EuroS&P A

39 papers

YearTitle / Authors
2020"Anyone Else Seeing this Error?": Community, System Administrators, and Patch Information.
Adam D. G. Jenkins, Pieris Kalligeros, Kami Vaniea, Maria K. Wolters
2020A Pragmatic Approach to Membership Inferences on Machine Learning Models.
Yunhui Long, Lei Wang, Diyue Bu, Vincent Bindschaedler, Xiaofeng Wang, Haixu Tang, Carl A. Gunter, Kai Chen
2020A Vehicular DAA Scheme for Unlinkable ECDSA Pseudonyms in V2X.
Christopher Hicks, Flavio D. Garcia
2020AVGuardian: Detecting and Mitigating Publish-Subscribe Overprivilege for Autonomous Vehicle Systems.
David Ke Hong, John Kloosterman, Yuqi Jin, Yulong Cao, Qi Alfred Chen, Scott A. Mahlke, Z. Morley Mao
2020Accountability in a Permissioned Blockchain: Formal Analysis of Hyperledger Fabric.
Mike Graf, Ralf Küsters, Daniel Rausch
2020Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating.
Giulio Lovisotto, Simon Eberz, Ivan Martinovic
2020Bypassing Backdoor Detection Algorithms in Deep Learning.
Te Juin Lester Tan, Reza Shokri
2020COMAR: Classification of Compromised versus Maliciously Registered Domains.
Sourena Maroofi, Maciej Korczynski, Cristian Hesselman, Benoît Ampeau, Andrzej Duda
2020Chameleons' Oblivion: Complex-Valued Deep Neural Networks for Protocol-Agnostic RF Device Fingerprinting.
Ioannis Agadakos, Nikolaos Agadakos, Jason Polakis, Mohamed R. Amer
2020Chorus: a Programming Framework for Building Scalable Differential Privacy Mechanisms.
Noah M. Johnson, Joseph P. Near, Joseph M. Hellerstein, Dawn Song
2020DARIA: Designing Actuators to Resist Arbitrary Attacks Against Cyber-Physical Systems.
Jairo Giraldo, Sahand Hadizadeh Kafash, Justin Ruths, Alvaro A. Cárdenas
2020DLA: Dense-Layer-Analysis for Adversarial Example Detection.
Philip Sperl, Ching-yu Kao, Peng Chen, Xiao Lei, Konstantin Böttinger
2020Detecting Malware Injection with Program-DNS Behavior.
Yixin Sun, Kangkook Jee, Suphannee Sivakorn, Zhichun Li, Cristian Lumezanu, Lauri Korts-Pärn, Zhenyu Wu, Junghwan Rhee, Chung Hwan Kim, Mung Chiang, Prateek Mittal
2020Differentially Private Two-Party Set Operations.
Bailey Kacsmar, Basit Khurram, Nils Lukas, Alexander Norton, Masoumeh Shafieinejad, Zhiwei Shang, Yaser Baseri, Maryam Sepehri, Simon Oya, Florian Kerschbaum
2020Evaluating Explanation Methods for Deep Learning in Security.
Alexander Warnecke, Daniel Arp, Christian Wressnegger, Konrad Rieck
2020Extensive Security Verification of the LoRaWAN Key-Establishment: Insecurities & Patches.
Stephan Wesemeyer, Ioana Boureanu, Zach Smith, Helen Treharne
2020Generalized Iterative Bayesian Update and Applications to Mechanisms for Privacy Protection.
Ehab ElSalamouny, Catuscia Palamidessi
2020IEEE European Symposium on Security and Privacy, EuroS&P 2020, Genoa, Italy, September 7-11, 2020
2020Improving Fuzzing through Controlled Compilation.
Laurent Simon, Akash Verma
2020IoTFinder: Efficient Large-Scale Identification of IoT Devices via Passive DNS Traffic Analysis.
Roberto Perdisci, Thomas Papastergiou, Omar Alrawi, Manos Antonakakis
2020Jekyll: Attacking Medical Image Diagnostics using Deep Generative Models.
Neal Mangaokar, Jiameng Pu, Parantapa Bhattacharya, Chandan K. Reddy, Bimal Viswanath
2020Membership Inference Against DNA Methylation Databases.
Inken Hagestedt, Mathias Humbert, Pascal Berrang, Irina Lehmann, Roland Eils, Michael Backes, Yang Zhang
2020Modular Security Analysis of OAuth 2.0 in the Three-Party Setting.
Xinyu Li, Jing Xu, Zhenfeng Zhang, Xiao Lan, Yuchen Wang
2020Multi-country Study of Third Party Trackers from Real Browser Histories.
Xuehui Hu, Guillermo Suarez de Tangil, Nishanth Sastry
2020On Deploying Secure Computing: Private Intersection-Sum-with-Cardinality.
Mihaela Ion, Ben Kreuter, Ahmet Erhan Nergiz, Sarvar Patel, Shobhit Saxena, Karn Seth, Mariana Raykova, David Shanahan, Moti Yung
2020Ordinos: A Verifiable Tally-Hiding E-Voting System.
Ralf Küsters, Julian Liedtke, Johannes Müller, Daniel Rausch, Andreas Vogt
2020PESTO: Proactively Secure Distributed Single Sign-On, or How to Trust a Hacked Server.
Carsten Baum, Tore Kasper Frederiksen, Julia Hesse, Anja Lehmann, Avishay Yanai
2020Practical Volume-Based Attacks on Encrypted Databases.
Rishabh Poddar, Stephanie Wang, Jianan Lu, Raluca Ada Popa
2020Quantitative Assessment on the Limitations of Code Randomization for Legacy Binaries.
Pei Wang, Jinquan Zhang, Shuai Wang, Dinghao Wu
2020Replay Attacks and Defenses Against Cross-shard Consensus in Sharded Distributed Ledgers.
Alberto Sonnino, Shehar Bano, Mustafa Al-Bassam, George Danezis
2020Reward Sharing Schemes for Stake Pools.
Lars Brünjes, Aggelos Kiayias, Elias Koutsoupias, Aikaterini-Panagiota Stouka
2020Saffire: Context-sensitive Function Specialization against Code Reuse Attacks.
Shachee Mishra, Michalis Polychronakis
2020SecurePay: Strengthening Two-Factor Authentication for Arbitrary Transactions.
Radhesh Krishnan Konoth, Björn Fischer, Wan J. Fokkink, Elias Athanasopoulos, Kaveh Razavi, Herbert Bos
2020SoK: Delegation and Revocation, the Missing Links in the Web's Chain of Trust.
Laurent Chuat, AbdelRahman Abdou, Ralf Sasse, Christoph Sprenger, David A. Basin, Adrian Perrig
2020TagBleed: Breaking KASLR on the Isolated Kernel Address Space using Tagged TLBs.
Jakob Koschel, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi
2020User Attitudes On Direct-to-Consumer Genetic Testing.
Debjani Saha, Anna Chan, Brook Stacy, Kiran Javkar, Sushant Patkar, Michelle L. Mazurek
2020VGRAPH: A Robust Vulnerable Code Clone Detection System Using Code Property Triplets.
Benjamin Bowman, H. Howie Huang
2020X-Men: A Mutation-Based Approach for the Formal Analysis of Security Ceremonies.
Diego Sempreboni, Luca Viganò
2020Zone Encryption with Anonymous Authentication for V2V Communication.
Jan Camenisch, Manu Drijvers, Anja Lehmann, Gregory Neven, Patrick Towa