CCS A*

149 papers

YearTitle / Authors
202019th Workshop on Privacy in the Electronic Society (WPES 2020).
Wouter Lueks, Paul Syverson
20202nd Workshop on Cyber-Security Arms Race (CYSARM 2020).
Thanassis Giannetsos, Daniele Sgandurra
2020A 2.1 KHz Zero-Knowledge Processor with BubbleRAM.
David Heath, Vladimir Kolesnikov
2020A Forensically Sound Method of Identifying Downloaders and Uploaders in Freenet.
Brian Neil Levine, Marc Liberatore, Brian Lynn, Matthew Wright
2020A Generic Technique for Automatically Finding Defense-Aware Code Reuse Attacks.
Edward J. Schwartz, Cory F. Cohen, Jeffrey Gennari, Stephanie Schwartz
2020A Multi-phased Multi-faceted IoT Honeypot Ecosystem.
Armin Ziaie Tabari, Xinming Ou
2020A Performant, Misuse-Resistant API for Primality Testing.
Jake Massimo, Kenneth G. Paterson
2020A Qualitative Study of Dependency Management and Its Security Implications.
Ivan Pashchenko, Duc-Ly Vu, Fabio Massacci
2020A Systematic Study of Elastic Objects in Kernel Exploitation.
Yueqi Chen, Zhenpeng Lin, Xinyu Xing
2020A Tale of Evil Twins: Adversarial Inputs versus Poisoned Models.
Ren Pang, Hua Shen, Xinyang Zhang, Shouling Ji, Yevgeniy Vorobeychik, Xiapu Luo, Alex X. Liu, Ting Wang
2020ACE: Asynchronous and Concurrent Execution of Complex Smart Contracts.
Karl Wüst, Sinisa Matetic, Silvan Egli, Kari Kostiainen, Srdjan Capkun
2020AISec'20: 13th Workshop on Artificial Intelligence and Security.
Sadia Afroz, Nicholas Carlini, Ambra Demontis
2020ASHES 2020: 4th Workshop on Attacks and Solutions in Hardware Security.
Chip-Hong Chang, Stefan Katzenbeisser, Ulrich Rührmair, Patrick Schaumont
2020AdvPulse: Universal, Synchronization-free, and Targeted Audio Adversarial Attacks via Subsecond Perturbations.
Zhuohang Li, Yi Wu, Jian Liu, Yingying Chen, Bo Yuan
2020Analyzing Information Leakage of Updates to Natural Language Models.
Santiago Zanella-Béguelin, Lukas Wutschitz, Shruti Tople, Victor Rühle, Andrew Paverd, Olga Ohrimenko, Boris Köpf, Marc Brockschmidt
2020Asynchronous Distributed Key Generation for Computationally-Secure Randomness, Consensus, and Threshold Signatures.
Eleftherios Kokoris-Kogias, Dahlia Malkhi, Alexander Spiegelman
2020Asynchronous Remote Key Generation: An Analysis of Yubico's Proposal for W3C WebAuthn.
Nick Frymann, Daniel Gardham, Franziskus Kiefer, Emil Lundberg, Mark Manulis, Dain Nilsson
2020BDoS: Blockchain Denial-of-Service.
Michael Mirkin, Yan Ji, Jonathan Pang, Ariah Klages-Mundt, Ittay Eyal, Ari Juels
2020Benchmarking Label Dynamics of VirusTotal Engines.
Shuofei Zhu, Ziyi Zhang, Limin Yang, Linhai Song, Gang Wang
2020Bento: Bringing Network Function Virtualization to Tor.
Michael Reininger, Arushi Arora, Stephen Herwig, Nicholas Francino, Christina Garman, Dave Levin
2020BlackMirror: Preventing Wallhacks in 3D Online FPS Games.
Seonghyun Park, Adil Ahmad, Byoungyoung Lee
2020Blinder - Scalable, Robust Anonymous Committed Broadcast.
