IEEE Symposium on Security and Privacy A*

61 papers

YearTitle / Authors
20172017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017
2017A Framework for Universally Composable Diffie-Hellman Key Exchange.
Ralf Küsters, Daniel Rausch
2017A Lustrum of Malware Network Communication: Evolution and Insights.
Chaz Lever, Platon Kotzias, Davide Balzarotti, Juan Caballero, Manos Antonakakis
2017An Experimental Security Analysis of an Industrial Robot Controller.
Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, Andrea Maria Zanchettin, Stefano Zanero
2017Augur: Internet-Wide Detection of Connectivity Disruptions.
Paul Pearce, Roya Ensafi, Frank Li, Nick Feamster, Vern Paxson
2017Backward-Bounded DSE: Targeting Infeasibility Questions on Obfuscated Codes.
Sébastien Bardin, Robin David, Jean-Yves Marion
2017CRLite: A Scalable System for Pushing All TLS Revocations to All Browsers.
James Larisch, David R. Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo Wilson
2017Catena: Efficient Non-equivocation via Bitcoin.
Alin Tomescu, Srinivas Devadas
2017Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop.
Yanick Fratantonio, Chenxiong Qian, Simon P. Chung, Wenke Lee
2017CoSMeDis: A Distributed Social Media Platform with Formally Verified Confidentiality Guarantees.
Thomas Bauereiß, Armando Pesenti Gritti, Andrei Popescu, Franco Raimondi
2017Comparing the Usability of Cryptographic APIs.
Yasemin Acar, Michael Backes, Sascha Fahl, Simson L. Garfinkel, Doowon Kim, Michelle L. Mazurek, Christian Stransky
2017Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks.
Yixin Sun, Anne Edmundson, Nick Feamster, Mung Chiang, Prateek Mittal
2017Cryptographic Function Detection in Obfuscated Binaries via Bit-Precise Symbolic Loop Mapping.
Dongpeng Xu, Jiang Ming, Dinghao Wu
2017Finding and Preventing Bugs in JavaScript Bindings.
Fraser Brown, Shravan Narayan, Riad S. Wahby, Dawson R. Engler, Ranjit Jhala, Deian Stefan
2017From Trash to Treasure: Timing-Sensitive Garbage Collection.
Mathias V. Pedersen, Aslan Askarov
2017HVLearn: Automated Black-Box Analysis of Hostname Verification in SSL/TLS Implementations.
Suphannee Sivakorn, George Argyros, Kexin Pei, Angelos D. Keromytis, Suman Jana
2017Hardening Java's Access Control by Abolishing Implicit Privilege Elevation.
Philipp Holzinger, Ben Hermann, Johannes Lerch, Eric Bodden, Mira Mezini
2017Hijacking Bitcoin: Routing Attacks on Cryptocurrencies.
Maria Apostolaki, Aviv Zohar, Laurent Vanbever
2017How They Did It: An Analysis of Emission Defeat Devices in Modern Automobiles.
Moritz Contag, Vector Guo Li, Andre Pawlowski, Felix Domke, Kirill Levchenko, Thorsten Holz, Stefan Savage
2017How to Learn Klingon without a Dictionary: Detection and Measurement of Black Keywords Used by the Underground Economy.
Hao Yang, Xiulin Ma, Kun Du, Zhou Li, Hai-Xin Duan, Xiaodong Su, Guang Liu, Zhifeng Geng, Jianping Wu
2017IKP: Turning a PKI Around with Decentralized Automated Incentives.
Stephanos Matsumoto, Raphael M. Reischuk
2017IVD: Automatic Learning and Enforcement of Authorization Rules in Online Social Networks.
Paul Marinescu, Chad Parry, Marjori Pomarole, Yuan Tian, Patrick Tague, Ioannis Papagiannis
2017Identifying Personal DNA Methylation Profiles by Genotype Inference.
Michael Backes, Pascal Berrang, Matthias Bieg, Roland Eils, Carl Herrmann, Mathias Humbert, Irina Lehmann
2017Implementing and Proving the TLS 1.3 Record Layer.
Antoine Delignat-Lavaud, Cédric Fournet, Markulf Kohlweiss, Jonathan Protzenko, Aseem Rastogi, Nikhil Swamy, Santiago Zanella-Béguelin, Karthikeyan Bhargavan, Jianyang Pan, Jean Karim Zinzindohoue
2017IoT Goes Nuclear: Creating a ZigBee Chain Reaction.
Eyal Ronen, Adi Shamir, Achi-Or Weingarten, Colin O'Flynn
2017Is Interaction Necessary for Distributed Private Learning?
Adam D. Smith, Abhradeep Thakurta, Jalaj Upadhyay
2017Leakage-Abuse Attacks against Order-Revealing Encryption.
Paul Grubbs, Kevin Sekniqi, Vincent Bindschaedler, Muhammad Naveed, Thomas Ristenpart
2017Machine-Checked Proofs of Privacy for Electronic Voting Protocols.
Véronique Cortier, Constantin Catalin Dragan, François Dupressoir, Benedikt Schmidt, Pierre-Yves Strub, Bogdan Warinschi
2017Membership Inference Attacks Against Machine Learning Models.
Reza Shokri, Marco Stronati, Congzheng Song, Vitaly Shmatikov
2017Multi-touch Authentication Using Hand Geometry and Behavioral Information.
Yunpeng Song, Zhongmin Cai, Zhi-Li Zhang
2017NEZHA: Efficient Domain-Independent Differential Testing.
Theofilos Petsios, Adrian Tang, Salvatore J. Stolfo, Angelos D. Keromytis, Suman Jana
2017NORAX: Enabling Execute-Only Memory for COTS Binaries on AArch64.
