CCS A*

208 papers

YearTitle / Authors
2019"I don't see why I would ever want to use it": Analyzing the Usability of Popular Smartphone Password Managers.
Sunyoung Seiler-Hwang, Patricia Arias Cabarcos, Andrés Marín, Florina Almenáres, Daniel Díaz Sánchez, Christian Becker
2019(Un)informed Consent: Studying GDPR Consent Notices in the Field.
Christine Utz, Martin Degeling, Sascha Fahl, Florian Schaub, Thorsten Holz
20191 Trillion Dollar Refund: How To Spoof PDF Signatures.
Vladislav Mladenov, Christian Mainka, Karsten Meyer zu Selhausen, Martin Grothe, Jörg Schwenk
201918th Workshop on Privacy in the Electronic Society (WPES 2019).
Josep Domingo-Ferrer
20191st Workshop on Cyber-Security Arms Race (CYSARM 2019).
Thanassis Giannetsos, Daniele Sgandurra
201928 Blinks Later: Tackling Practical Challenges of Eye Movement Biometrics.
Simon Eberz, Giulio Lovisotto, Kasper Bonne Rasmussen, Vincent Lenders, Ivan Martinovic
20193rd International Workshop on Software Protection (SPRO 2019).
Paolo Falcarin, Michael Zunke
20195GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol.
Syed Rafiul Hussain, Mitziu Echeverria, Imtiaz Karim, Omar Chowdhury, Elisa Bertino
2019A Formal Treatment of Deterministic Wallets.
Poulami Das, Sebastian Faust, Julian Loss
2019A High-Assurance Evaluator for Machine-Checked Secure Multiparty Computation.
Karim Eldefrawy, Vitor Pereira
2019A Machine-Checked Proof of Security for AWS Key Management Service.
José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Matthew Campagna, Ernie Cohen, Benjamin Grégoire, Vitor Pereira, Bernardo Portela, Pierre-Yves Strub, Serdar Tasiran
2019A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes.
Jo Van Bulck, David F. Oswald, Eduard Marin, Abdulla Aldoseri, Flavio D. Garcia, Frank Piessens
2019A Usability Evaluation of Let's Encrypt and Certbot: Usable Security Done Right.
Christian Tiefenau, Emanuel von Zezschwitz, Maximilian Häring, Katharina Krombholz, Matthew Smith
2019ABS: Scanning Neural Networks for Back-doors by Artificial Brain Stimulation.
Yingqi Liu, Wen-Chuan Lee, Guanhong Tao, Shiqing Ma, Yousra Aafer, Xiangyu Zhang
2019AISec'19: 12th ACM Workshop on Artificial Intelligence and Security.
Sadia Afroz, Battista Biggio, Nicholas Carlini, Yuval Elovici, Asaf Shabtai
2019ASHES 2019: 3rd Workshop on Attacks and Solutions in Hardware Security.
Chip-Hong Chang, Daniel E. Holcomb, Francesco Regazzoni, Ulrich Rührmair, Patrick Schaumont
2019AdVersarial: Perceptual Ad Blocking meets Adversarial Machine Learning.
Florian Tramèr, Pascal Dupré, Gili Rusak, Giancarlo Pellegrino, Dan Boneh
2019Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving.
Yulong Cao, Chaowei Xiao, Benjamin Cyr, Yimeng Zhou, Won Park, Sara Rampazzi, Qi Alfred Chen, Kevin Fu, Z. Morley Mao
2019An In-depth Look Into SDN Topology Discovery Mechanisms: Novel Attacks and Practical Countermeasures.
Eduard Marin, Nicola Bucciol, Mauro Conti
2019Analyzing Subgraph Statistics from Extended Local Views with Decentralized Differential Privacy.
Haipei Sun, Xiaokui Xiao, Issa Khalil, Yin Yang, Zhan Qin, Wendy Hui Wang, Ting Yu
2019Are These Pairing Elements Correct?: Automated Verification and Applications.
Susan Hohenberger, Satyanarayana Vusirikala
2019Atomic Multi-Channel Updates with Constant Collateral in Bitcoin-Compatible Payment-Channel Networks.
Christoph Egger, Pedro Moreno-Sanchez, Matteo Maffei
2019Attacking Graph-based Classification via Manipulating the Graph Structure.
Binghui Wang, Neil Zhenqiang Gong
2019Automatic Fingerprinting of Vulnerable BLE IoT Devices with Static UUIDs from Mobile Apps.
Chaoshun Zuo, Haohuang Wen, Zhiqiang Lin, Yinqian Zhang
2019Balance: Dynamic Adjustment of Cryptocurrency Deposits.
Dominik Harz, Lewis Gudgeon, Arthur Gervais, William J. Knottenbelt
2019Binary Control-Flow Trimming.
Masoud Ghaffarinia, Kevin W. Hamlen
2019CCSW'19 Workshop Summary: 2019 Cloud Computing Security Workshop.
