EuroS&P A

34 papers

YearTitle / Authors
20182018 IEEE European Symposium on Security and Privacy, EuroS&P 2018, London, United Kingdom, April 24-26, 2018
2018A Formal Analysis of the Neuchatel e-Voting Protocol.
Véronique Cortier, David Galindo, Mathieu Turuani
2018Attacking Deterministic Signature Schemes Using Fault Attacks.
Damian Poddebniak, Juraj Somorovsky, Sebastian Schinzel, Manfred Lochter, Paul Rösler
2018COVERN: A Logic for Compositional Verification of Information Flow Control.
Toby C. Murray, Robert Sison, Kai Engelhardt
2018CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM.
Joppe W. Bos, Léo Ducas, Eike Kiltz, Tancrède Lepoint, Vadim Lyubashevsky, John M. Schanck, Peter Schwabe, Gregor Seiler, Damien Stehlé
2018ChainSmith: Automatically Learning the Semantics of Malicious Campaigns by Mining Threat Intelligence Reports.
Ziyun Zhu, Tudor Dumitras
2018Crypto Crumple Zones: Enabling Limited Access without Mass Surveillance.
Charles V. Wright, Mayank Varia
2018DeepRefiner: Multi-layer Android Malware Detection System Applying Deep Neural Networks.
Ke Xu, Yingjiu Li, Robert H. Deng, Kai Chen
2018Dissecting Privacy Risks in Biomedical Data.
Pascal Berrang, Mathias Humbert, Yang Zhang, Irina Lehmann, Roland Eils, Michael Backes
2018Eraser: Your Data Won't Be Back.
Kaan Onarlioglu, William K. Robertson, Engin Kirda
2018Forgotten Siblings: Unifying Attacks on Machine Learning and Digital Watermarking.
Erwin Quiring, Daniel Arp, Konrad Rieck
2018Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure.
Patrick Speicher, Marcel Steinmetz, Robert Künnemann, Milivoj Simeonovski, Giancarlo Pellegrino, Jörg Hoffmann, Michael Backes
2018Get in Line: Ongoing Co-presence Verification of a Vehicle Formation Based on Driving Trajectories.
Christian Vaas, Mika Juuti, N. Asokan, Ivan Martinovic
2018Have Your PI and Eat it Too: Practical Security on a Low-Cost Ubiquitous Computing Platform.
Amit Vasudevan, Sagar Chaki
2018I Spy with My Little Eye: Analysis and Detection of Spying Browser Extensions.
Anupama Aggarwal, Bimal Viswanath, Liang Zhang, Saravana Kumar, Ayush Shah, Ponnurangam Kumaraguru
2018In Search of CurveSwap: Measuring Elliptic Curve Implementations in the Wild.
Luke Valenta, Nick Sullivan, Antonio Sanso, Nadia Heninger
2018Just In Time Hashing.
Benjamin Harsha, Jeremiah Blocki
2018Language-Independent Synthesis of Firewall Policies.
Chiara Bodei, Pierpaolo Degano, Letterio Galletta, Riccardo Focardi, Mauro Tempesta, Lorenzo Veronese
2018Masters of Time: An Overview of the NTP Ecosystem.
Teemu Rytilahti, Dennis Tatang, Janosch Kopper, Thorsten Holz
2018Mining ABAC Rules from Sparse Logs.
Carlos Cotrini, Thilo Weghorn, David A. Basin
2018More is Less: On the End-to-End Security of Group Chats in Signal, WhatsApp, and Threema.
Paul Rösler, Christian Mainka, Jörg Schwenk
2018On Composability of Game-Based Password Authenticated Key Exchange.
Marjan Skrobot, Jean Lancrenon
2018Online Synthesis of Adaptive Side-Channel Attacks Based On Noisy Observations.
Lucas Bang, Nicolás Rosner, Tevfik Bultan
2018Position-Independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure.
Enes Göktas, Benjamin Kollenda, Philipp Koppe, Erik Bosman, Georgios Portokalidis, Thorsten Holz, Herbert Bos, Cristiano Giuffrida
2018Probabilistic Obfuscation Through Covert Channels.
Jon Stephens, Babak Yadegari, Christian S. Collberg, Saumya Debray, Carlos Scheidegger
2018Security Risks in Asynchronous Web Servers: When Performance Optimizations Amplify the Impact of Data-Oriented Attacks.
Micah Morton, Jan Werner, Panagiotis Kintis, Kevin Z. Snow, Manos Antonakakis, Michalis Polychronakis, Fabian Monrose
2018Short Double- and N-Times-Authentication-Preventing Signatures from ECDSA and More.
David Derler, Sebastian Ramacher, Daniel Slamanig
2018SoK: Security and Privacy in Machine Learning.
Nicolas Papernot, Patrick D. McDaniel, Arunesh Sinha, Michael P. Wellman
2018Sponge-Based Control-Flow Protection for IoT Devices.
Mario Werner, Thomas Unterluggauer, David Schaffenrath, Stefan Mangard
2018TARANET: Traffic-Analysis Resistant Anonymity at the Network Layer.
Chen Chen, Daniele Enrico Asoni, Adrian Perrig, David Barrera, George Danezis, Carmela Troncoso
2018The Real First Class? Inferring Confidential Corporate Mergers and Government Relations from Air Traffic Communication.
Martin Strohmeier, Matthew Smith, Vincent Lenders, Ivan Martinovic
2018Understanding User Tradeoffs for Search in Encrypted Communication.
Wei Bai, Ciara Lynton, Charalampos Papamanthou, Michelle L. Mazurek
2018User Blocking Considered Harmful? An Attacker-Controllable Side Channel to Identify Social Accounts.
Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Keito Sasaoka, Takeshi Yagi, Tatsuya Mori
2018What You Get is What You C: Controlling Side Effects in Mainstream C Compilers.
Laurent Simon, David Chisnall, Ross J. Anderson