| 2018 | "What was that site doing with my Facebook password?": Designing Password-Reuse Notifications. Maximilian Golla, Miranda Wei, Juliette Hainline, Lydia Filipe, Markus Dürmuth, Elissa M. Redmiles, Blase Ur |
| 2018 | 11th International Workshop on Artificial Intelligence and Security (AISec 2018). Sadia Afroz, Battista Biggio, Yuval Elovici, David Freeman, Asaf Shabtai |
| 2018 | 17th Workshop on Privacy in the Electronic Society (WPES 2018). Aaron Johnson, Ryan Henry |
| 2018 | 2nd International Workshop on Multimedia Privacy and Security. Roger A. Hallman, Shujun Li, Victor Chang |
| 2018 | A Better Method to Analyze Blockchain Consistency. Lucianna Kiffer, Rajmohan Rajaraman, Abhi Shelat |
| 2018 | A Bitstream Reverse Engineering Tool for FPGA Hardware Trojan Detection. Junghwan Yoon, Yezee Seo, Jaedong Jang, Mingi Cho, Jingoog Kim, Hyeonsook Kim, Taekyoung Kwon |
| 2018 | A Discussion on Security Education in Academia. Kevin R. B. Butler, Robert K. Cunningham, Paul C. van Oorschot, Reihaneh Safavi-Naini, Ashraf Matrawy, Jeremy Clark |
| 2018 | A Formal Analysis of 5G Authentication. David A. Basin, Jannik Dreier, Lucca Hirschi, Sasa Radomirovic, Ralf Sasse, Vincent Stettler |
| 2018 | A Guided Approach to Behavioral Authentication. Yeeun Ku, Leo Hyun Park, Sooyeon Shin, Taekyoung Kwon |
| 2018 | A Markov Decision Process to Determine Optimal Policies in Moving Target. Jianjun Zheng, Akbar Siami Namin |
| 2018 | A Re-evaluation of Intrusion Detection Accuracy: Alternative Evaluation Strategy. Said Al-Riyami, Frans Coenen, Alexei Lisitsa |
| 2018 | A Robust and Efficient Defense against Use-after-Free Exploits via Concurrent Pointer Sweeping. Daiping Liu, Mingwei Zhang, Haining Wang |
| 2018 | A Storage-level Detection Mechanism against Crypto-Ransomware. Joon-Young Paik, Joong-Hyun Choi, Rize Jin, Jianming Wang, Eun-Sun Cho |
| 2018 | ABY Payman Mohassel, Peter Rindal |
| 2018 | AIM-SDN: Attacking Information Mismanagement in SDN-datastores. Vaibhav Hemant Dixit, Adam Doupé, Yan Shoshitaishvili, Ziming Zhao, Gail-Joon Ahn |
| 2018 | ALCHEMY: A Language and Compiler for Homomorphic Encryption Made easY. Eric Crockett, Chris Peikert, Chad Sharp |
| 2018 | ASHES 2018- Workshop on Attacks and Solutions in Hardware Security. Chip-Hong Chang, Jorge Guajardo, Daniel E. Holcomb, Francesco Regazzoni, Ulrich Rührmair |
| 2018 | AST-Based Deep Learning for Detecting Malicious PowerShell. Gili Rusak, Abdullah Al-Dujaili, Una-May O'Reilly |
| 2018 | Achieving Meaningful Privacy in Digital Systems. Helen Nissenbaum |
| 2018 | Advanced Cryptography: Promise and Challenges. Shai Halevi |
| 2018 | Adversarial Product Review Generation with Word Replacements. Yimin Zhu, Simon S. Woo |
| 2018 | Adversarial Traces for Website Fingerprinting Defense. Mohsen Imani, Mohammad Saidur Rahman, Matthew Wright |
| 2018 | Aggregated Machine Learning on Indicators of Compromise in Android Devices. John M. San Miguel, Megan E. M. Kline, Roger A. Hallman, Scott M. Slayback, Alexis Rogers, Stefanie S. F. Chang |
| 2018 | An Effective Android Code Coverage Tool. Aleksandr Pilgun, Olga Gadyatskaya, Stanislav Dashevskyi, Yury Zhauniarovich, Artsiom Kushniarou |
| 2018 | An End-to-End System for Large Scale P2P MPC-as-a-Service and Low-Bandwidth MPC for Weak Participants. Assi Barak, Martin Hirt, Lior Koskas, Yehuda Lindell |
| 2018 | An Exploratory Analysis of Microcode as a Building Block for System Defenses. Benjamin Kollenda, Philipp Koppe, Marc Fyrbiak, Christian Kison, Christof Paar, Thorsten Holz |
