EuroS&P A

49 papers

YearTitle / Authors
2021ANDRuspex: Leveraging Graph Representation Learning to Predict Harmful App Installations on Mobile Devices.
Yun Shen, Gianluca Stringhini
2021Aim, Wait, Shoot: How the CacheSniper Technique Improves Unprivileged Cache Attacks.
Samira Briongos, Ida Bruhns, Pedro Malagón, Thomas Eisenbarth, José Manuel Moya
2021An Investigation of Online Reverse Engineering Community Discussions in the Context of Ghidra.
Daniel Votipka, Mary Nicole Dugay Punzalan, Seth M. Rabin, Yla R. Tausczik, Michelle L. Mazurek
2021AppJitsu: Investigating the Resiliency of Android Applications.
Onur Zungur, Antonio Bianchi, Gianluca Stringhini, Manuel Egele
2021BGPeek-a-Boo: Active BGP-based Traceback for Amplification DDoS Attacks.
Johannes Krupp, Christian Rossow
2021Bullseye Polytope: A Scalable Clean-Label Poisoning Attack with Improved Transferability.
Hojjat Aghakhani, Dongyu Meng, Yu-Xiang Wang, Christopher Kruegel, Giovanni Vigna
2021Bypassing memory safety mechanisms through speculative control flow hijacks.
Andrea Mambretti, Alexandra Sandulescu, Alessandro Sorniotti, William Robertson, Engin Kirda, Anil Kurmus
2021Can ISPs Help Mitigate IoT Malware? A Longitudinal Study of Broadband ISP Security Efforts.
Arman Noroozian, Elsa Turcios Rodriguez, Elmer Lastdrager, Takahiro Kasama, Michel van Eeten, Carlos Gañán
2021Compiler-Assisted Hardening of Embedded Software Against Interrupt Latency Side-Channel Attacks.
Hans Winderix, Jan Tobias Mühlberg, Frank Piessens
2021Compression Boosts Differentially Private Federated Learning.
Raouf Kerkouche, Gergely Ács, Claude Castelluccia, Pierre Genevès
2021ConFuzzius: A Data Dependency-Aware Hybrid Fuzzer for Smart Contracts.
Christof Ferreira Torres, Antonio Ken Iannillo, Arthur Gervais, Radu State
2021Countering Concurrent Login Attacks in "Just Tap" Push-based Authentication: A Redesign and Usability Evaluations.
Jay Prakash, Clarice Chua Qing Yu, Tanvi Ravindra Thombre, Andrei Bytes, Mohammed Jubur, Nitesh Saxena, Lucienne Blessing, Jianying Zhou, Tony Q. S. Quek
2021Cryptocurrencies with Security Policies and Two-Factor Authentication.
Florian Breuer, Vipul Goyal, Giulio Malavolta
2021D-Fence: A Flexible, Efficient, and Comprehensive Phishing Email Detection System.
Jehyun Lee, Farren Tang, Pingxiao Ye, Fahim Abbasi, Phil Hay, Dinil Mon Divakaran
2021DY*: A Modular Symbolic Verification Framework for Executable Cryptographic Protocol Code.
Karthikeyan Bhargavan, Abhishek Bichhawat, Quoc Huy Do, Pedram Hosseyni, Ralf Küsters, Guido Schmitz, Tim Würtele
2021Ephemeral Astroturfing Attacks: The Case of Fake Twitter Trends.
Tugrulcan Elmas, Rebekah Overdorf, Ahmed Furkan Özkalay, Karl Aberer
2021Epoque: Practical End-to-End Verifiable Post-Quantum-Secure E-Voting.
Xavier Boyen, Thomas Haines, Johannes Müller
2021Extractor: Extracting Attack Behavior from Threat Reports.
Kiavash Satvat, Rigel Gjomemo, V. N. Venkatakrishnan
2021Fall of Giants: How popular text-based MLaaS fall against a simple evasion attack.
Luca Pajola, Mauro Conti
2021FastSpec: Scalable Generation and Detection of Spectre Gadgets Using Neural Embeddings.
M. Caner Tol, Berk Gülmezoglu, Koray Yurtseven, Berk Sunar
2021Fully Distributed Verifiable Random Functions and their Application to Decentralised Random Beacons.
David Galindo, Jia Liu, Mihai Ordean, Jin-Mann Wong
2021IEEE European Symposium on Security and Privacy, EuroS&P 2021, Vienna, Austria, September 6-10, 2021
2021NoVT: Eliminating C++ Virtual Calls to Mitigate Vtable Hijacking.
Markus Bauer, Christian Rossow
2021Nonce@Once: A Single-Trace EM Side Channel Attack on Several Constant-Time Elliptic Curve Implementations in Mobile Platforms.
Monjur Alam, Baki Berkay Yilmaz, Frank Werner, Niels Samwel, Alenka G. Zajic, Daniel Genkin, Yuval Yarom, Milos Prvulovic
2021Nontransitive Policies Transpiled.
