| 2020 | 19th Workshop on Privacy in the Electronic Society (WPES 2020). Wouter Lueks, Paul Syverson |
| 2020 | 2nd Workshop on Cyber-Security Arms Race (CYSARM 2020). Thanassis Giannetsos, Daniele Sgandurra |
| 2020 | A 2.1 KHz Zero-Knowledge Processor with BubbleRAM. David Heath, Vladimir Kolesnikov |
| 2020 | A Forensically Sound Method of Identifying Downloaders and Uploaders in Freenet. Brian Neil Levine, Marc Liberatore, Brian Lynn, Matthew Wright |
| 2020 | A Generic Technique for Automatically Finding Defense-Aware Code Reuse Attacks. Edward J. Schwartz, Cory F. Cohen, Jeffrey Gennari, Stephanie Schwartz |
| 2020 | A Multi-phased Multi-faceted IoT Honeypot Ecosystem. Armin Ziaie Tabari, Xinming Ou |
| 2020 | A Performant, Misuse-Resistant API for Primality Testing. Jake Massimo, Kenneth G. Paterson |
| 2020 | A Qualitative Study of Dependency Management and Its Security Implications. Ivan Pashchenko, Duc-Ly Vu, Fabio Massacci |
| 2020 | A Systematic Study of Elastic Objects in Kernel Exploitation. Yueqi Chen, Zhenpeng Lin, Xinyu Xing |
| 2020 | A Tale of Evil Twins: Adversarial Inputs versus Poisoned Models. Ren Pang, Hua Shen, Xinyang Zhang, Shouling Ji, Yevgeniy Vorobeychik, Xiapu Luo, Alex X. Liu, Ting Wang |
| 2020 | ACE: Asynchronous and Concurrent Execution of Complex Smart Contracts. Karl Wüst, Sinisa Matetic, Silvan Egli, Kari Kostiainen, Srdjan Capkun |
| 2020 | AISec'20: 13th Workshop on Artificial Intelligence and Security. Sadia Afroz, Nicholas Carlini, Ambra Demontis |
| 2020 | ASHES 2020: 4th Workshop on Attacks and Solutions in Hardware Security. Chip-Hong Chang, Stefan Katzenbeisser, Ulrich Rührmair, Patrick Schaumont |
| 2020 | AdvPulse: Universal, Synchronization-free, and Targeted Audio Adversarial Attacks via Subsecond Perturbations. Zhuohang Li, Yi Wu, Jian Liu, Yingying Chen, Bo Yuan |
| 2020 | Analyzing Information Leakage of Updates to Natural Language Models. Santiago Zanella-Béguelin, Lukas Wutschitz, Shruti Tople, Victor Rühle, Andrew Paverd, Olga Ohrimenko, Boris Köpf, Marc Brockschmidt |
| 2020 | Asynchronous Distributed Key Generation for Computationally-Secure Randomness, Consensus, and Threshold Signatures. Eleftherios Kokoris-Kogias, Dahlia Malkhi, Alexander Spiegelman |
| 2020 | Asynchronous Remote Key Generation: An Analysis of Yubico's Proposal for W3C WebAuthn. Nick Frymann, Daniel Gardham, Franziskus Kiefer, Emil Lundberg, Mark Manulis, Dain Nilsson |
| 2020 | BDoS: Blockchain Denial-of-Service. Michael Mirkin, Yan Ji, Jonathan Pang, Ariah Klages-Mundt, Ittay Eyal, Ari Juels |
| 2020 | Benchmarking Label Dynamics of VirusTotal Engines. Shuofei Zhu, Ziyi Zhang, Limin Yang, Linhai Song, Gang Wang |
| 2020 | Bento: Bringing Network Function Virtualization to Tor. Michael Reininger, Arushi Arora, Stephen Herwig, Nicholas Francino, Christina Garman, Dave Levin |
| 2020 | BlackMirror: Preventing Wallhacks in 3D Online FPS Games. Seonghyun Park, Adil Ahmad, Byoungyoung Lee |
| 2020 | Blinder - Scalable, Robust Anonymous Committed Broadcast. Ittai Abraham, Benny Pinkas, Avishay Yanai |
