| 2019 | "I don't see why I would ever want to use it": Analyzing the Usability of Popular Smartphone Password Managers. Sunyoung Seiler-Hwang, Patricia Arias Cabarcos, Andrés Marín, Florina Almenáres, Daniel Díaz Sánchez, Christian Becker |
| 2019 | (Un)informed Consent: Studying GDPR Consent Notices in the Field. Christine Utz, Martin Degeling, Sascha Fahl, Florian Schaub, Thorsten Holz |
| 2019 | 1 Trillion Dollar Refund: How To Spoof PDF Signatures. Vladislav Mladenov, Christian Mainka, Karsten Meyer zu Selhausen, Martin Grothe, Jörg Schwenk |
| 2019 | 18th Workshop on Privacy in the Electronic Society (WPES 2019). Josep Domingo-Ferrer |
| 2019 | 1st Workshop on Cyber-Security Arms Race (CYSARM 2019). Thanassis Giannetsos, Daniele Sgandurra |
| 2019 | 28 Blinks Later: Tackling Practical Challenges of Eye Movement Biometrics. Simon Eberz, Giulio Lovisotto, Kasper Bonne Rasmussen, Vincent Lenders, Ivan Martinovic |
| 2019 | 3rd International Workshop on Software Protection (SPRO 2019). Paolo Falcarin, Michael Zunke |
| 2019 | 5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol. Syed Rafiul Hussain, Mitziu Echeverria, Imtiaz Karim, Omar Chowdhury, Elisa Bertino |
| 2019 | A Formal Treatment of Deterministic Wallets. Poulami Das, Sebastian Faust, Julian Loss |
| 2019 | A High-Assurance Evaluator for Machine-Checked Secure Multiparty Computation. Karim Eldefrawy, Vitor Pereira |
| 2019 | A Machine-Checked Proof of Security for AWS Key Management Service. José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Matthew Campagna, Ernie Cohen, Benjamin Grégoire, Vitor Pereira, Bernardo Portela, Pierre-Yves Strub, Serdar Tasiran |
| 2019 | A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes. Jo Van Bulck, David F. Oswald, Eduard Marin, Abdulla Aldoseri, Flavio D. Garcia, Frank Piessens |
| 2019 | A Usability Evaluation of Let's Encrypt and Certbot: Usable Security Done Right. Christian Tiefenau, Emanuel von Zezschwitz, Maximilian Häring, Katharina Krombholz, Matthew Smith |
| 2019 | ABS: Scanning Neural Networks for Back-doors by Artificial Brain Stimulation. Yingqi Liu, Wen-Chuan Lee, Guanhong Tao, Shiqing Ma, Yousra Aafer, Xiangyu Zhang |
| 2019 | AISec'19: 12th ACM Workshop on Artificial Intelligence and Security. Sadia Afroz, Battista Biggio, Nicholas Carlini, Yuval Elovici, Asaf Shabtai |
| 2019 | ASHES 2019: 3rd Workshop on Attacks and Solutions in Hardware Security. Chip-Hong Chang, Daniel E. Holcomb, Francesco Regazzoni, Ulrich Rührmair, Patrick Schaumont |
| 2019 | AdVersarial: Perceptual Ad Blocking meets Adversarial Machine Learning. Florian Tramèr, Pascal Dupré, Gili Rusak, Giancarlo Pellegrino, Dan Boneh |
| 2019 | Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving. Yulong Cao, Chaowei Xiao, Benjamin Cyr, Yimeng Zhou, Won Park, Sara Rampazzi, Qi Alfred Chen, Kevin Fu, Z. Morley Mao |
| 2019 | An In-depth Look Into SDN Topology Discovery Mechanisms: Novel Attacks and Practical Countermeasures. Eduard Marin, Nicola Bucciol, Mauro Conti |
| 2019 | Analyzing Subgraph Statistics from Extended Local Views with Decentralized Differential Privacy. Haipei Sun, Xiaokui Xiao, Issa Khalil, Yin Yang, Zhan Qin, Wendy Hui Wang, Ting Yu |
| 2019 | Are These Pairing Elements Correct?: Automated Verification and Applications. Susan Hohenberger, Satyanarayana Vusirikala |
| 2019 | Atomic Multi-Channel Updates with Constant Collateral in Bitcoin-Compatible Payment-Channel Networks. Christoph Egger, Pedro Moreno-Sanchez, Matteo Maffei |
| 2019 | Attacking Graph-based Classification via Manipulating the Graph Structure. Binghui Wang, Neil Zhenqiang Gong |
| 2019 | Automatic Fingerprinting of Vulnerable BLE IoT Devices with Static UUIDs from Mobile Apps. Chaoshun Zuo, Haohuang Wen, Zhiqiang Lin, Yinqian Zhang |
| 2019 | Balance: Dynamic Adjustment of Cryptocurrency Deposits. Dominik Harz, Lewis Gudgeon, Arthur Gervais, William J. Knottenbelt |