| 2018 | Asking for a Friend: Evaluating Response Biases in Security User Studies. Elissa M. Redmiles, Ziyun Zhu, Sean Kross, Dhruv Kuchhal, Tudor Dumitras, Michelle L. Mazurek |
| 2018 | Assessing Non-Visual SSL Certificates with Desktop and Mobile Screen Readers. Daniela Napoli, Sonia Chiasson |
| 2018 | Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams. Ryo Iijima, Shota Minami, Yunao Zhou, Tatsuya Takehisa, Takeshi Takahashi, Yasuhiro Oikawa, Tatsuya Mori |
| 2018 | BEAT: Asynchronous BFT Made Practical. Sisi Duan, Michael K. Reiter, Haibin Zhang |
| 2018 | Bandwidth-Hard Functions: Reductions and Lower Bounds. Jeremiah Blocki, Ling Ren, Samson Zhou |
| 2018 | BitML: A Calculus for Bitcoin Smart Contracts. Massimo Bartoletti, Roberto Zunino |
| 2018 | Block Oriented Programming: Automating Data-Only Attacks. Kyriakos K. Ispoglou, Bader AlBassam, Trent Jaeger, Mathias Payer |
| 2018 | Building Applications with Homomorphic Encryption. Roger A. Hallman, Kim Laine, Wei Dai, Nicolas Gama, Alex J. Malozemoff, Yuriy Polyakov, Sergiu Carpov |
| 2018 | CALM: Consistent Adaptive Local Marginal for Marginal Release under Local Differential Privacy. Zhikun Zhang, Tianhao Wang, Ninghui Li, Shibo He, Jiming Chen |
| 2018 | CPS-SPC 2018: Fourth Workshop on Cyber-Physical Systems Security and PrivaCy. Awais Rashid, Nils Ole Tippenhauer |
| 2018 | Can Browser Add-Ons Protect Your Children from Online Tracking? Zachary Matthews, Natalija Vlajic |
| 2018 | Cashing in on the File-System Cache. Trishita Tiwari, Ari Trachtenberg |
| 2018 | Check It Again: Detecting Lacking-Recheck Bugs in OS Kernels. Wenwen Wang, Kangjie Lu, Pen-Chung Yew |
| 2018 | CipherLocker: Encrypted File Sharing with Ranked Search https: //cipherlocker.com. Jan Kasiak, Bogdan Carbunar, Jake Christensen, Maria Lyukova, Sumeet Bajaj, Mike Boruta, Radu Sion, Viorel Popescu, Alex Sorodoc, Gabriel Stan |
| 2018 | Circular AON: A Very Fast Scheme to Protect Encrypted Data Against Key Exposure. Katarzyna Kapusta, Gérard Memmi |
| 2018 | ClickShield: Are You Hiding Something? Towards Eradicating Clickjacking on Android. Andrea Possemato, Andrea Lanzi, Simon Pak Ho Chung, Wenke Lee, Yanick Fratantonio |
| 2018 | Clock Around the Clock: Time-Based Device Fingerprinting. Iskander Sánchez-Rola, Igor Santos, Davide Balzarotti |
| 2018 | Compressing Vector OLE. Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai |
| 2018 | Cracking the TSCH Channel Hopping in IEEE 802.15.4e. Xia Cheng, Mo Sha |
| 2018 | Cross-App Poisoning in Software-Defined Networking. Benjamin E. Ujcich, Samuel Jero, Anne Edmundson, Qi Wang, Richard Skowyra, James Landry, Adam Bates, William H. Sanders, Cristina Nita-Rotaru, Hamed Okhravi |
| 2018 | Cryptographically Secure Detection of Injection Attacks. Yun Lu, Konstantinos Mitropoulos, Rafail Ostrovsky, Avraham Weinstock, Vassilis Zikas |
| 2018 | DP-Finder: Finding Differential Privacy Violations by Sampling and Optimization. Benjamin Bichsel, Timon Gehr, Dana Drachsler-Cohen, Petar Tsankov, Martin T. Vechev |
| 2018 | Debin: Predicting Debug Information in Stripped Binaries. Jingxuan He, Pesho Ivanov, Petar Tsankov, Veselin Raychev, Martin T. Vechev |
| 2018 | Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning. Payap Sirinam, Mohsen Imani, Marc Juarez, Matthew Wright |
| 2018 | DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning. Milad Nasr, Alireza Bahramali, Amir Houmansadr |
