CCS A*

226 papers

YearTitle / Authors
2021"Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World.
Emily Wenger, Max Bronckers, Christian Cianfarani, Jenna Cryan, Angela Sha, Haitao Zheng, Ben Y. Zhao
2021"I need a better description": An Investigation Into User Expectations For Differential Privacy.
Rachel Cummings, Gabriel Kaptchuk, Elissa M. Redmiles
202112 Angry Developers - A Qualitative Study on Developers' Struggles with CSP.
Sebastian Roth, Lea Gröber, Michael Backes, Katharina Krombholz, Ben Stock
2021A Concrete Treatment of Efficient Continuous Group Key Agreement via Multi-Recipient PKEs.
Keitaro Hashimoto, Shuichi Katsumata, Eamonn W. Postlethwaite, Thomas Prest, Bas Westerbaan
2021A Formally Verified Configuration for Hardware Security Modules in the Cloud.
Riccardo Focardi, Flaminia L. Luccio
2021A Hard Label Black-box Adversarial Attack Against Graph Neural Networks.
Jiaming Mu, Binghui Wang, Qi Li, Kun Sun, Mingwei Xu, Zhuotao Liu
2021A One-Pass Distributed and Private Sketch for Kernel Sums with Applications to Machine Learning at Scale.
Benjamin Coleman, Anshumali Shrivastava
2021A PKI-based Framework for Establishing Efficient MPC Channels.
Daniel Masny, Gaven J. Watson
2021A Security Framework for Distributed Ledgers.
Mike Graf, Daniel Rausch, Viktoria Ronge, Christoph Egger, Ralf Küsters, Dominique Schröder
2021AHEAD: Adaptive Hierarchical Decomposition for Range Query under Local Differential Privacy.
Linkang Du, Zhikun Zhang, Shaojie Bai, Changchang Liu, Shouling Ji, Peng Cheng, Jiming Chen
2021AI-Lancet: Locating Error-inducing Neurons to Optimize Neural Networks.
Yue Zhao, Hong Zhu, Kai Chen, Shengzhi Zhang
2021APECS: A Distributed Access Control Framework for Pervasive Edge Computing Services.
Sean Dougherty, Reza Tourani, Gaurav Panwar, Roopa Vishwanathan, Satyajayant Misra, Srikathyayani Srikanteswara
2021Aion: Enabling Open Systems through Strong Availability Guarantees for Enclaves.
Fritz Alder, Jo Van Bulck, Frank Piessens, Jan Tobias Mühlberg
2021All your Credentials are Belong to Us: On Insecure WPA2-Enterprise Configurations.
Man Hong Hue, Joyanta Debnath, Kin Man Leung, Li Li, Mohsen Minaei, M. Hammad Mazhar, Kailiang Xian, Md. Endadul Hoque, Omar Chowdhury, Sze Yiu Chau
2021Amortized Threshold Symmetric-key Encryption.
Mihai Christodorescu, Sivanarayana Gaddam, Pratyay Mukherjee, Rohit Sinha
2021An In-Depth Symbolic Security Analysis of the ACME Standard.
Karthikeyan Bhargavan, Abhishek Bichhawat, Quoc Huy Do, Pedram Hosseyni, Ralf Küsters, Guido Schmitz, Tim Würtele
2021An Inside Look into the Practice of Malware Analysis.
Miuyin Yong Wong, Matthew Landen, Manos Antonakakis, Douglas M. Blough, Elissa M. Redmiles, Mustaque Ahamad
2021An Ontology-driven Knowledge Graph for Android Malware.
Christian Ryan, Sharmishtha Dutta, Youngja Park, Nidhi Rastogi
2021Android on PC: On the Security of End-user Android Emulators.
Fenghao Xu, Siyu Shen, Wenrui Diao, Zhou Li, Yi Chen, Rui Li, Kehuan Zhang
2021Appenzeller to Brie: Efficient Zero-Knowledge Proofs for Mixed-Mode Arithmetic and Z2k.
Carsten Baum, Lennart Braun, Alexander Munch-Hansen, Benoît Razet, Peter Scholl
2021Are we done yet? Our Journey to Fight against Memory-safety Bugs.
Taesoo Kim
2021Asynchronous Data Dissemination and its Applications.
Sourav Das, Zhuolun Xiang, Ling Ren
2021Automated Bug Hunting With Data-Driven Symbolic Root Cause Analysis.
Carter Yagemann, Simon P. Chung, Brendan Saltaformaggio, Wenke Lee
2021Automated Privacy Policy Annotation with Information Highlighting Made Practical Using Deep Representations.
Abdulrahman Alabduljabbar, Ahmed Abusnaina, Ülkü Meteriz-Yildiran, David Mohaisen
2021BFT Protocol Forensics.
Peiyao Sheng, Gerui Wang, Kartik Nayak, Sreeram Kannan, Pramod Viswanath
2021Backdoor Pre-trained Models Can Transfer to All.
Lujia Shen, Shouling Ji, Xuhong Zhang, Jinfeng Li, Jing Chen, Jie Shi, Chengfang Fang, Jianwei Yin, Ting Wang
2021Biometrics-Authenticated Key Exchange for Secure Messaging.
Mei Wang, Kun He, Jing Chen, Zengpeng Li, Wei Zhao, Ruiying Du
2021Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information.