Ittai Abraham, Benny Pinkas, Avishay Yanai
2020Bypassing Tor Exit Blocking with Exit Bridge Onion Services.
Zhao Zhang, Wenchao Zhou, Micah Sherr
2020CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020
Jay Ligatti, Xinming Ou, Jonathan Katz, Giovanni Vigna
2020CCSW'20: 2020 Cloud Computing Security Workshop.
Radu Sion, Yinqian Zhang
2020CLAPS: Client-Location-Aware Path Selection in Tor.
Florentin Rochet, Ryan Wails, Aaron Johnson, Prateek Mittal, Olivier Pereira
2020CPSIOTSEC'20: 2020 Joint Workshop on CPS&IoT Security and Privacy.
Michail Maniatakos, Yuqing Zhang
2020Cache-in-the-Middle (CITM) Attacks: Manipulating Sensitive Data in Isolated Execution Environments.
Jie Wang, Kun Sun, Lingguang Lei, Shengye Wan, Yuewu Wang, Jiwu Jing
2020Censored Planet: An Internet-wide, Longitudinal Censorship Observatory.
Ram Sundara Raman, Prerana Shenoy, Katharina Kohls, Roya Ensafi
2020CheckDP: An Automated and Integrated Approach for Proving Differential Privacy or Finding Precise Counterexamples.
Yuxin Wang, Zeyu Ding, Daniel Kifer, Danfeng Zhang
2020Clone Detection in Secure Messaging: Improving Post-Compromise Security in Practice.
Cas Cremers, Jaiden Fairoze, Benjamin Kiesl, Aurora Naska
2020Composite Backdoor Attack for Deep Neural Network by Mixing Existing Benign Features.
Junyu Lin, Lei Xu, Yingqi Liu, Xiangyu Zhang
2020Continuous and Multiregional Monitoring of Malicious Hosts.
Shota Fujii, Takayuki Sato, Sho Aoki, Yu Tsuda, Yusuke Okano, Tomohiro Shigemoto, Nobutaka Kawaguchi, Masato Terada
2020CrypTFlow2: Practical 2-Party Secure Inference.
Deevashwer Rathee, Mayank Rathee, Nishant Kumar, Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma
2020Cyber-Physical Inconsistency Vulnerability Identification for Safety Checks in Robotic Vehicles.
Hongjun Choi, Sayali Kate, Yousra Aafer, Xiangyu Zhang, Dongyan Xu
2020Cybersecurity Research and Training for Power Distribution Grids - A Blueprint.
Martin Henze, Lennart Bader, Julian Filter, Olav Lamberts, Simon Ofner, Dennis van der Velde
2020DECO: Liberating Web Data Using Decentralized Oracles for TLS.
Fan Zhang, Deepak Maram, Harjasleen Malvai, Steven Goldfeder, Ari Juels
2020DNS Cache Poisoning Attack Reloaded: Revolutions with Side Channels.
Keyu Man, Zhiyun Qian, Zhongjie Wang, Xiaofeng Zheng, Youjun Huang, Haixin Duan
2020Dangerous Skills Got Certified: Measuring the Trustworthiness of Skill Certification in Voice Personal Assistant Platforms.
Long Cheng, Christin Wilson, Song Liao, Jeffrey Young, Daniel Dong, Hongxin Hu
2020DeepDyve: Dynamic Verification for Deep Neural Networks.
Yu Li, Min Li, Bo Luo, Ye Tian, Qiang Xu
2020Demystifying Resource Management Risks in Emerging Mobile App-in-App Ecosystems.
Haoran Lu, Luyi Xing, Yue Xiao, Yifan Zhang, Xiaojing Liao, Xiaofeng Wang, Xueqiang Wang
2020Deploying Android Security Updates: an Extensive Study Involving Manufacturers, Carriers, and End Users.
Kailani R. Jones, Ting-Fang Yen, Sathya Chandran Sundaramurthy, Alexandru G. Bardas
2020Deterministic Wallets in a Quantum World.