| 2020 | Bypassing Tor Exit Blocking with Exit Bridge Onion Services. Zhao Zhang, Wenchao Zhou, Micah Sherr |
| 2020 | CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020 Jay Ligatti, Xinming Ou, Jonathan Katz, Giovanni Vigna |
| 2020 | CCSW'20: 2020 Cloud Computing Security Workshop. Radu Sion, Yinqian Zhang |
| 2020 | CLAPS: Client-Location-Aware Path Selection in Tor. Florentin Rochet, Ryan Wails, Aaron Johnson, Prateek Mittal, Olivier Pereira |
| 2020 | CPSIOTSEC'20: 2020 Joint Workshop on CPS&IoT Security and Privacy. Michail Maniatakos, Yuqing Zhang |
| 2020 | Cache-in-the-Middle (CITM) Attacks: Manipulating Sensitive Data in Isolated Execution Environments. Jie Wang, Kun Sun, Lingguang Lei, Shengye Wan, Yuewu Wang, Jiwu Jing |
| 2020 | Censored Planet: An Internet-wide, Longitudinal Censorship Observatory. Ram Sundara Raman, Prerana Shenoy, Katharina Kohls, Roya Ensafi |
| 2020 | CheckDP: An Automated and Integrated Approach for Proving Differential Privacy or Finding Precise Counterexamples. Yuxin Wang, Zeyu Ding, Daniel Kifer, Danfeng Zhang |
| 2020 | Clone Detection in Secure Messaging: Improving Post-Compromise Security in Practice. Cas Cremers, Jaiden Fairoze, Benjamin Kiesl, Aurora Naska |
| 2020 | Composite Backdoor Attack for Deep Neural Network by Mixing Existing Benign Features. Junyu Lin, Lei Xu, Yingqi Liu, Xiangyu Zhang |
| 2020 | Continuous and Multiregional Monitoring of Malicious Hosts. Shota Fujii, Takayuki Sato, Sho Aoki, Yu Tsuda, Yusuke Okano, Tomohiro Shigemoto, Nobutaka Kawaguchi, Masato Terada |
| 2020 | CrypTFlow2: Practical 2-Party Secure Inference. Deevashwer Rathee, Mayank Rathee, Nishant Kumar, Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma |
| 2020 | Cyber-Physical Inconsistency Vulnerability Identification for Safety Checks in Robotic Vehicles. Hongjun Choi, Sayali Kate, Yousra Aafer, Xiangyu Zhang, Dongyan Xu |
| 2020 | Cybersecurity Research and Training for Power Distribution Grids - A Blueprint. Martin Henze, Lennart Bader, Julian Filter, Olav Lamberts, Simon Ofner, Dennis van der Velde |
| 2020 | DECO: Liberating Web Data Using Decentralized Oracles for TLS. Fan Zhang, Deepak Maram, Harjasleen Malvai, Steven Goldfeder, Ari Juels |
| 2020 | DNS Cache Poisoning Attack Reloaded: Revolutions with Side Channels. Keyu Man, Zhiyun Qian, Zhongjie Wang, Xiaofeng Zheng, Youjun Huang, Haixin Duan |
| 2020 | Dangerous Skills Got Certified: Measuring the Trustworthiness of Skill Certification in Voice Personal Assistant Platforms. Long Cheng, Christin Wilson, Song Liao, Jeffrey Young, Daniel Dong, Hongxin Hu |
| 2020 | DeepDyve: Dynamic Verification for Deep Neural Networks. Yu Li, Min Li, Bo Luo, Ye Tian, Qiang Xu |
| 2020 | Demystifying Resource Management Risks in Emerging Mobile App-in-App Ecosystems. Haoran Lu, Luyi Xing, Yue Xiao, Yifan Zhang, Xiaojing Liao, Xiaofeng Wang, Xueqiang Wang |
| 2020 | Deploying Android Security Updates: an Extensive Study Involving Manufacturers, Carriers, and End Users. Kailani R. Jones, Ting-Fang Yen, Sathya Chandran Sundaramurthy, Alexandru G. Bardas |
| 2020 | Deterministic Wallets in a Quantum World. Nabil Alkeilani Alkadri, Poulami Das, Andreas Erwig, Sebastian Faust, Juliane Krämer, Siavash Riahi, Patrick Struck |