| 2019 | Binary Control-Flow Trimming. Masoud Ghaffarinia, Kevin W. Hamlen |
| 2019 | CCSW'19 Workshop Summary: 2019 Cloud Computing Security Workshop. Radu Sion, Charalampos Papamanthou |
| 2019 | CHURP: Dynamic-Committee Proactive Secret Sharing. Sai Krishna Deepak Maram, Fan Zhang, Lun Wang, Andrew Low, Yupeng Zhang, Ari Juels, Dawn Song |
| 2019 | CPS-SPC 2019: Fifth Workshop on Cyber-Physical Systems Security and PrivaCy. Nils Ole Tippenhauer, Avishai Wool |
| 2019 | Certificate Transparency in the Wild: Exploring the Reliability of Monitors. Bingyu Li, Jingqiang Lin, Fengjun Li, Qiongxiao Wang, Qi Li, Jiwu Jing, Congli Wang |
| 2019 | Charting the Attack Surface of Trigger-Action IoT Platforms. Qi Wang, Pubali Datta, Wei Yang, Si Liu, Adam Bates, Carl A. Gunter |
| 2019 | Conjure: Summoning Proxies from Unused Address Space. Sergey Frolov, Jack Wampler, Sze Chuen Tan, J. Alex Halderman, Nikita Borisov, Eric Wustrow |
| 2019 | CryptoGuard: High Precision Detection of Cryptographic Vulnerabilities in Massive-sized Java Projects. Sazzadur Rahaman, Ya Xiao, Sharmin Afrose, Fahad Shaon, Ke Tian, Miles Frantz, Murat Kantarcioglu, Danfeng (Daphne) Yao |
| 2019 | Data Quality for Security Challenges: Case Studies of Phishing, Malware and Intrusion Detection Datasets. Rakesh M. Verma, Victor Zeng, Houtan Faridi |
| 2019 | DeMiCPU: Device Fingerprinting with Magnetic Signals Radiated by CPU. Yushi Cheng, Xiaoyu Ji, Juchuan Zhang, Wenyuan Xu, Yi-Chao Chen |
| 2019 | DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps. Shengqu Xi, Shao Yang, Xusheng Xiao, Yuan Yao, Yayuan Xiong, Fengyuan Xu, Haoyu Wang, Peng Gao, Zhuotao Liu, Feng Xu, Jian Lu |
| 2019 | Detecting Fake Accounts in Online Social Networks at the Time of Registrations. Dong Yuan, Yuanli Miao, Neil Zhenqiang Gong, Zheng Yang, Qi Li, Dawn Song, Qian Wang, Xiao Liang |
| 2019 | Different is Good: Detecting the Use of Uninitialized Variables through Differential Replay. Mengchen Cao, Xiantong Hou, Tao Wang, Hunter Qu, Yajin Zhou, Xiaolong Bai, Fuwei Wang |
| 2019 | Differentially Private Nonparametric Hypothesis Testing. Simon Couch, Zeki Kazan, Kaiyan Shi, Andrew Bray, Adam Groce |
| 2019 | Distributed Vector-OLE: Improved Constructions and Implementation. Phillipp Schoppmann, Adrià Gascón, Leonie Reichert, Mariana Raykova |
| 2019 | Effective and Light-Weight Deobfuscation and Semantic-Aware Attack Detection for PowerShell Scripts. Zhenyuan Li, Qi Alfred Chen, Chunlin Xiong, Yan Chen, Tiantian Zhu, Hai Yang |
| 2019 | Efficient MPC via Program Analysis: A Framework for Efficient Optimal Mixing. Muhammad Ishaq, Ana L. Milanova, Vassilis Zikas |
| 2019 | Efficient Multi-Key Homomorphic Encryption with Packed Ciphertexts with Application to Oblivious Neural Network Inference. Hao Chen, Wei Dai, Miran Kim, Yongsoo Song |
| 2019 | Efficient Publicly Verifiable 2PC over a Blockchain with Applications to Financially-Secure Computations. Ruiyu Zhu, Changchang Ding, Yan Huang |
| 2019 | Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation. Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Rindal, Peter Scholl |
| 2019 | Efficient Verifiable Secret Sharing with Share Recovery in BFT Protocols. Soumya Basu, Alin Tomescu, Ittai Abraham, Dahlia Malkhi, Michael K. Reiter, Emin Gün Sirer |
| 2019 | Efficient Zero-Knowledge Arguments in the Discrete Log Setting, Revisited. Max Hoffmann, Michael Klooß, Andy Rupp |
| 2019 | Encrypted Databases: New Volume Attacks against Range Queries. Zichen Gui, Oliver Johnson, Bogdan Warinschi |
| 2019 | Endemic Oblivious Transfer. Daniel Masny, Peter Rindal |
| 2019 | Erlay: Efficient Transaction Relay for Bitcoin. Gleb Naumenko, Gregory Maxwell, Pieter Wuille, Alexandra Fedorova, Ivan Beschastnikh |
| 2019 | Exploiting Symmetries When Proving Equivalence Properties for Security Protocols. Vincent Cheval, Steve Kremer, Itsaka Rakotonirina |