Mohammad M. Ahmadpanah, Aslan Askarov, Andrei Sabelfeld
2021On the (In)Feasibility of Attribute Inference Attacks on Machine Learning Models.
Benjamin Zi Hao Zhao, Aviral Agrawal, Catisha Coburn, Hassan Jameel Asghar, Raghav Bhaskar, Mohamed Ali Kâafar, Darren Webb, Peter Dickinson
2021On the Privacy Risks of Algorithmic Fairness.
Hongyan Chang, Reza Shokri
2021Poster: Angry Birding: Evaluating Application Exceptions as Attack Canaries.
Tolga Ünlü, Lynsay A. Shepherd, Natalie Coull, Colin McLean
2021Poster: DyPolDroid: User-Centered Counter-Policies Against Android Permission-Abuse Attacks.
Matthew Hill, Carlos E. Rubio-Medrano, Luis Claramunt, Jaejong Baek, Gail-Joon Ahn
2021Poster: FLATEE: Federated Learning Across Trusted Execution Environments.
Arup Mondal, Yash More, Ruthu Hulikal Rooparaghunath, Debayan Gupta
2021Poster: Obfuscation Revealed - Using Electromagnetic Emanation to Identify and Classify Malware.
Duy-Phuc Pham, Damien Marion, Annelie Heuser
2021Poster: Preventing Spatial and Privacy Attacks in Mobile Augmented Reality Technologies.
Luis Claramunt, Larissa Pokam Epse, Carlos E. Rubio-Medrano, Jaejong Baek, Gail-Joon Ahn
2021Poster: Reducing Data Leakage on Personal Data Management Systems.
Robin Carpentier, Iulian Sandu Popa, Nicolas Anciaux
2021Poster: The Need for a Collaborative Approach to Cyber Security Education.
Gregor Langner, Jerry Andriessen, Gerald Quirchmayr, Steven Furnell, Vittorio Scarano, Teemu Tokola
2021Poster: Towards Verifiable Mutability for Blockchains.
Erik Daniel, Florian Tschorsch
2021Press @$@$ to Login: Strong Wearable Second Factor Authentication via Short Memorywise Effortless Typing Gestures.
Prakash Shrestha, Nitesh Saxena, Diksha Shukla, Vir V. Phoha
2021Privacy of DNS-over-HTTPS: Requiem for a Dream?
Levente Csikor, Himanshu Singh, Min Suk Kang, Dinil Mon Divakaran
2021Prognosis Negative: Evaluating Real-Time Behavioral Ransomware Detectors.
Abhinav Gupta, Aditi Prakash, Nolen Scaife
2021Remote Non-Intrusive Malware Detection for PLCs based on Chain of Trust Rooted in Hardware.
Prashant Hari Narayan Rajput, Esha Sarkar, Dimitrios Tychalas, Michail Maniatakos
2021Secure Messaging Authentication against Active Man-in-the-Middle Attacks.
Benjamin Dowling, Britta Hale
2021SoK: A Framework for Asset Discovery: Systematizing Advances in Network Measurements for Protecting Organizations.
Mathew Vermeer, Jonathan West, Alejandro Cuevas Villalba, Shuonan Niu, Nicolas Christin, Michel van Eeten, Tobias Fiebig, Carlos Gañán, Tyler Moore
2021SoK: Attacks on Industrial Control Logic and Formal Verification-Based Defenses.
Ruimin Sun, Alejandro Mera, Long Lu, David R. Choffnes
2021SoK: Context Sensing for Access Control in the Adversarial Home IoT.
Weijia He, Valerie Zhao, Olivia Morkved, Sabeeka Siddiqui, Earlence Fernandes, Josiah D. Hester, Blase Ur
2021SoK: Cryptojacking Malware.
Ege Tekiner, Abbas Acar, A. Selcuk Uluagac, Engin Kirda, Ali Aydin Selçuk
2021SoK: In Search of Lost Time: A Review of JavaScript Timers in Browsers.
Thomas Rokicki, Clémentine Maurice, Pierre Laperdrix
2021SoK: Secure FPGA Multi-Tenancy in the Cloud: Challenges and Opportunities.
Ghada Dessouky, Ahmad-Reza Sadeghi, Shaza Zeitouni
2021Sponge Examples: Energy-Latency Attacks on Neural Networks.
Ilia Shumailov, Yiren Zhao, Daniel Bates, Nicolas Papernot, Robert Mullins, Ross Anderson
2021Trojaning Language Models for Fun and Profit.
Xinyang Zhang, Zheng Zhang, Shouling Ji, Ting Wang
2021We Built This Circuit: Exploring Threat Vectors in Circuit Establishment in Tor.
Theodor Schnitzler, Christina Pöpper, Markus Dürmuth, Katharina Kohls