| 2021 | "Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World. Emily Wenger, Max Bronckers, Christian Cianfarani, Jenna Cryan, Angela Sha, Haitao Zheng, Ben Y. Zhao |
| 2021 | "I need a better description": An Investigation Into User Expectations For Differential Privacy. Rachel Cummings, Gabriel Kaptchuk, Elissa M. Redmiles |
| 2021 | 12 Angry Developers - A Qualitative Study on Developers' Struggles with CSP. Sebastian Roth, Lea Gröber, Michael Backes, Katharina Krombholz, Ben Stock |
| 2021 | A Concrete Treatment of Efficient Continuous Group Key Agreement via Multi-Recipient PKEs. Keitaro Hashimoto, Shuichi Katsumata, Eamonn W. Postlethwaite, Thomas Prest, Bas Westerbaan |
| 2021 | A Formally Verified Configuration for Hardware Security Modules in the Cloud. Riccardo Focardi, Flaminia L. Luccio |
| 2021 | A Hard Label Black-box Adversarial Attack Against Graph Neural Networks. Jiaming Mu, Binghui Wang, Qi Li, Kun Sun, Mingwei Xu, Zhuotao Liu |
| 2021 | A One-Pass Distributed and Private Sketch for Kernel Sums with Applications to Machine Learning at Scale. Benjamin Coleman, Anshumali Shrivastava |
| 2021 | A PKI-based Framework for Establishing Efficient MPC Channels. Daniel Masny, Gaven J. Watson |
| 2021 | A Security Framework for Distributed Ledgers. Mike Graf, Daniel Rausch, Viktoria Ronge, Christoph Egger, Ralf Küsters, Dominique Schröder |
| 2021 | AHEAD: Adaptive Hierarchical Decomposition for Range Query under Local Differential Privacy. Linkang Du, Zhikun Zhang, Shaojie Bai, Changchang Liu, Shouling Ji, Peng Cheng, Jiming Chen |
| 2021 | AI-Lancet: Locating Error-inducing Neurons to Optimize Neural Networks. Yue Zhao, Hong Zhu, Kai Chen, Shengzhi Zhang |
| 2021 | APECS: A Distributed Access Control Framework for Pervasive Edge Computing Services. Sean Dougherty, Reza Tourani, Gaurav Panwar, Roopa Vishwanathan, Satyajayant Misra, Srikathyayani Srikanteswara |
| 2021 | Aion: Enabling Open Systems through Strong Availability Guarantees for Enclaves. Fritz Alder, Jo Van Bulck, Frank Piessens, Jan Tobias Mühlberg |
| 2021 | All your Credentials are Belong to Us: On Insecure WPA2-Enterprise Configurations. Man Hong Hue, Joyanta Debnath, Kin Man Leung, Li Li, Mohsen Minaei, M. Hammad Mazhar, Kailiang Xian, Md. Endadul Hoque, Omar Chowdhury, Sze Yiu Chau |
| 2021 | Amortized Threshold Symmetric-key Encryption. Mihai Christodorescu, Sivanarayana Gaddam, Pratyay Mukherjee, Rohit Sinha |
| 2021 | An In-Depth Symbolic Security Analysis of the ACME Standard. Karthikeyan Bhargavan, Abhishek Bichhawat, Quoc Huy Do, Pedram Hosseyni, Ralf Küsters, Guido Schmitz, Tim Würtele |
| 2021 | An Inside Look into the Practice of Malware Analysis. Miuyin Yong Wong, Matthew Landen, Manos Antonakakis, Douglas M. Blough, Elissa M. Redmiles, Mustaque Ahamad |
| 2021 | An Ontology-driven Knowledge Graph for Android Malware. Christian Ryan, Sharmishtha Dutta, Youngja Park, Nidhi Rastogi |
| 2021 | Android on PC: On the Security of End-user Android Emulators. Fenghao Xu, Siyu Shen, Wenrui Diao, Zhou Li, Yi Chen, Rui Li, Kehuan Zhang |
| 2021 | Appenzeller to Brie: Efficient Zero-Knowledge Proofs for Mixed-Mode Arithmetic and Z2k. Carsten Baum, Lennart Braun, Alexander Munch-Hansen, Benoît Razet, Peter Scholl |
| 2021 | Are we done yet? Our Journey to Fight against Memory-safety Bugs. Taesoo Kim |
| 2021 | Asynchronous Data Dissemination and its Applications. Sourav Das, Zhuolun Xiang, Ling Ren |
| 2021 | Automated Bug Hunting With Data-Driven Symbolic Root Cause Analysis. Carter Yagemann, Simon P. Chung, Brendan Saltaformaggio, Wenke Lee |
| 2021 | Automated Privacy Policy Annotation with Information Highlighting Made Practical Using Deep Representations. Abdulrahman Alabduljabbar, Ahmed Abusnaina, Ülkü Meteriz-Yildiran, David Mohaisen |
| 2021 | BFT Protocol Forensics. Peiyao Sheng, Gerui Wang, Kartik Nayak, Sreeram Kannan, Pramod Viswanath |
| 2021 | Backdoor Pre-trained Models Can Transfer to All. Lujia Shen, Shouling Ji, Xuhong Zhang, Jinfeng Li, Jing Chen, Jie Shi, Chengfang Fang, Jianwei Yin, Ting Wang |
| 2021 | Biometrics-Authenticated Key Exchange for Secure Messaging. Mei Wang, Kun He, Jing Chen, Zengpeng Li, Wei Zhao, Ruiying Du |