Baolin Zheng, Peipei Jiang, Qian Wang, Qi Li, Chao Shen, Cong Wang, Yunjie Ge, Qingyang Teng, Shenyi Zhang
2021C3PO: Large-Scale Study Of Covert Monitoring of C&C Servers via Over-Permissioned Protocol Infiltration.
Jonathan Fuller, Ranjita Pai Kasturi, Amit Kumar Sikder, Haichuan Xu, Berat Arik, Vivek Verma, Ehsan Asdar, Brendan Saltaformaggio
2021CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021
Yongdae Kim, Jong Kim, Giovanni Vigna, Elaine Shi
2021COINN: Crypto/ML Codesign for Oblivious Inference via Neural Networks.
Siam Umar Hussain, Mojan Javaheripi, Mohammad Samragh, Farinaz Koushanfar
2021CPscan: Detecting Bugs Caused by Code Pruning in IoT Kernels.
Lirong Fu, Shouling Ji, Kangjie Lu, Peiyu Liu, Xuhong Zhang, Yuxuan Duan, Zihui Zhang, Wenzhi Chen, Yanjun Wu
2021Can We Use Arbitrary Objects to Attack LiDAR Perception in Autonomous Driving?
Yi Zhu, Chenglin Miao, Tianhang Zheng, Foad Hajiaghajani, Lu Su, Chunming Qiao
2021CapSpeaker: Injecting Voices to Microphones via Capacitors.
Xiaoyu Ji, Juchuan Zhang, Shui Jiang, Jishen Li, Wenyuan Xu
2021Catching Transparent Phish: Analyzing and Detecting MITM Phishing Toolkits.
Brian Kondracki, Babak Amin Azad, Oleksii Starov, Nick Nikiforakis
2021Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks.
Tianyu Du, Shouling Ji, Lujia Shen, Yao Zhang, Jinfeng Li, Jie Shi, Chengfang Fang, Jianwei Yin, Raheem Beyah, Ting Wang
2021Chronos: Timing Interference as a New Attack Vector on Autonomous Cyber-physical Systems.
Ao Li, Jinwen Wang, Ning Zhang
2021Chunk-Level Password Guessing: Towards Modeling Refined Password Composition Representations.
Ming Xu, Chuanwang Wang, Jitao Yu, Junjie Zhang, Kai Zhang, Weili Han
2021Compact and Malicious Private Set Intersection for Small Sets.
Mike Rosulek, Ni Trieu
2021Compressed Oblivious Encoding for Homomorphically Encrypted Search.
Seung Geol Choi, Dana Dachman-Soled, S. Dov Gordon, Linsheng Liu, Arkady Yerukhimovich
2021Consistency Analysis of Data-Usage Purposes in Mobile Apps.
Duc Bui, Yuan Yao, Kang G. Shin, Jong-Min Choi, Junbum Shin
2021Constant-Overhead Zero-Knowledge for RAM Programs.
Nicholas Franzese, Jonathan Katz, Steve Lu, Rafail Ostrovsky, Xiao Wang, Chenkai Weng
2021Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization.
Pietro Borrello, Daniele Cono D'Elia, Leonardo Querzoni, Cristiano Giuffrida
2021Continuous Release of Data Streams under both Centralized and Local Differential Privacy.
Tianhao Wang, Joann Qiongna Chen, Zhikun Zhang, Dong Su, Yueqiang Cheng, Zhou Li, Ninghui Li, Somesh Jha
2021CrossLine: Breaking "Security-by-Crash" based Memory Isolation in AMD SEV.
Mengyuan Li, Yinqian Zhang, Zhiqiang Lin
2021CyberBunker 2.0 - A Domain and Traffic Perspective on a Bulletproof Hoster.
Daniel Kopp, Eric Strehle, Oliver Hohlfeld
2021DEMO: A Secure Voting System for Score Based Elections.
Lihi Dery, Tamir Tassa, Avishay Yanai, Arthur Zamarin
2021DETER: Denial of Ethereum Txpool sERvices.
Kai Li, Yibo Wang, Yuzhe Tang
2021DNS Cache Poisoning Attack: Resurrections with Side Channels.
Keyu Man, Xin'an Zhou, Zhiyun Qian
2021DPGen: Automated Program Synthesis for Differential Privacy.
Yuxin Wang, Zeyu Ding, Yingtai Xiao, Daniel Kifer, Danfeng Zhang
2021DataLens: Scalable Privacy Preserving Training via Gradient Compression and Aggregation.
Boxin Wang, Fan Wu, Yunhui Long, Luka Rimanic, Ce Zhang, Bo Li
2021De-identification of Unstructured Clinical Texts from Sequence to Sequence Perspective.
Md. Monowar Anjum, Noman Mohammed, Xiaoqian Jiang
2021DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications.
Dongqi Han, Zhiliang Wang, Wenqi Chen, Ying Zhong, Su Wang, Han Zhang, Jiahai Yang, Xingang Shi, Xia Yin
2021Demo: Detecting Third-Party Library Problems with Combined Program Analysis.
Grigoris Ntousakis, Sotiris Ioannidis, Nikos Vasilakis
2021Demo: Large Scale Analysis on Vulnerability Remediation in Open-source JavaScript Projects.
Vinuri Bandara, Thisura Rathnayake, Nipuna Weerasekara, Charitha Elvitigala, Kenneth Thilakarathna, Primal Wijesekera, Kasun De Zoysa, Chamath Keppitiyagama
2021Demons in the Shared Kernel: Abstract Resource Attacks Against OS-level Virtualization.