| 2019 | Fallout: Leaking Data on Meltdown-resistant CPUs. Claudio Canella, Daniel Genkin, Lukas Giner, Daniel Gruss, Moritz Lipp, Marina Minkin, Daniel Moghimi, Frank Piessens, Michael Schwarz, Berk Sunar, Jo Van Bulck, Yuval Yarom |
| 2019 | Fast Actively Secure Five-Party Computation with Security Beyond Abort. Megha Byali, Carmit Hazay, Arpita Patra, Swati Singla |
| 2019 | Five Years of the Right to be Forgotten. Theo Bertram, Elie Bursztein, Stephanie Caro, Hubert Chao, Rutledge Chin Feman, Peter Fleischer, Albin Gustafsson, Jess Hemerly, Chris Hibbert, Luca Invernizzi, Lanah Kammourieh Donnelly, Jason Ketover, Jay Laefer, Paul Nicholas, Yuan Niu, Harjinder Obhi, David Price, Andrew Strait, Kurt Thomas, Al Verney |
| 2019 | Flexible Byzantine Fault Tolerance. Dahlia Malkhi, Kartik Nayak, Ling Ren |
| 2019 | Force vs. Nudge: Comparing Users' Pattern Choices on SysPal and TinPal. Harshal Tupsamudre, Sukanya Vaddepalli, Vijayanand Banahatti, Sachin Lodha |
| 2019 | GALACTICS: Gaussian Sampling for Lattice-Based Constant- Time Implementation of Cryptographic Signatures, Revisited. Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Mélissa Rossi, Mehdi Tibouchi |
| 2019 | Geneva: Evolving Censorship Evasion Strategies. Kevin Bock, George Hughey, Xiao Qiang, Dave Levin |
| 2019 | Gollum: Modular and Greybox Exploit Generation for Heap Overflows in Interpreters. Sean Heelan, Tom Melham, Daniel Kroening |
| 2019 | Hardware-Backed Heist: Extracting ECDSA Keys from Qualcomm's TrustZone. Keegan Ryan |
| 2019 | Hardware-assisted Trusted Execution Environments: Look Back, Look Ahead. N. Asokan |
| 2019 | HideNoSeek: Camouflaging Malicious JavaScript in Benign ASTs. Aurore Fass, Michael Backes, Ben Stock |
| 2019 | HoneyBadgerMPC and AsynchroMix: Practical Asynchronous MPC and its Application to Anonymous Communication. Donghang Lu, Thomas Yurek, Samarth Kulshreshtha, Rahul Govind, Aniket Kate, Andrew Miller |
| 2019 | Houdini's Escape: Breaking the Resource Rein of Linux Control Groups. Xing Gao, Zhongshu Gu, Zhengfa Li, Hani Jamjoom, Cong Wang |
| 2019 | How to (not) Share a Password: Privacy Preserving Protocols for Finding Heavy Hitters with Adversarial Behavior. Moni Naor, Benny Pinkas, Eyal Ronen |
| 2019 | How to Accurately and Privately Identify Anomalies. Hafiz Salman Asif, Periklis A. Papakonstantinou, Jaideep Vaidya |
| 2019 | HyperService: Interoperability and Programmability Across Heterogeneous Blockchains. Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, Yih-Chun Hu |
| 2019 | Insecure Until Proven Updated: Analyzing AMD SEV's Remote Attestation. Robert Buhren, Christian Werling, Jean-Pierre Seifert |
| 2019 | Intriguer: Field-Level Constraint Solving for Hybrid Fuzzing. Mingi Cho, Seoyoung Kim, Taekyoung Kwon |
| 2019 | IoT S&P 2019: 2nd Workshop on the Internet of Things Security and Privacy. Peng Liu, Yuqing Zhang |
| 2019 | Just the Tip of the Iceberg: Internet-Scale Exploitation of Routers for Cryptojacking. Hugo L. J. Bijmans, Tim M. Booij, Christian Doerr |
| 2019 | Kerberoid: A Practical Android App Decompilation System with Multiple Decompilers. Heejun Jang, Beomjin Jin, Sangwon Hyun, Hyoungshick Kim |
| 2019 | Latent Backdoor Attacks on Deep Neural Networks. Yuanshun Yao, Huiying Li, Haitao Zheng, Ben Y. Zhao |
| 2019 | Learning to Fuzz from Symbolic Execution with Application to Smart Contracts. Jingxuan He, Mislav Balunovic, Nodar Ambroladze, Petar Tsankov, Martin T. Vechev |
| 2019 | LegoSNARK: Modular Design and Composition of Succinct Zero-Knowledge Proofs. Matteo Campanelli, Dario Fiore, Anaïs Querol |
| 2019 | Let's Encrypt: An Automated Certificate Authority to Encrypt the Entire Web. Josh Aas, Richard Barnes, Benton Case, Zakir Durumeric, Peter Eckersley, Alan Flores-López, J. Alex Halderman, Jacob Hoffman-Andrews, James Kasten, Eric Rescorla, Seth D. Schoen, Brad Warren |
| 2019 | LevioSA: Lightweight Secure Arithmetic Computation. Carmit Hazay, Yuval Ishai, Antonio Marcedone, Muthuramakrishnan Venkitasubramaniam |