| 2020 | Devil is Virtual: Reversing Virtual Inheritance in C++ Binaries. Rukayat Ayomide Erinfolami, Aravind Prakash |
| 2020 | Dumbo: Faster Asynchronous BFT Protocols. Bingyong Guo, Zhenliang Lu, Qiang Tang, Jing Xu, Zhenfeng Zhang |
| 2020 | Déjà Vu: Side-Channel Analysis of Mozilla's NSS. Sohaib ul Hassan, Iaroslav Gridin, Ignacio M. Delgado-Lozano, Cesar Pereida García, Jesús-Javier Chi-Domínguez, Alejandro Cabrera Aldaya, Billy Bob Brumley |
| 2020 | Enhancing State-of-the-art Classifiers with API Semantics to Detect Evolved Android Malware. Xiaohan Zhang, Yuan Zhang, Ming Zhong, Daizong Ding, Yinzhi Cao, Yukun Zhang, Mi Zhang, Min Yang |
| 2020 | Estimating g-Leakage via Machine Learning. Marco Romanelli, Konstantinos Chatzikokolakis, Catuscia Palamidessi, Pablo Piantanida |
| 2020 | Everything is a Race and Nakamoto Always Wins. Amir Dembo, Sreeram Kannan, Ertem Nusret Tas, David Tse, Pramod Viswanath, Xuechao Wang, Ofer Zeitouni |
| 2020 | Exaggerated Error Handling Hurts! An In-Depth Study and Context-Aware Detection. Aditya Pakki, Kangjie Lu |
| 2020 | Examining Mirai's Battle over the Internet of Things. Harm Griffioen, Christian Doerr |
| 2020 | FEAST'20: Fifth Workshop on Forming an Ecosystem Around Software Transformation. Kevin W. Hamlen, Long Lu |
| 2020 | FREEDOM: Engineering a State-of-the-Art DOM Fuzzer. Wen Xu, Soyeon Park, Taesoo Kim |
| 2020 | Facilitating Protocol-independent Industrial Intrusion Detection Systems. Konrad Wolsing, Eric Wagner, Martin Henze |
| 2020 | Fast Database Joins and PSI for Secret Shared Data. Payman Mohassel, Peter Rindal, Mike Rosulek |
| 2020 | Ferret: Fast Extension for Correlated OT with Small Communication. Kang Yang, Chenkai Weng, Xiao Lan, Jiang Zhang, Xiao Wang |
| 2020 | Fill in the Blanks: Empirical Analysis of the Privacy Threats of Browser Form Autofill. Xu Lin, Panagiotis Ilia, Jason Polakis |
| 2020 | Finding Cracks in Shields: On the Security of Control Flow Integrity Mechanisms. Yuan Li, Mingzhe Wang, Chao Zhang, Xingman Chen, Songtao Yang, Ying Liu |
| 2020 | FirmXRay: Detecting Bluetooth Link Layer Vulnerabilities From Bare-Metal Firmware. Haohuang Wen, Zhiqiang Lin, Yinqian Zhang |
| 2020 | Forensic Analysis in Access Control: Foundations and a Case-Study from Practice. Nahid Juma, Xiaowei Huang, Mahesh Tripunitara |
| 2020 | Full Database Reconstruction in Two Dimensions. Francesca Falzon, Evangelia Anna Markatou, Akshima, David Cash, Adam Rivkin, Jesse Stern, Roberto Tamassia |
| 2020 | GAN-Leaks: A Taxonomy of Membership Inference Attacks against Generative Models. Dingfan Chen, Ning Yu, Yang Zhang, Mario Fritz |
| 2020 | Game-Set-MATCH: Using Mobile Devices for Seamless External-Facing Biometric Matching. Shashank Agrawal, Saikrishna Badrinarayanan, Pratyay Mukherjee, Peter Rindal |
| 2020 | Gotta Catch'Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks. Shawn Shan, Emily Wenger, Bolun Wang, Bo Li, Haitao Zheng, Ben Y. Zhao |