| 2021 | Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information. Baolin Zheng, Peipei Jiang, Qian Wang, Qi Li, Chao Shen, Cong Wang, Yunjie Ge, Qingyang Teng, Shenyi Zhang |
| 2021 | C3PO: Large-Scale Study Of Covert Monitoring of C&C Servers via Over-Permissioned Protocol Infiltration. Jonathan Fuller, Ranjita Pai Kasturi, Amit Kumar Sikder, Haichuan Xu, Berat Arik, Vivek Verma, Ehsan Asdar, Brendan Saltaformaggio |
| 2021 | CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021 Yongdae Kim, Jong Kim, Giovanni Vigna, Elaine Shi |
| 2021 | COINN: Crypto/ML Codesign for Oblivious Inference via Neural Networks. Siam Umar Hussain, Mojan Javaheripi, Mohammad Samragh, Farinaz Koushanfar |
| 2021 | CPscan: Detecting Bugs Caused by Code Pruning in IoT Kernels. Lirong Fu, Shouling Ji, Kangjie Lu, Peiyu Liu, Xuhong Zhang, Yuxuan Duan, Zihui Zhang, Wenzhi Chen, Yanjun Wu |
| 2021 | Can We Use Arbitrary Objects to Attack LiDAR Perception in Autonomous Driving? Yi Zhu, Chenglin Miao, Tianhang Zheng, Foad Hajiaghajani, Lu Su, Chunming Qiao |
| 2021 | CapSpeaker: Injecting Voices to Microphones via Capacitors. Xiaoyu Ji, Juchuan Zhang, Shui Jiang, Jishen Li, Wenyuan Xu |
| 2021 | Catching Transparent Phish: Analyzing and Detecting MITM Phishing Toolkits. Brian Kondracki, Babak Amin Azad, Oleksii Starov, Nick Nikiforakis |
| 2021 | Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks. Tianyu Du, Shouling Ji, Lujia Shen, Yao Zhang, Jinfeng Li, Jie Shi, Chengfang Fang, Jianwei Yin, Raheem Beyah, Ting Wang |
| 2021 | Chronos: Timing Interference as a New Attack Vector on Autonomous Cyber-physical Systems. Ao Li, Jinwen Wang, Ning Zhang |
| 2021 | Chunk-Level Password Guessing: Towards Modeling Refined Password Composition Representations. Ming Xu, Chuanwang Wang, Jitao Yu, Junjie Zhang, Kai Zhang, Weili Han |
| 2021 | Compact and Malicious Private Set Intersection for Small Sets. Mike Rosulek, Ni Trieu |
| 2021 | Compressed Oblivious Encoding for Homomorphically Encrypted Search. Seung Geol Choi, Dana Dachman-Soled, S. Dov Gordon, Linsheng Liu, Arkady Yerukhimovich |
| 2021 | Consistency Analysis of Data-Usage Purposes in Mobile Apps. Duc Bui, Yuan Yao, Kang G. Shin, Jong-Min Choi, Junbum Shin |
| 2021 | Constant-Overhead Zero-Knowledge for RAM Programs. Nicholas Franzese, Jonathan Katz, Steve Lu, Rafail Ostrovsky, Xiao Wang, Chenkai Weng |
| 2021 | Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization. Pietro Borrello, Daniele Cono D'Elia, Leonardo Querzoni, Cristiano Giuffrida |
| 2021 | Continuous Release of Data Streams under both Centralized and Local Differential Privacy. Tianhao Wang, Joann Qiongna Chen, Zhikun Zhang, Dong Su, Yueqiang Cheng, Zhou Li, Ninghui Li, Somesh Jha |
| 2021 | CrossLine: Breaking "Security-by-Crash" based Memory Isolation in AMD SEV. Mengyuan Li, Yinqian Zhang, Zhiqiang Lin |
| 2021 | CyberBunker 2.0 - A Domain and Traffic Perspective on a Bulletproof Hoster. Daniel Kopp, Eric Strehle, Oliver Hohlfeld |
| 2021 | DEMO: A Secure Voting System for Score Based Elections. Lihi Dery, Tamir Tassa, Avishay Yanai, Arthur Zamarin |
| 2021 | DETER: Denial of Ethereum Txpool sERvices. Kai Li, Yibo Wang, Yuzhe Tang |
| 2021 | DNS Cache Poisoning Attack: Resurrections with Side Channels. Keyu Man, Xin'an Zhou, Zhiyun Qian |
| 2021 | DPGen: Automated Program Synthesis for Differential Privacy. Yuxin Wang, Zeyu Ding, Yingtai Xiao, Daniel Kifer, Danfeng Zhang |
| 2021 | DataLens: Scalable Privacy Preserving Training via Gradient Compression and Aggregation. Boxin Wang, Fan Wu, Yunhui Long, Luka Rimanic, Ce Zhang, Bo Li |
| 2021 | De-identification of Unstructured Clinical Texts from Sequence to Sequence Perspective. Md. Monowar Anjum, Noman Mohammed, Xiaoqian Jiang |
| 2021 | DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications. Dongqi Han, Zhiliang Wang, Wenqi Chen, Ying Zhong, Su Wang, Han Zhang, Jiahai Yang, Xingang Shi, Xia Yin |
| 2021 | Demo: Detecting Third-Party Library Problems with Combined Program Analysis. Grigoris Ntousakis, Sotiris Ioannidis, Nikos Vasilakis |
| 2021 | Demo: Large Scale Analysis on Vulnerability Remediation in Open-source JavaScript Projects. Vinuri Bandara, Thisura Rathnayake, Nipuna Weerasekara, Charitha Elvitigala, Kenneth Thilakarathna, Primal Wijesekera, Kasun De Zoysa, Chamath Keppitiyagama |