Nabil Alkeilani Alkadri, Poulami Das, Andreas Erwig, Sebastian Faust, Juliane Krämer, Siavash Riahi, Patrick Struck
2020Devil is Virtual: Reversing Virtual Inheritance in C++ Binaries.
Rukayat Ayomide Erinfolami, Aravind Prakash
2020Dumbo: Faster Asynchronous BFT Protocols.
Bingyong Guo, Zhenliang Lu, Qiang Tang, Jing Xu, Zhenfeng Zhang
2020Déjà Vu: Side-Channel Analysis of Mozilla's NSS.
Sohaib ul Hassan, Iaroslav Gridin, Ignacio M. Delgado-Lozano, Cesar Pereida García, Jesús-Javier Chi-Domínguez, Alejandro Cabrera Aldaya, Billy Bob Brumley
2020Enhancing State-of-the-art Classifiers with API Semantics to Detect Evolved Android Malware.
Xiaohan Zhang, Yuan Zhang, Ming Zhong, Daizong Ding, Yinzhi Cao, Yukun Zhang, Mi Zhang, Min Yang
2020Estimating g-Leakage via Machine Learning.
Marco Romanelli, Konstantinos Chatzikokolakis, Catuscia Palamidessi, Pablo Piantanida
2020Everything is a Race and Nakamoto Always Wins.
Amir Dembo, Sreeram Kannan, Ertem Nusret Tas, David Tse, Pramod Viswanath, Xuechao Wang, Ofer Zeitouni
2020Exaggerated Error Handling Hurts! An In-Depth Study and Context-Aware Detection.
Aditya Pakki, Kangjie Lu
2020Examining Mirai's Battle over the Internet of Things.
Harm Griffioen, Christian Doerr
2020FEAST'20: Fifth Workshop on Forming an Ecosystem Around Software Transformation.
Kevin W. Hamlen, Long Lu
2020FREEDOM: Engineering a State-of-the-Art DOM Fuzzer.
Wen Xu, Soyeon Park, Taesoo Kim
2020Facilitating Protocol-independent Industrial Intrusion Detection Systems.
Konrad Wolsing, Eric Wagner, Martin Henze
2020Fast Database Joins and PSI for Secret Shared Data.
Payman Mohassel, Peter Rindal, Mike Rosulek
2020Ferret: Fast Extension for Correlated OT with Small Communication.
Kang Yang, Chenkai Weng, Xiao Lan, Jiang Zhang, Xiao Wang
2020Fill in the Blanks: Empirical Analysis of the Privacy Threats of Browser Form Autofill.
Xu Lin, Panagiotis Ilia, Jason Polakis
2020Finding Cracks in Shields: On the Security of Control Flow Integrity Mechanisms.
Yuan Li, Mingzhe Wang, Chao Zhang, Xingman Chen, Songtao Yang, Ying Liu
2020FirmXRay: Detecting Bluetooth Link Layer Vulnerabilities From Bare-Metal Firmware.
Haohuang Wen, Zhiqiang Lin, Yinqian Zhang
2020Forensic Analysis in Access Control: Foundations and a Case-Study from Practice.
Nahid Juma, Xiaowei Huang, Mahesh Tripunitara
2020Full Database Reconstruction in Two Dimensions.
Francesca Falzon, Evangelia Anna Markatou, Akshima, David Cash, Adam Rivkin, Jesse Stern, Roberto Tamassia
2020GAN-Leaks: A Taxonomy of Membership Inference Attacks against Generative Models.
Dingfan Chen, Ning Yu, Yang Zhang, Mario Fritz
2020Game-Set-MATCH: Using Mobile Devices for Seamless External-Facing Biometric Matching.
Shashank Agrawal, Saikrishna Badrinarayanan, Pratyay Mukherjee, Peter Rindal
2020Gotta Catch'Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks.