Nanzi Yang, Wenbo Shen, Jinku Li, Yutian Yang, Kangjie Lu, Jietao Xiao, Tianyu Zhou, Chenggang Qin, Wang Yu, Jianfeng Ma, Kui Ren
2021Detecting Missed Security Operations Through Differential Checking of Object-based Similar Paths.
Dinghao Liu, Qiushi Wu, Shouling Ji, Kangjie Lu, Zhenguang Liu, Jianhai Chen, Qinming He
2021DetectorGuard: Provably Securing Object Detectors against Localized Patch Hiding Attacks.
Chong Xiang, Prateek Mittal
2021Deterrence of Intelligent DDoS via Multi-Hop Traffic Divergence.
Yuanjie Li, Hewu Li, Zhizheng Lv, Xingkun Yao, Qianru Li, Jianping Wu
2021Differential Privacy for Directional Data.
Benjamin Weggenmann, Florian Kerschbaum
2021Differentially Private Sparse Vectors with Low Error, Optimal Space, and Fast Access.
Martin Aumüller, Christian Janos Lebeda, Rasmus Pagh
2021Dissecting Click Fraud Autonomy in the Wild.
Tong Zhu, Yan Meng, Haotian Hu, Xiaokuan Zhang, Minhui Xue, Haojin Zhu
2021Dissecting Residual APIs in Custom Android ROMs.
Zeinab El-Rewini, Yousra Aafer
2021Don't Forget the Stuffing! Revisiting the Security Impact of Typo-Tolerant Password Authentication.
Sena Sahin, Frank Li
2021DoubleX: Statically Detecting Vulnerable Data Flows in Browser Extensions at Scale.
Aurore Fass, Dolière Francis Somé, Michael Backes, Ben Stock
2021Doubly Efficient Interactive Proofs for General Arithmetic Circuits with Linear Prover Time.
Jiaheng Zhang, Tianyi Liu, Weijie Wang, Yinuo Zhang, Dawn Song, Xiang Xie, Yupeng Zhang
2021DroneKey: A Drone-Aided Group-Key Generation Scheme for Large-Scale IoT Networks.
Dianqi Han, Ang Li, Jiawei Li, Yan Zhang, Tao Li, Yanchao Zhang
2021ECMO: Peripheral Transplantation to Rehost Embedded Linux Kernels.
Muhui Jiang, Lin Ma, Yajin Zhou, Qiang Liu, Cen Zhang, Zhi Wang, Xiapu Luo, Lei Wu, Kui Ren
2021Earable Authentication via Acoustic Toothprint.
Zi Wang, Yili Ren, Yingying Chen, Jie Yang
2021EasyPQC: Verifying Post-Quantum Cryptography.
Manuel Barbosa, Gilles Barthe, Xiong Fan, Benjamin Grégoire, Shih-Han Hung, Jonathan Katz, Pierre-Yves Strub, Xiaodi Wu, Li Zhou
2021Efficient CCA Timed Commitments in Class Groups.
Sri Aravinda Krishnan Thyagarajan, Guilhem Castagnos, Fabien Laguillaumie, Giulio Malavolta
2021Efficient Linear Multiparty PSI and Extensions to Circuit/Quorum PSI.
Nishanth Chandran, Nishka Dasgupta, Divya Gupta, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar, Akash Shah
2021Efficient Online-friendly Two-Party ECDSA Signature.
Haiyang Xue, Man Ho Au, Xiang Xie, Tsz Hon Yuen, Handong Cui
2021Enabling Visual Analytics via Alert-driven Attack Graphs.
Azqa Nadeem, Sicco Verwer, Stephen Moskal, Shanchieh Jay Yang
2021EncoderMI: Membership Inference against Pre-trained Encoders in Contrastive Learning.
Hongbin Liu, Jinyuan Jia, Wenjie Qu, Neil Zhenqiang Gong
2021Evaluating Resilience of Domains in PKI.
Markus Brandt, Haya Schulmann, Michael Waidner
2021Exorcising Spectres with Secure Compilers.
Marco Patrignani, Marco Guarnieri
2021Facilitating Vulnerability Assessment through PoC Migration.
Jiarun Dai, Yuan Zhang, Hailong Xu, Haiming Lyu, Zicheng Wu, Xinyu Xing, Min Yang
2021FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants.
Yanjiao Chen, Yijie Bai, Richard Mitev, Kaibo Wang, Ahmad-Reza Sadeghi, Wenyuan Xu
2021Faster Lattice-Based KEMs via a Generic Fujisaki-Okamoto Transform Using Prefix Hashing.
Julien Duman, Kathrin Hövelmanns, Eike Kiltz, Vadim Lyubashevsky, Gregor Seiler
2021Feature-Indistinguishable Attack to Circumvent Trapdoor-Enabled Defense.
Chaoxiang He, Bin Benjamin Zhu, Xiaojing Ma, Hai Jin, Shengshan Hu
2021Fuzzy Message Detection.
Gabrielle Beck, Julia Len, Ian Miers, Matthew Green
2021Generalized Proof of Liabilities.
Yan Ji, Konstantinos Chalkias
2021Ghost in the Binder: Binder Transaction Redirection Attacks in Android System Services.
Xiaobo Xiang, Ren Zhang, Hanxiang Wen, Xiaorui Gong, Baoxu Liu
2021Glowworm Attack: Optical TEMPEST Sound Recovery via a Device's Power Indicator LED.