Radu Sion, Charalampos Papamanthou
2019CHURP: Dynamic-Committee Proactive Secret Sharing.
Sai Krishna Deepak Maram, Fan Zhang, Lun Wang, Andrew Low, Yupeng Zhang, Ari Juels, Dawn Song
2019CPS-SPC 2019: Fifth Workshop on Cyber-Physical Systems Security and PrivaCy.
Nils Ole Tippenhauer, Avishai Wool
2019Certificate Transparency in the Wild: Exploring the Reliability of Monitors.
Bingyu Li, Jingqiang Lin, Fengjun Li, Qiongxiao Wang, Qi Li, Jiwu Jing, Congli Wang
2019Charting the Attack Surface of Trigger-Action IoT Platforms.
Qi Wang, Pubali Datta, Wei Yang, Si Liu, Adam Bates, Carl A. Gunter
2019Conjure: Summoning Proxies from Unused Address Space.
Sergey Frolov, Jack Wampler, Sze Chuen Tan, J. Alex Halderman, Nikita Borisov, Eric Wustrow
2019CryptoGuard: High Precision Detection of Cryptographic Vulnerabilities in Massive-sized Java Projects.
Sazzadur Rahaman, Ya Xiao, Sharmin Afrose, Fahad Shaon, Ke Tian, Miles Frantz, Murat Kantarcioglu, Danfeng (Daphne) Yao
2019Data Quality for Security Challenges: Case Studies of Phishing, Malware and Intrusion Detection Datasets.
Rakesh M. Verma, Victor Zeng, Houtan Faridi
2019DeMiCPU: Device Fingerprinting with Magnetic Signals Radiated by CPU.
Yushi Cheng, Xiaoyu Ji, Juchuan Zhang, Wenyuan Xu, Yi-Chao Chen
2019DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps.
Shengqu Xi, Shao Yang, Xusheng Xiao, Yuan Yao, Yayuan Xiong, Fengyuan Xu, Haoyu Wang, Peng Gao, Zhuotao Liu, Feng Xu, Jian Lu
2019Detecting Fake Accounts in Online Social Networks at the Time of Registrations.
Dong Yuan, Yuanli Miao, Neil Zhenqiang Gong, Zheng Yang, Qi Li, Dawn Song, Qian Wang, Xiao Liang
2019Different is Good: Detecting the Use of Uninitialized Variables through Differential Replay.
Mengchen Cao, Xiantong Hou, Tao Wang, Hunter Qu, Yajin Zhou, Xiaolong Bai, Fuwei Wang
2019Differentially Private Nonparametric Hypothesis Testing.
Simon Couch, Zeki Kazan, Kaiyan Shi, Andrew Bray, Adam Groce
2019Distributed Vector-OLE: Improved Constructions and Implementation.
Phillipp Schoppmann, Adrià Gascón, Leonie Reichert, Mariana Raykova
2019Effective and Light-Weight Deobfuscation and Semantic-Aware Attack Detection for PowerShell Scripts.
Zhenyuan Li, Qi Alfred Chen, Chunlin Xiong, Yan Chen, Tiantian Zhu, Hai Yang
2019Efficient MPC via Program Analysis: A Framework for Efficient Optimal Mixing.
Muhammad Ishaq, Ana L. Milanova, Vassilis Zikas
2019Efficient Multi-Key Homomorphic Encryption with Packed Ciphertexts with Application to Oblivious Neural Network Inference.
Hao Chen, Wei Dai, Miran Kim, Yongsoo Song
2019Efficient Publicly Verifiable 2PC over a Blockchain with Applications to Financially-Secure Computations.
Ruiyu Zhu, Changchang Ding, Yan Huang
2019Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation.
Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Rindal, Peter Scholl
2019Efficient Verifiable Secret Sharing with Share Recovery in BFT Protocols.
Soumya Basu, Alin Tomescu, Ittai Abraham, Dahlia Malkhi, Michael K. Reiter, Emin Gün Sirer
2019Efficient Zero-Knowledge Arguments in the Discrete Log Setting, Revisited.
Max Hoffmann, Michael Klooß, Andy Rupp
2019Encrypted Databases: New Volume Attacks against Range Queries.
Zichen Gui, Oliver Johnson, Bogdan Warinschi
2019Endemic Oblivious Transfer.
Daniel Masny, Peter Rindal
2019Erlay: Efficient Transaction Relay for Bitcoin.
Gleb Naumenko, Gregory Maxwell, Pieter Wuille, Alexandra Fedorova, Ivan Beschastnikh
2019Exploiting Symmetries When Proving Equivalence Properties for Security Protocols.
Vincent Cheval, Steve Kremer, Itsaka Rakotonirina
2019Fallout: Leaking Data on Meltdown-resistant CPUs.
