.
Milad Nasr, Alireza Bahramali, Amir Houmansadr
2018DeepMem: Learning Graph Neural Network Models for Fast and Robust Memory Forensic Analysis.
Wei Song, Heng Yin, Chang Liu, Dawn Song
2018Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach.
Hongjun Choi, Wen-Chuan Lee, Yousra Aafer, Fan Fei, Zhan Tu, Xiangyu Zhang, Dongyan Xu, Xinyan Deng
2018Detecting Violations of Differential Privacy.
Zeyu Ding, Yuxin Wang, Guanhong Wang, Danfeng Zhang, Daniel Kifer
2018DiSE: Distributed Symmetric-key Encryption.
Shashank Agrawal, Payman Mohassel, Pratyay Mukherjee, Peter Rindal
2018Domain Validation++ For MitM-Resilient PKI.
Markus Brandt, Tianxiang Dai, Amit Klein, Haya Schulmann, Michael Waidner
2018Effective Program Debloating via Reinforcement Learning.
Kihong Heo, Woosuk Lee, Pardis Pashakhanloo, Mayur Naik
2018Enabling Fair ML Evaluations for Security.
Feargus Pendlebury, Fabio Pierazzi, Roberto Jordaney, Johannes Kinder, Lorenzo Cavallaro
2018End-to-End Secure Mobile Group Messaging with Conversation Integrity and Minimal Metadata Leakage.
Michael Schliep, Nicholas Hopper
2018Enforcing Unique Code Target Property for Control-Flow Integrity.
Hong Hu, Chenxiong Qian, Carter Yagemann, Simon Pak Ho Chung, William R. Harris, Taesoo Kim, Wenke Lee
2018Equitable Security: Optimizing Distribution of Nudges and Resources.
Elissa M. Redmiles, John P. Dickerson, Krishna P. Gummadi, Michelle L. Mazurek
2018Evaluating Fuzz Testing.
George Klees, Andrew Ruef, Benji Cooper, Shiyi Wei, Michael Hicks
2018EviHunter: Identifying Digital Evidence in the Permanent Storage of Android Devices via Static Analysis.
Chris Chao-Chun Cheng, Chen Shi, Neil Zhenqiang Gong, Yong Guan
2018FEAST'18 - 2018 Workshop on Forming an Ecosystem around Software Transformation.
Yan Shoshitaishvili, Mayur Naik
2018Faceted Secure Multi Execution.
Thomas Schmitz, Maximilian Algehed, Cormac Flanagan, Alejandro Russo
2018Facilitating Privacy-preserving Recommendation-as-a-Service with Machine Learning.
Jun Wang, Afonso Arriaga, Qiang Tang, Peter Y. A. Ryan
2018FairSwap: How To Fairly Exchange Digital Goods.
Stefan Dziembowski, Lisa Eckey, Sebastian Faust
2018Fast Multiparty Threshold ECDSA with Fast Trustless Setup.
Rosario Gennaro, Steven Goldfeder
2018Fast Secure Computation for Small Population over the Internet.
Megha Byali, Arun Joseph, Arpita Patra, Divya Ravi
2018Fast Secure Multiparty ECDSA with Practical Distributed Key Generation and Applications to Cryptocurrency Custody.
Yehuda Lindell, Ariel Nof
2018FlowNotation: An Annotation System for Statically Enforcing Information Flow Policies in C.
Darion Cassel, Yan Huang, Limin Jia
2018Fraud De-Anonymization for Fun and Profit.
Nestor Hernandez, Mizanur Rahman, Ruben Recabarren, Bogdan Carbunar
2018Game Theory Meets Network Security: A Tutorial.
Quanyan Zhu, Stefan Rass
2018General State Channel Networks.
Stefan Dziembowski, Sebastian Faust, Kristina Hostáková
2018Generalizing the SPDZ Compiler For Other Protocols.
Toshinori Araki, Assi Barak, Jun Furukawa, Marcel Keller, Yehuda Lindell, Kazuma Ohara, Hikaru Tsuchida
2018Hardware Acceleration of Searchable Encryption.
Arnab Bag, Sikhar Patranabis, L. Tribhuvan, Debdeep Mukhopadhyay
2018Hawkeye: Towards a Desired Directed Grey-box Fuzzer.