Ben Nassi, Yaron Pirutin, Tomer Cohen Galor, Yuval Elovici, Boris Zadov
2021HardsHeap: A Universal and Extensible Framework for Evaluating Secure Allocators.
Insu Yun, Woosun Song, Seunggi Min, Taesoo Kim
2021Hardware Support to Improve Fuzzing Performance and Precision.
Ren Ding, Yonghae Kim, Fan Sang, Wen Xu, Gururaj Saileshwar, Taesoo Kim
2021Hidden Backdoors in Human-Centric Language Models.
Shaofeng Li, Hui Liu, Tian Dong, Benjamin Zi Hao Zhao, Minhui Xue, Haojin Zhu, Jialiang Lu
2021Hiding the Lengths of Encrypted Messages via Gaussian Padding.
Jean Paul Degabriele
2021Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs.
Mohammad Malekzadeh, Anastasia Borovykh, Deniz Gündüz
2021How Does Blockchain Security Dictate Blockchain Implementation?
Andrew Lewis-Pye, Tim Roughgarden
2021Human and Organizational Factors in Public Key Certificate Authority Failures.
Skyler Johnson, Katherine Ferro, L. Jean Camp, Hilda Hadan
2021HyperFuzzer: An Efficient Hybrid Fuzzer for Virtual CPUs.
Xinyang Ge, Ben Niu, Robert Brotzman, Yaohui Chen, HyungSeok Han, Patrice Godefroid, Weidong Cui
2021I Can See the Light: Attacks on Autonomous Vehicles Using Invisible Lights.
Wei Wang, Yao Yao, Xin Liu, Xiang Li, Pei Hao, Ting Zhu
2021Igor: Crash Deduplication Through Root-Cause Clustering.
Zhiyuan Jiang, Xiyue Jiang, Ahmad Hazimeh, Chaojing Tang, Chao Zhang, Mathias Payer
2021Indistinguishability Prevents Scheduler Side Channels in Real-Time Systems.
Chien-Ying Chen, Debopam Sanyal, Sibin Mohan
2021It's Not What It Looks Like: Manipulating Perceptual Hashing based Applications.
Qingying Hao, Licheng Luo, Steve T. K. Jan, Gang Wang
2021Key Agreement for Decentralized Secure Group Messaging with Strong Security Guarantees.
Matthew Weidner, Martin Kleppmann, Daniel Hugenroth, Alastair R. Beresford
2021LEAP: Leakage-Abuse Attack on Efficiently Deployable, Efficiently Searchable Encryption with Partially Known Dataset.
Jianting Ning, Xinyi Huang, Geong Sen Poh, Jiaming Yuan, Yingjiu Li, Jian Weng, Robert H. Deng
2021Labeled PSI from Homomorphic Encryption with Reduced Computation and Communication.
Kelong Cong, Radames Cruz Moreno, Mariana Botelho da Gama, Wei Dai, Ilia Iliashenko, Kim Laine, Michael Rosenberg
2021Learning Security Classifiers with Verified Global Robustness Properties.
Yizheng Chen, Shiqi Wang, Yue Qin, Xiaojing Liao, Suman Jana, David A. Wagner
2021Learning to Explore Paths for Symbolic Execution.
Jingxuan He, Gishor Sivanrupan, Petar Tsankov, Martin T. Vechev
2021Let's Downgrade Let's Encrypt.
Tianxiang Dai, Haya Schulmann, Michael Waidner
2021Limbo: Efficient Zero-knowledge MPCitH-based Arguments.
Cyprien Delpech de Saint Guilhem, Emmanuela Orsini, Titouan Tanguy
2021Locally Private Graph Neural Networks.
Sina Sajadmanesh, Daniel Gatica-Perez
2021Locating the Security Patches for Disclosed OSS Vulnerabilities with Vulnerability-Commit Correlation Ranking.
Xin Tan, Yuan Zhang, Chenyuan Mi, Jiajun Cao, Kun Sun, Yifan Lin, Min Yang
2021MANIAC: A Man-Machine Collaborative System for Classifying Malware Author Groups.
Eujeanne Kim, Sung-Jun Park, Seokwoo Choi, Dong-Kyu Chae, Sang-Wook Kim
2021MPC-Friendly Commitments for Publicly Verifiable Covert Security.
Nitin Agrawal, James Bell, Adrià Gascón, Matt J. Kusner
2021MaMIoT: Manipulation of Energy Market Leveraging High Wattage IoT Botnets.
Tohid Shekari, Celine Irvene, Alvaro A. Cárdenas, Raheem Beyah
2021Machine-checked ZKP for NP relations: Formally Verified Security Proofs and Implementations of MPC-in-the-Head.
José Bacelar Almeida, Manuel Barbosa, Manuel L. Correia, Karim Eldefrawy, Stéphane Graham-Lengrand, Hugo Pacheco, Vitor Pereira
2021Mechanized Proofs of Adversarial Complexity and Application to Universal Composability.
Manuel Barbosa, Gilles Barthe, Benjamin Grégoire, Adrien Koutsos, Pierre-Yves Strub
2021Membership Inference Attacks Against Recommender Systems.
Minxing Zhang, Zhaochun Ren, Zihan Wang, Pengjie Ren, Zhumin Chen, Pengfei Hu, Yang Zhang
2021Membership Inference Attacks against GANs by Leveraging Over-representation Regions.