| 2019 | LibreCAN: Automated CAN Message Translator. Mert D. Pesé, Troy Stacer, C. Andrés Campos, Eric Newberry, Dongyao Chen, Kang G. Shin |
| 2019 | Lifelong Anomaly Detection Through Unlearning. Min Du, Zhi Chen, Chang Liu, Rajvardhan Oak, Dawn Song |
| 2019 | LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed. Huayi Duan, Cong Wang, Xingliang Yuan, Yajin Zhou, Qian Wang, Kui Ren |
| 2019 | Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise. Fucheng Liu, Yu Wen, Dongxue Zhang, Xihe Jiang, Xinyu Xing, Dan Meng |
| 2019 | MTD 2019: The 6th ACM Workshop on Moving Target Defense. Zhuo Lu |
| 2019 | Machine-Checked Proofs for Cryptographic Standards: Indifferentiability of Sponge and Secure High-Assurance Implementations of SHA-3. José Bacelar Almeida, Cécile Baritel-Ruet, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Alley Stoughton, Pierre-Yves Strub |
| 2019 | Make Some ROOM for the Zeros: Data Sparsity in Secure Distributed Machine Learning. Phillipp Schoppmann, Adrià Gascón, Mariana Raykova, Benny Pinkas |
| 2019 | MalMax: Multi-Aspect Execution for Automated Dynamic Web Server Malware Analysis. Abbas Naderi-Afooshteh, Yonghwi Kwon, Anh Nguyen-Tuong, Ali Razmjoo-Qalaei, Mohammad-Reza Zamiri-Gourabi, Jack W. Davidson |
| 2019 | MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol. Muhammed F. Esgin, Raymond K. Zhao, Ron Steinfeld, Joseph K. Liu, Dongxi Liu |
| 2019 | Matched and Mismatched SOCs: A Qualitative Study on Security Operations Center Issues. Faris Bugra Kokulu, Ananta Soneji, Tiffany Bao, Yan Shoshitaishvili, Ziming Zhao, Adam Doupé, Gail-Joon Ahn |
| 2019 | Matryoshka: Fuzzing Deeply Nested Branches. Peng Chen, Jianzhong Liu, Hao Chen |
| 2019 | Medical Protocol Security: DICOM Vulnerability Mining Based on Fuzzing Technology. Zhiqiang Wang, Quanqi Li, Yazhe Wang, Biao Liu, Jianyi Zhang, Qixu Liu |
| 2019 | MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples. Jinyuan Jia, Ahmed Salem, Michael Backes, Yang Zhang, Neil Zhenqiang Gong |
| 2019 | Membership Privacy for Fully Dynamic Group Signatures. Michael Backes, Lucjan Hanzlik, Jonas Schneider-Bensch |
| 2019 | Mitigating Leakage in Secure Cloud-Hosted Data Structures: Volume-Hiding for Multi-Maps via Hashing. Sarvar Patel, Giuseppe Persiano, Kevin Yeo, Moti Yung |
| 2019 | Moving Beyond Set-It-And-Forget-It Privacy Settings on Social Media. Mainack Mondal, Günce Su Yilmaz, Noah Hirsch, Mohammad Taha Khan, Michael Tang, Christopher Tran, Chris Kanich, Blase Ur, Elena Zheleva |
| 2019 | Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms. Rahul Chatterjee, M. Sadegh Riazi, Tanmoy Chowdhury, Emanuela Marasco, Farinaz Koushanfar, Ari Juels |
| 2019 | Network Hygiene, Incentives, and Regulation: Deployment of Source Address Validation in the Internet. Matthew J. Luckie, Robert Beverly, Ryan Koga, Ken Keys, Joshua A. Kroll, K. C. Claffy |
| 2019 | Neural Network Inversion in Adversarial Setting via Background Knowledge Alignment. Ziqi Yang, Jiyi Zhang, Ee-Chien Chang, Zhenkai Liang |
| 2019 | Nickel to Lego: Using Foolgle</> to Create Adversarial Examples to Fool Google Cloud Speech-to-Text API. Joon Kuy Han, Hyoungshick Kim, Simon S. Woo |
| 2019 | OPERA: Open Remote Attestation for Intel's Secure Enclaves. Guoxing Chen, Yinqian Zhang, Ten-Hwang Lai |
| 2019 | Oh, the Places You've Been! User Reactions to Longitudinal Transparency About Third-Party Web Tracking and Inferencing. Ben Weinshel, Miranda Wei, Mainack Mondal, Euirim Choi, Shawn Shan, Claire Dolin, Michelle L. Mazurek, Blase Ur |
| 2019 | Omniring: Scaling Private Payments Without Trusted Setup. Russell W. F. Lai, Viktoria Ronge, Tim Ruffing, Dominique Schröder, Sri Aravinda Krishnan Thyagarajan, Jiafan Wang |
| 2019 | Onion Ring ORAM: Efficient Constant Bandwidth Oblivious RAM from (Leveled) TFHE. Hao Chen, Ilaria Chillotti, Ling Ren |
| 2019 | PIEs: Public Incompressible Encodings for Decentralized Storage. Ethan Cecchetti, Ben Fisch, Ian Miers, Ari Juels |
