| 2020 | "Anyone Else Seeing this Error?": Community, System Administrators, and Patch Information. Adam D. G. Jenkins, Pieris Kalligeros, Kami Vaniea, Maria K. Wolters |
| 2020 | A Pragmatic Approach to Membership Inferences on Machine Learning Models. Yunhui Long, Lei Wang, Diyue Bu, Vincent Bindschaedler, Xiaofeng Wang, Haixu Tang, Carl A. Gunter, Kai Chen |
| 2020 | A Vehicular DAA Scheme for Unlinkable ECDSA Pseudonyms in V2X. Christopher Hicks, Flavio D. Garcia |
| 2020 | AVGuardian: Detecting and Mitigating Publish-Subscribe Overprivilege for Autonomous Vehicle Systems. David Ke Hong, John Kloosterman, Yuqi Jin, Yulong Cao, Qi Alfred Chen, Scott A. Mahlke, Z. Morley Mao |
| 2020 | Accountability in a Permissioned Blockchain: Formal Analysis of Hyperledger Fabric. Mike Graf, Ralf Küsters, Daniel Rausch |
| 2020 | Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating. Giulio Lovisotto, Simon Eberz, Ivan Martinovic |
| 2020 | Bypassing Backdoor Detection Algorithms in Deep Learning. Te Juin Lester Tan, Reza Shokri |
| 2020 | COMAR: Classification of Compromised versus Maliciously Registered Domains. Sourena Maroofi, Maciej Korczynski, Cristian Hesselman, Benoît Ampeau, Andrzej Duda |
| 2020 | Chameleons' Oblivion: Complex-Valued Deep Neural Networks for Protocol-Agnostic RF Device Fingerprinting. Ioannis Agadakos, Nikolaos Agadakos, Jason Polakis, Mohamed R. Amer |
| 2020 | Chorus: a Programming Framework for Building Scalable Differential Privacy Mechanisms. Noah M. Johnson, Joseph P. Near, Joseph M. Hellerstein, Dawn Song |
| 2020 | DARIA: Designing Actuators to Resist Arbitrary Attacks Against Cyber-Physical Systems. Jairo Giraldo, Sahand Hadizadeh Kafash, Justin Ruths, Alvaro A. Cárdenas |
| 2020 | DLA: Dense-Layer-Analysis for Adversarial Example Detection. Philip Sperl, Ching-yu Kao, Peng Chen, Xiao Lei, Konstantin Böttinger |
| 2020 | Detecting Malware Injection with Program-DNS Behavior. Yixin Sun, Kangkook Jee, Suphannee Sivakorn, Zhichun Li, Cristian Lumezanu, Lauri Korts-Pärn, Zhenyu Wu, Junghwan Rhee, Chung Hwan Kim, Mung Chiang, Prateek Mittal |
| 2020 | Differentially Private Two-Party Set Operations. Bailey Kacsmar, Basit Khurram, Nils Lukas, Alexander Norton, Masoumeh Shafieinejad, Zhiwei Shang, Yaser Baseri, Maryam Sepehri, Simon Oya, Florian Kerschbaum |
| 2020 | Evaluating Explanation Methods for Deep Learning in Security. Alexander Warnecke, Daniel Arp, Christian Wressnegger, Konrad Rieck |
| 2020 | Extensive Security Verification of the LoRaWAN Key-Establishment: Insecurities & Patches. Stephan Wesemeyer, Ioana Boureanu, Zach Smith, Helen Treharne |
| 2020 | Generalized Iterative Bayesian Update and Applications to Mechanisms for Privacy Protection. Ehab ElSalamouny, Catuscia Palamidessi |
| 2020 | IEEE European Symposium on Security and Privacy, EuroS&P 2020, Genoa, Italy, September 7-11, 2020 |
| 2020 | Improving Fuzzing through Controlled Compilation. Laurent Simon, Akash Verma |