Hailong Hu, Jun Pang
2021Membership Leakage in Label-Only Exposures.
Zheng Li, Yang Zhang
2021Meteor: Cryptographically Secure Steganography for Realistic Distributions.
Gabriel Kaptchuk, Tushar M. Jois, Matthew Green, Aviel D. Rubin
2021Mining in Logarithmic Space.
Aggelos Kiayias, Nikos Leonardos, Dionysis Zindros
2021MirChecker: Detecting Bugs in Rust Programs via Static Analysis.
Zhuohua Li, Jincheng Wang, Mingshen Sun, John C. S. Lui
2021Modular Design of Secure Group Messaging Protocols and the Security of MLS.
Joël Alwen, Sandro Coretti, Yevgeniy Dodis, Yiannis Tselekounis
2021Morpheus: Bringing The (PKCS) One To Meet the Oracle.
Moosa Yahyazadeh, Sze Yiu Chau, Li Li, Man Hong Hue, Joyanta Debnath, Sheung Chiu Ip, Chun Ngai Li, Md. Endadul Hoque, Omar Chowdhury
2021Multi-Threshold Byzantine Fault Tolerance.
Atsuki Momose, Ling Ren
2021New Directions in Automated Traffic Analysis.
Jordan Holland, Paul Schmitt, Nick Feamster, Prateek Mittal
2021Noncompliance as Deviant Behavior: An Automated Black-box Noncompliance Checker for 4G LTE Cellular Devices.
Syed Rafiul Hussain, Imtiaz Karim, Abdullah Al Ishtiaq, Omar Chowdhury, Elisa Bertino
2021Oblivious Linear Group Actions and Applications.
Nuttapong Attrapadung, Goichiro Hanaoka, Takahiro Matsuda, Hiraku Morita, Kazuma Ohara, Jacob C. N. Schuldt, Tadanori Teruya, Kazunari Tozawa
2021On Adoptability and Use Case Exploration of Threat Modeling for Mobile Communication Systems.
Hsin Yi Chen, Siddharth Prakash Rao
2021On Re-engineering the X.509 PKI with Executable Specification for Better Implementation Guarantees.
Joyanta Debnath, Sze Yiu Chau, Omar Chowdhury
2021On the (In)Security of ElGamal in OpenPGP.
Luca De Feo, Bertram Poettering, Alessandro Sorniotti
2021On the Robustness of Domain Constraints.
Ryan Sheatsley, Blaine Hoak, Eric Pauley, Yohan Beugin, Michael J. Weisman, Patrick D. McDaniel
2021On the Rényi Differential Privacy of the Shuffle Model.
Antonious M. Girgis, Deepesh Data, Suhas N. Diggavi, Ananda Theertha Suresh, Peter Kairouz
2021On the TOCTOU Problem in Remote Attestation.
Ivan De Oliveira Nunes, Sashidhar Jakkamsetti, Norrathep Rattanavipanon, Gene Tsudik
2021On-device IoT Certificate Revocation Checking with Small Memory and Low Latency.
Xiaofeng Shi, Shouqian Shi, Minmei Wang, Jonne Kaunisto, Chen Qian
2021One Glitch to Rule Them All: Fault Injection Attacks Against AMD's Secure Encrypted Virtualization.
Robert Buhren, Hans Niklas Jacob, Thilo Krachenfels, Jean-Pierre Seifert
2021One Hot Garbling.
David Heath, Vladimir Kolesnikov
2021OnionPIR: Response Efficient Single-Server PIR.
Muhammad Haris Mughees, Hao Chen, Ling Ren
2021OpenSquare: Decentralized Repeated Modular Squaring Service.
Sri Aravinda Krishnan Thyagarajan, Tiantian Gong, Adithya Bhat, Aniket Kate, Dominique Schröder
2021Optimized Predictive Control for AGC Cyber Resiliency.
Muhammad Nouman Nafees, Neetesh Saxena, Pete Burnap
2021Out of Sight, Out of Mind: Detecting Orphaned Web Pages at Internet-Scale.
Stijn Pletinckx, Kevin Borgolte, Tobias Fiebig
2021PARASITE: PAssword Recovery Attack against Srp Implementations in ThE wild.
Daniel De Almeida Braga, Pierre-Alain Fouque, Mohamed Sabt
2021POSTER: A Tough Nut to Crack: Attempting to Break Modulation Obfuscation.
Naureen Hoque, Hanif Rahbari
2021POSTER: An Open-Source Framework for Developing Heterogeneous Distributed Enclave Applications.
Gianluca Scopelliti, Sepideh Pouyanrad, Job Noorman, Fritz Alder, Frank Piessens, Jan Tobias Mühlberg
2021POSTER: How Dangerous is My Click? Boosting Website Fingerprinting By Considering Sequences of Webpages.
Asya Mitseva, Jan Pennekamp, Johannes Lohmöller, Torsten Ziemann, Carl Hoerchner, Klaus Wehrle, Andriy Panchenko
2021POSTER: OS Independent Fuzz Testing of I/O Boundary.
Masanori Misono, Takahiro Shinagawa
2021POSTER: ReAvatar: Virtual Reality De-anonymization Attack Through Correlating Movement Signatures.
Brandon Falk, Yan Meng, Yuxia Zhan, Haojin Zhu
2021POSTER: Recovering Songs from a Hanging Light Bulb.