| 2020 | HACLxN: Verified Generic SIMD Crypto (for all your favourite platforms). Marina Polubelova, Karthikeyan Bhargavan, Jonathan Protzenko, Benjamin Beurdouche, Aymeric Fromherz, Natalia Kulatova, Santiago Zanella-Béguelin |
| 2020 | Harnessing the Ambient Radio Frequency Noise for Wearable Device Pairing. Wenqiang Jin, Ming Li, Srinivasan Murali, Linke Guo |
| 2020 | HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems. Efrén López-Morales, Carlos E. Rubio-Medrano, Adam Doupé, Yan Shoshitaishvili, Ruoyu Wang, Tiffany Bao, Gail-Joon Ahn |
| 2020 | Impact of Energy Consumption Attacks on LoRaWAN-Enabled Devices in Industrial Context. Muhammad Nouman Nafees, Neetesh Saxena, Pete Burnap, Bong Jun Choi |
| 2020 | Impersonation-as-a-Service: Characterizing the Emerging Criminal Infrastructure for User Impersonation at Scale. Michele Campobasso, Luca Allodi |
| 2020 | Implementing the Exponential Mechanism with Base-2 Differential Privacy. Christina Ilvento |
| 2020 | InSpectre: Breaking and Fixing Microarchitectural Vulnerabilities by Formal Analysis. Roberto Guanciale, Musard Balliu, Mads Dam |
| 2020 | Information Leakage in Embedding Models. Congzheng Song, Ananth Raghunathan |
| 2020 | Is the Classical GMW Paradigm Practical? The Case of Non-Interactive Actively Secure 2PC. Jackson Abascal, Mohammad Hossein Faghihi Sereshgi, Carmit Hazay, Yuval Ishai, Muthuramakrishnan Venkitasubramaniam |
| 2020 | LEAF: A Faster Secure Search Algorithm via Localization, Extraction, and Reconstruction. Rui Wen, Yu Yu, Xiang Xie, Yang Zhang |
| 2020 | LPET - Mining MS-Windows Software Privilege Escalation Vulnerabilities by Monitoring Interactive Behavior. Can Huang, Xinhui Han, Guorui Yu |
| 2020 | LadderLeak: Breaking ECDSA with Less than One Bit of Nonce Leakage. Diego F. Aranha, Felipe Rodrigues Novaes, Akira Takahashi, Mehdi Tibouchi, Yuval Yarom |
| 2020 | Lies in the Air: Characterizing Fake-base-station Spam Ecosystem in China. Yiming Zhang, Baojun Liu, Chaoyi Lu, Zhou Li, Haixin Duan, Shuang Hao, Mingxuan Liu, Ying Liu, Dong Wang, Qiang Li |
| 2020 | Lift-and-Shift: Obtaining Simulation Extractable Subversion and Updatable SNARKs Generically. Behzad Abdolmaleki, Sebastian Ramacher, Daniel Slamanig |
| 2020 | Ligero++: A New Optimized Sublinear IOP. Rishabh Bhadauria, Zhiyong Fang, Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Tiancheng Xie, Yupeng Zhang |
| 2020 | Logging to the Danger Zone: Race Condition Attacks and Defenses on System Audit Frameworks. Riccardo Paccagnella, Kevin Liao, Dave Tian, Adam Bates |
| 2020 | MP-SPDZ: A Versatile Framework for Multi-Party Computation. Marcel Keller |
| 2020 | MTD'20: 7th ACM Workshop on Moving Target Defense. Hamed Okhravi, Cliff Wang |
| 2020 | Machine Learning and Security: The Good, The Bad, and The Ugly. Wenke Lee |
| 2020 | Methodologies for Quantifying (Re-)randomization Security and Timing under JIT-ROP. Salman Ahmed, Ya Xiao, Kevin Z. Snow, Gang Tan, Fabian Monrose, Danfeng (Daphne) Yao |
| 2020 | Minimal Symmetric PAKE and 1-out-of-N OT from Programmable-Once Public Functions. Ian McQuoid, Mike Rosulek, Lawrence Roy |