Shawn Shan, Emily Wenger, Bolun Wang, Bo Li, Haitao Zheng, Ben Y. Zhao
2020HACLxN: Verified Generic SIMD Crypto (for all your favourite platforms).
Marina Polubelova, Karthikeyan Bhargavan, Jonathan Protzenko, Benjamin Beurdouche, Aymeric Fromherz, Natalia Kulatova, Santiago Zanella-Béguelin
2020Harnessing the Ambient Radio Frequency Noise for Wearable Device Pairing.
Wenqiang Jin, Ming Li, Srinivasan Murali, Linke Guo
2020HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems.
Efrén López-Morales, Carlos E. Rubio-Medrano, Adam Doupé, Yan Shoshitaishvili, Ruoyu Wang, Tiffany Bao, Gail-Joon Ahn
2020Impact of Energy Consumption Attacks on LoRaWAN-Enabled Devices in Industrial Context.
Muhammad Nouman Nafees, Neetesh Saxena, Pete Burnap, Bong Jun Choi
2020Impersonation-as-a-Service: Characterizing the Emerging Criminal Infrastructure for User Impersonation at Scale.
Michele Campobasso, Luca Allodi
2020Implementing the Exponential Mechanism with Base-2 Differential Privacy.
Christina Ilvento
2020InSpectre: Breaking and Fixing Microarchitectural Vulnerabilities by Formal Analysis.
Roberto Guanciale, Musard Balliu, Mads Dam
2020Information Leakage in Embedding Models.
Congzheng Song, Ananth Raghunathan
2020Is the Classical GMW Paradigm Practical? The Case of Non-Interactive Actively Secure 2PC.
Jackson Abascal, Mohammad Hossein Faghihi Sereshgi, Carmit Hazay, Yuval Ishai, Muthuramakrishnan Venkitasubramaniam
2020LEAF: A Faster Secure Search Algorithm via Localization, Extraction, and Reconstruction.
Rui Wen, Yu Yu, Xiang Xie, Yang Zhang
2020LPET - Mining MS-Windows Software Privilege Escalation Vulnerabilities by Monitoring Interactive Behavior.
Can Huang, Xinhui Han, Guorui Yu
2020LadderLeak: Breaking ECDSA with Less than One Bit of Nonce Leakage.
Diego F. Aranha, Felipe Rodrigues Novaes, Akira Takahashi, Mehdi Tibouchi, Yuval Yarom
2020Lies in the Air: Characterizing Fake-base-station Spam Ecosystem in China.
Yiming Zhang, Baojun Liu, Chaoyi Lu, Zhou Li, Haixin Duan, Shuang Hao, Mingxuan Liu, Ying Liu, Dong Wang, Qiang Li
2020Lift-and-Shift: Obtaining Simulation Extractable Subversion and Updatable SNARKs Generically.
Behzad Abdolmaleki, Sebastian Ramacher, Daniel Slamanig
2020Ligero++: A New Optimized Sublinear IOP.
Rishabh Bhadauria, Zhiyong Fang, Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Tiancheng Xie, Yupeng Zhang
2020Logging to the Danger Zone: Race Condition Attacks and Defenses on System Audit Frameworks.
Riccardo Paccagnella, Kevin Liao, Dave Tian, Adam Bates
2020MP-SPDZ: A Versatile Framework for Multi-Party Computation.
Marcel Keller
2020MTD'20: 7th ACM Workshop on Moving Target Defense.
Hamed Okhravi, Cliff Wang
2020Machine Learning and Security: The Good, The Bad, and The Ugly.
Wenke Lee
2020Methodologies for Quantifying (Re-)randomization Security and Timing under JIT-ROP.
Salman Ahmed, Ya Xiao, Kevin Z. Snow, Gang Tan, Fabian Monrose, Danfeng (Daphne) Yao
2020Minimal Symmetric PAKE and 1-out-of-N OT from Programmable-Once Public Functions.