Ben Nassi, Yaron Pirutin, Raz Swissa, Adi Shamir, Yuval Elovici, Boris Zadov
2021PPE Circuits for Rational Polynomials.
Susan Hohenberger, Satyanarayana Vusirikala
2021Packet Scheduling with Optional Client Privacy.
Andrew Beams, Sampath Kannan, Sebastian Angel
2021PalmTree: Learning an Assembly Language Model for Instruction Embedding.
Xuezixiang Li, Yu Qu, Heng Yin
2021Periscope: A Keystroke Inference Attack Using Human Coupled Electromagnetic Emanations.
Wenqiang Jin, Srinivasan Murali, Huadi Zhu, Ming Li
2021Predictive Cipher-Suite Negotiation for Boosting Deployment of New Ciphers.
Elias Heftrig, Jean-Pierre Seifert, Haya Schulmann, Michael Waidner, Nils Wisiol
2021Preventing Dynamic Library Compromise on Node.js via RWX-Based Privilege Reduction.
Nikos Vasilakis, Cristian-Alexandru Staicu, Grigoris Ntousakis, Konstantinos Kallas, Ben Karel, André DeHon, Michael Pradel
2021Prime+Scope: Overcoming the Observer Effect for High-Precision Cache Contention Attacks.
Antoon Purnal, Furkan Turan, Ingrid Verbauwhede
2021Private Hierarchical Clustering in Federated Networks.
Aashish Kolluri, Teodora Baluta, Prateek Saxena
2021Pseudo-Randomness and the Crystal Ball.
Cynthia Dwork
2021Quantifying and Mitigating Privacy Risks of Contrastive Learning.
Xinlei He, Yang Zhang
2021QuickSilver: Efficient and Affordable Zero-Knowledge Proofs for Circuits and Polynomials over Any Field.
Kang Yang, Pratik Sarkar, Chenkai Weng, Xiao Wang
2021RandPiper - Reconfiguration-Friendly Random Beacons with Quadratic Communication.
Adithya Bhat, Nibesh Shrestha, Zhongtang Luo, Aniket Kate, Kartik Nayak
2021RealSWATT: Remote Software-based Attestation for Embedded Devices under Realtime Constraints.
Sebastian Surminski, Christian Niesler, Ferdinand Brasser, Lucas Davi, Ahmad-Reza Sadeghi
2021Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis.
Chuanpu Fu, Qi Li, Meng Shen, Ke Xu
2021Reconstructing with Less: Leakage Abuse Attacks in Two Dimensions.
Evangelia Anna Markatou, Francesca Falzon, Roberto Tamassia, William Schor
2021Regression Greybox Fuzzing.
Xiaogang Zhu, Marcel Böhme
2021Reverse Attack: Black-box Attacks on Collaborative Recommendation.
Yihe Zhang, Xu Yuan, Jin Li, Jiadong Lou, Li Chen, Nian-Feng Tzeng
2021Revisiting Fuzzy Signatures: Towards a More Risk-Free Cryptographic Authentication System based on Biometrics.
Shuichi Katsumata, Takahiro Matsuda, Wataru Nakamura, Kazuma Ohara, Kenta Takahashi
2021Revisiting Hybrid Private Information Retrieval.
Daniel Günther, Thomas Schneider, Felix Wiegand
2021Revisiting Nakamoto Consensus in Asynchronous Networks: A Comprehensive Analysis of Bitcoin Safety and ChainQuality.
Muhammad Saad, Afsah Anwar, Srivatsan Ravi, David Mohaisen
2021Robust Adversarial Attacks Against DNN-Based Wireless Communication Systems.
Alireza Bahramali, Milad Nasr, Amir Houmansadr, Dennis Goeckel, Don Towsley
2021Robust Detection of Machine-induced Audio Attacks in Intelligent Audio Systems with Microphone Array.
Zhuohang Li, Cong Shi, Tianfang Zhang, Yi Xie, Jian Liu, Bo Yuan, Yingying Chen
2021Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code.
Madura A. Shelton, Lukasz Chmielewski, Niels Samwel, Markus Wagner, Lejla Batina, Yuval Yarom
2021Rusted Anchors: A National Client-Side View of Hidden Root CAs in the Web PKI Ecosystem.
Yiming Zhang, Baojun Liu, Chaoyi Lu, Zhou Li, Haixin Duan, Jiachen Li, Zaifeng Zhang
2021Same Coverage, Less Bloat: Accelerating Binary-only Fuzzing with Coverage-preserving Coverage-guided Tracing.
Stefan Nagy, Anh Nguyen-Tuong, Jason D. Hiser, Jack W. Davidson, Matthew Hicks
2021Scan, Test, Execute: Adversarial Tactics in Amplification DDoS Attacks.
Harm Griffioen, Kris Oosthoek, Paul van der Knaap, Christian Doerr
2021Search-Based Local Black-Box Deobfuscation: Understand, Improve and Mitigate (Poster).
Grégoire Menguy, Sébastien Bardin, Richard Bonichon, Cauim de Souza Lima
2021Search-Based Local Black-Box Deobfuscation: Understand, Improve and Mitigate.
Grégoire Menguy, Sébastien Bardin, Richard Bonichon, Cauim de Souza Lima
2021Secure Complaint-Enabled Source-Tracking for Encrypted Messaging.
Charlotte Peale, Saba Eskandarian, Dan Boneh
2021Secure Graph Analysis at Scale.
