SP A*

115 papers

YearTitle / Authors
202142nd IEEE Symposium on Security and Privacy, SP 2021, San Francisco, CA, USA, 24-27 May 2021
2021A
Erkan Tairi, Pedro Moreno-Sanchez, Matteo Maffei
2021A Decentralized and Encrypted National Gun Registry.
Seny Kamara, Tarik Moataz, Andrew Park, Lucy Qin
2021A First Look at Zoombombing.
Chen Ling, Utkucan Balci, Jeremy Blackburn, Gianluca Stringhini
2021A Novel Dynamic Analysis Infrastructure to Instrument Untrusted Execution Flow Across User-Kernel Spaces.
Jiaqi Hong, Xuhua Ding
2021A Secure and Formally Verified Linux KVM Hypervisor.
Shih-Wei Li, Xupeng Li, Ronghui Gu, Jason Nieh, John Zhuang Hui
2021A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer.
Antoine Delignat-Lavaud, Cédric Fournet, Bryan Parno, Jonathan Protzenko, Tahina Ramananandro, Jay Bosamiya, Joseph Lallemand, Itsaka Rakotonirina, Yi Zhou
2021ARBITRAR: User-Guided API Misuse Detection.
Ziyang Li, Aravind Machiry, Binghong Chen, Mayur Naik, Ke Wang, Le Song
2021Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding.
Sahar Abdelnabi, Mario Fritz
2021Adversary Instantiation: Lower Bounds for Differentially Private Machine Learning.
Milad Nasr, Shuang Song, Abhradeep Thakurta, Nicolas Papernot, Nicholas Carlini
2021An I/O Separation Model for Formal Verification of Kernel Implementations.
Miao Yu, Virgil D. Gligor, Limin Jia
2021An Interactive Prover for Protocol Verification in the Computational Model.
David Baelde, Stéphanie Delaune, Charlie Jacomme, Adrien Koutsos, Solène Moreau
2021Android Custom Permissions Demystified: From Privilege Escalation to Design Shortcomings.
Rui Li, Wenrui Diao, Zhou Li, Jianqi Du, Shanqing Guo
2021BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures.
Cas Cremers, Samed Düzlü, Rune Fiedler, Marc Fischlin, Christian Janson
2021Bitcoin-Compatible Virtual Channels.
Lukas Aumayr, Matteo Maffei, Oguzhan Ersoy, Andreas Erwig, Sebastian Faust, Siavash Riahi, Kristina Hostáková, Pedro Moreno-Sanchez
2021Black Widow: Blackbox Data-driven Web Scanning.
Benjamin Eriksson, Giancarlo Pellegrino, Andrei Sabelfeld
2021Bomberman: Defining and Defeating Hardware Ticking Timebombs at Design-time.
Timothy Trippel, Kang G. Shin, Kevin B. Bush, Matthew Hicks
2021Bookworm Game: Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis.
Yi Chen, Yepeng Yao, Xiaofeng Wang, Dandan Xu, Chang Yue, Xiaozhong Liu, Kai Chen, Haixu Tang, Baoxu Liu
2021Breaking the Specification: PDF Certification.
Simon Rohlmann, Vladislav Mladenov, Christian Mainka, Jörg Schwenk
2021CANNON: Reliable and Stealthy Remote Shutdown Attacks via Unaltered Automotive Microcontrollers.
Sekar Kulandaivel, Shalabh Jain, Jorge Guajardo, Vyas Sekar
2021CRYLOGGER: Detecting Crypto Misuses Dynamically.
Luca Piccolboni, Giuseppe Di Guglielmo, Luca P. Carloni, Simha Sethumadhavan
2021CacheOut: Leaking Data on Intel CPUs via Cache Evictions.
Stephan van Schaik, Marina Minkin, Andrew Kwong, Daniel Genkin, Yuval Yarom
2021CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability.
Deepak Maram, Harjasleen Malvai, Fan Zhang, Nerla Jean-Louis, Alexander Frolov, Tyler Kell, Tyrone Lobban, Christine Moy, Ari Juels, Andrew Miller
2021Co-Inflow: Coarse-grained Information Flow Control for Java-like Languages.
Jian Xiang, Stephen Chong
2021Compact Certificates of Collective Knowledge.