Hongxu Chen, Yinxing Xue, Yuekang Li, Bihuan Chen, Xiaofei Xie, Xiuheng Wu, Yang Liu
2018HoMonit: Monitoring Smart Home Apps from Encrypted Traffic.
Wei Zhang, Yan Meng, Yugeng Liu, Xiaokuan Zhang, Yinqian Zhang, Haojin Zhu
2018How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World.
Geng Hong, Zhemin Yang, Sen Yang, Lei Zhang, Yuhong Nan, Zhibo Zhang, Min Yang, Yuan Zhang, Zhiyun Qian, Hai-Xin Duan
2018How to Choose Suitable Secure Multiparty Computation Using Generalized SPDZ.
Toshinori Araki, Assi Barak, Jun Furukawa, Marcel Keller, Kazuma Ohara, Hikaru Tsuchida
2018HyCC: Compilation of Hybrid Protocols for Practical Secure Computation.
Niklas Büscher, Daniel Demmler, Stefan Katzenbeisser, David Kretzmer, Thomas Schneider
2018HyperFlow: A Processor Architecture for Nonmalleable, Timing-Safe Information Flow Security.
Andrew Ferraiuolo, Mark Zhao, Andrew C. Myers, G. Edward Suh
2018If This Then What?: Controlling Flows in IoT Apps.
Iulia Bastys, Musard Balliu, Andrei Sabelfeld
2018Image Disguising for Privacy-preserving Deep Learning.
Sagar Sharma, Keke Chen
2018Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum Signatures.
Jonathan Katz, Vladimir Kolesnikov, Xiao Wang
2018Investigating System Operators' Perspective on Security Misconfigurations.
Constanze Dietrich, Katharina Krombholz, Kevin Borgolte, Tobias Fiebig
2018Invetter: Locating Insecure Input Validations in Android Services.
Lei Zhang, Zhemin Yang, Yuyu He, Zhenyu Zhang, Zhiyun Qian, Geng Hong, Yuan Zhang, Min Yang
2018JN-SAF: Precise and Efficient NDK/JNI-aware Inter-language Static Analysis Framework for Security Vetting of Android Applications with Native Code.
Fengguo Wei, Xingwei Lin, Xinming Ou, Ting Chen, Xiaosong Zhang
2018K-Hunt: Pinpointing Insecure Cryptographic Keys from Execution Traces.
Juanru Li, Zhiqiang Lin, Juan Caballero, Yuanyuan Zhang, Dawu Gu
2018Knowledge Seeking on The Shadow Brokers.
Seung Ho Na, Kwanwoo Kim, Seungwon Shin
2018LEMNA: Explaining Deep Learning based Security Applications.
Wenbo Guo, Dongliang Mu, Jun Xu, Purui Su, Gang Wang, Xinyu Xing
2018Labeled PSI from Fully Homomorphic Encryption with Malicious Security.
Hao Chen, Zhicong Huang, Kim Laine, Peter Rindal
2018Large-Scale and Language-Oblivious Code Authorship Identification.
Mohammed Abuhamad, Tamer AbuHmed, Aziz Mohaisen, DaeHun Nyang
2018Lattice-Based Group Signatures and Zero-Knowledge Proofs of Automorphism Stability.
Rafaël del Pino, Vadim Lyubashevsky, Gregor Seiler
2018Lattice-Based zk-SNARKs from Square Span Programs.
Rosario Gennaro, Michele Minelli, Anca Nitulescu, Michele Orrù
2018Lawful Device Access without Mass Surveillance Risk: A Technical Design Discussion.
Stefan Savage
2018Lord of the x86 Rings: A Portable User Mode Privilege Separation Architecture on x86.
Hojoon Lee, Chihyun Song, Brent ByungHoon Kang
2018MORPH: Enhancing System Security through Interactive Customization of Application and Communication Protocol Features.
Hongfa Xue, Yurong Chen, Guru Venkataramani, Tian Lan, Guang Jin, Jason H. Li
2018MTD 2018: 5th ACM Workshop on Moving Target Defense (MTD).
Massimiliano Albanese, Dijiang Huang
2018MVG Mechanism: Differential Privacy under Matrix-Valued Query.