| 2021 | Demons in the Shared Kernel: Abstract Resource Attacks Against OS-level Virtualization. Nanzi Yang, Wenbo Shen, Jinku Li, Yutian Yang, Kangjie Lu, Jietao Xiao, Tianyu Zhou, Chenggang Qin, Wang Yu, Jianfeng Ma, Kui Ren |
| 2021 | Detecting Missed Security Operations Through Differential Checking of Object-based Similar Paths. Dinghao Liu, Qiushi Wu, Shouling Ji, Kangjie Lu, Zhenguang Liu, Jianhai Chen, Qinming He |
| 2021 | DetectorGuard: Provably Securing Object Detectors against Localized Patch Hiding Attacks. Chong Xiang, Prateek Mittal |
| 2021 | Deterrence of Intelligent DDoS via Multi-Hop Traffic Divergence. Yuanjie Li, Hewu Li, Zhizheng Lv, Xingkun Yao, Qianru Li, Jianping Wu |
| 2021 | Differential Privacy for Directional Data. Benjamin Weggenmann, Florian Kerschbaum |
| 2021 | Differentially Private Sparse Vectors with Low Error, Optimal Space, and Fast Access. Martin Aumüller, Christian Janos Lebeda, Rasmus Pagh |
| 2021 | Dissecting Click Fraud Autonomy in the Wild. Tong Zhu, Yan Meng, Haotian Hu, Xiaokuan Zhang, Minhui Xue, Haojin Zhu |
| 2021 | Dissecting Residual APIs in Custom Android ROMs. Zeinab El-Rewini, Yousra Aafer |
| 2021 | Don't Forget the Stuffing! Revisiting the Security Impact of Typo-Tolerant Password Authentication. Sena Sahin, Frank Li |
| 2021 | DoubleX: Statically Detecting Vulnerable Data Flows in Browser Extensions at Scale. Aurore Fass, Dolière Francis Somé, Michael Backes, Ben Stock |
| 2021 | Doubly Efficient Interactive Proofs for General Arithmetic Circuits with Linear Prover Time. Jiaheng Zhang, Tianyi Liu, Weijie Wang, Yinuo Zhang, Dawn Song, Xiang Xie, Yupeng Zhang |
| 2021 | DroneKey: A Drone-Aided Group-Key Generation Scheme for Large-Scale IoT Networks. Dianqi Han, Ang Li, Jiawei Li, Yan Zhang, Tao Li, Yanchao Zhang |
| 2021 | ECMO: Peripheral Transplantation to Rehost Embedded Linux Kernels. Muhui Jiang, Lin Ma, Yajin Zhou, Qiang Liu, Cen Zhang, Zhi Wang, Xiapu Luo, Lei Wu, Kui Ren |
| 2021 | Earable Authentication via Acoustic Toothprint. Zi Wang, Yili Ren, Yingying Chen, Jie Yang |
| 2021 | EasyPQC: Verifying Post-Quantum Cryptography. Manuel Barbosa, Gilles Barthe, Xiong Fan, Benjamin Grégoire, Shih-Han Hung, Jonathan Katz, Pierre-Yves Strub, Xiaodi Wu, Li Zhou |
| 2021 | Efficient CCA Timed Commitments in Class Groups. Sri Aravinda Krishnan Thyagarajan, Guilhem Castagnos, Fabien Laguillaumie, Giulio Malavolta |
| 2021 | Efficient Linear Multiparty PSI and Extensions to Circuit/Quorum PSI. Nishanth Chandran, Nishka Dasgupta, Divya Gupta, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar, Akash Shah |
| 2021 | Efficient Online-friendly Two-Party ECDSA Signature. Haiyang Xue, Man Ho Au, Xiang Xie, Tsz Hon Yuen, Handong Cui |
| 2021 | Enabling Visual Analytics via Alert-driven Attack Graphs. Azqa Nadeem, Sicco Verwer, Stephen Moskal, Shanchieh Jay Yang |
| 2021 | EncoderMI: Membership Inference against Pre-trained Encoders in Contrastive Learning. Hongbin Liu, Jinyuan Jia, Wenjie Qu, Neil Zhenqiang Gong |
| 2021 | Evaluating Resilience of Domains in PKI. Markus Brandt, Haya Schulmann, Michael Waidner |
| 2021 | Exorcising Spectres with Secure Compilers. Marco Patrignani, Marco Guarnieri |
| 2021 | Facilitating Vulnerability Assessment through PoC Migration. Jiarun Dai, Yuan Zhang, Hailong Xu, Haiming Lyu, Zicheng Wu, Xinyu Xing, Min Yang |
| 2021 | FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants. Yanjiao Chen, Yijie Bai, Richard Mitev, Kaibo Wang, Ahmad-Reza Sadeghi, Wenyuan Xu |
| 2021 | Faster Lattice-Based KEMs via a Generic Fujisaki-Okamoto Transform Using Prefix Hashing. Julien Duman, Kathrin Hövelmanns, Eike Kiltz, Vadim Lyubashevsky, Gregor Seiler |
| 2021 | Feature-Indistinguishable Attack to Circumvent Trapdoor-Enabled Defense. Chaoxiang He, Bin Benjamin Zhu, Xiaojing Ma, Hai Jin, Shengshan Hu |
| 2021 | Fuzzy Message Detection. Gabrielle Beck, Julia Len, Ian Miers, Matthew Green |
| 2021 | Generalized Proof of Liabilities. Yan Ji, Konstantinos Chalkias |
| 2021 | Ghost in the Binder: Binder Transaction Redirection Attacks in Android System Services. Xiaobo Xiang, Ren Zhang, Hanxiang Wen, Xiaorui Gong, Baoxu Liu |