Claudio Canella, Daniel Genkin, Lukas Giner, Daniel Gruss, Moritz Lipp, Marina Minkin, Daniel Moghimi, Frank Piessens, Michael Schwarz, Berk Sunar, Jo Van Bulck, Yuval Yarom
2019Fast Actively Secure Five-Party Computation with Security Beyond Abort.
Megha Byali, Carmit Hazay, Arpita Patra, Swati Singla
2019Five Years of the Right to be Forgotten.
Theo Bertram, Elie Bursztein, Stephanie Caro, Hubert Chao, Rutledge Chin Feman, Peter Fleischer, Albin Gustafsson, Jess Hemerly, Chris Hibbert, Luca Invernizzi, Lanah Kammourieh Donnelly, Jason Ketover, Jay Laefer, Paul Nicholas, Yuan Niu, Harjinder Obhi, David Price, Andrew Strait, Kurt Thomas, Al Verney
2019Flexible Byzantine Fault Tolerance.
Dahlia Malkhi, Kartik Nayak, Ling Ren
2019Force vs. Nudge: Comparing Users' Pattern Choices on SysPal and TinPal.
Harshal Tupsamudre, Sukanya Vaddepalli, Vijayanand Banahatti, Sachin Lodha
2019GALACTICS: Gaussian Sampling for Lattice-Based Constant- Time Implementation of Cryptographic Signatures, Revisited.
Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Mélissa Rossi, Mehdi Tibouchi
2019Geneva: Evolving Censorship Evasion Strategies.
Kevin Bock, George Hughey, Xiao Qiang, Dave Levin
2019Gollum: Modular and Greybox Exploit Generation for Heap Overflows in Interpreters.
Sean Heelan, Tom Melham, Daniel Kroening
2019Hardware-Backed Heist: Extracting ECDSA Keys from Qualcomm's TrustZone.
Keegan Ryan
2019Hardware-assisted Trusted Execution Environments: Look Back, Look Ahead.
N. Asokan
2019HideNoSeek: Camouflaging Malicious JavaScript in Benign ASTs.
Aurore Fass, Michael Backes, Ben Stock
2019HoneyBadgerMPC and AsynchroMix: Practical Asynchronous MPC and its Application to Anonymous Communication.
Donghang Lu, Thomas Yurek, Samarth Kulshreshtha, Rahul Govind, Aniket Kate, Andrew Miller
2019Houdini's Escape: Breaking the Resource Rein of Linux Control Groups.
Xing Gao, Zhongshu Gu, Zhengfa Li, Hani Jamjoom, Cong Wang
2019How to (not) Share a Password: Privacy Preserving Protocols for Finding Heavy Hitters with Adversarial Behavior.
Moni Naor, Benny Pinkas, Eyal Ronen
2019How to Accurately and Privately Identify Anomalies.
Hafiz Salman Asif, Periklis A. Papakonstantinou, Jaideep Vaidya
2019HyperService: Interoperability and Programmability Across Heterogeneous Blockchains.
Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, Yih-Chun Hu
2019Insecure Until Proven Updated: Analyzing AMD SEV's Remote Attestation.
Robert Buhren, Christian Werling, Jean-Pierre Seifert
2019Intriguer: Field-Level Constraint Solving for Hybrid Fuzzing.
Mingi Cho, Seoyoung Kim, Taekyoung Kwon
2019IoT S&P 2019: 2nd Workshop on the Internet of Things Security and Privacy.
Peng Liu, Yuqing Zhang
2019Just the Tip of the Iceberg: Internet-Scale Exploitation of Routers for Cryptojacking.
Hugo L. J. Bijmans, Tim M. Booij, Christian Doerr
2019Kerberoid: A Practical Android App Decompilation System with Multiple Decompilers.
Heejun Jang, Beomjin Jin, Sangwon Hyun, Hyoungshick Kim
2019Latent Backdoor Attacks on Deep Neural Networks.
Yuanshun Yao, Huiying Li, Haitao Zheng, Ben Y. Zhao
2019Learning to Fuzz from Symbolic Execution with Application to Smart Contracts.
Jingxuan He, Mislav Balunovic, Nodar Ambroladze, Petar Tsankov, Martin T. Vechev
2019LegoSNARK: Modular Design and Composition of Succinct Zero-Knowledge Proofs.
Matteo Campanelli, Dario Fiore, Anaïs Querol
2019Let's Encrypt: An Automated Certificate Authority to Encrypt the Entire Web.
Josh Aas, Richard Barnes, Benton Case, Zakir Durumeric, Peter Eckersley, Alan Flores-López, J. Alex Halderman, Jacob Hoffman-Andrews, James Kasten, Eric Rescorla, Seth D. Schoen, Brad Warren
2019LevioSA: Lightweight Secure Arithmetic Computation.
Carmit Hazay, Yuval Ishai, Antonio Marcedone, Muthuramakrishnan Venkitasubramaniam
2019LibreCAN: Automated CAN Message Translator.