| 2018 | DeepMem: Learning Graph Neural Network Models for Fast and Robust Memory Forensic Analysis. Wei Song, Heng Yin, Chang Liu, Dawn Song |
| 2018 | Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach. Hongjun Choi, Wen-Chuan Lee, Yousra Aafer, Fan Fei, Zhan Tu, Xiangyu Zhang, Dongyan Xu, Xinyan Deng |
| 2018 | Detecting Violations of Differential Privacy. Zeyu Ding, Yuxin Wang, Guanhong Wang, Danfeng Zhang, Daniel Kifer |
| 2018 | DiSE: Distributed Symmetric-key Encryption. Shashank Agrawal, Payman Mohassel, Pratyay Mukherjee, Peter Rindal |
| 2018 | Domain Validation++ For MitM-Resilient PKI. Markus Brandt, Tianxiang Dai, Amit Klein, Haya Schulmann, Michael Waidner |
| 2018 | Effective Program Debloating via Reinforcement Learning. Kihong Heo, Woosuk Lee, Pardis Pashakhanloo, Mayur Naik |
| 2018 | Enabling Fair ML Evaluations for Security. Feargus Pendlebury, Fabio Pierazzi, Roberto Jordaney, Johannes Kinder, Lorenzo Cavallaro |
| 2018 | End-to-End Secure Mobile Group Messaging with Conversation Integrity and Minimal Metadata Leakage. Michael Schliep, Nicholas Hopper |
| 2018 | Enforcing Unique Code Target Property for Control-Flow Integrity. Hong Hu, Chenxiong Qian, Carter Yagemann, Simon Pak Ho Chung, William R. Harris, Taesoo Kim, Wenke Lee |
| 2018 | Equitable Security: Optimizing Distribution of Nudges and Resources. Elissa M. Redmiles, John P. Dickerson, Krishna P. Gummadi, Michelle L. Mazurek |
| 2018 | Evaluating Fuzz Testing. George Klees, Andrew Ruef, Benji Cooper, Shiyi Wei, Michael Hicks |
| 2018 | EviHunter: Identifying Digital Evidence in the Permanent Storage of Android Devices via Static Analysis. Chris Chao-Chun Cheng, Chen Shi, Neil Zhenqiang Gong, Yong Guan |
| 2018 | FEAST'18 - 2018 Workshop on Forming an Ecosystem around Software Transformation. Yan Shoshitaishvili, Mayur Naik |
| 2018 | Faceted Secure Multi Execution. Thomas Schmitz, Maximilian Algehed, Cormac Flanagan, Alejandro Russo |
| 2018 | Facilitating Privacy-preserving Recommendation-as-a-Service with Machine Learning. Jun Wang, Afonso Arriaga, Qiang Tang, Peter Y. A. Ryan |
| 2018 | FairSwap: How To Fairly Exchange Digital Goods. Stefan Dziembowski, Lisa Eckey, Sebastian Faust |
| 2018 | Fast Multiparty Threshold ECDSA with Fast Trustless Setup. Rosario Gennaro, Steven Goldfeder |
| 2018 | Fast Secure Computation for Small Population over the Internet. Megha Byali, Arun Joseph, Arpita Patra, Divya Ravi |
| 2018 | Fast Secure Multiparty ECDSA with Practical Distributed Key Generation and Applications to Cryptocurrency Custody. Yehuda Lindell, Ariel Nof |
| 2018 | FlowNotation: An Annotation System for Statically Enforcing Information Flow Policies in C. Darion Cassel, Yan Huang, Limin Jia |
| 2018 | Fraud De-Anonymization for Fun and Profit. Nestor Hernandez, Mizanur Rahman, Ruben Recabarren, Bogdan Carbunar |
| 2018 | Game Theory Meets Network Security: A Tutorial. Quanyan Zhu, Stefan Rass |
| 2018 | General State Channel Networks. Stefan Dziembowski, Sebastian Faust, Kristina Hostáková |
| 2018 | Generalizing the SPDZ Compiler For Other Protocols. Toshinori Araki, Assi Barak, Jun Furukawa, Marcel Keller, Yehuda Lindell, Kazuma Ohara, Hikaru Tsuchida |
| 2018 | Hardware Acceleration of Searchable Encryption. Arnab Bag, Sikhar Patranabis, L. Tribhuvan, Debdeep Mukhopadhyay |
| 2018 | Hawkeye: Towards a Desired Directed Grey-box Fuzzer. Hongxu Chen, Yinxing Xue, Yuekang Li, Bihuan Chen, Xiaofei Xie, Xiuheng Wu, Yang Liu |