| 2021 | Glowworm Attack: Optical TEMPEST Sound Recovery via a Device's Power Indicator LED. Ben Nassi, Yaron Pirutin, Tomer Cohen Galor, Yuval Elovici, Boris Zadov |
| 2021 | HardsHeap: A Universal and Extensible Framework for Evaluating Secure Allocators. Insu Yun, Woosun Song, Seunggi Min, Taesoo Kim |
| 2021 | Hardware Support to Improve Fuzzing Performance and Precision. Ren Ding, Yonghae Kim, Fan Sang, Wen Xu, Gururaj Saileshwar, Taesoo Kim |
| 2021 | Hidden Backdoors in Human-Centric Language Models. Shaofeng Li, Hui Liu, Tian Dong, Benjamin Zi Hao Zhao, Minhui Xue, Haojin Zhu, Jialiang Lu |
| 2021 | Hiding the Lengths of Encrypted Messages via Gaussian Padding. Jean Paul Degabriele |
| 2021 | Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs. Mohammad Malekzadeh, Anastasia Borovykh, Deniz Gündüz |
| 2021 | How Does Blockchain Security Dictate Blockchain Implementation? Andrew Lewis-Pye, Tim Roughgarden |
| 2021 | Human and Organizational Factors in Public Key Certificate Authority Failures. Skyler Johnson, Katherine Ferro, L. Jean Camp, Hilda Hadan |
| 2021 | HyperFuzzer: An Efficient Hybrid Fuzzer for Virtual CPUs. Xinyang Ge, Ben Niu, Robert Brotzman, Yaohui Chen, HyungSeok Han, Patrice Godefroid, Weidong Cui |
| 2021 | I Can See the Light: Attacks on Autonomous Vehicles Using Invisible Lights. Wei Wang, Yao Yao, Xin Liu, Xiang Li, Pei Hao, Ting Zhu |
| 2021 | Igor: Crash Deduplication Through Root-Cause Clustering. Zhiyuan Jiang, Xiyue Jiang, Ahmad Hazimeh, Chaojing Tang, Chao Zhang, Mathias Payer |
| 2021 | Indistinguishability Prevents Scheduler Side Channels in Real-Time Systems. Chien-Ying Chen, Debopam Sanyal, Sibin Mohan |
| 2021 | It's Not What It Looks Like: Manipulating Perceptual Hashing based Applications. Qingying Hao, Licheng Luo, Steve T. K. Jan, Gang Wang |
| 2021 | Key Agreement for Decentralized Secure Group Messaging with Strong Security Guarantees. Matthew Weidner, Martin Kleppmann, Daniel Hugenroth, Alastair R. Beresford |
| 2021 | LEAP: Leakage-Abuse Attack on Efficiently Deployable, Efficiently Searchable Encryption with Partially Known Dataset. Jianting Ning, Xinyi Huang, Geong Sen Poh, Jiaming Yuan, Yingjiu Li, Jian Weng, Robert H. Deng |
| 2021 | Labeled PSI from Homomorphic Encryption with Reduced Computation and Communication. Kelong Cong, Radames Cruz Moreno, Mariana Botelho da Gama, Wei Dai, Ilia Iliashenko, Kim Laine, Michael Rosenberg |
| 2021 | Learning Security Classifiers with Verified Global Robustness Properties. Yizheng Chen, Shiqi Wang, Yue Qin, Xiaojing Liao, Suman Jana, David A. Wagner |
| 2021 | Learning to Explore Paths for Symbolic Execution. Jingxuan He, Gishor Sivanrupan, Petar Tsankov, Martin T. Vechev |
| 2021 | Let's Downgrade Let's Encrypt. Tianxiang Dai, Haya Schulmann, Michael Waidner |
| 2021 | Limbo: Efficient Zero-knowledge MPCitH-based Arguments. Cyprien Delpech de Saint Guilhem, Emmanuela Orsini, Titouan Tanguy |
| 2021 | Locally Private Graph Neural Networks. Sina Sajadmanesh, Daniel Gatica-Perez |
| 2021 | Locating the Security Patches for Disclosed OSS Vulnerabilities with Vulnerability-Commit Correlation Ranking. Xin Tan, Yuan Zhang, Chenyuan Mi, Jiajun Cao, Kun Sun, Yifan Lin, Min Yang |
| 2021 | MANIAC: A Man-Machine Collaborative System for Classifying Malware Author Groups. Eujeanne Kim, Sung-Jun Park, Seokwoo Choi, Dong-Kyu Chae, Sang-Wook Kim |
| 2021 | MPC-Friendly Commitments for Publicly Verifiable Covert Security. Nitin Agrawal, James Bell, Adrià Gascón, Matt J. Kusner |
| 2021 | MaMIoT: Manipulation of Energy Market Leveraging High Wattage IoT Botnets. Tohid Shekari, Celine Irvene, Alvaro A. Cárdenas, Raheem Beyah |
| 2021 | Machine-checked ZKP for NP relations: Formally Verified Security Proofs and Implementations of MPC-in-the-Head. José Bacelar Almeida, Manuel Barbosa, Manuel L. Correia, Karim Eldefrawy, Stéphane Graham-Lengrand, Hugo Pacheco, Vitor Pereira |
| 2021 | Mechanized Proofs of Adversarial Complexity and Application to Universal Composability. Manuel Barbosa, Gilles Barthe, Benjamin Grégoire, Adrien Koutsos, Pierre-Yves Strub |
| 2021 | Membership Inference Attacks Against Recommender Systems. Minxing Zhang, Zhaochun Ren, Zihan Wang, Pengjie Ren, Zhumin Chen, Pengfei Hu, Yang Zhang |
| 2021 | Membership Inference Attacks against GANs by Leveraging Over-representation Regions. Hailong Hu, Jun Pang |