| 2019 | PLAS 2019: ACM SIGSAC Workshop on Programming Languages and Analysis for Security. Piotr Mardziel, Niki Vazou |
| 2019 | POIROT: Aligning Attack Behavior with Kernel Audit Records for Cyber Threat Hunting. Sadegh M. Milajerdi, Birhanu Eshete, Rigel Gjomemo, V. N. Venkatakrishnan |
| 2019 | POSTER: Detecting Audio Adversarial Example through Audio Modification. Hyun Kwon, Hyunsoo Yoon, Ki-Woong Park |
| 2019 | POSTER: Traffic Splitting to Counter Website Fingerprinting. Wladimir De la Cadena, Asya Mitseva, Jan Pennekamp, Jens Hiller, Fabian Lanze, Thomas Engel, Klaus Wehrle, Andriy Panchenko |
| 2019 | PPML '19: Privacy Preserving Machine Learning. Borja Balle, Adrià Gascón, Olya Ohrimenko, Mariana Raykova, Phillipp Schoppmann, Carmela Troncoso |
| 2019 | Page Cache Attacks. Daniel Gruss, Erik Kraft, Trishita Tiwari, Michael Schwarz, Ari Trachtenberg, Jason Hennessey, Alex Ionescu, Anders Fogh |
| 2019 | Peeves: Physical Event Verification in Smart Homes. Simon Birnbach, Simon Eberz, Ivan Martinovic |
| 2019 | Post-Collusion Security and Distance Bounding. Sjouke Mauw, Zach Smith, Jorge Toro-Pozo, Rolando Trujillo-Rasua |
| 2019 | Poster: A First Look at the Privacy Risks of Voice Assistant Apps. Atsuko Natatsuka, Ryo Iijima, Takuya Watanabe, Mitsuaki Akiyama, Tetsuya Sakai, Tatsuya Mori |
| 2019 | Poster: A Proof-of-Stake (PoS) Blockchain Protocol using Fair and Dynamic Sharding Management. Daehwa Rayer Lee, Yunhee Jang, Hyoungshick Kim |
| 2019 | Poster: A Reliable and Accountable Privacy-Preserving Federated Learning Framework using the Blockchain. Sana Awan, Fengjun Li, Bo Luo, Mei Liu |
| 2019 | Poster: Adversarial Examples for Hate Speech Classifiers. Rajvardhan Oak |
| 2019 | Poster: Attacking Malware Classifiers by Crafting Gradient-Attacks that Preserve Functionality. Raphael Labaca Castro, Battista Biggio, Gabi Dreo Rodosek |
| 2019 | Poster: Challenges of Accurately Measuring Churn in P2P Botnets. Leon Böck, Shankar Karuppayah, Kory Fong, Max Mühlhäuser, Emmanouil Vasilomanolakis |
| 2019 | Poster: Deployment-quality and Accessible Solutions for Cryptography Code Development. Sazzadur Rahaman, Ya Xiao, Sharmin Afrose, Ke Tian, Miles Frantz, Na Meng, Barton P. Miller, Fahad Shaon, Murat Kantarcioglu, Danfeng (Daphne) Yao |
| 2019 | Poster: Detecting WebAssembly-based Cryptocurrency Mining. Weikang Bian, Wei Meng, Yi Wang |
| 2019 | Poster: Directed Hybrid Fuzzing on Binary Code. Juhwan Kim, Joobeom Yun |
| 2019 | Poster: Effective Layers in Coverage Metrics for Deep Neural Networks. Leo Hyun Park, Sangjin Oh, Jaeuk Kim, Soochang Chung, Taekyoung Kwon |
| 2019 | Poster: Evaluating Code Coverage for System Call Fuzzers. Seoyoung Kim, Seyeon Jeong, Mingi Cho, Soochang Chung, Taekyoung Kwon |
| 2019 | Poster: Evaluating Security Metrics for Website Fingerprinting. Nate Mathews, Mohammad Saidur Rahman, Matthew Wright |
| 2019 | Poster: Finding JavaScript Name Conflicts on the Web. Mingxue Zhang, Wei Meng, Yi Wang |
| 2019 | Poster: Framework for Semi-Private Function Evaluation with Application to Secure Insurance Rate Calculation. Daniel Günther, Ágnes Kiss, Lukas Scheidel, Thomas Schneider |
| 2019 | Poster: Fuzzing IoT Firmware via Multi-stage Message Generation. Bo Yu, Pengfei Wang, Tai Yue, Yong Tang |
| 2019 | Poster: GRANDPA Finality Gadget. Alistair Stewart |
| 2019 | Poster: Let History not Repeat Itself (this Time) - Tackling WebAuthn Developer Issues Early On. Aftab Alam, Katharina Krombholz, Sven Bugiel |
| 2019 | Poster: Network Message Field Type Recognition. Stephan Kleber, Frank Kargl |
| 2019 | Poster: On the Application of NLP to Discover Relationships between Malicious Network Entities. Giuseppe Siracusano, Martino Trevisan, Roberto Gonzalez, Roberto Bifulco |
| 2019 | Poster: Proofs of Retrievability with Low Server Storage. Michael Hanling, Gaspard Anthoine, Jean-Guillaume Dumas, Aude Maignan, Clément Pernet, Daniel S. Roche |