| 2018 | HoMonit: Monitoring Smart Home Apps from Encrypted Traffic. Wei Zhang, Yan Meng, Yugeng Liu, Xiaokuan Zhang, Yinqian Zhang, Haojin Zhu |
| 2018 | How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World. Geng Hong, Zhemin Yang, Sen Yang, Lei Zhang, Yuhong Nan, Zhibo Zhang, Min Yang, Yuan Zhang, Zhiyun Qian, Hai-Xin Duan |
| 2018 | How to Choose Suitable Secure Multiparty Computation Using Generalized SPDZ. Toshinori Araki, Assi Barak, Jun Furukawa, Marcel Keller, Kazuma Ohara, Hikaru Tsuchida |
| 2018 | HyCC: Compilation of Hybrid Protocols for Practical Secure Computation. Niklas Büscher, Daniel Demmler, Stefan Katzenbeisser, David Kretzmer, Thomas Schneider |
| 2018 | HyperFlow: A Processor Architecture for Nonmalleable, Timing-Safe Information Flow Security. Andrew Ferraiuolo, Mark Zhao, Andrew C. Myers, G. Edward Suh |
| 2018 | If This Then What?: Controlling Flows in IoT Apps. Iulia Bastys, Musard Balliu, Andrei Sabelfeld |
| 2018 | Image Disguising for Privacy-preserving Deep Learning. Sagar Sharma, Keke Chen |
| 2018 | Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum Signatures. Jonathan Katz, Vladimir Kolesnikov, Xiao Wang |
| 2018 | Investigating System Operators' Perspective on Security Misconfigurations. Constanze Dietrich, Katharina Krombholz, Kevin Borgolte, Tobias Fiebig |
| 2018 | Invetter: Locating Insecure Input Validations in Android Services. Lei Zhang, Zhemin Yang, Yuyu He, Zhenyu Zhang, Zhiyun Qian, Geng Hong, Yuan Zhang, Min Yang |
| 2018 | JN-SAF: Precise and Efficient NDK/JNI-aware Inter-language Static Analysis Framework for Security Vetting of Android Applications with Native Code. Fengguo Wei, Xingwei Lin, Xinming Ou, Ting Chen, Xiaosong Zhang |
| 2018 | K-Hunt: Pinpointing Insecure Cryptographic Keys from Execution Traces. Juanru Li, Zhiqiang Lin, Juan Caballero, Yuanyuan Zhang, Dawu Gu |
| 2018 | Knowledge Seeking on The Shadow Brokers. Seung Ho Na, Kwanwoo Kim, Seungwon Shin |
| 2018 | LEMNA: Explaining Deep Learning based Security Applications. Wenbo Guo, Dongliang Mu, Jun Xu, Purui Su, Gang Wang, Xinyu Xing |
| 2018 | Labeled PSI from Fully Homomorphic Encryption with Malicious Security. Hao Chen, Zhicong Huang, Kim Laine, Peter Rindal |
| 2018 | Large-Scale and Language-Oblivious Code Authorship Identification. Mohammed Abuhamad, Tamer AbuHmed, Aziz Mohaisen, DaeHun Nyang |
| 2018 | Lattice-Based Group Signatures and Zero-Knowledge Proofs of Automorphism Stability. Rafaël del Pino, Vadim Lyubashevsky, Gregor Seiler |
| 2018 | Lattice-Based zk-SNARKs from Square Span Programs. Rosario Gennaro, Michele Minelli, Anca Nitulescu, Michele Orrù |
| 2018 | Lawful Device Access without Mass Surveillance Risk: A Technical Design Discussion. Stefan Savage |
| 2018 | Lord of the x86 Rings: A Portable User Mode Privilege Separation Architecture on x86. Hojoon Lee, Chihyun Song, Brent ByungHoon Kang |
| 2018 | MORPH: Enhancing System Security through Interactive Customization of Application and Communication Protocol Features. Hongfa Xue, Yurong Chen, Guru Venkataramani, Tian Lan, Guang Jin, Jason H. Li |
| 2018 | MTD 2018: 5th ACM Workshop on Moving Target Defense (MTD). Massimiliano Albanese, Dijiang Huang |
| 2018 | MVG Mechanism: Differential Privacy under Matrix-Valued Query. Thee Chanyaswad, Alex Dytso, H. Vincent Poor, Prateek Mittal |