| 2021 | Membership Leakage in Label-Only Exposures. Zheng Li, Yang Zhang |
| 2021 | Meteor: Cryptographically Secure Steganography for Realistic Distributions. Gabriel Kaptchuk, Tushar M. Jois, Matthew Green, Aviel D. Rubin |
| 2021 | Mining in Logarithmic Space. Aggelos Kiayias, Nikos Leonardos, Dionysis Zindros |
| 2021 | MirChecker: Detecting Bugs in Rust Programs via Static Analysis. Zhuohua Li, Jincheng Wang, Mingshen Sun, John C. S. Lui |
| 2021 | Modular Design of Secure Group Messaging Protocols and the Security of MLS. Joël Alwen, Sandro Coretti, Yevgeniy Dodis, Yiannis Tselekounis |
| 2021 | Morpheus: Bringing The (PKCS) One To Meet the Oracle. Moosa Yahyazadeh, Sze Yiu Chau, Li Li, Man Hong Hue, Joyanta Debnath, Sheung Chiu Ip, Chun Ngai Li, Md. Endadul Hoque, Omar Chowdhury |
| 2021 | Multi-Threshold Byzantine Fault Tolerance. Atsuki Momose, Ling Ren |
| 2021 | New Directions in Automated Traffic Analysis. Jordan Holland, Paul Schmitt, Nick Feamster, Prateek Mittal |
| 2021 | Noncompliance as Deviant Behavior: An Automated Black-box Noncompliance Checker for 4G LTE Cellular Devices. Syed Rafiul Hussain, Imtiaz Karim, Abdullah Al Ishtiaq, Omar Chowdhury, Elisa Bertino |
| 2021 | Oblivious Linear Group Actions and Applications. Nuttapong Attrapadung, Goichiro Hanaoka, Takahiro Matsuda, Hiraku Morita, Kazuma Ohara, Jacob C. N. Schuldt, Tadanori Teruya, Kazunari Tozawa |
| 2021 | On Adoptability and Use Case Exploration of Threat Modeling for Mobile Communication Systems. Hsin Yi Chen, Siddharth Prakash Rao |
| 2021 | On Re-engineering the X.509 PKI with Executable Specification for Better Implementation Guarantees. Joyanta Debnath, Sze Yiu Chau, Omar Chowdhury |
| 2021 | On the (In)Security of ElGamal in OpenPGP. Luca De Feo, Bertram Poettering, Alessandro Sorniotti |
| 2021 | On the Robustness of Domain Constraints. Ryan Sheatsley, Blaine Hoak, Eric Pauley, Yohan Beugin, Michael J. Weisman, Patrick D. McDaniel |
| 2021 | On the Rényi Differential Privacy of the Shuffle Model. Antonious M. Girgis, Deepesh Data, Suhas N. Diggavi, Ananda Theertha Suresh, Peter Kairouz |
| 2021 | On the TOCTOU Problem in Remote Attestation. Ivan De Oliveira Nunes, Sashidhar Jakkamsetti, Norrathep Rattanavipanon, Gene Tsudik |
| 2021 | On-device IoT Certificate Revocation Checking with Small Memory and Low Latency. Xiaofeng Shi, Shouqian Shi, Minmei Wang, Jonne Kaunisto, Chen Qian |
| 2021 | One Glitch to Rule Them All: Fault Injection Attacks Against AMD's Secure Encrypted Virtualization. Robert Buhren, Hans Niklas Jacob, Thilo Krachenfels, Jean-Pierre Seifert |
| 2021 | One Hot Garbling. David Heath, Vladimir Kolesnikov |
| 2021 | OnionPIR: Response Efficient Single-Server PIR. Muhammad Haris Mughees, Hao Chen, Ling Ren |
| 2021 | OpenSquare: Decentralized Repeated Modular Squaring Service. Sri Aravinda Krishnan Thyagarajan, Tiantian Gong, Adithya Bhat, Aniket Kate, Dominique Schröder |
| 2021 | Optimized Predictive Control for AGC Cyber Resiliency. Muhammad Nouman Nafees, Neetesh Saxena, Pete Burnap |
| 2021 | Out of Sight, Out of Mind: Detecting Orphaned Web Pages at Internet-Scale. Stijn Pletinckx, Kevin Borgolte, Tobias Fiebig |
| 2021 | PARASITE: PAssword Recovery Attack against Srp Implementations in ThE wild. Daniel De Almeida Braga, Pierre-Alain Fouque, Mohamed Sabt |
| 2021 | POSTER: A Tough Nut to Crack: Attempting to Break Modulation Obfuscation. Naureen Hoque, Hanif Rahbari |
| 2021 | POSTER: An Open-Source Framework for Developing Heterogeneous Distributed Enclave Applications. Gianluca Scopelliti, Sepideh Pouyanrad, Job Noorman, Fritz Alder, Frank Piessens, Jan Tobias Mühlberg |
| 2021 | POSTER: How Dangerous is My Click? Boosting Website Fingerprinting By Considering Sequences of Webpages. Asya Mitseva, Jan Pennekamp, Johannes Lohmöller, Torsten Ziemann, Carl Hoerchner, Klaus Wehrle, Andriy Panchenko |
| 2021 | POSTER: OS Independent Fuzz Testing of I/O Boundary. Masanori Misono, Takahiro Shinagawa |
| 2021 | POSTER: ReAvatar: Virtual Reality De-anonymization Attack Through Correlating Movement Signatures. Brandon Falk, Yan Meng, Yuxia Zhan, Haojin Zhu |
| 2021 | POSTER: Recovering Songs from a Hanging Light Bulb. Ben Nassi, Yaron Pirutin, Raz Swissa, Adi Shamir, Yuval Elovici, Boris Zadov |