Thee Chanyaswad, Alex Dytso, H. Vincent Poor, Prateek Mittal
2018Machine Learning with Membership Privacy using Adversarial Regularization.
Milad Nasr, Reza Shokri, Amir Houmansadr
2018Measuring Information Leakage in Website Fingerprinting Attacks and Defenses.
Shuai Li, Huajun Guo, Nicholas Hopper
2018Medical Devices are at Risk: Information Security on Diagnostic Imaging System.
Zhiqiang Wang, Pingchuan Ma, Yaping Chi, Jianyi Zhang
2018Milkomeda: Safeguarding the Mobile GPU Interface Using WebGL Security Checks.
Zhihao Yao, Saeed Mirzamohammadi, Ardalan Amiri Sani, Mathias Payer
2018MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense.
Radhesh Krishnan Konoth, Emanuele Vineti, Veelasha Moonsamy, Martina Lindorfer, Christopher Kruegel, Herbert Bos, Giovanni Vigna
2018Mitigating Risk while Complying with Data Retention Laws.
Luis Vargas, Gyan Hazarika, Rachel Culpepper, Kevin R. B. Butler, Thomas Shrimpton, Doug Szajda, Patrick Traynor
2018Model-Reuse Attacks on Deep Learning Systems.
Yujie Ji, Xinyang Zhang, Shouling Ji, Xiapu Luo, Ting Wang
2018Mystique: Uncovering Information Leakage from Browser Extensions.
Quan Chen, Alexandros Kapravelos
2018NANOPI: Extreme-Scale Actively-Secure Multi-Party Computation.
Ruiyu Zhu, Darion Cassel, Amr Sabry, Yan Huang
2018Nemesis: Studying Microarchitectural Timing Leaks in Rudimentary CPU Interrupt Logic.
Jo Van Bulck, Frank Piessens, Raoul Strackx
2018New Constructions for Forward and Backward Private Symmetric Searchable Encryption.
Javad Ghareh Chamani, Dimitrios Papadopoulos, Charalampos Papamanthou, Rasool Jalili
2018No Training Hurdles: Fast Training-Agnostic Attacks to Infer Your Typing.
Song Fang, Ian D. Markwood, Yao Liu, Shangqing Zhao, Zhuo Lu, Haojin Zhu
2018NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis.
Yutao Tang, Ding Li, Zhichun Li, Mu Zhang, Kangkook Jee, Xusheng Xiao, Zhenyu Wu, Junghwan Rhee, Fengyuan Xu, Qun Li
2018Not All Pixels are Born Equal: An Analysis of Evasion Attacks under Locality Constraints.
Vikash Sehwag, Chawin Sitawarin, Arjun Nitin Bhagoji, Arsalan Mosenia, Mung Chiang, Prateek Mittal
2018Off-Path Attacks Against PKI.
Tianxiang Dai, Haya Schulmann, Michael Waidner
2018Ohm's Law in Data Centers: A Voltage Side Channel for Timing Power Attacks.
Mohammad A. Islam, Shaolei Ren
2018On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees.
Katriel Cohn-Gordon, Cas Cremers, Luke Garratt, Jon Millican, Kevin Milner
2018On the Accuracy of Password Strength Meters.
Maximilian Golla, Markus Dürmuth
2018On the Safety of IoT Device Physical Interaction Control.
Wenbo Ding, Hongxin Hu
2018On the Security of the PKCS#1 v1.5 Signature Scheme.
Tibor Jager, Saqib A. Kakvi, Alexander May
2018Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability.
Christian Badertscher, Peter Gazi, Aggelos Kiayias, Alexander Russell, Vassilis Zikas
2018PASTA: PASsword-based Threshold Authentication.
Shashank Agrawal, Peihan Miao, Payman Mohassel, Pratyay Mukherjee
2018PLAS 2018 - ACM SIGSAC Workshop on Programming Languages and Analysis for Security.
Mário S. Alvim, Stéphanie Delaune
2018Partially Specified Channels: The TLS 1.3 Record Layer without Elision.
Christopher Patton, Thomas Shrimpton
2018PatternListener: Cracking Android Pattern Lock Using Acoustic Signals.
