| 2021 | ANDRuspex: Leveraging Graph Representation Learning to Predict Harmful App Installations on Mobile Devices. Yun Shen, Gianluca Stringhini |
| 2021 | Aim, Wait, Shoot: How the CacheSniper Technique Improves Unprivileged Cache Attacks. Samira Briongos, Ida Bruhns, Pedro Malagón, Thomas Eisenbarth, José Manuel Moya |
| 2021 | An Investigation of Online Reverse Engineering Community Discussions in the Context of Ghidra. Daniel Votipka, Mary Nicole Dugay Punzalan, Seth M. Rabin, Yla R. Tausczik, Michelle L. Mazurek |
| 2021 | AppJitsu: Investigating the Resiliency of Android Applications. Onur Zungur, Antonio Bianchi, Gianluca Stringhini, Manuel Egele |
| 2021 | BGPeek-a-Boo: Active BGP-based Traceback for Amplification DDoS Attacks. Johannes Krupp, Christian Rossow |
| 2021 | Bullseye Polytope: A Scalable Clean-Label Poisoning Attack with Improved Transferability. Hojjat Aghakhani, Dongyu Meng, Yu-Xiang Wang, Christopher Kruegel, Giovanni Vigna |
| 2021 | Bypassing memory safety mechanisms through speculative control flow hijacks. Andrea Mambretti, Alexandra Sandulescu, Alessandro Sorniotti, William Robertson, Engin Kirda, Anil Kurmus |
| 2021 | Can ISPs Help Mitigate IoT Malware? A Longitudinal Study of Broadband ISP Security Efforts. Arman Noroozian, Elsa Turcios Rodriguez, Elmer Lastdrager, Takahiro Kasama, Michel van Eeten, Carlos Gañán |
| 2021 | Compiler-Assisted Hardening of Embedded Software Against Interrupt Latency Side-Channel Attacks. Hans Winderix, Jan Tobias Mühlberg, Frank Piessens |
| 2021 | Compression Boosts Differentially Private Federated Learning. Raouf Kerkouche, Gergely Ács, Claude Castelluccia, Pierre Genevès |
| 2021 | ConFuzzius: A Data Dependency-Aware Hybrid Fuzzer for Smart Contracts. Christof Ferreira Torres, Antonio Ken Iannillo, Arthur Gervais, Radu State |
| 2021 | Countering Concurrent Login Attacks in "Just Tap" Push-based Authentication: A Redesign and Usability Evaluations. Jay Prakash, Clarice Chua Qing Yu, Tanvi Ravindra Thombre, Andrei Bytes, Mohammed Jubur, Nitesh Saxena, Lucienne Blessing, Jianying Zhou, Tony Q. S. Quek |
| 2021 | Cryptocurrencies with Security Policies and Two-Factor Authentication. Florian Breuer, Vipul Goyal, Giulio Malavolta |
| 2021 | D-Fence: A Flexible, Efficient, and Comprehensive Phishing Email Detection System. Jehyun Lee, Farren Tang, Pingxiao Ye, Fahim Abbasi, Phil Hay, Dinil Mon Divakaran |
| 2021 | DY*: A Modular Symbolic Verification Framework for Executable Cryptographic Protocol Code. Karthikeyan Bhargavan, Abhishek Bichhawat, Quoc Huy Do, Pedram Hosseyni, Ralf Küsters, Guido Schmitz, Tim Würtele |
| 2021 | Ephemeral Astroturfing Attacks: The Case of Fake Twitter Trends. Tugrulcan Elmas, Rebekah Overdorf, Ahmed Furkan Özkalay, Karl Aberer |
| 2021 | Epoque: Practical End-to-End Verifiable Post-Quantum-Secure E-Voting. Xavier Boyen, Thomas Haines, Johannes Müller |
| 2021 | Extractor: Extracting Attack Behavior from Threat Reports. Kiavash Satvat, Rigel Gjomemo, V. N. Venkatakrishnan |
| 2021 | Fall of Giants: How popular text-based MLaaS fall against a simple evasion attack. Luca Pajola, Mauro Conti |
| 2021 | FastSpec: Scalable Generation and Detection of Spectre Gadgets Using Neural Embeddings. M. Caner Tol, Berk Gülmezoglu, Koray Yurtseven, Berk Sunar |
| 2021 | Fully Distributed Verifiable Random Functions and their Application to Decentralised Random Beacons. David Galindo, Jia Liu, Mihai Ordean, Jin-Mann Wong |
| 2021 | IEEE European Symposium on Security and Privacy, EuroS&P 2021, Vienna, Austria, September 6-10, 2021 |
| 2021 | NoVT: Eliminating C++ Virtual Calls to Mitigate Vtable Hijacking. Markus Bauer, Christian Rossow |
| 2021 | Nonce@Once: A Single-Trace EM Side Channel Attack on Several Constant-Time Elliptic Curve Implementations in Mobile Platforms. Monjur Alam, Baki Berkay Yilmaz, Frank Werner, Niels Samwel, Alenka G. Zajic, Daniel Genkin, Yuval Yarom, Milos Prvulovic |
