EuroS&P A

43 papers

YearTitle / Authors
2019A Mechanised Cryptographic Proof of the WireGuard Virtual Private Network Protocol.
Benjamin Lipp, Bruno Blanchet, Karthikeyan Bhargavan
2019A Practical Attestation Protocol for Autonomous Embedded Systems.
Florian Kohnhäuser, Niklas Büscher, Stefan Katzenbeisser
2019A Symbolic Analysis of ECC-Based Direct Anonymous Attestation.
Jorden Whitefield, Liqun Chen, Ralf Sasse, Steve A. Schneider, Helen Treharne, Stephan Wesemeyer
2019Adaptive Call-Site Sensitive Control Flow Integrity.
Mustakimur Khandaker, Abu Naser, Wenqing Liu, Zhi Wang, Yajin Zhou, Yueqiang Cheng
2019Challenges in Designing Exploit Mitigations for Deeply Embedded Systems.
Ali Abbasi, Jos Wetzels, Thorsten Holz, Sandro Etalle
2019Deanonymization and Linkability of Cryptocurrency Transactions Based on Network Analysis.
Alex Biryukov, Sergei Tikhomirov
2019Degenerate Fault Attacks on Elliptic Curve Parameters in OpenSSL.
Akira Takahashi, Mehdi Tibouchi
2019Discovering Correlations: A Formal Definition of Causal Dependency Among Heterogeneous Events.
Charles Xosanavongsa, Eric Totel, Olivier Bettan
2019Domain Impersonation is Feasible: A Study of CA Domain Validation Vulnerabilities.
Lorenz Schwittmann, Matthäus Wander, Torben Weis
2019DroidEvolver: Self-Evolving Android Malware Detection System.
Ke Xu, Yingjiu Li, Robert H. Deng, Kai Chen, Jiayun Xu
2019Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts.
Raymond Cheng, Fan Zhang, Jernej Kos, Warren He, Nicholas Hynes, Noah M. Johnson, Ari Juels, Andrew Miller, Dawn Song
2019EzPC: Programmable and Efficient Secure Two-Party Computation for Machine Learning.
Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma, Shardul Tripathi
2019False Sense of Security: A Study on the Effectivity of Jailbreak Detection in Banking Apps.
Ansgar Kellner, Micha Horlboge, Konrad Rieck, Christian Wressnegger
2019IEEE European Symposium on Security and Privacy, EuroS&P 2019, Stockholm, Sweden, June 17-19, 2019
2019IFAL: Issue First Activate Later Certificates for V2X.
Eric R. Verheul, Christopher Hicks, Flavio D. Garcia
2019Improving Automated Symbolic Analysis of Ballot Secrecy for E-Voting Protocols: A Method Based on Sufficient Conditions.
Lucca Hirschi, Cas Cremers
2019In Encryption We Don't Trust: The Effect of End-to-End Encryption to the Masses on User Perception.
Sergej Dechand, Alena Naiakshina, Anastasia Danilova, Matthew Smith
2019Information-Flow Control for Database-Backed Applications.
Marco Guarnieri, Musard Balliu, Daniel Schoepe, David A. Basin, Andrei Sabelfeld
2019Is Your Vote Overheard? A New Scalable Side-Channel Attack Against Paper Voting.
Kristjan Krips, Jan Willemson, Sebastian Värv
2019Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key.
Zhen Liu, Guomin Yang, Duncan S. Wong, Khoa Nguyen, Huaxiong Wang
2019MALPITY: Automatic Identification and Exploitation of Tarpit Vulnerabilities in Malware.
Walla Sebastian, Christian Rossow
2019Mitch: A Machine Learning Approach to the Black-Box Detection of CSRF Vulnerabilities.
Stefano Calzavara, Mauro Conti, Riccardo Focardi, Alvise Rabitti, Gabriele Tolomei
2019Noise Explorer: Fully Automated Modeling and Verification for Arbitrary Noise Protocols.
Nadim Kobeissi, Georgio Nicolas, Karthikeyan Bhargavan
2019On Aggregation of Information in Timing Attacks.
Itsaka Rakotonirina, Boris Köpf
2019PILOT: Practical Privacy-Preserving Indoor Localization Using OuTsourcing.
Kimmo Järvinen, Helena Leppäkoski, Elena Simona Lohan, Philipp Richter, Thomas Schneider, Oleksandr Tkachenko, Zheng Yang
2019PRADA: Protecting Against DNN Model Stealing Attacks.
Mika Juuti, Sebastian Szyller, Samuel Marchal, N. Asokan
2019Private Votes on Untrusted Platforms: Models, Attacks and Provable Scheme.
Sergiu Bursuc, Constantin Catalin Dragan, Steve Kremer
2019Programming with Flow-Limited Authorization: Coarser is Better.
Mathias Vorreiter Pedersen, Stephen Chong
2019ReplicaTEE: Enabling Seamless Replication of SGX Enclaves in the Cloud.
Claudio Soriente, Ghassan Karame, Wenting Li, Sergey Fedorov
2019Rethinking Location Privacy for Unknown Mobility Behaviors.
Simon Oya, Carmela Troncoso, Fernando Pérez-González
2019Revisiting User Privacy for Certificate Transparency.
Daniel Kales, Olamide Omolola, Sebastian Ramacher
2019SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting.
Olivier Blazy, Angèle Bossuat, Xavier Bultel, Pierre-Alain Fouque, Cristina Onete, Elena Pagnin
2019STEROIDS for DOPed Applications: A Compiler for Automated Data-Oriented Programming.
Jannik Pewny, Philipp Koppe, Thorsten Holz
2019SgxPectre: Stealing Intel Secrets from SGX Enclaves Via Speculative Execution.
Guoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, Ten-Hwang Lai
2019SoK: Benchmarking Flaws in Systems Security.
Erik van der Kouwe, Gernot Heiser, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida
2019StopGuessing: Using Guessed Passwords to Thwart Online Guessing.
Stuart E. Schechter, Yuan Tian, Cormac Herley
2019Tell Me You Fixed It: Evaluating Vulnerability Notifications via Quarantine Networks.
Orçun Çetin, Carlos Gañán, Lisette Altena, Samaneh Tajalizadehkhoob, Michel van Eeten
2019The 5G-AKA Authentication Protocol Privacy.
Adrien Koutsos
2019The Case of Adversarial Inputs for Secure Similarity Approximation Protocols.
Evgenios M. Kornaropoulos, Petros Efstathopoulos
2019Towards Understanding Limitations of Pixel Discretization Against Adversarial Attacks.
Jiefeng Chen, Xi Wu, Vaibhav Rastogi, Yingyu Liang, Somesh Jha
2019TraffickStop: Detecting and Measuring Illicit Traffic Monetization Through Large-Scale DNS Analysis.
Baojun Liu, Zhou Li, Peiyuan Zong, Chaoyi Lu, Hai-Xin Duan, Ying Liu, Sumayah A. Alrwais, Xiaofeng Wang, Shuang Hao, Yaoqi Jia, Yiming Zhang, Kai Chen, Zaifeng Zhang
2019Understanding eWhoring.
Alice Hutchings, Sergio Pastrana
2019Up-To-Crash: Evaluating Third-Party Library Updatability on Android.
Jie Huang, Nataniel P. Borges Jr., Sven Bugiel, Michael Backes