Mert D. Pesé, Troy Stacer, C. Andrés Campos, Eric Newberry, Dongyao Chen, Kang G. Shin
2019Lifelong Anomaly Detection Through Unlearning.
Min Du, Zhi Chen, Chang Liu, Rajvardhan Oak, Dawn Song
2019LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed.
Huayi Duan, Cong Wang, Xingliang Yuan, Yajin Zhou, Qian Wang, Kui Ren
2019Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise.
Fucheng Liu, Yu Wen, Dongxue Zhang, Xihe Jiang, Xinyu Xing, Dan Meng
2019MTD 2019: The 6th ACM Workshop on Moving Target Defense.
Zhuo Lu
2019Machine-Checked Proofs for Cryptographic Standards: Indifferentiability of Sponge and Secure High-Assurance Implementations of SHA-3.
José Bacelar Almeida, Cécile Baritel-Ruet, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Alley Stoughton, Pierre-Yves Strub
2019Make Some ROOM for the Zeros: Data Sparsity in Secure Distributed Machine Learning.
Phillipp Schoppmann, Adrià Gascón, Mariana Raykova, Benny Pinkas
2019MalMax: Multi-Aspect Execution for Automated Dynamic Web Server Malware Analysis.
Abbas Naderi-Afooshteh, Yonghwi Kwon, Anh Nguyen-Tuong, Ali Razmjoo-Qalaei, Mohammad-Reza Zamiri-Gourabi, Jack W. Davidson
2019MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol.
Muhammed F. Esgin, Raymond K. Zhao, Ron Steinfeld, Joseph K. Liu, Dongxi Liu
2019Matched and Mismatched SOCs: A Qualitative Study on Security Operations Center Issues.
Faris Bugra Kokulu, Ananta Soneji, Tiffany Bao, Yan Shoshitaishvili, Ziming Zhao, Adam Doupé, Gail-Joon Ahn
2019Matryoshka: Fuzzing Deeply Nested Branches.
Peng Chen, Jianzhong Liu, Hao Chen
2019Medical Protocol Security: DICOM Vulnerability Mining Based on Fuzzing Technology.
Zhiqiang Wang, Quanqi Li, Yazhe Wang, Biao Liu, Jianyi Zhang, Qixu Liu
2019MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples.
Jinyuan Jia, Ahmed Salem, Michael Backes, Yang Zhang, Neil Zhenqiang Gong
2019Membership Privacy for Fully Dynamic Group Signatures.
Michael Backes, Lucjan Hanzlik, Jonas Schneider-Bensch
2019Mitigating Leakage in Secure Cloud-Hosted Data Structures: Volume-Hiding for Multi-Maps via Hashing.
Sarvar Patel, Giuseppe Persiano, Kevin Yeo, Moti Yung
2019Moving Beyond Set-It-And-Forget-It Privacy Settings on Social Media.
Mainack Mondal, Günce Su Yilmaz, Noah Hirsch, Mohammad Taha Khan, Michael Tang, Christopher Tran, Chris Kanich, Blase Ur, Elena Zheleva
2019Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms.
Rahul Chatterjee, M. Sadegh Riazi, Tanmoy Chowdhury, Emanuela Marasco, Farinaz Koushanfar, Ari Juels
2019Network Hygiene, Incentives, and Regulation: Deployment of Source Address Validation in the Internet.
Matthew J. Luckie, Robert Beverly, Ryan Koga, Ken Keys, Joshua A. Kroll, K. C. Claffy
2019Neural Network Inversion in Adversarial Setting via Background Knowledge Alignment.
Ziqi Yang, Jiyi Zhang, Ee-Chien Chang, Zhenkai Liang
2019Nickel to Lego: Using Foolgle</> to Create Adversarial Examples to Fool Google Cloud Speech-to-Text API.
Joon Kuy Han, Hyoungshick Kim, Simon S. Woo
2019OPERA: Open Remote Attestation for Intel's Secure Enclaves.
Guoxing Chen, Yinqian Zhang, Ten-Hwang Lai
2019Oh, the Places You've Been! User Reactions to Longitudinal Transparency About Third-Party Web Tracking and Inferencing.
Ben Weinshel, Miranda Wei, Mainack Mondal, Euirim Choi, Shawn Shan, Claire Dolin, Michelle L. Mazurek, Blase Ur
2019Omniring: Scaling Private Payments Without Trusted Setup.
Russell W. F. Lai, Viktoria Ronge, Tim Ruffing, Dominique Schröder, Sri Aravinda Krishnan Thyagarajan, Jiafan Wang
2019Onion Ring ORAM: Efficient Constant Bandwidth Oblivious RAM from (Leveled) TFHE.
Hao Chen, Ilaria Chillotti, Ling Ren
2019PIEs: Public Incompressible Encodings for Decentralized Storage.
Ethan Cecchetti, Ben Fisch, Ian Miers, Ari Juels
2019PLAS 2019: ACM SIGSAC Workshop on Programming Languages and Analysis for Security.