Toshinori Araki, Jun Furukawa, Kazuma Ohara, Benny Pinkas, Hanan Rosemarin, Hikaru Tsuchida
2021Secure Multi-party Computation of Differentially Private Heavy Hitters.
Jonas Böhler, Florian Kerschbaum
2021Securing Parallel-chain Protocols under Variable Mining Power.
Xuechao Wang, Viswa Virinchi Muppirala, Lei Yang, Sreeram Kannan, Pramod Viswanath
2021Shorter and Faster Post-Quantum Designated-Verifier zkSNARKs from Lattices.
Yuval Ishai, Hang Su, David J. Wu
2021Side-Channel Attacks on Query-Based Data Anonymization.
Franziska Boenisch, Reinhard Munz, Marcel Tiepelt, Simon Hanisch, Christiane Kuhn, Paul Francis
2021Simple, Fast Malicious Multiparty Private Set Intersection.
Ofri Nevo, Ni Trieu, Avishay Yanai
2021SmashEx: Smashing SGX Enclaves Using Exceptions.
Jinhua Cui, Jason Zhijingcheng Yu, Shweta Shinde, Prateek Saxena, Zhiping Cai
2021Snipuzz: Black-box Fuzzing of IoT Firmware via Message Snippet Inference.
Xiaotao Feng, Ruoxi Sun, Xiaogang Zhu, Minhui Xue, Sheng Wen, Dongxi Liu, Surya Nepal, Yang Xiang
2021SoFi: Reflection-Augmented Fuzzing for JavaScript Engines.
Xiaoyu He, Xiaofei Xie, Yuekang Li, Jianwen Sun, Feng Li, Wei Zou, Yang Liu, Lei Yu, Jianhua Zhou, Wenchang Shi, Wei Huo
2021Solver-Aided Constant-Time Hardware Verification.
Klaus von Gleissenthall, Rami Gökhan Kici, Deian Stefan, Ranjit Jhala
2021Spinner: Automated Dynamic Command Subsystem Perturbation.
Meng Wang, Chijung Jung, Ali Ahad, Yonghwi Kwon
2021Statically Discovering High-Order Taint Style Vulnerabilities in OS Kernels.
Hang Zhang, Weiteng Chen, Yu Hao, Guoren Li, Yizhuo Zhai, Xiaochen Zou, Zhiyun Qian
2021Structural Attack against Graph Based Android Malware Detection.
Kaifa Zhao, Hao Zhou, Yulin Zhu, Xian Zhan, Kai Zhou, Jianfeng Li, Le Yu, Wei Yuan, Xiapu Luo
2021Structured Leakage and Applications to Cryptographic Constant-Time and Cost.
Gilles Barthe, Benjamin Grégoire, Vincent Laporte, Swarn Priya
2021Subpopulation Data Poisoning Attacks.
Matthew Jagielski, Giorgio Severi, Niklas Pousette Harger, Alina Oprea
2021SugarCoat: Programmatically Generating Privacy-Preserving, Web-Compatible Resource Replacements for Content Blocking.
Michael Smith, Peter Snyder, Benjamin Livshits, Deian Stefan
2021Supply-Chain Vulnerability Elimination via Active Learning and Regeneration.
Nikos Vasilakis, Achilles Benetopoulos, Shivam Handa, Alizee Schoen, Jiasi Shen, Martin C. Rinard
2021SyncAttack: Double-spending in Bitcoin Without Mining Power.
Muhammad Saad, Songqing Chen, David Mohaisen
2021SyzGen: Automated Generation of Syscall Specification of Closed-Source macOS Drivers.
Weiteng Chen, Yu Wang, Zheng Zhang, Zhiyun Qian
2021T-Reqs: HTTP Request Smuggling with Differential Fuzzing.
Bahruz Jabiyev, Steven Sprecher, Kaan Onarlioglu, Engin Kirda
2021TSS: Transformation-Specific Smoothing for Robustness Certification.
Linyi Li, Maurice Weber, Xiaojun Xu, Luka Rimanic, Bhavya Kailkhura, Tao Xie, Ce Zhang, Bo Li
2021TableGAN-MCA: Evaluating Membership Collisions of GAN-Synthesized Tabular Data Releasing.
Aoting Hu, Renjie Xie, Zhigang Lu, Aiqun Hu, Minhui Xue
2021The Effect of Google Search on Software Security: Unobtrusive Security Interventions via Content Re-ranking.
Felix Fischer, Yannick Stachelscheid, Jens Grossklags
2021The Exact Security of BIP32 Wallets.
Poulami Das, Andreas Erwig, Sebastian Faust, Julian Loss, Siavash Riahi
2021The Invisible Shadow: How Security Cameras Leak Private Activities.
Jian Gong, Xinyu Zhang, Ju Ren, Yaoxue Zhang
2021The One-Page Setting: A Higher Standard for Evaluating Website Fingerprinting Defenses.
Tao Wang
2021The Return of Eratosthenes: Secure Generation of RSA Moduli using Distributed Sieving.
Cyprien Delpech de Saint Guilhem, Eleftheria Makri, Dragos Rotaru, Titouan Tanguy
2021The Security of ChaCha20-Poly1305 in the Multi-User Setting.
Jean Paul Degabriele, Jérôme Govinden, Felix Günther, Kenneth G. Paterson
2021Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison.