Yaohui Chen, Dongli Zhang, Ruowen Wang, Rui Qiao, Ahmed M. Azab, Long Lu, Hayawardh Vijayakumar, Wenbo Shen
2017Obstacles to the Adoption of Secure Communication Tools.
Ruba Abu-Salma, M. Angela Sasse, Joseph Bonneau, Anastasia Danilova, Alena Naiakshina, Matthew Smith
2017One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation.
Jan Camenisch, Liqun Chen, Manu Drijvers, Anja Lehmann, David Novick, Rainer Urian
2017Optimized Honest-Majority MPC for Malicious Adversaries - Breaking the 1 Billion-Gate Per Second Barrier.
Toshinori Araki, Assi Barak, Jun Furukawa, Tamar Lichter, Yehuda Lindell, Ariel Nof, Kazuma Ohara, Adi Watzman, Or Weinstein
2017Protecting Bare-Metal Embedded Systems with Privilege Overlays.
Abraham A. Clements, Naif Saleh Almakhdhub, Khaled Saab, Prashast Srivastava, Jinkyu Koo, Saurabh Bagchi, Mathias Payer
2017Pyramid: Enhancing Selectivity in Big Data Protection with Count Featurization.
Mathias Lécuyer, Riley Spahn, Roxana Geambasu, Tzu-Kuo Huang, Siddhartha Sen
2017Scalable Bias-Resistant Distributed Randomness.
Ewa Syta, Philipp Jovanovic, Eleftherios Kokoris-Kogias, Nicolas Gailly, Linus Gasser, Ismail Khoffi, Michael J. Fischer, Bryan Ford
2017SecureML: A System for Scalable Privacy-Preserving Machine Learning.
Payman Mohassel, Yupeng Zhang
2017Securing Augmented Reality Output.
Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner
2017Side-Channel Attacks on Shared Search Indexes.
Liang Wang, Paul Grubbs, Jiahui Lu, Vincent Bindschaedler, David Cash, Thomas Ristenpart
2017Skyfire: Data-Driven Seed Generation for Fuzzing.
Junjie Wang, Bihuan Chen, Lei Wei, Yang Liu
2017SmarPer: Context-Aware and Automatic Runtime-Permissions for Mobile Devices.
Katarzyna Olejnik, Italo Dacosta, Joana Soares Machado, Kévin Huguenin, Mohammad Emtiyaz Khan, Jean-Pierre Hubaux
2017SoK: Cryptographically Protected Database Search.
Benjamin Fuller, Mayank Varia, Arkady Yerukhimovich, Emily Shen, Ariel Hamlin, Vijay Gadepally, Richard Shay, John Darby Mitchell, Robert K. Cunningham
2017SoK: Exploiting Network Printers.
Jens Müller, Vladislav Mladenov, Juraj Somorovsky, Jörg Schwenk
2017SoK: Science, Security and the Elusive Goal of Security as a Scientific Pursuit.
Cormac Herley, Paul C. van Oorschot
2017Spotless Sandboxes: Evading Malware Analysis Systems Using Wear-and-Tear Artifacts.
Najmeh Miramirkhani, Mahathi Priya Appini, Nick Nikiforakis, Michalis Polychronakis
2017Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security.
Felix Fischer, Konstantin Böttinger, Huang Xiao, Christian Stransky, Yasemin Acar, Michael Backes, Sascha Fahl
2017SymCerts: Practical Symbolic Execution for Exposing Noncompliance in X.509 Certificate Validation Implementations.
Sze Yiu Chau, Omar Chowdhury, Md. Endadul Hoque, Huangyi Ge, Aniket Kate, Cristina Nita-Rotaru, Ninghui Li
2017SysPal: System-Guided Pattern Locks for Android.
Geumhwan Cho, Jun Ho Huh, Junsung Cho, Seongyeol Oh, Youngbae Song, Hyoungshick Kim
2017The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences.
Primal Wijesekera, Arjun Baokar, Lynn Tsai, Joel Reardon, Serge Egelman, David A. Wagner, Konstantin Beznosov
2017The Password Reset MitM Attack.
Nethanel Gelernter, Senia Kalma, Bar Magnezi, Hen Porcilan
2017To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild.
Brown Farinholt, Mohammad Rezaeirad, Paul Pearce, Hitesh Dharmdasani, Haikuo Yin, Stevens Le Blond, Damon McCoy, Kirill Levchenko
2017Towards Evaluating the Robustness of Neural Networks.
Nicholas Carlini, David A. Wagner
2017Under the Shadow of Sunshine: Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider Networks.
Sumayah A. Alrwais, Xiaojing Liao, Xianghang Mi, Peng Wang, Xiaofeng Wang, Feng Qian, Raheem A. Beyah, Damon McCoy
2017VUDDY: A Scalable Approach for Vulnerable Code Clone Discovery.
Seulbae Kim, Seunghoon Woo, Heejo Lee, Hakjoo Oh
2017Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate.
Karthikeyan Bhargavan, Bruno Blanchet, Nadim Kobeissi
2017Verifying and Synthesizing Constant-Resource Implementations with Types.
Van Chan Ngo, Mario Dehesa-Azuara, Matthew Fredrikson, Jan Hoffmann
2017XHOUND: Quantifying the Fingerprintability of Browser Extensions.
Oleksii Starov, Nick Nikiforakis
2017Your Exploit is Mine: Automatic Shellcode Transplant for Remote Exploits.
Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, David Brumley
2017vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases.
Yupeng Zhang, Daniel Genkin, Jonathan Katz, Dimitrios Papadopoulos, Charalampos Papamanthou