Piotr Mardziel, Niki Vazou
2019POIROT: Aligning Attack Behavior with Kernel Audit Records for Cyber Threat Hunting.
Sadegh M. Milajerdi, Birhanu Eshete, Rigel Gjomemo, V. N. Venkatakrishnan
2019POSTER: Detecting Audio Adversarial Example through Audio Modification.
Hyun Kwon, Hyunsoo Yoon, Ki-Woong Park
2019POSTER: Traffic Splitting to Counter Website Fingerprinting.
Wladimir De la Cadena, Asya Mitseva, Jan Pennekamp, Jens Hiller, Fabian Lanze, Thomas Engel, Klaus Wehrle, Andriy Panchenko
2019PPML '19: Privacy Preserving Machine Learning.
Borja Balle, Adrià Gascón, Olya Ohrimenko, Mariana Raykova, Phillipp Schoppmann, Carmela Troncoso
2019Page Cache Attacks.
Daniel Gruss, Erik Kraft, Trishita Tiwari, Michael Schwarz, Ari Trachtenberg, Jason Hennessey, Alex Ionescu, Anders Fogh
2019Peeves: Physical Event Verification in Smart Homes.
Simon Birnbach, Simon Eberz, Ivan Martinovic
2019Post-Collusion Security and Distance Bounding.
Sjouke Mauw, Zach Smith, Jorge Toro-Pozo, Rolando Trujillo-Rasua
2019Poster: A First Look at the Privacy Risks of Voice Assistant Apps.
Atsuko Natatsuka, Ryo Iijima, Takuya Watanabe, Mitsuaki Akiyama, Tetsuya Sakai, Tatsuya Mori
2019Poster: A Proof-of-Stake (PoS) Blockchain Protocol using Fair and Dynamic Sharding Management.
Daehwa Rayer Lee, Yunhee Jang, Hyoungshick Kim
2019Poster: A Reliable and Accountable Privacy-Preserving Federated Learning Framework using the Blockchain.
Sana Awan, Fengjun Li, Bo Luo, Mei Liu
2019Poster: Adversarial Examples for Hate Speech Classifiers.
Rajvardhan Oak
2019Poster: Attacking Malware Classifiers by Crafting Gradient-Attacks that Preserve Functionality.
Raphael Labaca Castro, Battista Biggio, Gabi Dreo Rodosek
2019Poster: Challenges of Accurately Measuring Churn in P2P Botnets.
Leon Böck, Shankar Karuppayah, Kory Fong, Max Mühlhäuser, Emmanouil Vasilomanolakis
2019Poster: Deployment-quality and Accessible Solutions for Cryptography Code Development.
Sazzadur Rahaman, Ya Xiao, Sharmin Afrose, Ke Tian, Miles Frantz, Na Meng, Barton P. Miller, Fahad Shaon, Murat Kantarcioglu, Danfeng (Daphne) Yao
2019Poster: Detecting WebAssembly-based Cryptocurrency Mining.
Weikang Bian, Wei Meng, Yi Wang
2019Poster: Directed Hybrid Fuzzing on Binary Code.
Juhwan Kim, Joobeom Yun
2019Poster: Effective Layers in Coverage Metrics for Deep Neural Networks.
Leo Hyun Park, Sangjin Oh, Jaeuk Kim, Soochang Chung, Taekyoung Kwon
2019Poster: Evaluating Code Coverage for System Call Fuzzers.
Seoyoung Kim, Seyeon Jeong, Mingi Cho, Soochang Chung, Taekyoung Kwon
2019Poster: Evaluating Security Metrics for Website Fingerprinting.
Nate Mathews, Mohammad Saidur Rahman, Matthew Wright
2019Poster: Finding JavaScript Name Conflicts on the Web.
Mingxue Zhang, Wei Meng, Yi Wang
2019Poster: Framework for Semi-Private Function Evaluation with Application to Secure Insurance Rate Calculation.
Daniel Günther, Ágnes Kiss, Lukas Scheidel, Thomas Schneider
2019Poster: Fuzzing IoT Firmware via Multi-stage Message Generation.
Bo Yu, Pengfei Wang, Tai Yue, Yong Tang
2019Poster: GRANDPA Finality Gadget.
Alistair Stewart
2019Poster: Let History not Repeat Itself (this Time) - Tackling WebAuthn Developer Issues Early On.
Aftab Alam, Katharina Krombholz, Sven Bugiel
2019Poster: Network Message Field Type Recognition.
Stephan Kleber, Frank Kargl
2019Poster: On the Application of NLP to Discover Relationships between Malicious Network Entities.
Giuseppe Siracusano, Martino Trevisan, Roberto Gonzalez, Roberto Bifulco
2019Poster: Proofs of Retrievability with Low Server Storage.