| 2018 | Machine Learning with Membership Privacy using Adversarial Regularization. Milad Nasr, Reza Shokri, Amir Houmansadr |
| 2018 | Measuring Information Leakage in Website Fingerprinting Attacks and Defenses. Shuai Li, Huajun Guo, Nicholas Hopper |
| 2018 | Medical Devices are at Risk: Information Security on Diagnostic Imaging System. Zhiqiang Wang, Pingchuan Ma, Yaping Chi, Jianyi Zhang |
| 2018 | Milkomeda: Safeguarding the Mobile GPU Interface Using WebGL Security Checks. Zhihao Yao, Saeed Mirzamohammadi, Ardalan Amiri Sani, Mathias Payer |
| 2018 | MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense. Radhesh Krishnan Konoth, Emanuele Vineti, Veelasha Moonsamy, Martina Lindorfer, Christopher Kruegel, Herbert Bos, Giovanni Vigna |
| 2018 | Mitigating Risk while Complying with Data Retention Laws. Luis Vargas, Gyan Hazarika, Rachel Culpepper, Kevin R. B. Butler, Thomas Shrimpton, Doug Szajda, Patrick Traynor |
| 2018 | Model-Reuse Attacks on Deep Learning Systems. Yujie Ji, Xinyang Zhang, Shouling Ji, Xiapu Luo, Ting Wang |
| 2018 | Mystique: Uncovering Information Leakage from Browser Extensions. Quan Chen, Alexandros Kapravelos |
| 2018 | NANOPI: Extreme-Scale Actively-Secure Multi-Party Computation. Ruiyu Zhu, Darion Cassel, Amr Sabry, Yan Huang |
| 2018 | Nemesis: Studying Microarchitectural Timing Leaks in Rudimentary CPU Interrupt Logic. Jo Van Bulck, Frank Piessens, Raoul Strackx |
| 2018 | New Constructions for Forward and Backward Private Symmetric Searchable Encryption. Javad Ghareh Chamani, Dimitrios Papadopoulos, Charalampos Papamanthou, Rasool Jalili |
| 2018 | No Training Hurdles: Fast Training-Agnostic Attacks to Infer Your Typing. Song Fang, Ian D. Markwood, Yao Liu, Shangqing Zhao, Zhuo Lu, Haojin Zhu |
| 2018 | NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis. Yutao Tang, Ding Li, Zhichun Li, Mu Zhang, Kangkook Jee, Xusheng Xiao, Zhenyu Wu, Junghwan Rhee, Fengyuan Xu, Qun Li |
| 2018 | Not All Pixels are Born Equal: An Analysis of Evasion Attacks under Locality Constraints. Vikash Sehwag, Chawin Sitawarin, Arjun Nitin Bhagoji, Arsalan Mosenia, Mung Chiang, Prateek Mittal |
| 2018 | Off-Path Attacks Against PKI. Tianxiang Dai, Haya Schulmann, Michael Waidner |
| 2018 | Ohm's Law in Data Centers: A Voltage Side Channel for Timing Power Attacks. Mohammad A. Islam, Shaolei Ren |
| 2018 | On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees. Katriel Cohn-Gordon, Cas Cremers, Luke Garratt, Jon Millican, Kevin Milner |
| 2018 | On the Accuracy of Password Strength Meters. Maximilian Golla, Markus Dürmuth |
| 2018 | On the Safety of IoT Device Physical Interaction Control. Wenbo Ding, Hongxin Hu |
| 2018 | On the Security of the PKCS#1 v1.5 Signature Scheme. Tibor Jager, Saqib A. Kakvi, Alexander May |
| 2018 | Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability. Christian Badertscher, Peter Gazi, Aggelos Kiayias, Alexander Russell, Vassilis Zikas |
| 2018 | PASTA: PASsword-based Threshold Authentication. Shashank Agrawal, Peihan Miao, Payman Mohassel, Pratyay Mukherjee |
| 2018 | PLAS 2018 - ACM SIGSAC Workshop on Programming Languages and Analysis for Security. Mário S. Alvim, Stéphanie Delaune |
| 2018 | Partially Specified Channels: The TLS 1.3 Record Layer without Elision. Christopher Patton, Thomas Shrimpton |
| 2018 | PatternListener: Cracking Android Pattern Lock Using Acoustic Signals. Man Zhou, Qian Wang, Jingxiao Yang, Qi Li, Feng Xiao, Zhibo Wang, Xiaofeng Chen |