Man Zhou, Qian Wang, Jingxiao Yang, Qi Li, Feng Xiao, Zhibo Wang, Xiaofeng Chen
2018Peeling the Onion's User Experience Layer: Examining Naturalistic Use of the Tor Browser.
Kevin Gallagher, Sameer Patil, Brendan Dolan-Gavitt, Damon McCoy, Nasir D. Memon
2018Phishing Attacks on Modern Android.
Simone Aonzo, Alessio Merlo, Giulio Tavella, Yanick Fratantonio
2018Pinto: Enabling Video Privacy for Commodity IoT Cameras.
Hyunwoo Yu, Jaemin Lim, Kiyeon Kim, Suk-Bok Lee
2018Post-quantum Security using Channel Noise.
Setareh Sharifian, Reihaneh Safavi-Naini, Fuchun Lin
2018Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption.
Shifeng Sun, Xingliang Yuan, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Viet Vo, Surya Nepal
2018Practical Fault Attack on Deep Neural Networks.
Jakub Breier, Xiaolu Hou, Dirmanto Jap, Lei Ma, Shivam Bhasin, Yang Liu
2018Practical State Recovery Attacks against Legacy RNG Implementations.
Shaanan N. Cohney, Matthew D. Green, Nadia Heninger
2018Practical and Privacy-Aware Truth Discovery in Mobile Crowd Sensing Systems.
Guowen Xu, Hongwei Li, Rongxing Lu
2018Precise Android API Protection Mapping Derivation and Reasoning.
Yousra Aafer, Guanhong Tao, Jianjun Huang, Xiangyu Zhang, Ninghui Li
2018Predicting Impending Exposure to Malicious Content from User Behavior.
Mahmood Sharif, Jumpei Urakawa, Nicolas Christin, Ayumu Kubota, Akira Yamada
2018Preserving Both Privacy and Utility in Network Trace Anonymization.
Meisam Mohammady, Lingyu Wang, Yuan Hong, Habib Louafi, Makan Pourzandi, Mourad Debbabi
2018Pride and Prejudice in Progressive Web Apps: Abusing Native App-like Features in Web Applications.
Jiyeon Lee, Hayeon Kim, Junghwan Park, Insik Shin, Sooel Son
2018Prime and Prejudice: Primality Testing Under Adversarial Conditions.
Martin R. Albrecht, Jake Massimo, Kenneth G. Paterson, Juraj Somorovsky
2018PrinTracker: Fingerprinting 3D Printers using Commodity Scanners.
Zhengxiong Li, Aditya Singh Rathore, Chen Song, Sheng Wei, Yanzhi Wang, Wenyao Xu
2018Privacy-Preserving Boosting with Random Linear Classifiers.
Sagar Sharma, Keke Chen
2018Privacy-Preserving Dynamic Learning of Tor Network Traffic.
Rob Jansen, Matthew Traudt, Nicholas Hopper
2018PrivacyBuDe: Privacy Buckets Demo Tight Differential Privacy Guarantees made Simple.
David M. Sommer, Sebastian Meiser, Esfandiar Mohammadi
2018Private Stateful Information Retrieval.
Sarvar Patel, Giuseppe Persiano, Kevin Yeo
2018Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, Toronto, ON, Canada, October 15-19, 2018
David Lie, Mohammad Mannan, Michael Backes, Xiaofeng Wang
2018Property Inference Attacks on Fully Connected Neural Networks using Permutation Invariant Representations.
Karan Ganju, Qi Wang, Wei Yang, Carl A. Gunter, Nikita Borisov
2018Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure.
Eyal Ronen, Kenneth G. Paterson, Adi Shamir
2018Public Order Preserving Cipher Generation Scheme for Distributed Computing.
Amrita Roy Chowdhury, Parameswaran Ramanathan
2018Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries.
Paul Grubbs, Marie-Sarah Lacharité, Brice Minaud, Kenneth G. Paterson
2018RapidChain: Scaling Blockchain via Full Sharding.
Mahdi Zamani, Mahnush Movahedi, Mariana Raykova
2018Reinforcing System-Assigned Passphrases Through Implicit Learning.
Zeinab Joudaki, Julie Thorpe, Miguel Vargas Martin
2018Release the Kraken: New KRACKs in the 802.11 Standard.