Zhongjie Wang, Shitong Zhu, Keyu Man, Pengxiong Zhu, Yu Hao, Zhiyun Qian, Srikanth V. Krishnamurthy, Tom La Porta, Michael J. De Lucia
2021This Sneaky Piggy Went to the Android Ad Market: Misusing Mobile Sensors for Stealthy Data Exfiltration.
Michalis Diamantaris, Serafeim Moustakas, Lichao Sun, Sotiris Ioannidis, Jason Polakis
2021Towards Automated Computational Auditing of mHealth Security and Privacy Regulations.
Brian Tung, Zhiyuan Yu, Ning Zhang
2021Towards Building a Responsible Data Economy.
Dawn Song
2021Towards Transparent and Stealthy Android OS Sandboxing via Customizable Container-Based Virtualization.
Wenna Song, Jiang Ming, Lin Jiang, Yi Xiang, Xuanchen Pan, Jianming Fu, Guojun Peng
2021Understanding and Detecting Mobile Ad Fraud Through the Lens of Invalid Traffic.
Suibin Sun, Le Yu, Xiaokuan Zhang, Minhui Xue, Ren Zhou, Haojin Zhu, Shuang Hao, Xiaodong Lin
2021United We Stand: Collaborative Detection and Mitigation of Amplification DDoS Attacks at Scale.
Daniel Wagner, Daniel Kopp, Matthias Wichtlhuber, Christoph Dietzel, Oliver Hohlfeld, Georgios Smaragdakis, Anja Feldmann
2021Unleashing the Tiger: Inference Attacks on Split Learning.
Dario Pasquini, Giuseppe Ateniese, Massimo Bernaschi
2021Usable User Authentication on a Smartwatch using Vibration.
Sunwoo Lee, Wonsuk Choi, Dong Hoon Lee
2021Util: : Lookup: Exploiting Key Decoding in Cryptographic Libraries.
Florian Sieck, Sebastian Berndt, Jan Wichelmann, Thomas Eisenbarth
2021V-Shuttle: Scalable and Semantics-Aware Hypervisor Virtual Device Fuzzing.
Gaoning Pan, Xingwei Lin, Xuhong Zhang, Yongkang Jia, Shouling Ji, Chunming Wu, Xinlei Ying, Jiashui Wang, Yanjun Wu
2021VIP: Safeguard Value Invariant Property for Thwarting Critical Memory Corruption Attacks.
Mohannad Ismail, Jinwoo Yom, Christopher Jelesnianski, Yeongjin Jang, Changwoo Min
2021Validating the Integrity of Audit Logs Against Execution Repartitioning Attacks.
Carter Yagemann, Mohammad A. Noureddine, Wajih Ul Hassan, Simon P. Chung, Adam Bates, Wenke Lee
2021Verifying Table-Based Elections.
David A. Basin, Jannik Dreier, Sofia Giampietro, Sasa Radomirovic
2021Warmonger: Inflicting Denial-of-Service via Serverless Functions in the Cloud.
Junjie Xiong, Mingkui Wei, Zhuo Lu, Yao Liu
2021When Machine Unlearning Jeopardizes Privacy.
Min Chen, Zhikun Zhang, Tianhao Wang, Michael Backes, Mathias Humbert, Yang Zhang
2021Who's In Control? On Security Risks of Disjointed IoT Device Management Channels.
Yan Jia, Bin Yuan, Luyi Xing, Dongfang Zhao, Yifan Zhang, Xiaofeng Wang, Yijing Liu, Kaimin Zheng, Peyton Crnjak, Yuqing Zhang, Deqing Zou, Hai Jin
2021Wireless Charging Power Side-Channel Attacks.
Alexander S. La Cour, Khurram K. Afridi, G. Edward Suh
2021With a Little Help from My Friends: Constructing Practical Anonymous Credentials.
Lucjan Hanzlik, Daniel Slamanig
2021WristPrint: Characterizing User Re-identification Risks from Wrist-worn Accelerometry Data.
Nazir Saleheen, Md. Azim Ullah, Supriyo Chakraborty, Deniz S. Ones, Mani B. Srivastava, Santosh Kumar
2021XSinator.com: From a Formal Model to the Automatic Evaluation of Cross-Site Leaks in Web Browsers.
Lukas Knittel, Christian Mainka, Marcus Niemietz, Dominik Trevor Noß, Jörg Schwenk
2021You Make Me Tremble: A First Look at Attacks Against Structural Control Systems.
Abel Zambrano, Alejandro Palacio Betancur, Luis Burbano, Andres Felipe Niño, Luis Felipe Giraldo, Mariantonieta Gutierrez Soto, Jairo Giraldo, Alvaro A. Cárdenas
2021ZKCPlus: Optimized Fair-exchange Protocol Supporting Practical and Flexible Data Exchange.
Yun Li, Cun Ye, Yuguang Hu, Ivring Morpheus, Yu Guo, Chao Zhang, Yupeng Zhang, Zhipeng Sun, Yiwen Lu, Haodi Wang
2021Zero Knowledge Static Program Analysis.
Zhiyong Fang, David Darais, Joseph P. Near, Yupeng Zhang
2021zkCNN: Zero Knowledge Proofs for Convolutional Neural Network Predictions and Accuracy.
Tianyi Liu, Xiang Xie, Yupeng Zhang
2021εpsolute: Efficiently Querying Databases While Providing Differential Privacy.
Dmytro Bogatov, Georgios Kellaris, George Kollios, Kobbi Nissim, Adam O'Neill