| 2018 | Peeling the Onion's User Experience Layer: Examining Naturalistic Use of the Tor Browser. Kevin Gallagher, Sameer Patil, Brendan Dolan-Gavitt, Damon McCoy, Nasir D. Memon |
| 2018 | Phishing Attacks on Modern Android. Simone Aonzo, Alessio Merlo, Giulio Tavella, Yanick Fratantonio |
| 2018 | Pinto: Enabling Video Privacy for Commodity IoT Cameras. Hyunwoo Yu, Jaemin Lim, Kiyeon Kim, Suk-Bok Lee |
| 2018 | Post-quantum Security using Channel Noise. Setareh Sharifian, Reihaneh Safavi-Naini, Fuchun Lin |
| 2018 | Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption. Shifeng Sun, Xingliang Yuan, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Viet Vo, Surya Nepal |
| 2018 | Practical Fault Attack on Deep Neural Networks. Jakub Breier, Xiaolu Hou, Dirmanto Jap, Lei Ma, Shivam Bhasin, Yang Liu |
| 2018 | Practical State Recovery Attacks against Legacy RNG Implementations. Shaanan N. Cohney, Matthew D. Green, Nadia Heninger |
| 2018 | Practical and Privacy-Aware Truth Discovery in Mobile Crowd Sensing Systems. Guowen Xu, Hongwei Li, Rongxing Lu |
| 2018 | Precise Android API Protection Mapping Derivation and Reasoning. Yousra Aafer, Guanhong Tao, Jianjun Huang, Xiangyu Zhang, Ninghui Li |
| 2018 | Predicting Impending Exposure to Malicious Content from User Behavior. Mahmood Sharif, Jumpei Urakawa, Nicolas Christin, Ayumu Kubota, Akira Yamada |
| 2018 | Preserving Both Privacy and Utility in Network Trace Anonymization. Meisam Mohammady, Lingyu Wang, Yuan Hong, Habib Louafi, Makan Pourzandi, Mourad Debbabi |
| 2018 | Pride and Prejudice in Progressive Web Apps: Abusing Native App-like Features in Web Applications. Jiyeon Lee, Hayeon Kim, Junghwan Park, Insik Shin, Sooel Son |
| 2018 | Prime and Prejudice: Primality Testing Under Adversarial Conditions. Martin R. Albrecht, Jake Massimo, Kenneth G. Paterson, Juraj Somorovsky |
| 2018 | PrinTracker: Fingerprinting 3D Printers using Commodity Scanners. Zhengxiong Li, Aditya Singh Rathore, Chen Song, Sheng Wei, Yanzhi Wang, Wenyao Xu |
| 2018 | Privacy-Preserving Boosting with Random Linear Classifiers. Sagar Sharma, Keke Chen |
| 2018 | Privacy-Preserving Dynamic Learning of Tor Network Traffic. Rob Jansen, Matthew Traudt, Nicholas Hopper |
| 2018 | PrivacyBuDe: Privacy Buckets Demo Tight Differential Privacy Guarantees made Simple. David M. Sommer, Sebastian Meiser, Esfandiar Mohammadi |
| 2018 | Private Stateful Information Retrieval. Sarvar Patel, Giuseppe Persiano, Kevin Yeo |
| 2018 | Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, Toronto, ON, Canada, October 15-19, 2018 David Lie, Mohammad Mannan, Michael Backes, Xiaofeng Wang |
| 2018 | Property Inference Attacks on Fully Connected Neural Networks using Permutation Invariant Representations. Karan Ganju, Qi Wang, Wei Yang, Carl A. Gunter, Nikita Borisov |
| 2018 | Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure. Eyal Ronen, Kenneth G. Paterson, Adi Shamir |
| 2018 | Public Order Preserving Cipher Generation Scheme for Distributed Computing. Amrita Roy Chowdhury, Parameswaran Ramanathan |
| 2018 | Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries. Paul Grubbs, Marie-Sarah Lacharité, Brice Minaud, Kenneth G. Paterson |
| 2018 | RapidChain: Scaling Blockchain via Full Sharding. Mahdi Zamani, Mahnush Movahedi, Mariana Raykova |
| 2018 | Reinforcing System-Assigned Passphrases Through Implicit Learning. Zeinab Joudaki, Julie Thorpe, Miguel Vargas Martin |