| 2020 | Mitigation of Attacks on Email End-to-End Encryption. Jörg Schwenk, Marcus Brinkmann, Damian Poddebniak, Jens Müller, Juraj Somorovsky, Sebastian Schinzel |
| 2020 | Mnemosyne: An Effective and Efficient Postmortem Watering Hole Attack Investigation System. Joey Allen, Zheng Yang, Matthew Landen, Raghav Bhat, Harsh Grover, Andrew Chang, Yang Ji, Roberto Perdisci, Wenke Lee |
| 2020 | More Efficient MPC from Improved Triple Generation and Authenticated Garbling. Kang Yang, Xiao Wang, Jiang Zhang |
| 2020 | MuSig-DN: Schnorr Multi-Signatures with Verifiably Deterministic Nonces. Jonas Nick, Tim Ruffing, Yannick Seurin, Pieter Wuille |
| 2020 | Off-Path TCP Exploits of the Mixed IPID Assignment. Xuewei Feng, Chuanpu Fu, Qi Li, Kun Sun, Ke Xu |
| 2020 | On the Optimality of Optimistic Responsiveness. Nibesh Shrestha, Ittai Abraham, Ling Ren, Kartik Nayak |
| 2020 | Oracle Simulation: A Technique for Protocol Composition with Long Term Shared Secrets. Hubert Comon, Charlie Jacomme, Guillaume Scerri |
| 2020 | PDiff: Semantic-based Patch Presence Testing for Downstream Kernels. Zheyue Jiang, Yuan Zhang, Jun Xu, Qi Wen, Zhenghe Wang, Xiaohan Zhang, Xinyu Xing, Min Yang, Zhemin Yang |
| 2020 | PLAS'20: 15th Workshop on Programming Languages and Analysis for Security. Alley Stoughton, Marco Vassena |
| 2020 | PMForce: Systematically Analyzing postMessage Handlers at Scale. Marius Steffens, Ben Stock |
| 2020 | PPE Circuits: Formal Definition to Software Automation. Susan Hohenberger, Satyanarayana Vusirikala, Brent Waters |
| 2020 | PPMLP 2020: Workshop on Privacy-Preserving Machine Learning In Practice. Benyu Zhang, Matei Zaharia, Shouling Ji, Raluca Ada Popa, Guofei Gu |
| 2020 | PatchScope: Memory Object Centric Patch Diffing. Lei Zhao, Yuncong Zhu, Jiang Ming, Yichen Zhang, Haotian Zhang, Heng Yin |
| 2020 | Phantom of the ADAS: Securing Advanced Driver-Assistance Systems from Split-Second Phantom Attacks. Ben Nassi, Yisroel Mirsky, Dudi Nassi, Raz Ben-Netanel, Oleg Drokin, Yuval Elovici |
| 2020 | PhishBench 2.0: A Versatile and Extendable Benchmarking Framework for Phishing. Victor Zeng, Xin Zhou, Shahryar Baki, Rakesh M. Verma |
| 2020 | Pointproofs: Aggregating Proofs for Multiple Vector Commitments. Sergey Gorbunov, Leonid Reyzin, Hoeteck Wee, Zhenfei Zhang |
| 2020 | Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communications by Parasitizing on WebRTC. Diogo Barradas, Nuno Santos, Luís E. T. Rodrigues, Vítor Nunes |
| 2020 | Post-Quantum TLS Without Handshake Signatures. Peter Schwabe, Douglas Stebila, Thom Wiggers |
| 2020 | Practical Lattice-Based Zero-Knowledge Proofs for Integer Relations. Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler |
| 2020 | Practical Recommendations for Stronger, More Usable Passwords Combining Minimum-strength, Minimum-length, and Blocklist Requirements. Joshua Tan, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor |
| 2020 | Privaros: A Framework for Privacy-Compliant Delivery Drones. Rakesh Rajan Beck, Abhishek Vijeev, Vinod Ganapathy |
| 2020 | Private Summation in the Multi-Message Shuffle Model. Borja Balle, James Bell, Adrià Gascón, Kobbi Nissim |