Ian McQuoid, Mike Rosulek, Lawrence Roy
2020Mitigation of Attacks on Email End-to-End Encryption.
Jörg Schwenk, Marcus Brinkmann, Damian Poddebniak, Jens Müller, Juraj Somorovsky, Sebastian Schinzel
2020Mnemosyne: An Effective and Efficient Postmortem Watering Hole Attack Investigation System.
Joey Allen, Zheng Yang, Matthew Landen, Raghav Bhat, Harsh Grover, Andrew Chang, Yang Ji, Roberto Perdisci, Wenke Lee
2020More Efficient MPC from Improved Triple Generation and Authenticated Garbling.
Kang Yang, Xiao Wang, Jiang Zhang
2020MuSig-DN: Schnorr Multi-Signatures with Verifiably Deterministic Nonces.
Jonas Nick, Tim Ruffing, Yannick Seurin, Pieter Wuille
2020Off-Path TCP Exploits of the Mixed IPID Assignment.
Xuewei Feng, Chuanpu Fu, Qi Li, Kun Sun, Ke Xu
2020On the Optimality of Optimistic Responsiveness.
Nibesh Shrestha, Ittai Abraham, Ling Ren, Kartik Nayak
2020Oracle Simulation: A Technique for Protocol Composition with Long Term Shared Secrets.
Hubert Comon, Charlie Jacomme, Guillaume Scerri
2020PDiff: Semantic-based Patch Presence Testing for Downstream Kernels.
Zheyue Jiang, Yuan Zhang, Jun Xu, Qi Wen, Zhenghe Wang, Xiaohan Zhang, Xinyu Xing, Min Yang, Zhemin Yang
2020PLAS'20: 15th Workshop on Programming Languages and Analysis for Security.
Alley Stoughton, Marco Vassena
2020PMForce: Systematically Analyzing postMessage Handlers at Scale.
Marius Steffens, Ben Stock
2020PPE Circuits: Formal Definition to Software Automation.
Susan Hohenberger, Satyanarayana Vusirikala, Brent Waters
2020PPMLP 2020: Workshop on Privacy-Preserving Machine Learning In Practice.
Benyu Zhang, Matei Zaharia, Shouling Ji, Raluca Ada Popa, Guofei Gu
2020PatchScope: Memory Object Centric Patch Diffing.
Lei Zhao, Yuncong Zhu, Jiang Ming, Yichen Zhang, Haotian Zhang, Heng Yin
2020Phantom of the ADAS: Securing Advanced Driver-Assistance Systems from Split-Second Phantom Attacks.
Ben Nassi, Yisroel Mirsky, Dudi Nassi, Raz Ben-Netanel, Oleg Drokin, Yuval Elovici
2020PhishBench 2.0: A Versatile and Extendable Benchmarking Framework for Phishing.
Victor Zeng, Xin Zhou, Shahryar Baki, Rakesh M. Verma
2020Pointproofs: Aggregating Proofs for Multiple Vector Commitments.
Sergey Gorbunov, Leonid Reyzin, Hoeteck Wee, Zhenfei Zhang
2020Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communications by Parasitizing on WebRTC.
Diogo Barradas, Nuno Santos, Luís E. T. Rodrigues, Vítor Nunes
2020Post-Quantum TLS Without Handshake Signatures.
Peter Schwabe, Douglas Stebila, Thom Wiggers
2020Practical Lattice-Based Zero-Knowledge Proofs for Integer Relations.
Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler
2020Practical Recommendations for Stronger, More Usable Passwords Combining Minimum-strength, Minimum-length, and Blocklist Requirements.
Joshua Tan, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor
2020Privaros: A Framework for Privacy-Compliant Delivery Drones.
Rakesh Rajan Beck, Abhishek Vijeev, Vinod Ganapathy
2020Private Summation in the Multi-Message Shuffle Model.
Borja Balle, James Bell, Adrià Gascón, Kobbi Nissim
2020ProMACs: Progressive and Resynchronizing MACs for Continuous Efficient Authentication of Message Streams.