| 2018 | Release the Kraken: New KRACKs in the 802.11 Standard. Mathy Vanhoef, Frank Piessens |
| 2018 | Removing the Bottleneck for Practical 2PC. Kris Shrishak, Haya Schulmann, Michael Waidner |
| 2018 | Rendered Insecure: GPU Side Channel Attacks are Practical. Hoda Naghibijouybari, Ajaya Neupane, Zhiyun Qian, Nael B. Abu-Ghazaleh |
| 2018 | Restricting Control Flow During Speculative Execution. Zhuojia Shen, Jie Zhou, Divya Ojha, John Criswell |
| 2018 | Result Pattern Hiding Searchable Encryption for Conjunctive Queries. Shangqi Lai, Sikhar Patranabis, Amin Sakzad, Joseph K. Liu, Debdeep Mukhopadhyay, Ron Steinfeld, Shifeng Sun, Dongxi Liu, Cong Zuo |
| 2018 | Revery: From Proof-of-Concept to Exploitable. Yan Wang, Chao Zhang, Xiaobo Xiang, Zixuan Zhao, Wenjie Li, Xiaorui Gong, Bingchang Liu, Kaixiang Chen, Wei Zou |
| 2018 | Runtime Analysis of Whole-System Provenance. Thomas F. J.-M. Pasquier, Xueyuan Han, Thomas Moyer, Adam Bates, Olivier Hermant, David M. Eyers, Jean Bacon, Margo I. Seltzer |
| 2018 | Scission: Signal Characteristic-Based Sender Identification and Intrusion Detection in Automotive Networks. Marcel Kneib, Christopher Huth |
| 2018 | Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers. Giovanni Camurati, Sebastian Poeplau, Marius Muench, Tom Hayes, Aurélien Francillon |
| 2018 | SecArch'18: 1st Workshop of Security-Oriented Designs of Computer Architectures and Processors. Dan Meng |
| 2018 | Secure Computation with Differentially Private Access Patterns. Sahar Mazloom, S. Dov Gordon |
| 2018 | Secure Multi-Party Computation. Fattaneh Bayatbabolghani, Marina Blanton |
| 2018 | Secure Opportunistic Multipath Key Exchange. Sergiu Costea, Marios O. Choudary, Doru Gucea, Björn Tackmann, Costin Raiciu |
| 2018 | Secure Outsourced Matrix Computation and Application to Neural Networks. Xiaoqian Jiang, Miran Kim, Kristin E. Lauter, Yongsoo Song |
| 2018 | Secure Search on Encrypted Data via Multi-Ring Sketch. Adi Akavia, Dan Feldman, Hayim Shaul |
| 2018 | Securify: Practical Security Analysis of Smart Contracts. Petar Tsankov, Andrei Marian Dan, Dana Drachsler-Cohen, Arthur Gervais, Florian Bünzli, Martin T. Vechev |
| 2018 | Situational Access Control in the Internet of Things. Roei Schuster, Vitaly Shmatikov, Eran Tromer |
| 2018 | Spartan Networks: Self-Feature-Squeezing Networks for Increased Robustness in Adversarial Settings. François Menet, Paul Berthier, Michel Gagnon, José M. Fernandez |
| 2018 | Symbolic Proofs for Lattice-Based Cryptography. Gilles Barthe, Xiong Fan, Joshua Gancher, Benjamin Grégoire, Charlie Jacomme, Elaine Shi |
| 2018 | SysTEX'18: 2018 Workshop on System Software for Trusted Execution. Baris Kasikci, Mark Silberstein |
| 2018 | TACHYON: Fast Signatures from Compact Knapsack. Rouzbeh Behnia, Muslum Ozgur Ozmen, Attila A. Yavuz, Mike Rosulek |
| 2018 | The Gap Game. Itay Tsabary, Ittay Eyal |
| 2018 | The House That Knows You: User Authentication Based on IoT Data. Talha Ongun, Alina Oprea, Cristina Nita-Rotaru, Mihai Christodorescu, Negin Salajegheh |
| 2018 | The Influence of Code Coverage Metrics on Automated Testing Efficiency in Android. Stanislav Dashevskyi, Olga Gadyatskaya, Aleksandr Pilgun, Yury Zhauniarovich |
| 2018 | The Multi-user Security of GCM, Revisited: Tight Bounds for Nonce Randomization. Viet Tung Hoang, Stefano Tessaro, Aishwarya Thiruvengadam |
| 2018 | The Price of Privacy in Collaborative Learning. Balázs Pejó, Qiang Tang, Gergely Biczók |