Mathy Vanhoef, Frank Piessens
2018Removing the Bottleneck for Practical 2PC.
Kris Shrishak, Haya Schulmann, Michael Waidner
2018Rendered Insecure: GPU Side Channel Attacks are Practical.
Hoda Naghibijouybari, Ajaya Neupane, Zhiyun Qian, Nael B. Abu-Ghazaleh
2018Restricting Control Flow During Speculative Execution.
Zhuojia Shen, Jie Zhou, Divya Ojha, John Criswell
2018Result Pattern Hiding Searchable Encryption for Conjunctive Queries.
Shangqi Lai, Sikhar Patranabis, Amin Sakzad, Joseph K. Liu, Debdeep Mukhopadhyay, Ron Steinfeld, Shifeng Sun, Dongxi Liu, Cong Zuo
2018Revery: From Proof-of-Concept to Exploitable.
Yan Wang, Chao Zhang, Xiaobo Xiang, Zixuan Zhao, Wenjie Li, Xiaorui Gong, Bingchang Liu, Kaixiang Chen, Wei Zou
2018Runtime Analysis of Whole-System Provenance.
Thomas F. J.-M. Pasquier, Xueyuan Han, Thomas Moyer, Adam Bates, Olivier Hermant, David M. Eyers, Jean Bacon, Margo I. Seltzer
2018Scission: Signal Characteristic-Based Sender Identification and Intrusion Detection in Automotive Networks.
Marcel Kneib, Christopher Huth
2018Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers.
Giovanni Camurati, Sebastian Poeplau, Marius Muench, Tom Hayes, Aurélien Francillon
2018SecArch'18: 1st Workshop of Security-Oriented Designs of Computer Architectures and Processors.
Dan Meng
2018Secure Computation with Differentially Private Access Patterns.
Sahar Mazloom, S. Dov Gordon
2018Secure Multi-Party Computation.
Fattaneh Bayatbabolghani, Marina Blanton
2018Secure Opportunistic Multipath Key Exchange.
Sergiu Costea, Marios O. Choudary, Doru Gucea, Björn Tackmann, Costin Raiciu
2018Secure Outsourced Matrix Computation and Application to Neural Networks.
Xiaoqian Jiang, Miran Kim, Kristin E. Lauter, Yongsoo Song
2018Secure Search on Encrypted Data via Multi-Ring Sketch.
Adi Akavia, Dan Feldman, Hayim Shaul
2018Securify: Practical Security Analysis of Smart Contracts.
Petar Tsankov, Andrei Marian Dan, Dana Drachsler-Cohen, Arthur Gervais, Florian Bünzli, Martin T. Vechev
2018Situational Access Control in the Internet of Things.
Roei Schuster, Vitaly Shmatikov, Eran Tromer
2018Spartan Networks: Self-Feature-Squeezing Networks for Increased Robustness in Adversarial Settings.
François Menet, Paul Berthier, Michel Gagnon, José M. Fernandez
2018Symbolic Proofs for Lattice-Based Cryptography.
Gilles Barthe, Xiong Fan, Joshua Gancher, Benjamin Grégoire, Charlie Jacomme, Elaine Shi
2018SysTEX'18: 2018 Workshop on System Software for Trusted Execution.
Baris Kasikci, Mark Silberstein
2018TACHYON: Fast Signatures from Compact Knapsack.
Rouzbeh Behnia, Muslum Ozgur Ozmen, Attila A. Yavuz, Mike Rosulek
2018The Gap Game.
Itay Tsabary, Ittay Eyal
2018The House That Knows You: User Authentication Based on IoT Data.
Talha Ongun, Alina Oprea, Cristina Nita-Rotaru, Mihai Christodorescu, Negin Salajegheh
2018The Influence of Code Coverage Metrics on Automated Testing Efficiency in Android.
Stanislav Dashevskyi, Olga Gadyatskaya, Aleksandr Pilgun, Yury Zhauniarovich
2018The Multi-user Security of GCM, Revisited: Tight Bounds for Nonce Randomization.
Viet Tung Hoang, Stefano Tessaro, Aishwarya Thiruvengadam
2018The Price of Privacy in Collaborative Learning.
