| 2019 | Adding Linkability to Ring Signatures with One-Time Signatures. Xueli Wang, Yu Chen, Xuecheng Ma |
| 2019 | An Analysis of Malware Trends in Enterprise Networks. Abbas Acar, Long Lu, A. Selcuk Uluagac, Engin Kirda |
| 2019 | Auditable Compressed Storage. Iraklis Leontiadis, Reza Curtmola |
| 2019 | Automated Reconstruction of Control Logic for Programmable Logic Controller Forensics. Syed Ali Qasim, Juan Lopez Jr., Irfan Ahmed |
| 2019 | Barnum: Detecting Document Malware via Control Flow Anomalies in Hardware Traces. Carter Yagemann, Salmin Sultana, Li Chen, Wenke Lee |
| 2019 | Can Today's Machine Learning Pass Image-Based Turing Tests? Apostolis Zarras, Ilias Gerostathopoulos, Daniel Méndez Fernández |
| 2019 | Code-Based Zero Knowledge PRF Arguments. Carlo Brunetta, Bei Liang, Aikaterini Mitrokotsa |
| 2019 | Cryptographic Authentication from the Iris. Sailesh Simhadri, James Steel, Benjamin Fuller |
| 2019 | Cube Cryptanalysis of Round-Reduced ACORN. Jingchun Yang, Meicheng Liu, Dongdai Lin |
| 2019 | Decentralized Evaluation of Quadratic Polynomials on Encrypted Data. Chloé Hébant, Duong Hieu Phan, David Pointcheval |
| 2019 | Full Database Reconstruction with Access and Search Pattern Leakage. Evangelia Anna Markatou, Roberto Tamassia |
| 2019 | Getting Under Alexa's Umbrella: Infiltration Attacks Against Internet Top Domain Lists. Walter Rweyemamu, Tobias Lauinger, Christo Wilson, William K. Robertson, Engin Kirda |
| 2019 | IBWH: An Intermittent Block Withholding Attack with Optimal Mining Reward Rate. Junming Ke, Pawel Szalachowski, Jianying Zhou, Qiuliang Xu, Zheng Yang |
| 2019 | Information Security - 22nd International Conference, ISC 2019, New York City, NY, USA, September 16-18, 2019, Proceedings Zhiqiang Lin, Charalampos Papamanthou, Michalis Polychronakis |
| 2019 | L(a)ying in (Test)Bed - How Biased Datasets Produce Impractical Results for Actual Malware Families' Classification. Tamy Beppler, Marcus Botacin, Fabricio Ceschin, Luiz E. S. Oliveira, André Grégio |
| 2019 | LightSense: A Novel Side Channel for Zero-permission Mobile User Tracking. Quanqi Ye, Yan Zhang, Guangdong Bai, Naipeng Dong, Zhenkai Liang, Jin Song Dong, Haoyu Wang |
| 2019 | Mitigation Techniques for Attacks on 1-Dimensional Databases that Support Range Queries. Evangelia Anna Markatou, Roberto Tamassia |
| 2019 | On New Zero-Knowledge Proofs for Lattice-Based Group Signatures with Verifier-Local Revocation. Yanhua Zhang, Yupu Hu, Qikun Zhang, Huiwen Jia |
| 2019 | PD-ML-Lite: Private Distributed Machine Learning from Lightweight Cryptography. Maksim Tsikhanovich, Malik Magdon-Ismail, Muhammad Ishaq, Vassilis Zikas |
| 2019 | Robust Covert Channels Based on DRAM Power Consumption. Thales Bandiera Paiva, Javier Navaridas, Routo Terada |
| 2019 | Robust Distributed Pseudorandom Functions for mNP Access Structures. Bei Liang, Aikaterini Mitrokotsa |
| 2019 | Secure Stern Signatures in Quantum Random Oracle Model. Hanwen Feng, Jianwei Liu, Qianhong Wu |
| 2019 | Truth in Web Mining: Measuring the Profitability and the Imposed Overheads of Cryptojacking. Panagiotis Papadopoulos, Panagiotis Ilia, Evangelos P. Markatos |
| 2019 | When the Attacker Knows a Lot: The GAGA Graph Anonymizer. Arash Alavi, Rajiv Gupta, Zhiyun Qian |