| 2018 | The Web's Sixth Sense: A Study of Scripts Accessing Smartphone Sensors. Anupam Das, Gunes Acar, Nikita Borisov, Amogh Pradeep |
| 2018 | Threat Intelligence Computing. Xiaokui Shu, Frederico Araujo, Douglas Lee Schales, Marc Ph. Stoecklin, Jiyong Jang, Heqing Huang, Josyula R. Rao |
| 2018 | Tight on Budget?: Tight Bounds for r-Fold Approximate Differential Privacy. Sebastian Meiser, Esfandiar Mohammadi |
| 2018 | Tiresias: Predicting Security Events Through Deep Learning. Yun Shen, Enrico Mariconti, Pierre-Antoine Vervier, Gianluca Stringhini |
| 2018 | Toward Trustworthy Deep Learning in Security. Wooyoung Go, Daewoo Lee |
| 2018 | Towards Architecture and OS-Independent Malware Detection via Memory Forensics. Rachel Petrik, Berat Arik, Jared M. Smith |
| 2018 | Towards Fine-grained Network Security Forensics and Diagnosis in the SDN Era. Haopei Wang, Guangliang Yang, Phakpoom Chinprutthiwong, Lei Xu, Yangyong Zhang, Guofei Gu |
| 2018 | Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking with Orders-of-Magnitude Performance Boost. Binlin Cheng, Jiang Ming, Jianming Fu, Guojun Peng, Ting Chen, Xiaosong Zhang, Jean-Yves Marion |
| 2018 | Towards Understanding the Dynamics of Adversarial Attacks. Yujie Ji, Ting Wang |
| 2018 | Towards Usable Checksums: Automating the Integrity Verification of Web Downloads for the Masses. Mauro Cherubini, Alexandre Meylan, Bertil Chapuis, Mathias Humbert, Igor Bilogrevic, Kévin Huguenin |
| 2018 | Towards Verified, Constant-time Floating Point Operations. Marc Andrysco, Andres Nötzli, Fraser Brown, Ranjit Jhala, Deian Stefan |
| 2018 | Truth Will Out: Departure-Based Process-Level Detection of Stealthy Attacks on Control Systems. Wissam Aoudi, Mikel Iturbe, Magnus Almgren |
| 2018 | Unveiling Hardware-based Data Prefetcher, a Hidden Source of Information Leakage. Young-joo Shin, Hyung Chan Kim, Dokeun Kwon, Ji-Hoon Jeong, Junbeom Hur |
| 2018 | Using Logic Programming to Recover C++ Classes and Methods from Compiled Executables. Edward J. Schwartz, Cory F. Cohen, Michael Duggan, Jeffrey Gennari, Jeffrey S. Havrilla, Charles Hines |
| 2018 | Utility-Aware Synthesis of Differentially Private and Attack-Resilient Location Traces. Mehmet Emre Gursoy, Ling Liu, Stacey Truex, Lei Yu, Wenqi Wei |
| 2018 | VMHunt: A Verifiable Approach to Partially-Virtualized Binary Code Simplification. Dongpeng Xu, Jiang Ming, Yu Fu, Dinghao Wu |
| 2018 | Voting: You Can't Have Privacy without Individual Verifiability. Véronique Cortier, Joseph Lallemand |
| 2018 | WAHC'18: 6th Workshop on Encrypted Computing and Applied Homomorphic Cryptography. Michael Brenner, Kurt Rohloff |
| 2018 | When Good Components Go Bad: Formally Secure Compilation Despite Dynamic Compromise. Carmine Abate, Arthur Azevedo de Amorim, Roberto Blanco, Ana Nora Evans, Guglielmo Fachini, Catalin Hritcu, Théo Laurent, Benjamin C. Pierce, Marco Stronati, Andrew Tolmach |
| 2018 | Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning. Battista Biggio, Fabio Roli |
| 2018 | Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach. Guixin Ye, Zhanyong Tang, Dingyi Fang, Zhanxing Zhu, Yansong Feng, Pengfei Xu, Xiaojiang Chen, Zheng Wang |
| 2018 | ret2spec: Speculative Execution Using Return Stack Buffers. Giorgi Maisuradze, Christian Rossow |
| 2018 | vNIDS: Towards Elastic Security with Safe and Efficient Virtualization of Network Intrusion Detection Systems. Hongda Li, Hongxin Hu, Guofei Gu, Gail-Joon Ahn, Fuqiang Zhang |