| 2021 | PPE Circuits for Rational Polynomials. Susan Hohenberger, Satyanarayana Vusirikala |
| 2021 | Packet Scheduling with Optional Client Privacy. Andrew Beams, Sampath Kannan, Sebastian Angel |
| 2021 | PalmTree: Learning an Assembly Language Model for Instruction Embedding. Xuezixiang Li, Yu Qu, Heng Yin |
| 2021 | Periscope: A Keystroke Inference Attack Using Human Coupled Electromagnetic Emanations. Wenqiang Jin, Srinivasan Murali, Huadi Zhu, Ming Li |
| 2021 | Predictive Cipher-Suite Negotiation for Boosting Deployment of New Ciphers. Elias Heftrig, Jean-Pierre Seifert, Haya Schulmann, Michael Waidner, Nils Wisiol |
| 2021 | Preventing Dynamic Library Compromise on Node.js via RWX-Based Privilege Reduction. Nikos Vasilakis, Cristian-Alexandru Staicu, Grigoris Ntousakis, Konstantinos Kallas, Ben Karel, André DeHon, Michael Pradel |
| 2021 | Prime+Scope: Overcoming the Observer Effect for High-Precision Cache Contention Attacks. Antoon Purnal, Furkan Turan, Ingrid Verbauwhede |
| 2021 | Private Hierarchical Clustering in Federated Networks. Aashish Kolluri, Teodora Baluta, Prateek Saxena |
| 2021 | Pseudo-Randomness and the Crystal Ball. Cynthia Dwork |
| 2021 | Quantifying and Mitigating Privacy Risks of Contrastive Learning. Xinlei He, Yang Zhang |
| 2021 | QuickSilver: Efficient and Affordable Zero-Knowledge Proofs for Circuits and Polynomials over Any Field. Kang Yang, Pratik Sarkar, Chenkai Weng, Xiao Wang |
| 2021 | RandPiper - Reconfiguration-Friendly Random Beacons with Quadratic Communication. Adithya Bhat, Nibesh Shrestha, Zhongtang Luo, Aniket Kate, Kartik Nayak |
| 2021 | RealSWATT: Remote Software-based Attestation for Embedded Devices under Realtime Constraints. Sebastian Surminski, Christian Niesler, Ferdinand Brasser, Lucas Davi, Ahmad-Reza Sadeghi |
| 2021 | Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis. Chuanpu Fu, Qi Li, Meng Shen, Ke Xu |
| 2021 | Reconstructing with Less: Leakage Abuse Attacks in Two Dimensions. Evangelia Anna Markatou, Francesca Falzon, Roberto Tamassia, William Schor |
| 2021 | Regression Greybox Fuzzing. Xiaogang Zhu, Marcel Böhme |
| 2021 | Reverse Attack: Black-box Attacks on Collaborative Recommendation. Yihe Zhang, Xu Yuan, Jin Li, Jiadong Lou, Li Chen, Nian-Feng Tzeng |
| 2021 | Revisiting Fuzzy Signatures: Towards a More Risk-Free Cryptographic Authentication System based on Biometrics. Shuichi Katsumata, Takahiro Matsuda, Wataru Nakamura, Kazuma Ohara, Kenta Takahashi |
| 2021 | Revisiting Hybrid Private Information Retrieval. Daniel Günther, Thomas Schneider, Felix Wiegand |
| 2021 | Revisiting Nakamoto Consensus in Asynchronous Networks: A Comprehensive Analysis of Bitcoin Safety and ChainQuality. Muhammad Saad, Afsah Anwar, Srivatsan Ravi, David Mohaisen |
| 2021 | Robust Adversarial Attacks Against DNN-Based Wireless Communication Systems. Alireza Bahramali, Milad Nasr, Amir Houmansadr, Dennis Goeckel, Don Towsley |
| 2021 | Robust Detection of Machine-induced Audio Attacks in Intelligent Audio Systems with Microphone Array. Zhuohang Li, Cong Shi, Tianfang Zhang, Yi Xie, Jian Liu, Bo Yuan, Yingying Chen |
| 2021 | Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code. Madura A. Shelton, Lukasz Chmielewski, Niels Samwel, Markus Wagner, Lejla Batina, Yuval Yarom |
| 2021 | Rusted Anchors: A National Client-Side View of Hidden Root CAs in the Web PKI Ecosystem. Yiming Zhang, Baojun Liu, Chaoyi Lu, Zhou Li, Haixin Duan, Jiachen Li, Zaifeng Zhang |
| 2021 | Same Coverage, Less Bloat: Accelerating Binary-only Fuzzing with Coverage-preserving Coverage-guided Tracing. Stefan Nagy, Anh Nguyen-Tuong, Jason D. Hiser, Jack W. Davidson, Matthew Hicks |
| 2021 | Scan, Test, Execute: Adversarial Tactics in Amplification DDoS Attacks. Harm Griffioen, Kris Oosthoek, Paul van der Knaap, Christian Doerr |
| 2021 | Search-Based Local Black-Box Deobfuscation: Understand, Improve and Mitigate (Poster). Grégoire Menguy, Sébastien Bardin, Richard Bonichon, Cauim de Souza Lima |
| 2021 | Search-Based Local Black-Box Deobfuscation: Understand, Improve and Mitigate. Grégoire Menguy, Sébastien Bardin, Richard Bonichon, Cauim de Souza Lima |