| 2020 | ProMACs: Progressive and Resynchronizing MACs for Continuous Efficient Authentication of Message Streams. Frederik Armknecht, Paul Walther, Gene Tsudik, Martin Beck, Thorsten Strufe |
| 2020 | QuantumHammer: A Practical Hybrid Attack on the LUOV Signature Scheme. Koksal Mus, Saad Islam, Berk Sunar |
| 2020 | R2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions. Meisam Mohammady, Shangyu Xie, Yuan Hong, Mengyuan Zhang, Lingyu Wang, Makan Pourzandi, Mourad Debbabi |
| 2020 | RIPT - An Efficient Multi-Core Record-Replay System. Jiashuo Liang, Guancheng Li, Chao Zhang, Ming Yuan, Xingman Chen, Xinhui Han |
| 2020 | RTFM! Automatic Assumption Discovery and Verification Derivation from Library Document for API Misuse Detection. Tao Lv, Ruishi Li, Yi Yang, Kai Chen, Xiaojing Liao, Xiaofeng Wang, Peiwei Hu, Luyi Xing |
| 2020 | Realistic Threats and Realistic Users: Lessons from the Election. Alex Stamos |
| 2020 | SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel Analysis. Okan Seker, Sebastian Berndt, Luca Wilke, Thomas Eisenbarth |
| 2020 | SQUIRREL: Testing Database Management Systems with Language Validity and Coverage Feedback. Rui Zhong, Yongheng Chen, Hong Hu, Hangfan Zhang, Wenke Lee, Dinghao Wu |
| 2020 | Secure Single-Server Aggregation with (Poly)Logarithmic Overhead. James Henry Bell, Kallista A. Bonawitz, Adrià Gascón, Tancrède Lepoint, Mariana Raykova |
| 2020 | Security Analysis and Implementation of Relay-Resistant Contactless Payments. Ioana Boureanu, Tom Chothia, Alexandre Debant, Stéphanie Delaune |
| 2020 | Security of Streaming Encryption in Google's Tink Library. Viet Tung Hoang, Yaobin Shen |
| 2020 | Slimium: Debloating the Chromium Browser with Feature Subsetting. Chenxiong Qian, Hyungjoon Koo, ChangSeok Oh, Taesoo Kim, Wenke Lee |
| 2020 | Speculative Probing: Hacking Blind in the Spectre Era. Enes Göktas, Kaveh Razavi, Georgios Portokalidis, Herbert Bos, Cristiano Giuffrida |
| 2020 | T2Pair: Secure and Usable Pairing for Heterogeneous IoT Devices. Xiaopeng Li, Qiang Zeng, Lannan Luo, Tongbo Luo |
| 2020 | TEMPEST Comeback: A Realistic Audio Eavesdropping Threat on Mixed-signal SoCs. Jieun Choi, Hae-Yong Yang, Dong-Ho Cho |
| 2020 | TPDP'20: 6th Workshop on Theory and Practice of Differential Privacy. Rachel Cummings, Michael Hay |
| 2020 | TRUSTORE: Side-Channel Resistant Storage for SGX using Intel Hybrid CPU-FPGA. Hyunyoung Oh, Adil Ahmad, Seonghyun Park, Byoungyoung Lee, Yunheung Paek |
| 2020 | Talking with Familiar Strangers: An Empirical Study on HTTPS Context Confusion Attacks. Mingming Zhang, Xiaofeng Zheng, Kaiwen Shen, Ziqiao Kong, Chaoyi Lu, Yu Wang, Haixin Duan, Shuang Hao, Baojun Liu, Min Yang |
| 2020 | Text Captcha Is Dead? A Large Scale Deployment and Empirical Study. Chenghui Shi, Shouling Ji, Qianjun Liu, Changchang Liu, Yuefeng Chen, Yuan He, Zhe Liu, Raheem Beyah, Ting Wang |
| 2020 | The Boon and Bane of Cross-Signing: Shedding Light on a Common Practice in Public Key Infrastructures. Jens Hiller, Johanna Amann, Oliver Hohlfeld |
| 2020 | The Cookie Hunter: Automated Black-box Auditing for Web Authentication and Authorization Flaws. Kostas Drakonakis, Sotiris Ioannidis, Jason Polakis |