Balázs Pejó, Qiang Tang, Gergely Biczók
2018The Web's Sixth Sense: A Study of Scripts Accessing Smartphone Sensors.
Anupam Das, Gunes Acar, Nikita Borisov, Amogh Pradeep
2018Threat Intelligence Computing.
Xiaokui Shu, Frederico Araujo, Douglas Lee Schales, Marc Ph. Stoecklin, Jiyong Jang, Heqing Huang, Josyula R. Rao
2018Tight on Budget?: Tight Bounds for r-Fold Approximate Differential Privacy.
Sebastian Meiser, Esfandiar Mohammadi
2018Tiresias: Predicting Security Events Through Deep Learning.
Yun Shen, Enrico Mariconti, Pierre-Antoine Vervier, Gianluca Stringhini
2018Toward Trustworthy Deep Learning in Security.
Wooyoung Go, Daewoo Lee
2018Towards Architecture and OS-Independent Malware Detection via Memory Forensics.
Rachel Petrik, Berat Arik, Jared M. Smith
2018Towards Fine-grained Network Security Forensics and Diagnosis in the SDN Era.
Haopei Wang, Guangliang Yang, Phakpoom Chinprutthiwong, Lei Xu, Yangyong Zhang, Guofei Gu
2018Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking with Orders-of-Magnitude Performance Boost.
Binlin Cheng, Jiang Ming, Jianming Fu, Guojun Peng, Ting Chen, Xiaosong Zhang, Jean-Yves Marion
2018Towards Understanding the Dynamics of Adversarial Attacks.
Yujie Ji, Ting Wang
2018Towards Usable Checksums: Automating the Integrity Verification of Web Downloads for the Masses.
Mauro Cherubini, Alexandre Meylan, Bertil Chapuis, Mathias Humbert, Igor Bilogrevic, Kévin Huguenin
2018Towards Verified, Constant-time Floating Point Operations.
Marc Andrysco, Andres Nötzli, Fraser Brown, Ranjit Jhala, Deian Stefan
2018Truth Will Out: Departure-Based Process-Level Detection of Stealthy Attacks on Control Systems.
Wissam Aoudi, Mikel Iturbe, Magnus Almgren
2018Unveiling Hardware-based Data Prefetcher, a Hidden Source of Information Leakage.
Young-joo Shin, Hyung Chan Kim, Dokeun Kwon, Ji-Hoon Jeong, Junbeom Hur
2018Using Logic Programming to Recover C++ Classes and Methods from Compiled Executables.
Edward J. Schwartz, Cory F. Cohen, Michael Duggan, Jeffrey Gennari, Jeffrey S. Havrilla, Charles Hines
2018Utility-Aware Synthesis of Differentially Private and Attack-Resilient Location Traces.
Mehmet Emre Gursoy, Ling Liu, Stacey Truex, Lei Yu, Wenqi Wei
2018VMHunt: A Verifiable Approach to Partially-Virtualized Binary Code Simplification.
Dongpeng Xu, Jiang Ming, Yu Fu, Dinghao Wu
2018Voting: You Can't Have Privacy without Individual Verifiability.
Véronique Cortier, Joseph Lallemand
2018WAHC'18: 6th Workshop on Encrypted Computing and Applied Homomorphic Cryptography.
Michael Brenner, Kurt Rohloff
2018When Good Components Go Bad: Formally Secure Compilation Despite Dynamic Compromise.
Carmine Abate, Arthur Azevedo de Amorim, Roberto Blanco, Ana Nora Evans, Guglielmo Fachini, Catalin Hritcu, Théo Laurent, Benjamin C. Pierce, Marco Stronati, Andrew Tolmach
2018Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning.
Battista Biggio, Fabio Roli
2018Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach.
Guixin Ye, Zhanyong Tang, Dingyi Fang, Zhanxing Zhu, Yansong Feng, Pengfei Xu, Xiaojiang Chen, Zheng Wang
2018ret2spec: Speculative Execution Using Return Stack Buffers.
Giorgi Maisuradze, Christian Rossow
2018vNIDS: Towards Elastic Security with Safe and Efficient Virtualization of Network Intrusion Detection Systems.
Hongda Li, Hongxin Hu, Guofei Gu, Gail-Joon Ahn, Fuqiang Zhang