| 2020 | IoTFinder: Efficient Large-Scale Identification of IoT Devices via Passive DNS Traffic Analysis. Roberto Perdisci, Thomas Papastergiou, Omar Alrawi, Manos Antonakakis |
| 2020 | Jekyll: Attacking Medical Image Diagnostics using Deep Generative Models. Neal Mangaokar, Jiameng Pu, Parantapa Bhattacharya, Chandan K. Reddy, Bimal Viswanath |
| 2020 | Membership Inference Against DNA Methylation Databases. Inken Hagestedt, Mathias Humbert, Pascal Berrang, Irina Lehmann, Roland Eils, Michael Backes, Yang Zhang |
| 2020 | Modular Security Analysis of OAuth 2.0 in the Three-Party Setting. Xinyu Li, Jing Xu, Zhenfeng Zhang, Xiao Lan, Yuchen Wang |
| 2020 | Multi-country Study of Third Party Trackers from Real Browser Histories. Xuehui Hu, Guillermo Suarez de Tangil, Nishanth Sastry |
| 2020 | On Deploying Secure Computing: Private Intersection-Sum-with-Cardinality. Mihaela Ion, Ben Kreuter, Ahmet Erhan Nergiz, Sarvar Patel, Shobhit Saxena, Karn Seth, Mariana Raykova, David Shanahan, Moti Yung |
| 2020 | Ordinos: A Verifiable Tally-Hiding E-Voting System. Ralf Küsters, Julian Liedtke, Johannes Müller, Daniel Rausch, Andreas Vogt |
| 2020 | PESTO: Proactively Secure Distributed Single Sign-On, or How to Trust a Hacked Server. Carsten Baum, Tore Kasper Frederiksen, Julia Hesse, Anja Lehmann, Avishay Yanai |
| 2020 | Practical Volume-Based Attacks on Encrypted Databases. Rishabh Poddar, Stephanie Wang, Jianan Lu, Raluca Ada Popa |
| 2020 | Quantitative Assessment on the Limitations of Code Randomization for Legacy Binaries. Pei Wang, Jinquan Zhang, Shuai Wang, Dinghao Wu |
| 2020 | Replay Attacks and Defenses Against Cross-shard Consensus in Sharded Distributed Ledgers. Alberto Sonnino, Shehar Bano, Mustafa Al-Bassam, George Danezis |
| 2020 | Reward Sharing Schemes for Stake Pools. Lars Brünjes, Aggelos Kiayias, Elias Koutsoupias, Aikaterini-Panagiota Stouka |
| 2020 | Saffire: Context-sensitive Function Specialization against Code Reuse Attacks. Shachee Mishra, Michalis Polychronakis |
| 2020 | SecurePay: Strengthening Two-Factor Authentication for Arbitrary Transactions. Radhesh Krishnan Konoth, Björn Fischer, Wan J. Fokkink, Elias Athanasopoulos, Kaveh Razavi, Herbert Bos |
| 2020 | SoK: Delegation and Revocation, the Missing Links in the Web's Chain of Trust. Laurent Chuat, AbdelRahman Abdou, Ralf Sasse, Christoph Sprenger, David A. Basin, Adrian Perrig |
| 2020 | TagBleed: Breaking KASLR on the Isolated Kernel Address Space using Tagged TLBs. Jakob Koschel, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi |
| 2020 | User Attitudes On Direct-to-Consumer Genetic Testing. Debjani Saha, Anna Chan, Brook Stacy, Kiran Javkar, Sushant Patkar, Michelle L. Mazurek |
| 2020 | VGRAPH: A Robust Vulnerable Code Clone Detection System Using Code Property Triplets. Benjamin Bowman, H. Howie Huang |
| 2020 | X-Men: A Mutation-Based Approach for the Formal Analysis of Security Ceremonies. Diego Sempreboni, Luca Viganò |
| 2020 | Zone Encryption with Anonymous Authentication for V2V Communication. Jan Camenisch, Manu Drijvers, Anja Lehmann, Gregory Neven, Patrick Towa |