Michael Hanling, Gaspard Anthoine, Jean-Guillaume Dumas, Aude Maignan, Clément Pernet, Daniel S. Roche
2019Poster: Recovering the Input of Neural Networks via Single Shot Side-channel Attacks.
Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek
2019Poster: SDN-based System to Filter Out DRDoS Amplification Traffic in ISP Networks.
Priyanka Dodia, Yury Zhauniarovich
2019Poster: TCLP: Enforcing Least Privileges to Prevent Containers from Kernel Vulnerabilities.
Suyeol Lee, Junsik Seo, Jaehyun Nam, Seungwon Shin
2019Poster: Towards Automated Quantitative Analysis and Forecasting of Vulnerability Discoveries in Debian GNU/Linux.
Nikolaos Alexopoulos, Rolf Egert, Tim Grube, Max Mühlhäuser
2019Poster: Towards Characterizing and Limiting Information Exposure in DNN Layers.
Fan Mo, Ali Shahin Shamsabadi, Kleomenis Katevas, Andrea Cavallaro, Hamed Haddadi
2019Poster: Towards Robust Open-World Detection of Deepfakes.
Saniat Javid Sohrawardi, Akash Chintha, Bao Thai, Sovantharith Seng, Andrea Hickerson, Raymond W. Ptucha, Matthew Wright
2019Poster: Towards a Data Centric Approach for the Design and Verification of Cryptographic Protocols.
Luca Arnaboldi, Roberto Metere
2019Poster: Towards a Framework for Assessing Vulnerabilities of Brainwave Authentication Systems.
Karen Becker, Patricia Arias Cabarcos, Thilo Habrich, Christian Becker
2019Poster: Understanding User's Decision to Interact with Potential Phishing Posts on Facebook using a Vignette Study.
Sovantharith Seng, Huzeyfe Kocabas, Mahdi Nasrullah Al-Ameen, Matthew Wright
2019Poster: Using Generative Adversarial Networks for Secure Pseudorandom Number Generation.
Rajvardhan Oak, Chaitanya Rahalkar, Dhaval Gujar
2019Poster: Video Fingerprinting in Tor.
Mohammad Saidur Rahman, Nate Mathews, Matthew Wright
2019Poster: When Adversary Becomes the Guardian - Towards Side-channel Security With Adversarial Attacks.
Stjepan Picek, Dirmanto Jap, Shivam Bhasin
2019Power Adjusting and Bribery Racing: Novel Mining Attacks in the Bitcoin System.
Shang Gao, Zecheng Li, Zhe Peng, Bin Xiao
2019Practical Decryption exFiltration: Breaking PDF Encryption.
Jens Müller, Fabian Ising, Vladislav Mladenov, Christian Mainka, Sebastian Schinzel, Jörg Schwenk
2019Practical Fully Secure Three-Party Computation via Sublinear Distributed Zero-Knowledge Proofs.
Elette Boyle, Niv Gilboa, Yuval Ishai, Ariel Nof
2019Principled Unearthing of TCP Side Channel Vulnerabilities.
Yue Cao, Zhongjie Wang, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy, Paul L. Yu
2019Prism: Deconstructing the Blockchain to Approach Physical Limits.
Vivek Kumar Bagaria, Sreeram Kannan, David Tse, Giulia Fanti, Pramod Viswanath
2019PrivDPI: Privacy-Preserving Encrypted Traffic Inspection with Reusable Obfuscated Rules.
Jianting Ning, Geong Sen Poh, Jia-Ch'ng Loh, Jason Chia, Ee-Chien Chang
2019Privacy Aspects and Subliminal Channels in Zcash.
Alex Biryukov, Daniel Feher, Giuseppe Vitto
2019Privacy Risks of Securing Machine Learning Models against Adversarial Examples.
Liwei Song, Reza Shokri, Prateek Mittal
2019Probabilistic Data Structures in Adversarial Environments.
David Clayton, Christopher Patton, Thomas Shrimpton
2019Procedural Noise Adversarial Examples for Black-Box Attacks on Deep Convolutional Networks.
Kenneth T. Co, Luis Muñoz-González, Sixte de Maupeou, Emil C. Lupu
2019Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, London, UK, November 11-15, 2019.
Lorenzo Cavallaro, Johannes Kinder, Xiaofeng Wang, Jonathan Katz
2019Program-mandering: Quantitative Privilege Separation.
Shen Liu, Dongrui Zeng, Yongzhe Huang, Frank Capobianco, Stephen McCamant, Trent Jaeger, Gang Tan
2019Proof-Carrying Network Code.
Christian Skalka, John H. Ring, David Darais, Minseok Kwon, Sahil Gupta, Kyle Diller, Steffen Smolka, Nate Foster
2019Protocols for Checking Compromised Credentials.
Lucy Li, Bijeeta Pal, Junade Ali, Nick Sullivan, Rahul Chatterjee, Thomas Ristenpart
2019QUOTIENT: Two-Party Secure Neural Network Training and Prediction.
