IEEE Symposium on Security and Privacy A*

64 papers

YearTitle / Authors
20182018 IEEE Symposium on Security and Privacy, SP 2018, Proceedings, 21-23 May 2018, San Francisco, California, USA
2018A Formal Treatment of Accountable Proxying Over TLS.
Karthikeyan Bhargavan, Ioana Boureanu, Antoine Delignat-Lavaud, Pierre-Alain Fouque, Cristina Onete
2018A Machine Learning Approach to Prevent Malicious Calls over Telephony Networks.
Huichen Li, Xiaojun Xu, Chang Liu, Teng Ren, Kun Wu, Xuezhi Cao, Weinan Zhang, Yong Yu, Dawn Song
2018A Tale of Two Studies: The Best and Worst of YubiKey Usability.
Joshua Reynolds, Trevor Smith, Ken Reese, Luke Dickinson, Scott Ruoti, Kent E. Seamons
2018AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation.
Timon Gehr, Matthew Mirman, Dana Drachsler-Cohen, Petar Tsankov, Swarat Chaudhuri, Martin T. Vechev
2018Angora: Efficient Fuzzing by Principled Search.
Peng Chen, Hao Chen
2018Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency - Choose Two.
Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, Aniket Kate
2018Another Flip in the Wall of Rowhammer Defenses.
Daniel Gruss, Moritz Lipp, Michael Schwarz, Daniel Genkin, Jonas Juffinger, Sioli O'Connell, Wolfgang Schoechl, Yuval Yarom
2018Blue Note: How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems.
Connor Bolton, Sara Rampazzi, Chaohao Li, Andrew Kwong, Wenyuan Xu, Kevin Fu
2018Bulletproofs: Short Proofs for Confidential Transactions and More.
Benedikt Bünz, Jonathan Bootle, Dan Boneh, Andrew Poelstra, Pieter Wuille, Gregory Maxwell
2018CollAFL: Path Sensitive Fuzzing.
Shuitao Gan, Chao Zhang, Xiaojun Qin, Xuwen Tu, Kang Li, Zhongyu Pei, Zuoning Chen
2018Compiler-Assisted Code Randomization.
Hyungjoon Koo, Yaohui Chen, Long Lu, Vasileios P. Kemerlis, Michalis Polychronakis
2018Computer Security and Privacy for Refugees in the United States.
Lucy Simko, Ada Lerner, Samia Ibtasam, Franziska Roesner, Tadayoshi Kohno
2018Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks.
Kai Jansen, Matthias Schäfer, Daniel Moser, Vincent Lenders, Christina Pöpper, Jens B. Schmitt
2018DEEPSEC: Deciding Equivalence Properties in Security Protocols Theory and Practice.
Vincent Cheval, Steve Kremer, Itsaka Rakotonirina
2018Distance-Bounding Protocols: Verification without Time and Location.
Sjouke Mauw, Zach Smith, Jorge Toro-Pozo, Rolando Trujillo-Rasua
2018Do You Feel What I Hear? Enabling Autonomous IoT Device Pairing Using Different Sensor Types.
Jun Han, Albert Jin Chung, Manal Kumar Sinha, Madhumitha Harishankar, Shijia Pan, Hae Young Noh, Pei Zhang, Patrick Tague
2018Doubly-Efficient zkSNARKs Without Trusted Setup.
Riad S. Wahby, Ioanna Tzialla, Abhi Shelat, Justin Thaler, Michael Walfish
2018EnclaveDB: A Secure Database Using SGX.
Christian Priebe, Kapil Vaswani, Manuel Costa
2018Enumerating Active IPv6 Hosts for Large-Scale Security Scans via DNSSEC-Signed Reverse Zones.
Kevin Borgolte, Shuang Hao, Tobias Fiebig, Giovanni Vigna
2018EyeTell: Video-Assisted Touchscreen Keystroke Inference from Eye Movements.
Yimin Chen, Tao Li, Rui Zhang, Yanchao Zhang, Terri Hedgpeth
2018FP-STALKER: Tracking Browser Fingerprint Evolutions.
Antoine Vastel, Pierre Laperdrix, Walter Rudametkin, Romain Rouvoy
2018FPGA-Based Remote Power Side-Channel Attacks.
Mark Zhao, G. Edward Suh
2018FuturesMEX: Secure, Distributed Futures Market Exchange.
Fabio Massacci, Chan Nam Ngo, Jing Nie, Daniele Venturi, Julian Williams
2018Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPU.
Pietro Frigo, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi
2018Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes.
Daniel Votipka, Rock Stevens, Elissa M. Redmiles, Jeremy Hu, Michelle L. Mazurek
2018Implementing Conjunction Obfuscation Under Entropic Ring LWE.
David Bruce Cousins, Giovanni Di Crescenzo, Kamil Doruk Gür, Kevin King, Yuriy Polyakov, Kurt Rohloff, Gerard W. Ryan, Erkay Savas
2018Impossibility of Precise and Sound Termination-Sensitive Security Enforcements.
Minh Ngo, Frank Piessens, Tamara Rezk
2018Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage.
Marie-Sarah Lacharité, Brice Minaud, Kenneth G. Paterson
2018Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System.
Yuqi Chen, Christopher M. Poskitt, Jun Sun
2018Locally Differentially Private Frequent Itemset Mining.
Tianhao Wang, Ninghui Li, Somesh Jha
2018Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning.
Matthew Jagielski, Alina Oprea, Battista Biggio, Chang Liu, Cristina Nita-Rotaru, Bo Li
2018Mobile Application Web API Reconnaissance: Web-to-Mobile Inconsistencies & Vulnerabilities.
Abner Mendoza, Guofei Gu
2018Oblix: An Efficient Oblivious Search Index.