| 2019 | Poster: Recovering the Input of Neural Networks via Single Shot Side-channel Attacks. Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek |
| 2019 | Poster: SDN-based System to Filter Out DRDoS Amplification Traffic in ISP Networks. Priyanka Dodia, Yury Zhauniarovich |
| 2019 | Poster: TCLP: Enforcing Least Privileges to Prevent Containers from Kernel Vulnerabilities. Suyeol Lee, Junsik Seo, Jaehyun Nam, Seungwon Shin |
| 2019 | Poster: Towards Automated Quantitative Analysis and Forecasting of Vulnerability Discoveries in Debian GNU/Linux. Nikolaos Alexopoulos, Rolf Egert, Tim Grube, Max Mühlhäuser |
| 2019 | Poster: Towards Characterizing and Limiting Information Exposure in DNN Layers. Fan Mo, Ali Shahin Shamsabadi, Kleomenis Katevas, Andrea Cavallaro, Hamed Haddadi |
| 2019 | Poster: Towards Robust Open-World Detection of Deepfakes. Saniat Javid Sohrawardi, Akash Chintha, Bao Thai, Sovantharith Seng, Andrea Hickerson, Raymond W. Ptucha, Matthew Wright |
| 2019 | Poster: Towards a Data Centric Approach for the Design and Verification of Cryptographic Protocols. Luca Arnaboldi, Roberto Metere |
| 2019 | Poster: Towards a Framework for Assessing Vulnerabilities of Brainwave Authentication Systems. Karen Becker, Patricia Arias Cabarcos, Thilo Habrich, Christian Becker |
| 2019 | Poster: Understanding User's Decision to Interact with Potential Phishing Posts on Facebook using a Vignette Study. Sovantharith Seng, Huzeyfe Kocabas, Mahdi Nasrullah Al-Ameen, Matthew Wright |
| 2019 | Poster: Using Generative Adversarial Networks for Secure Pseudorandom Number Generation. Rajvardhan Oak, Chaitanya Rahalkar, Dhaval Gujar |
| 2019 | Poster: Video Fingerprinting in Tor. Mohammad Saidur Rahman, Nate Mathews, Matthew Wright |
| 2019 | Poster: When Adversary Becomes the Guardian - Towards Side-channel Security With Adversarial Attacks. Stjepan Picek, Dirmanto Jap, Shivam Bhasin |
| 2019 | Power Adjusting and Bribery Racing: Novel Mining Attacks in the Bitcoin System. Shang Gao, Zecheng Li, Zhe Peng, Bin Xiao |
| 2019 | Practical Decryption exFiltration: Breaking PDF Encryption. Jens Müller, Fabian Ising, Vladislav Mladenov, Christian Mainka, Sebastian Schinzel, Jörg Schwenk |
| 2019 | Practical Fully Secure Three-Party Computation via Sublinear Distributed Zero-Knowledge Proofs. Elette Boyle, Niv Gilboa, Yuval Ishai, Ariel Nof |
| 2019 | Principled Unearthing of TCP Side Channel Vulnerabilities. Yue Cao, Zhongjie Wang, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy, Paul L. Yu |
| 2019 | Prism: Deconstructing the Blockchain to Approach Physical Limits. Vivek Kumar Bagaria, Sreeram Kannan, David Tse, Giulia Fanti, Pramod Viswanath |
| 2019 | PrivDPI: Privacy-Preserving Encrypted Traffic Inspection with Reusable Obfuscated Rules. Jianting Ning, Geong Sen Poh, Jia-Ch'ng Loh, Jason Chia, Ee-Chien Chang |
| 2019 | Privacy Aspects and Subliminal Channels in Zcash. Alex Biryukov, Daniel Feher, Giuseppe Vitto |
| 2019 | Privacy Risks of Securing Machine Learning Models against Adversarial Examples. Liwei Song, Reza Shokri, Prateek Mittal |
| 2019 | Probabilistic Data Structures in Adversarial Environments. David Clayton, Christopher Patton, Thomas Shrimpton |
| 2019 | Procedural Noise Adversarial Examples for Black-Box Attacks on Deep Convolutional Networks. Kenneth T. Co, Luis Muñoz-González, Sixte de Maupeou, Emil C. Lupu |
| 2019 | Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, London, UK, November 11-15, 2019. Lorenzo Cavallaro, Johannes Kinder, Xiaofeng Wang, Jonathan Katz |
| 2019 | Program-mandering: Quantitative Privilege Separation. Shen Liu, Dongrui Zeng, Yongzhe Huang, Frank Capobianco, Stephen McCamant, Trent Jaeger, Gang Tan |
| 2019 | Proof-Carrying Network Code. Christian Skalka, John H. Ring, David Darais, Minseok Kwon, Sahil Gupta, Kyle Diller, Steffen Smolka, Nate Foster |