Nitin Agrawal, Ali Shahin Shamsabadi, Matt J. Kusner, Adrià Gascón
2019Quantitative Verification of Neural Networks and Its Security Applications.
Teodora Baluta, Shiqi Shen, Shweta Shinde, Kuldeep S. Meel, Prateek Saxena
2019SAMPL: Scalable Auditability of Monitoring Processes using Public Ledgers.
Gaurav Panwar, Roopa Vishwanathan, Satyajayant Misra, Austin Bos
2019SEEMless: Secure End-to-End Encrypted Messaging with less</> Trust.
Melissa Chase, Apoorvaa Deshpande, Esha Ghosh, Harjasleen Malvai
2019SICO: Surgical Interception Attacks by Manipulating BGP Communities.
Henry Birge-Lee, Liang Wang, Jennifer Rexford, Prateek Mittal
2019SLAKE: Facilitating Slab Manipulation for Exploiting Vulnerabilities in the Linux Kernel.
Yueqi Chen, Xinyu Xing
2019SMoTherSpectre: Exploiting Speculative Execution through Port Contention.
Atri Bhattacharyya, Alexandra Sandulescu, Matthias Neugschwandtner, Alessandro Sorniotti, Babak Falsafi, Mathias Payer, Anil Kurmus
2019SSR'19: The 5th Conference on Security Standardisation Research.
Maryam Mehrnezhad, Thyla van der Merwe, Feng Hao
2019SecTEE: A Software-based Approach to Secure Enclave Architecture Using TEE.
Shijun Zhao, Qianying Zhang, Yu Qin, Wei Feng, Dengguo Feng
2019Securely Sampling Biased Coins with Applications to Differential Privacy.
Jeffrey Champion, Abhi Shelat, Jonathan R. Ullman
2019Security Certification in Payment Card Industry: Testbeds, Measurements, and Recommendations.
Sazzadur Rahaman, Gang Wang, Danfeng Daphne Yao
2019Seeing isn't Believing: Towards More Robust Adversarial Attack Against Real World Object Detectors.
Yue Zhao, Hong Zhu, Ruigang Liang, Qintao Shen, Shengzhi Zhang, Kai Chen
2019Seems Legit: Automated Analysis of Subtle Attacks on Protocols that Use Signatures.
Dennis Jackson, Cas Cremers, Katriel Cohn-Gordon, Ralf Sasse
2019Signed Cryptographic Program Verification with Typed CryptoLine.
Yu-Fu Fu, Jiaxiang Liu, Xiaomu Shi, Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang
2019Snout: An Extensible IoT Pen-Testing Tool.
John Mikulskis, Johannes K. Becker, Stefan Gvozdenovic, David Starobinski
2019Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updatable Structured Reference Strings.
Mary Maller, Sean Bowe, Markulf Kohlweiss, Sarah Meiklejohn
2019Stormy: Statistics in Tor by Measuring Securely.
Ryan Wails, Aaron Johnson, Daniel Starin, Arkady Yerukhimovich, S. Dov Gordon
2019Succinct Arguments for Bilinear Group Arithmetic: Practical Structure-Preserving Cryptography.
Russell W. F. Lai, Giulio Malavolta, Viktoria Ronge
2019TIS'19: Theory of Implementation Security Workshop 2019.
Begül Bilgin, Svetla Nikova, Vincent Rijmen
2019Tesseract: Real-Time Cryptocurrency Exchange Using Trusted Hardware.
Iddo Bentov, Yan Ji, Fan Zhang, Lorenz Breidenbach, Philip Daian, Ari Juels
2019The Art and Craft of Fraudulent App Promotion in Google Play.
Mizanur Rahman, Nestor Hernandez, Ruben Recabarren, Syed Ishtiaque Ahmed, Bogdan Carbunar
2019The Catcher in the Field: A Fieldprint based Spoofing Detection for Text-Independent Speaker Verification.
Chen Yan, Yan Long, Xiaoyu Ji, Wenyuan Xu
2019The Next 700 Policy Miners: A Universal Method for Building Policy Miners.
Carlos Cotrini, Luca Corinzia, Thilo Weghorn, David A. Basin
2019The SPHINCS
Daniel J. Bernstein, Andreas Hülsing, Stefan Kölbl, Ruben Niederhagen, Joost Rijneveld, Peter Schwabe
2019TokenScope: Automatically Detecting Inconsistent Behaviors of Cryptocurrency Tokens in Ethereum.
Ting Chen, Yufei Zhang, Zihao Li, Xiapu Luo, Ting Wang, Rong Cao, Xiuzhuo Xiao, Xiaosong Zhang
2019Towards Continuous Access Control Validation and Forensics.
Chengcheng Xiang, Yudong Wu, Bingyu Shen, Mingyao Shen, Haochen Huang, Tianyin Xu, Yuanyuan Zhou, Cindy Moore, Xinxin Jin, Tianwei Sheng
2019Towards Memory Safe Enclave Programming with Rust-SGX.