Pratyush Mishra, Rishabh Poddar, Jerry Chen, Alessandro Chiesa, Raluca Ada Popa
2018OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding.
Eleftherios Kokoris-Kogias, Philipp Jovanovic, Linus Gasser, Nicolas Gailly, Ewa Syta, Bryan Ford
2018On Enforcing the Digital Immunity of a Large Humanitarian Organization.
Stevens Le Blond, Alejandro Cuevas, Juan Ramón Troncoso-Pastoriza, Philipp Jovanovic, Bryan Ford, Jean-Pierre Hubaux
2018On the Economics of Offline Password Cracking.
Jeremiah Blocki, Benjamin Harsha, Samson Zhou
2018PIR with Compressed Queries and Amortized Query Processing.
Sebastian Angel, Hao Chen, Kim Laine, Srinath T. V. Setty
2018Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels.
Meng Xu, Chenxiong Qian, Kangjie Lu, Michael Backes, Taesoo Kim
2018Privacy Risks with Facebook's PII-Based Targeting: Auditing a Data Broker's Advertising Interface.
Giridhari Venkatadri, Athanasios Andreou, Yabing Liu, Alan Mislove, Krishna P. Gummadi, Patrick Loiseau, Oana Goga
2018Protecting the Stack with Metadata Policies and Tagged Hardware.
Nick Roessler, André DeHon
2018Racing in Hyperspace: Closing Hyper-Threading Side Channels on SGX with Contrived Data Races.
Guoxing Chen, Wenhao Wang, Tianyu Chen, Sanchuan Chen, Yinqian Zhang, Xiaofeng Wang, Ten-Hwang Lai, Dongdai Lin
2018Routing Around Congestion: Defeating DDoS Attacks and Adverse Network Conditions via Reactive BGP Routing.
Jared M. Smith, Max Schuchard
2018Secure Device Bootstrapping Without Secrets Resistant to Signal Manipulation Attacks.
Nirnimesh Ghose, Loukas Lazos, Ming Li
2018Secure Two-party Threshold ECDSA from ECDSA Assumptions.
Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat
2018SoK: "Plug & Pray" Today - Understanding USB Insecurity in Versions 1 Through C.
Jing (Dave) Tian, Nolen Scaife, Deepak Kumar, Michael D. Bailey, Adam Bates, Kevin R. B. Butler
2018SoK: Keylogging Side Channels.
John V. Monaco
2018Sonar: Detecting SS7 Redirection Attacks with Audio-Based Distance Bounding.
Christian Peeters, Hadi Abdullah, Nolen Scaife, Jasmine D. Bowers, Patrick Traynor, Bradley Reaves, Kevin R. B. Butler
2018Speechless: Analyzing the Threat to Speech Privacy from Smartphone Motion Sensors.
S. Abhishek Anand, Nitesh Saxena
2018Static Evaluation of Noninterference Using Approximate Model Counting.
Ziqiao Zhou, Zhiyun Qian, Michael K. Reiter, Yinqian Zhang
2018Stealing Hyperparameters in Machine Learning.
Binghui Wang, Neil Zhenqiang Gong
2018Study and Mitigation of Origin Stripping Vulnerabilities in Hybrid-postMessage Enabled Mobile Applications.
Guangliang Yang, Jeff Huang, Guofei Gu, Abner Mendoza
2018Surveylance: Automatically Detecting Online Survey Scams.
Amin Kharraz, William K. Robertson, Engin Kirda
2018T-Fuzz: Fuzzing by Program Transformation.
Hui Peng, Yan Shoshitaishvili, Mathias Payer
2018The Cards Aren't Alright: Detecting Counterfeit Gift Cards Using Encoding Jitter.
Nolen Scaife, Christian Peeters, Camilo Velez, Hanqing Zhao, Patrick Traynor, David Arnold
2018The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators.
Marten Oltrogge, Erik Derr, Christian Stransky, Yasemin Acar, Sascha Fahl, Christian Rossow, Giancarlo Pellegrino, Sven Bugiel, Michael Backes
2018The Spyware Used in Intimate Partner Violence.
Rahul Chatterjee, Periwinkle Doerfler, Hadas Orgad, Sam Havron, Jackeline Palmer, Diana Freed, Karen Levy, Nicola Dell, Damon McCoy, Thomas Ristenpart
2018Towards Security and Privacy for Multi-user Augmented Reality: Foundations with End Users.
Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner
2018Tracking Certificate Misissuance in the Wild.
Deepak Kumar, Zhengping Wang, Matthew Hyder, Joseph Dickinson, Gabrielle Beck, David Adrian, Joshua Mason, Zakir Durumeric, J. Alex Halderman, Michael D. Bailey
2018Tracking Ransomware End-to-end.
Danny Yuxing Huang, Maxwell Matthaios Aliapoulios, Vector Guo Li, Luca Invernizzi, Elie Bursztein, Kylie McRoberts, Jonathan Levin, Kirill Levchenko, Alex C. Snoeren, Damon McCoy
2018Understanding Linux Malware.
Emanuele Cozzi, Mariano Graziano, Yanick Fratantonio, Davide Balzarotti
2018When Your Fitness Tracker Betrays You: Quantifying the Predictability of Biometric Features Across Contexts.
Simon Eberz, Giulio Lovisotto, Andrea Patane, Marta Kwiatkowska, Vincent Lenders, Ivan Martinovic
2018vRAM: Faster Verifiable RAM with Program-Independent Preprocessing.
Yupeng Zhang, Daniel Genkin, Jonathan Katz, Dimitrios Papadopoulos, Charalampos Papamanthou
2018xJsnark: A Framework for Efficient Verifiable Computation.
Ahmed E. Kosba, Charalampos Papamanthou, Elaine Shi