| 2021 | Secure Complaint-Enabled Source-Tracking for Encrypted Messaging. Charlotte Peale, Saba Eskandarian, Dan Boneh |
| 2021 | Secure Graph Analysis at Scale. Toshinori Araki, Jun Furukawa, Kazuma Ohara, Benny Pinkas, Hanan Rosemarin, Hikaru Tsuchida |
| 2021 | Secure Multi-party Computation of Differentially Private Heavy Hitters. Jonas Böhler, Florian Kerschbaum |
| 2021 | Securing Parallel-chain Protocols under Variable Mining Power. Xuechao Wang, Viswa Virinchi Muppirala, Lei Yang, Sreeram Kannan, Pramod Viswanath |
| 2021 | Shorter and Faster Post-Quantum Designated-Verifier zkSNARKs from Lattices. Yuval Ishai, Hang Su, David J. Wu |
| 2021 | Side-Channel Attacks on Query-Based Data Anonymization. Franziska Boenisch, Reinhard Munz, Marcel Tiepelt, Simon Hanisch, Christiane Kuhn, Paul Francis |
| 2021 | Simple, Fast Malicious Multiparty Private Set Intersection. Ofri Nevo, Ni Trieu, Avishay Yanai |
| 2021 | SmashEx: Smashing SGX Enclaves Using Exceptions. Jinhua Cui, Jason Zhijingcheng Yu, Shweta Shinde, Prateek Saxena, Zhiping Cai |
| 2021 | Snipuzz: Black-box Fuzzing of IoT Firmware via Message Snippet Inference. Xiaotao Feng, Ruoxi Sun, Xiaogang Zhu, Minhui Xue, Sheng Wen, Dongxi Liu, Surya Nepal, Yang Xiang |
| 2021 | SoFi: Reflection-Augmented Fuzzing for JavaScript Engines. Xiaoyu He, Xiaofei Xie, Yuekang Li, Jianwen Sun, Feng Li, Wei Zou, Yang Liu, Lei Yu, Jianhua Zhou, Wenchang Shi, Wei Huo |
| 2021 | Solver-Aided Constant-Time Hardware Verification. Klaus von Gleissenthall, Rami Gökhan Kici, Deian Stefan, Ranjit Jhala |
| 2021 | Spinner: Automated Dynamic Command Subsystem Perturbation. Meng Wang, Chijung Jung, Ali Ahad, Yonghwi Kwon |
| 2021 | Statically Discovering High-Order Taint Style Vulnerabilities in OS Kernels. Hang Zhang, Weiteng Chen, Yu Hao, Guoren Li, Yizhuo Zhai, Xiaochen Zou, Zhiyun Qian |
| 2021 | Structural Attack against Graph Based Android Malware Detection. Kaifa Zhao, Hao Zhou, Yulin Zhu, Xian Zhan, Kai Zhou, Jianfeng Li, Le Yu, Wei Yuan, Xiapu Luo |
| 2021 | Structured Leakage and Applications to Cryptographic Constant-Time and Cost. Gilles Barthe, Benjamin Grégoire, Vincent Laporte, Swarn Priya |
| 2021 | Subpopulation Data Poisoning Attacks. Matthew Jagielski, Giorgio Severi, Niklas Pousette Harger, Alina Oprea |
| 2021 | SugarCoat: Programmatically Generating Privacy-Preserving, Web-Compatible Resource Replacements for Content Blocking. Michael Smith, Peter Snyder, Benjamin Livshits, Deian Stefan |
| 2021 | Supply-Chain Vulnerability Elimination via Active Learning and Regeneration. Nikos Vasilakis, Achilles Benetopoulos, Shivam Handa, Alizee Schoen, Jiasi Shen, Martin C. Rinard |
| 2021 | SyncAttack: Double-spending in Bitcoin Without Mining Power. Muhammad Saad, Songqing Chen, David Mohaisen |
| 2021 | SyzGen: Automated Generation of Syscall Specification of Closed-Source macOS Drivers. Weiteng Chen, Yu Wang, Zheng Zhang, Zhiyun Qian |
| 2021 | T-Reqs: HTTP Request Smuggling with Differential Fuzzing. Bahruz Jabiyev, Steven Sprecher, Kaan Onarlioglu, Engin Kirda |
| 2021 | TSS: Transformation-Specific Smoothing for Robustness Certification. Linyi Li, Maurice Weber, Xiaojun Xu, Luka Rimanic, Bhavya Kailkhura, Tao Xie, Ce Zhang, Bo Li |
| 2021 | TableGAN-MCA: Evaluating Membership Collisions of GAN-Synthesized Tabular Data Releasing. Aoting Hu, Renjie Xie, Zhigang Lu, Aiqun Hu, Minhui Xue |
| 2021 | The Effect of Google Search on Software Security: Unobtrusive Security Interventions via Content Re-ranking. Felix Fischer, Yannick Stachelscheid, Jens Grossklags |
| 2021 | The Exact Security of BIP32 Wallets. Poulami Das, Andreas Erwig, Sebastian Faust, Julian Loss, Siavash Riahi |
| 2021 | The Invisible Shadow: How Security Cameras Leak Private Activities. Jian Gong, Xinyu Zhang, Ju Ren, Yaoxue Zhang |
| 2021 | The One-Page Setting: A Higher Standard for Evaluating Website Fingerprinting Defenses. Tao Wang |
| 2021 | The Return of Eratosthenes: Secure Generation of RSA Moduli using Distributed Sieving. Cyprien Delpech de Saint Guilhem, Eleftheria Makri, Dragos Rotaru, Titouan Tanguy |
| 2021 | The Security of ChaCha20-Poly1305 in the Multi-User Setting. Jean Paul Degabriele, Jérôme Govinden, Felix Günther, Kenneth G. Paterson |