Huibo Wang, Pei Wang, Yu Ding, Mingshen Sun, Yiming Jing, Ran Duan, Long Li, Yulong Zhang, Tao Wei, Zhiqiang Lin
2019Traceback for End-to-End Encrypted Messaging.
Nirvan Tyagi, Ian Miers, Thomas Ristenpart
2019Transparency Logs via Append-Only Authenticated Dictionaries.
Alin Tomescu, Vivek Bhupatiraju, Dimitrios Papadopoulos, Charalampos Papamanthou, Nikos Triandopoulos, Srinivas Devadas
2019Trick or Heat?: Manipulating Critical Temperature-Based Control Systems Using Rectification Attacks.
Yazhou Tu, Sara Rampazzi, Bin Hao, Angel Rodriguez, Kevin Fu, Xiali Hei
2019Triplet Fingerprinting: More Practical and Portable Website Fingerprinting with N-shot Learning.
Payap Sirinam, Nate Mathews, Mohammad Saidur Rahman, Matthew Wright
2019Two-Thirds Honest-Majority MPC for Malicious Adversaries at Almost the Cost of Semi-Honest.
Jun Furukawa, Yehuda Lindell
2019Two-party Private Set Intersection with an Untrusted Third Party.
Phi Hung Le, Samuel Ranellucci, S. Dov Gordon
2019Updatable Anonymous Credentials and Applications to Incentive Systems.
Johannes Blömer, Jan Bobolz, Denis Diemert, Fabian Eidens
2019Updatable Oblivious Key Management for Storage Systems.
Stanislaw Jarecki, Hugo Krawczyk, Jason K. Resch
2019User Account Access Graphs.
Sven Hammann, Sasa Radomirovic, Ralf Sasse, David A. Basin
2019Velody: Nonlinear Vibration Challenge-Response for Resilient User Authentication.
Jingjie Li, Kassem Fawaz, Younghyun Kim
2019VeriSketch: Synthesizing Secure Hardware Designs with Timing-Sensitive Information Flow Properties.
Armaiti Ardeshiricham, Yoshiki Takashima, Sicun Gao, Ryan Kastner
2019Verified Verifiers for Verifying Elections.
Thomas Haines, Rajeev Goré, Mukesh Tiwari
2019VoltJockey: Breaching TrustZone by Software-Controlled Voltage Manipulation over Multi-core Frequencies.
Pengfei Qiu, Dongsheng Wang, Yongqiang Lyu, Gang Qu
2019WAHC'19: 7th Workshop on Encrypted Computing & Applied Homomorphic Cryptograph.
Michael Brenner, Tancrède Lepoint, Kurt Rohloff
2019WI Is Not Enough: Zero-Knowledge Contingent (Service) Payments Revisited.
Georg Fuchsbauer
2019Watching You Watch: The Tracking Ecosystem of Over-the-Top TV Streaming Devices.
Hooman Mohajeri Moghaddam, Gunes Acar, Ben Burgess, Arunesh Mathur, Danny Yuxing Huang, Nick Feamster, Edward W. Felten, Prateek Mittal, Arvind Narayanan
2019Where Does It Go?: Refining Indirect-Call Targets with Multi-Layer Type Analysis.
Kangjie Lu, Hong Hu
2019You Are Who You Appear to Be: A Longitudinal Study of Domain Impersonation in TLS Certificates.
Richard Roberts, Yaelle Goldschlag, Rachel Walter, Taejoong Chung, Alan Mislove, Dave Levin
2019You Shall Not Join: A Measurement Study of Cryptocurrency Peer-to-Peer Bootstrapping Techniques.
Angelique Faye Loe, Elizabeth Anne Quaglia
2019Your Cache Has Fallen: Cache-Poisoned Denial-of-Service Attack.
Hoai Viet Nguyen, Luigi Lo Iacono, Hannes Federrath
2019ZombieLoad: Cross-Privilege-Boundary Data Sampling.
Michael Schwarz, Moritz Lipp, Daniel Moghimi, Jo Van Bulck, Julian Stecklina, Thomas Prescher, Daniel Gruss
2019pFilter: Retrofitting Legacy Applications for Data Privacy.
Manish Shukla, Kumar Vidhani, Gangadhara Reddy Sirigireddy, Vijayanand Banahatti, Sachin Lodha
2019simFIDO: FIDO2 User Authentication with simTPM.
Dhiman Chakraborty, Sven Bugiel
2019zkay: Specifying and Enforcing Data Privacy in Smart Contracts.
Samuel Steffen, Benjamin Bichsel, Mario Gersbach, Noa Melchior, Petar Tsankov, Martin T. Vechev
2019ÆGIS: Smart Shielding of Smart Contracts.
Christof Ferreira Torres, Mathis Baden, Robert Norvill, Hugo Jonker