| 2021 | Nontransitive Policies Transpiled. Mohammad M. Ahmadpanah, Aslan Askarov, Andrei Sabelfeld |
| 2021 | On the (In)Feasibility of Attribute Inference Attacks on Machine Learning Models. Benjamin Zi Hao Zhao, Aviral Agrawal, Catisha Coburn, Hassan Jameel Asghar, Raghav Bhaskar, Mohamed Ali Kâafar, Darren Webb, Peter Dickinson |
| 2021 | On the Privacy Risks of Algorithmic Fairness. Hongyan Chang, Reza Shokri |
| 2021 | Poster: Angry Birding: Evaluating Application Exceptions as Attack Canaries. Tolga Ünlü, Lynsay A. Shepherd, Natalie Coull, Colin McLean |
| 2021 | Poster: DyPolDroid: User-Centered Counter-Policies Against Android Permission-Abuse Attacks. Matthew Hill, Carlos E. Rubio-Medrano, Luis Claramunt, Jaejong Baek, Gail-Joon Ahn |
| 2021 | Poster: FLATEE: Federated Learning Across Trusted Execution Environments. Arup Mondal, Yash More, Ruthu Hulikal Rooparaghunath, Debayan Gupta |
| 2021 | Poster: Obfuscation Revealed - Using Electromagnetic Emanation to Identify and Classify Malware. Duy-Phuc Pham, Damien Marion, Annelie Heuser |
| 2021 | Poster: Preventing Spatial and Privacy Attacks in Mobile Augmented Reality Technologies. Luis Claramunt, Larissa Pokam Epse, Carlos E. Rubio-Medrano, Jaejong Baek, Gail-Joon Ahn |
| 2021 | Poster: Reducing Data Leakage on Personal Data Management Systems. Robin Carpentier, Iulian Sandu Popa, Nicolas Anciaux |
| 2021 | Poster: The Need for a Collaborative Approach to Cyber Security Education. Gregor Langner, Jerry Andriessen, Gerald Quirchmayr, Steven Furnell, Vittorio Scarano, Teemu Tokola |
| 2021 | Poster: Towards Verifiable Mutability for Blockchains. Erik Daniel, Florian Tschorsch |
| 2021 | Press @$@$ to Login: Strong Wearable Second Factor Authentication via Short Memorywise Effortless Typing Gestures. Prakash Shrestha, Nitesh Saxena, Diksha Shukla, Vir V. Phoha |
| 2021 | Privacy of DNS-over-HTTPS: Requiem for a Dream? Levente Csikor, Himanshu Singh, Min Suk Kang, Dinil Mon Divakaran |
| 2021 | Prognosis Negative: Evaluating Real-Time Behavioral Ransomware Detectors. Abhinav Gupta, Aditi Prakash, Nolen Scaife |
| 2021 | Remote Non-Intrusive Malware Detection for PLCs based on Chain of Trust Rooted in Hardware. Prashant Hari Narayan Rajput, Esha Sarkar, Dimitrios Tychalas, Michail Maniatakos |
| 2021 | Secure Messaging Authentication against Active Man-in-the-Middle Attacks. Benjamin Dowling, Britta Hale |
| 2021 | SoK: A Framework for Asset Discovery: Systematizing Advances in Network Measurements for Protecting Organizations. Mathew Vermeer, Jonathan West, Alejandro Cuevas Villalba, Shuonan Niu, Nicolas Christin, Michel van Eeten, Tobias Fiebig, Carlos Gañán, Tyler Moore |
| 2021 | SoK: Attacks on Industrial Control Logic and Formal Verification-Based Defenses. Ruimin Sun, Alejandro Mera, Long Lu, David R. Choffnes |
| 2021 | SoK: Context Sensing for Access Control in the Adversarial Home IoT. Weijia He, Valerie Zhao, Olivia Morkved, Sabeeka Siddiqui, Earlence Fernandes, Josiah D. Hester, Blase Ur |
| 2021 | SoK: Cryptojacking Malware. Ege Tekiner, Abbas Acar, A. Selcuk Uluagac, Engin Kirda, Ali Aydin Selçuk |
| 2021 | SoK: In Search of Lost Time: A Review of JavaScript Timers in Browsers. Thomas Rokicki, Clémentine Maurice, Pierre Laperdrix |
| 2021 | SoK: Secure FPGA Multi-Tenancy in the Cloud: Challenges and Opportunities. Ghada Dessouky, Ahmad-Reza Sadeghi, Shaza Zeitouni |
| 2021 | Sponge Examples: Energy-Latency Attacks on Neural Networks. Ilia Shumailov, Yiren Zhao, Daniel Bates, Nicolas Papernot, Robert Mullins, Ross Anderson |
| 2021 | Trojaning Language Models for Fun and Profit. Xinyang Zhang, Zheng Zhang, Shouling Ji, Ting Wang |
| 2021 | We Built This Circuit: Exploring Threat Vectors in Circuit Establishment in Tor. Theodor Schnitzler, Christina Pöpper, Markus Dürmuth, Katharina Kohls |