Frederik Armknecht, Paul Walther, Gene Tsudik, Martin Beck, Thorsten Strufe
2020QuantumHammer: A Practical Hybrid Attack on the LUOV Signature Scheme.
Koksal Mus, Saad Islam, Berk Sunar
2020R2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions.
Meisam Mohammady, Shangyu Xie, Yuan Hong, Mengyuan Zhang, Lingyu Wang, Makan Pourzandi, Mourad Debbabi
2020RIPT - An Efficient Multi-Core Record-Replay System.
Jiashuo Liang, Guancheng Li, Chao Zhang, Ming Yuan, Xingman Chen, Xinhui Han
2020RTFM! Automatic Assumption Discovery and Verification Derivation from Library Document for API Misuse Detection.
Tao Lv, Ruishi Li, Yi Yang, Kai Chen, Xiaojing Liao, Xiaofeng Wang, Peiwei Hu, Luyi Xing
2020Realistic Threats and Realistic Users: Lessons from the Election.
Alex Stamos
2020SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel Analysis.
Okan Seker, Sebastian Berndt, Luca Wilke, Thomas Eisenbarth
2020SQUIRREL: Testing Database Management Systems with Language Validity and Coverage Feedback.
Rui Zhong, Yongheng Chen, Hong Hu, Hangfan Zhang, Wenke Lee, Dinghao Wu
2020Secure Single-Server Aggregation with (Poly)Logarithmic Overhead.
James Henry Bell, Kallista A. Bonawitz, Adrià Gascón, Tancrède Lepoint, Mariana Raykova
2020Security Analysis and Implementation of Relay-Resistant Contactless Payments.
Ioana Boureanu, Tom Chothia, Alexandre Debant, Stéphanie Delaune
2020Security of Streaming Encryption in Google's Tink Library.
Viet Tung Hoang, Yaobin Shen
2020Slimium: Debloating the Chromium Browser with Feature Subsetting.
Chenxiong Qian, Hyungjoon Koo, ChangSeok Oh, Taesoo Kim, Wenke Lee
2020Speculative Probing: Hacking Blind in the Spectre Era.
Enes Göktas, Kaveh Razavi, Georgios Portokalidis, Herbert Bos, Cristiano Giuffrida
2020T2Pair: Secure and Usable Pairing for Heterogeneous IoT Devices.
Xiaopeng Li, Qiang Zeng, Lannan Luo, Tongbo Luo
2020TEMPEST Comeback: A Realistic Audio Eavesdropping Threat on Mixed-signal SoCs.
Jieun Choi, Hae-Yong Yang, Dong-Ho Cho
2020TPDP'20: 6th Workshop on Theory and Practice of Differential Privacy.
Rachel Cummings, Michael Hay
2020TRUSTORE: Side-Channel Resistant Storage for SGX using Intel Hybrid CPU-FPGA.
Hyunyoung Oh, Adil Ahmad, Seonghyun Park, Byoungyoung Lee, Yunheung Paek
2020Talking with Familiar Strangers: An Empirical Study on HTTPS Context Confusion Attacks.
Mingming Zhang, Xiaofeng Zheng, Kaiwen Shen, Ziqiao Kong, Chaoyi Lu, Yu Wang, Haixin Duan, Shuang Hao, Baojun Liu, Min Yang
2020Text Captcha Is Dead? A Large Scale Deployment and Empirical Study.
Chenghui Shi, Shouling Ji, Qianjun Liu, Changchang Liu, Yuefeng Chen, Yuan He, Zhe Liu, Raheem Beyah, Ting Wang
2020The Boon and Bane of Cross-Signing: Shedding Light on a Common Practice in Public Key Infrastructures.
Jens Hiller, Johanna Amann, Oliver Hohlfeld
2020The Cookie Hunter: Automated Black-box Auditing for Web Authentication and Authorization Flaws.