| 2019 | Protocols for Checking Compromised Credentials. Lucy Li, Bijeeta Pal, Junade Ali, Nick Sullivan, Rahul Chatterjee, Thomas Ristenpart |
| 2019 | QUOTIENT: Two-Party Secure Neural Network Training and Prediction. Nitin Agrawal, Ali Shahin Shamsabadi, Matt J. Kusner, Adrià Gascón |
| 2019 | Quantitative Verification of Neural Networks and Its Security Applications. Teodora Baluta, Shiqi Shen, Shweta Shinde, Kuldeep S. Meel, Prateek Saxena |
| 2019 | SAMPL: Scalable Auditability of Monitoring Processes using Public Ledgers. Gaurav Panwar, Roopa Vishwanathan, Satyajayant Misra, Austin Bos |
| 2019 | SEEMless: Secure End-to-End Encrypted Messaging with less</> Trust. Melissa Chase, Apoorvaa Deshpande, Esha Ghosh, Harjasleen Malvai |
| 2019 | SICO: Surgical Interception Attacks by Manipulating BGP Communities. Henry Birge-Lee, Liang Wang, Jennifer Rexford, Prateek Mittal |
| 2019 | SLAKE: Facilitating Slab Manipulation for Exploiting Vulnerabilities in the Linux Kernel. Yueqi Chen, Xinyu Xing |
| 2019 | SMoTherSpectre: Exploiting Speculative Execution through Port Contention. Atri Bhattacharyya, Alexandra Sandulescu, Matthias Neugschwandtner, Alessandro Sorniotti, Babak Falsafi, Mathias Payer, Anil Kurmus |
| 2019 | SSR'19: The 5th Conference on Security Standardisation Research. Maryam Mehrnezhad, Thyla van der Merwe, Feng Hao |
| 2019 | SecTEE: A Software-based Approach to Secure Enclave Architecture Using TEE. Shijun Zhao, Qianying Zhang, Yu Qin, Wei Feng, Dengguo Feng |
| 2019 | Securely Sampling Biased Coins with Applications to Differential Privacy. Jeffrey Champion, Abhi Shelat, Jonathan R. Ullman |
| 2019 | Security Certification in Payment Card Industry: Testbeds, Measurements, and Recommendations. Sazzadur Rahaman, Gang Wang, Danfeng Daphne Yao |
| 2019 | Seeing isn't Believing: Towards More Robust Adversarial Attack Against Real World Object Detectors. Yue Zhao, Hong Zhu, Ruigang Liang, Qintao Shen, Shengzhi Zhang, Kai Chen |
| 2019 | Seems Legit: Automated Analysis of Subtle Attacks on Protocols that Use Signatures. Dennis Jackson, Cas Cremers, Katriel Cohn-Gordon, Ralf Sasse |
| 2019 | Signed Cryptographic Program Verification with Typed CryptoLine. Yu-Fu Fu, Jiaxiang Liu, Xiaomu Shi, Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang |
| 2019 | Snout: An Extensible IoT Pen-Testing Tool. John Mikulskis, Johannes K. Becker, Stefan Gvozdenovic, David Starobinski |
| 2019 | Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updatable Structured Reference Strings. Mary Maller, Sean Bowe, Markulf Kohlweiss, Sarah Meiklejohn |
| 2019 | Stormy: Statistics in Tor by Measuring Securely. Ryan Wails, Aaron Johnson, Daniel Starin, Arkady Yerukhimovich, S. Dov Gordon |
| 2019 | Succinct Arguments for Bilinear Group Arithmetic: Practical Structure-Preserving Cryptography. Russell W. F. Lai, Giulio Malavolta, Viktoria Ronge |
| 2019 | TIS'19: Theory of Implementation Security Workshop 2019. Begül Bilgin, Svetla Nikova, Vincent Rijmen |
| 2019 | Tesseract: Real-Time Cryptocurrency Exchange Using Trusted Hardware. Iddo Bentov, Yan Ji, Fan Zhang, Lorenz Breidenbach, Philip Daian, Ari Juels |
| 2019 | The Art and Craft of Fraudulent App Promotion in Google Play. Mizanur Rahman, Nestor Hernandez, Ruben Recabarren, Syed Ishtiaque Ahmed, Bogdan Carbunar |
| 2019 | The Catcher in the Field: A Fieldprint based Spoofing Detection for Text-Independent Speaker Verification. Chen Yan, Yan Long, Xiaoyu Ji, Wenyuan Xu |
| 2019 | The Next 700 Policy Miners: A Universal Method for Building Policy Miners. Carlos Cotrini, Luca Corinzia, Thilo Weghorn, David A. Basin |
| 2019 | The SPHINCS Daniel J. Bernstein, Andreas Hülsing, Stefan Kölbl, Ruben Niederhagen, Joost Rijneveld, Peter Schwabe |
| 2019 | TokenScope: Automatically Detecting Inconsistent Behaviors of Cryptocurrency Tokens in Ethereum. Ting Chen, Yufei Zhang, Zihao Li, Xiapu Luo, Ting Wang, Rong Cao, Xiuzhuo Xiao, Xiaosong Zhang |