| 2021 | Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison. Zhongjie Wang, Shitong Zhu, Keyu Man, Pengxiong Zhu, Yu Hao, Zhiyun Qian, Srikanth V. Krishnamurthy, Tom La Porta, Michael J. De Lucia |
| 2021 | This Sneaky Piggy Went to the Android Ad Market: Misusing Mobile Sensors for Stealthy Data Exfiltration. Michalis Diamantaris, Serafeim Moustakas, Lichao Sun, Sotiris Ioannidis, Jason Polakis |
| 2021 | Towards Automated Computational Auditing of mHealth Security and Privacy Regulations. Brian Tung, Zhiyuan Yu, Ning Zhang |
| 2021 | Towards Building a Responsible Data Economy. Dawn Song |
| 2021 | Towards Transparent and Stealthy Android OS Sandboxing via Customizable Container-Based Virtualization. Wenna Song, Jiang Ming, Lin Jiang, Yi Xiang, Xuanchen Pan, Jianming Fu, Guojun Peng |
| 2021 | Understanding and Detecting Mobile Ad Fraud Through the Lens of Invalid Traffic. Suibin Sun, Le Yu, Xiaokuan Zhang, Minhui Xue, Ren Zhou, Haojin Zhu, Shuang Hao, Xiaodong Lin |
| 2021 | United We Stand: Collaborative Detection and Mitigation of Amplification DDoS Attacks at Scale. Daniel Wagner, Daniel Kopp, Matthias Wichtlhuber, Christoph Dietzel, Oliver Hohlfeld, Georgios Smaragdakis, Anja Feldmann |
| 2021 | Unleashing the Tiger: Inference Attacks on Split Learning. Dario Pasquini, Giuseppe Ateniese, Massimo Bernaschi |
| 2021 | Usable User Authentication on a Smartwatch using Vibration. Sunwoo Lee, Wonsuk Choi, Dong Hoon Lee |
| 2021 | Util: : Lookup: Exploiting Key Decoding in Cryptographic Libraries. Florian Sieck, Sebastian Berndt, Jan Wichelmann, Thomas Eisenbarth |
| 2021 | V-Shuttle: Scalable and Semantics-Aware Hypervisor Virtual Device Fuzzing. Gaoning Pan, Xingwei Lin, Xuhong Zhang, Yongkang Jia, Shouling Ji, Chunming Wu, Xinlei Ying, Jiashui Wang, Yanjun Wu |
| 2021 | VIP: Safeguard Value Invariant Property for Thwarting Critical Memory Corruption Attacks. Mohannad Ismail, Jinwoo Yom, Christopher Jelesnianski, Yeongjin Jang, Changwoo Min |
| 2021 | Validating the Integrity of Audit Logs Against Execution Repartitioning Attacks. Carter Yagemann, Mohammad A. Noureddine, Wajih Ul Hassan, Simon P. Chung, Adam Bates, Wenke Lee |
| 2021 | Verifying Table-Based Elections. David A. Basin, Jannik Dreier, Sofia Giampietro, Sasa Radomirovic |
| 2021 | Warmonger: Inflicting Denial-of-Service via Serverless Functions in the Cloud. Junjie Xiong, Mingkui Wei, Zhuo Lu, Yao Liu |
| 2021 | When Machine Unlearning Jeopardizes Privacy. Min Chen, Zhikun Zhang, Tianhao Wang, Michael Backes, Mathias Humbert, Yang Zhang |
| 2021 | Who's In Control? On Security Risks of Disjointed IoT Device Management Channels. Yan Jia, Bin Yuan, Luyi Xing, Dongfang Zhao, Yifan Zhang, Xiaofeng Wang, Yijing Liu, Kaimin Zheng, Peyton Crnjak, Yuqing Zhang, Deqing Zou, Hai Jin |
| 2021 | Wireless Charging Power Side-Channel Attacks. Alexander S. La Cour, Khurram K. Afridi, G. Edward Suh |
| 2021 | With a Little Help from My Friends: Constructing Practical Anonymous Credentials. Lucjan Hanzlik, Daniel Slamanig |
| 2021 | WristPrint: Characterizing User Re-identification Risks from Wrist-worn Accelerometry Data. Nazir Saleheen, Md. Azim Ullah, Supriyo Chakraborty, Deniz S. Ones, Mani B. Srivastava, Santosh Kumar |
| 2021 | XSinator.com: From a Formal Model to the Automatic Evaluation of Cross-Site Leaks in Web Browsers. Lukas Knittel, Christian Mainka, Marcus Niemietz, Dominik Trevor Noß, Jörg Schwenk |
| 2021 | You Make Me Tremble: A First Look at Attacks Against Structural Control Systems. Abel Zambrano, Alejandro Palacio Betancur, Luis Burbano, Andres Felipe Niño, Luis Felipe Giraldo, Mariantonieta Gutierrez Soto, Jairo Giraldo, Alvaro A. Cárdenas |
| 2021 | ZKCPlus: Optimized Fair-exchange Protocol Supporting Practical and Flexible Data Exchange. Yun Li, Cun Ye, Yuguang Hu, Ivring Morpheus, Yu Guo, Chao Zhang, Yupeng Zhang, Zhipeng Sun, Yiwen Lu, Haodi Wang |
| 2021 | Zero Knowledge Static Program Analysis. Zhiyong Fang, David Darais, Joseph P. Near, Yupeng Zhang |
| 2021 | zkCNN: Zero Knowledge Proofs for Convolutional Neural Network Predictions and Accuracy. Tianyi Liu, Xiang Xie, Yupeng Zhang |
| 2021 | εpsolute: Efficiently Querying Databases While Providing Differential Privacy. Dmytro Bogatov, Georgios Kellaris, George Kollios, Kobbi Nissim, Adam O'Neill |