| 2020 | The Signal Private Group System and Anonymous Credentials Supporting Efficient Verifiable Encryption. Melissa Chase, Trevor Perrin, Greg Zaverucha |
| 2020 | Threshold Password-Hardened Encryption Services. Julian Brost, Christoph Egger, Russell W. F. Lai, Fritz Schmid, Dominique Schröder, Markus Zoppelt |
| 2020 | Tight Consistency Bounds for Bitcoin. Peter Gazi, Aggelos Kiayias, Alexander Russell |
| 2020 | Towards Attribution in Mobile Markets: Identifying Developer Account Polymorphism. Silvia Sebastián, Juan Caballero |
| 2020 | Towards Using Source Code Repositories to Identify Software Supply Chain Attacks. Duc-Ly Vu, Ivan Pashchenko, Fabio Massacci, Henrik Plate, Antonino Sabetta |
| 2020 | TrafficSliver: Fighting Website Fingerprinting Attacks with Traffic Splitting. Wladimir De la Cadena, Asya Mitseva, Jens Hiller, Jan Pennekamp, Sebastian Reuter, Julian Filter, Thomas Engel, Klaus Wehrle, Andriy Panchenko |
| 2020 | UC Non-Interactive, Proactive, Threshold ECDSA with Identifiable Aborts. Ran Canetti, Rosario Gennaro, Steven Goldfeder, Nikolaos Makriyannis, Udi Peled |
| 2020 | Usage Patterns of Privacy-Enhancing Technologies. Kovila P. L. Coopamootoo |
| 2020 | VAHunt: Warding Off New Repackaged Android Malware in App-Virtualization's Clothing. Luman Shi, Jiang Ming, Jianming Fu, Guojun Peng, Dongpeng Xu, Kun Gao, Xuanchen Pan |
| 2020 | VRLifeTime - An IDE Tool to Avoid Concurrency and Memory Bugs in Rust. Ziyi Zhang, Boqin Qin, Yilun Chen, Linhai Song, Yiying Zhang |
| 2020 | Verifiable Timed Signatures Made Practical. Sri Aravinda Krishnan Thyagarajan, Adithya Bhat, Giulio Malavolta, Nico Döttling, Aniket Kate, Dominique Schröder |
| 2020 | VisualPhishNet: Zero-Day Phishing Website Detection by Visual Similarity. Sahar Abdelnabi, Katharina Krombholz, Mario Fritz |
| 2020 | Voice-Indistinguishability - Protecting Voiceprint with Differential Privacy under an Untrusted Server. Yaowei Han, Yang Cao, Sheng Li, Qiang Ma, Masatoshi Yoshikawa |
| 2020 | WI is Almost Enough: Contingent Payment All Over Again. Ky Nguyen, Miguel Ambrona, Masayuki Abe |
| 2020 | When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech Recognition. Shu Wang, Jiahao Cao, Xu He, Kun Sun, Qi Li |
| 2020 | You've Changed: Detecting Malicious Browser Extensions through their Update Deltas. Nikolaos Pantelaios, Nick Nikiforakis, Alexandros Kapravelos |
| 2020 | Zero Knowledge Proofs for Decision Tree Predictions and Accuracy. Jiaheng Zhang, Zhiyong Fang, Yupeng Zhang, Dawn Song |
| 2020 | Zombie Awakening: Stealthy Hijacking of Active Domains through DNS Hosting Referral. Eihal Alowaisheq, Siyuan Tang, Zhihao Wang, Fatemah Alharbi, Xiaojing Liao, Xiaofeng Wang |
| 2020 | eThor: Practical and Provably Sound Static Analysis of Ethereum Smart Contracts. Clara Schneidewind, Ilya Grishchenko, Markus Scherer, Matteo Maffei |
| 2020 | iDEA: Static Analysis on the Security of Apple Kernel Drivers. Xiaolong Bai, Luyi Xing, Min Zheng, Fuping Qu |
| 2020 | rProfiler - Assessing Insider Influence on Enterprise Assets. Manish Shukla, Sachin Lodha |