| 2019 | Towards Continuous Access Control Validation and Forensics. Chengcheng Xiang, Yudong Wu, Bingyu Shen, Mingyao Shen, Haochen Huang, Tianyin Xu, Yuanyuan Zhou, Cindy Moore, Xinxin Jin, Tianwei Sheng |
| 2019 | Towards Memory Safe Enclave Programming with Rust-SGX. Huibo Wang, Pei Wang, Yu Ding, Mingshen Sun, Yiming Jing, Ran Duan, Long Li, Yulong Zhang, Tao Wei, Zhiqiang Lin |
| 2019 | Traceback for End-to-End Encrypted Messaging. Nirvan Tyagi, Ian Miers, Thomas Ristenpart |
| 2019 | Transparency Logs via Append-Only Authenticated Dictionaries. Alin Tomescu, Vivek Bhupatiraju, Dimitrios Papadopoulos, Charalampos Papamanthou, Nikos Triandopoulos, Srinivas Devadas |
| 2019 | Trick or Heat?: Manipulating Critical Temperature-Based Control Systems Using Rectification Attacks. Yazhou Tu, Sara Rampazzi, Bin Hao, Angel Rodriguez, Kevin Fu, Xiali Hei |
| 2019 | Triplet Fingerprinting: More Practical and Portable Website Fingerprinting with N-shot Learning. Payap Sirinam, Nate Mathews, Mohammad Saidur Rahman, Matthew Wright |
| 2019 | Two-Thirds Honest-Majority MPC for Malicious Adversaries at Almost the Cost of Semi-Honest. Jun Furukawa, Yehuda Lindell |
| 2019 | Two-party Private Set Intersection with an Untrusted Third Party. Phi Hung Le, Samuel Ranellucci, S. Dov Gordon |
| 2019 | Updatable Anonymous Credentials and Applications to Incentive Systems. Johannes Blömer, Jan Bobolz, Denis Diemert, Fabian Eidens |
| 2019 | Updatable Oblivious Key Management for Storage Systems. Stanislaw Jarecki, Hugo Krawczyk, Jason K. Resch |
| 2019 | User Account Access Graphs. Sven Hammann, Sasa Radomirovic, Ralf Sasse, David A. Basin |
| 2019 | Velody: Nonlinear Vibration Challenge-Response for Resilient User Authentication. Jingjie Li, Kassem Fawaz, Younghyun Kim |
| 2019 | VeriSketch: Synthesizing Secure Hardware Designs with Timing-Sensitive Information Flow Properties. Armaiti Ardeshiricham, Yoshiki Takashima, Sicun Gao, Ryan Kastner |
| 2019 | Verified Verifiers for Verifying Elections. Thomas Haines, Rajeev Goré, Mukesh Tiwari |
| 2019 | VoltJockey: Breaching TrustZone by Software-Controlled Voltage Manipulation over Multi-core Frequencies. Pengfei Qiu, Dongsheng Wang, Yongqiang Lyu, Gang Qu |
| 2019 | WAHC'19: 7th Workshop on Encrypted Computing & Applied Homomorphic Cryptograph. Michael Brenner, Tancrède Lepoint, Kurt Rohloff |
| 2019 | WI Is Not Enough: Zero-Knowledge Contingent (Service) Payments Revisited. Georg Fuchsbauer |
| 2019 | Watching You Watch: The Tracking Ecosystem of Over-the-Top TV Streaming Devices. Hooman Mohajeri Moghaddam, Gunes Acar, Ben Burgess, Arunesh Mathur, Danny Yuxing Huang, Nick Feamster, Edward W. Felten, Prateek Mittal, Arvind Narayanan |
| 2019 | Where Does It Go?: Refining Indirect-Call Targets with Multi-Layer Type Analysis. Kangjie Lu, Hong Hu |
| 2019 | You Are Who You Appear to Be: A Longitudinal Study of Domain Impersonation in TLS Certificates. Richard Roberts, Yaelle Goldschlag, Rachel Walter, Taejoong Chung, Alan Mislove, Dave Levin |
| 2019 | You Shall Not Join: A Measurement Study of Cryptocurrency Peer-to-Peer Bootstrapping Techniques. Angelique Faye Loe, Elizabeth Anne Quaglia |
| 2019 | Your Cache Has Fallen: Cache-Poisoned Denial-of-Service Attack. Hoai Viet Nguyen, Luigi Lo Iacono, Hannes Federrath |
| 2019 | ZombieLoad: Cross-Privilege-Boundary Data Sampling. Michael Schwarz, Moritz Lipp, Daniel Moghimi, Jo Van Bulck, Julian Stecklina, Thomas Prescher, Daniel Gruss |
| 2019 | pFilter: Retrofitting Legacy Applications for Data Privacy. Manish Shukla, Kumar Vidhani, Gangadhara Reddy Sirigireddy, Vijayanand Banahatti, Sachin Lodha |
| 2019 | simFIDO: FIDO2 User Authentication with simTPM. Dhiman Chakraborty, Sven Bugiel |
| 2019 | zkay: Specifying and Enforcing Data Privacy in Smart Contracts. Samuel Steffen, Benjamin Bichsel, Mario Gersbach, Noa Melchior, Petar Tsankov, Martin T. Vechev |
| 2019 | ÆGIS: Smart Shielding of Smart Contracts. Christof Ferreira Torres, Mathis Baden, Robert Norvill, Hugo Jonker |