| 2020 | 23rd International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2020, San Sebastian, Spain, October 14-15, 2020 Manuel Egele, Leyla Bilge |
| 2020 | A Framework for Software Diversification with ISA Heterogeneity. Xiaoguang Wang, Sengming Yeoh, Robert Lyerly, Pierre Olivier, Sang-Hoon Kim, Binoy Ravindran |
| 2020 | An Object Detection based Solver for Google's Image reCAPTCHA v2. Md. Imran Hossen, Yazhou Tu, Md Fazle Rabby, Md. Nazmul Islam, Hui Cao, Xiali Hei |
| 2020 | Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities. Manh-Dung Nguyen, Sébastien Bardin, Richard Bonichon, Roland Groz, Matthieu Lemerre |
| 2020 | BlueShield: Detecting Spoofing Attacks in Bluetooth Low Energy Networks. Jianliang Wu, Yuhong Nan, Vireshwar Kumar, Mathias Payer, Dongyan Xu |
| 2020 | Camera Fingerprinting Authentication Revisited. Dominik Christian Maier, Henrik Erb, Patrick Mullan, Vincent Haupert |
| 2020 | Confine: Automated System Call Policy Generation for Container Attack Surface Reduction. Seyedhamed Ghavamnia, Tapti Palit, Azzedine Benameur, Michalis Polychronakis |
| 2020 | Cyber Threat Intelligence Modeling Based on Heterogeneous Graph Convolutional Network. Jun Zhao, Qiben Yan, Xudong Liu, Bo Li, Guangsheng Zuo |
| 2020 | Dark Firmware: A Systematic Approach to Exploring Application Security Risks in the Presence of Untrusted Firmware. Duha Ibdah, Nada Lachtar, Abdulrahman Abu Elkhail, Anys Bacha, Hafiz Malik |
| 2020 | Detecting Lateral Movement in Enterprise Computer Networks with Unsupervised Graph AI. Benjamin Bowman, Craig Laprade, Yuede Ji, H. Howie Huang |
| 2020 | Effective Detection of Credential Thefts from Windows Memory: Learning Access Behaviours to Local Security Authority Subsystem Service. Patrick Ah-Fat, Michael Huth, Rob Mead, Tim Burrell, Joshua Neil |
| 2020 | EnclavePDP: A General Framework to Verify Data Integrity in Cloud Using Intel SGX. Yun He, Yihua Xu, Xiaoqi Jia, Shengzhi Zhang, Peng Liu, Shuai Chang |
| 2020 | Evaluating Changes to Fake Account Verification Systems. Fedor Kozlov, Isabella Yuen, Jakub Kowalczyk, Daniel Bernhardt, David Freeman, Paul Pearce, Ivan Ivanov |
| 2020 | Evasion Attacks against Banking Fraud Detection Systems. Michele Carminati, Luca Santini, Mario Polino, Stefano Zanero |
| 2020 | GhostImage: Remote Perception Attacks against Camera-based Image Classification Systems. Yanmao Man, Ming Li, Ryan M. Gerdes |
| 2020 | HyperLeech: Stealthy System Virtualization with Minimal Target Impact through DMA-Based Hypervisor Injection. Ralph Palutke, Simon Ruderich, Matthias Wild, Felix C. Freiling |
| 2020 | MEUZZ: Smart Seed Scheduling for Hybrid Fuzzing. Yaohui Chen, Mansour Ahmadi, Reza Mirzazade Farkhani, Boyu Wang, Long Lu |
| 2020 | Mininode: Reducing the Attack Surface of Node.js Applications. Igibek Koishybayev, Alexandros Kapravelos |
| 2020 | Never Trust Your Victim: Weaponizing Vulnerabilities in Security Scanners. Andrea Valenza, Gabriele Costa, Alessandro Armando |
| 2020 | PLC-Sleuth: Detecting and Localizing PLC Intrusions Using Control Invariants. Zeyu Yang, Liang He, Peng Cheng, Jiming Chen, David K. Y. Yau, Linkang Du |
| 2020 | Robust P2P Primitives Using SGX Enclaves. Yaoqi Jia, Shruti Tople, Tarik Moataz, Deli Gong, Prateek Saxena, Zhenkai Liang |
| 2020 | SIEVE: Secure In-Vehicle Automatic Speech Recognition Systems. Shu Wang, Jiahao Cao, Kun Sun, Qi Li |
| 2020 | Software-based Realtime Recovery from Sensor Attacks on Robotic Vehicles. Hongjun Choi, Sayali Kate, Yousra Aafer, Xiangyu Zhang, Dongyan Xu |
| 2020 | SourceFinder: Finding Malware Source-Code from Publicly Available Repositories in GitHub. Md Omar Faruk Rokon, Risul Islam, Ahmad Darki, Evangelos E. Papalexakis, Michalis Faloutsos |
| 2020 | SpecROP: Speculative Exploitation of ROP Chains. Atri Bhattacharyya, Andrés Sánchez, Esmaeil Mohammadian Koruyeh, Nael B. Abu-Ghazaleh, Chengyu Song, Mathias Payer |
| 2020 | The Limitations of Federated Learning in Sybil Settings. Clement Fung, Chris J. M. Yoon, Ivan Beschastnikh |
| 2020 | Tracing and Analyzing Web Access Paths Based on User-Side Data Collection: How Do Users Reach Malicious URLs? Takeshi Takahashi, Christopher Kruegel, Giovanni Vigna, Katsunari Yoshioka, Daisuke Inoue |
| 2020 | WearFlow: Expanding Information Flow Analysis To Companion Apps in Wear OS. Marcos Tileria, Jorge Blasco, Guillermo Suarez-Tangil |
| 2020 | What's in an Exploit? An Empirical Analysis of Reflected Server XSS Exploitation Techniques. Ahmet Salih Buyukkayhan, Can Gemicioglu, Tobias Lauinger, Alina Oprea, William Robertson, Engin Kirda |
| 2020 | aBBRate: Automating BBR Attack Exploration Using a Model-Based Approach. Anthony Peterson, Samuel Jero, Md. Endadul Hoque, David R. Choffnes, Cristina Nita-Rotaru |
| 2020 | sysfilter: Automated System Call Filtering for Commodity Software. Nicholas DeMarinis, Kent Williams-King, Di Jin, Rodrigo Fonseca, Vasileios P. Kemerlis |
| 2020 | μSBS: Static Binary Sanitization of Bare-metal Embedded Devices for Fault Observability. Majid Salehi, Danny Hughes, Bruno Crispo |