Kostas Drakonakis, Sotiris Ioannidis, Jason Polakis
2020The Signal Private Group System and Anonymous Credentials Supporting Efficient Verifiable Encryption.
Melissa Chase, Trevor Perrin, Greg Zaverucha
2020Threshold Password-Hardened Encryption Services.
Julian Brost, Christoph Egger, Russell W. F. Lai, Fritz Schmid, Dominique Schröder, Markus Zoppelt
2020Tight Consistency Bounds for Bitcoin.
Peter Gazi, Aggelos Kiayias, Alexander Russell
2020Towards Attribution in Mobile Markets: Identifying Developer Account Polymorphism.
Silvia Sebastián, Juan Caballero
2020Towards Using Source Code Repositories to Identify Software Supply Chain Attacks.
Duc-Ly Vu, Ivan Pashchenko, Fabio Massacci, Henrik Plate, Antonino Sabetta
2020TrafficSliver: Fighting Website Fingerprinting Attacks with Traffic Splitting.
Wladimir De la Cadena, Asya Mitseva, Jens Hiller, Jan Pennekamp, Sebastian Reuter, Julian Filter, Thomas Engel, Klaus Wehrle, Andriy Panchenko
2020UC Non-Interactive, Proactive, Threshold ECDSA with Identifiable Aborts.
Ran Canetti, Rosario Gennaro, Steven Goldfeder, Nikolaos Makriyannis, Udi Peled
2020Usage Patterns of Privacy-Enhancing Technologies.
Kovila P. L. Coopamootoo
2020VAHunt: Warding Off New Repackaged Android Malware in App-Virtualization's Clothing.
Luman Shi, Jiang Ming, Jianming Fu, Guojun Peng, Dongpeng Xu, Kun Gao, Xuanchen Pan
2020VRLifeTime - An IDE Tool to Avoid Concurrency and Memory Bugs in Rust.
Ziyi Zhang, Boqin Qin, Yilun Chen, Linhai Song, Yiying Zhang
2020Verifiable Timed Signatures Made Practical.
Sri Aravinda Krishnan Thyagarajan, Adithya Bhat, Giulio Malavolta, Nico Döttling, Aniket Kate, Dominique Schröder
2020VisualPhishNet: Zero-Day Phishing Website Detection by Visual Similarity.
Sahar Abdelnabi, Katharina Krombholz, Mario Fritz
2020Voice-Indistinguishability - Protecting Voiceprint with Differential Privacy under an Untrusted Server.
Yaowei Han, Yang Cao, Sheng Li, Qiang Ma, Masatoshi Yoshikawa
2020WI is Almost Enough: Contingent Payment All Over Again.
Ky Nguyen, Miguel Ambrona, Masayuki Abe
2020When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech Recognition.
Shu Wang, Jiahao Cao, Xu He, Kun Sun, Qi Li
2020You've Changed: Detecting Malicious Browser Extensions through their Update Deltas.
Nikolaos Pantelaios, Nick Nikiforakis, Alexandros Kapravelos
2020Zero Knowledge Proofs for Decision Tree Predictions and Accuracy.
Jiaheng Zhang, Zhiyong Fang, Yupeng Zhang, Dawn Song
2020Zombie Awakening: Stealthy Hijacking of Active Domains through DNS Hosting Referral.
Eihal Alowaisheq, Siyuan Tang, Zhihao Wang, Fatemah Alharbi, Xiaojing Liao, Xiaofeng Wang
2020eThor: Practical and Provably Sound Static Analysis of Ethereum Smart Contracts.
Clara Schneidewind, Ilya Grishchenko, Markus Scherer, Matteo Maffei
2020iDEA: Static Analysis on the Security of Apple Kernel Drivers.
Xiaolong Bai, Luyi Xing, Min Zheng, Fuping Qu
2020rProfiler - Assessing Insider Influence on Enterprise Assets.
Manish Shukla, Sachin Lodha