Silvio Micali, Leonid Reyzin, Georgios Vlachos, Riad S. Wahby, Nickolai Zeldovich
2021Compositional Non-Interference for Fine-Grained Concurrent Programs.
Dan Frumin, Robbert Krebbers, Lars Birkedal
2021Compositional Security for Reentrant Applications.
Ethan Cecchetti, Siqiu Yao, Haobin Ni, Andrew C. Myers
2021ConDySTA: Context-Aware Dynamic Supplement to Static Taint Analysis.
Xueling Zhang, Xiaoyin Wang, Rocky Slavin, Jianwei Niu
2021CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing.
Penghui Zhang, Adam Oest, Haehyun Cho, Zhibo Sun, RC Johnson, Brad Wardman, Shaown Sarker, Alexandros Kapravelos, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn
2021Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More).
Amit Klein
2021Cross-Domain Access Control Encryption: Arbitrary-policy, Constant-size, Efficient.
Xiuhua Wang, Sherman S. M. Chow
2021CrossTalk: Speculative Data Leaks Across Cores Are Real.
Hany Ragab, Alyssa Milburn, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida
2021CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU.
Sijun Tan, Brian Knott, Yuan Tian, David J. Wu
2021DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis.
Alejandro Mera, Bo Feng, Long Lu, Engin Kirda
2021DP-Sniper: Black-Box Discovery of Differential Privacy Violations using Classifiers.
Benjamin Bichsel, Samuel Steffen, Ilija Bogunovic, Martin T. Vechev
2021Data Privacy in Trigger-Action Systems.
Yunang Chen, Amrita Roy Chowdhury, Ruizhe Wang, Andrei Sabelfeld, Rahul Chatterjee, Earlence Fernandes
2021Defensive Technology Use by Political Activists During the Sudanese Revolution.
Alaa Daffalla, Lucy Simko, Tadayoshi Kohno, Alexandru G. Bardas
2021Detecting AI Trojans Using Meta Neural Analysis.
Xiaojun Xu, Qi Wang, Huichen Li, Nikita Borisov, Carl A. Gunter, Bo Li
2021Detecting Filter List Evasion with Event-Loop-Turn Granularity JavaScript Signatures.
Quan Chen, Peter Snyder, Ben Livshits, Alexandros Kapravelos
2021Diane: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices.
Nilo Redini, Andrea Continella, Dipanjan Das, Giulio De Pasquale, Noah Spahn, Aravind Machiry, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna
2021Did you mix me? Formally Verifying Verifiable Mix Nets in Electronic Voting.
Thomas Haines, Rajeev Goré, Bhavesh Sharma
2021DifuzzRTL: Differential Fuzz Testing to Find CPU Bugs.
Jaewon Hur, Suhwan Song, Dongup Kwon, Eunjin Baek, Jangwoo Kim, Byoungyoung Lee
2021Diogenes: Lightweight Scalable RSA Modulus Generation with a Dishonest Majority.
Megan Chen, Carmit Hazay, Yuval Ishai, Yuriy Kashnikov, Daniele Micciancio, Tarik Riviere, Abhi Shelat, Muthuramakrishnan Venkitasubramaniam, Ruihan Wang
2021Doing good by fighting fraud: Ethical anti-fraud systems for mobile payments.
Zain ul Abi Din, Hari Venugopalan, Henry Lin, Adam Wushensky, Steven Liu, Samuel T. King
2021DynPTA: Combining Static and Dynamic Analysis for Practical Selective Data Protection.
Tapti Palit, Jarin Firose Moon, Fabian Monrose, Michalis Polychronakis
2021Ebb-and-Flow Protocols: A Resolution of the Availability-Finality Dilemma.
Joachim Neu, Ertem Nusret Tas, David Tse
2021Epochal Signatures for Deniable Group Chats.
Andreas Hülsing, Florian Weber
2021Fingerprinting the Fingerprinters: Learning to Detect Browser Fingerprinting Behaviors.
Umar Iqbal, Steven Englehardt, Zubair Shafiq
2021Good Bot, Bad Bot: Characterizing Automated Browsing Activity.
Xigao Li, Babak Amin Azad, Amir Rahmati, Nick Nikiforakis
2021HackEd: A Pedagogical Analysis of Online Vulnerability Discovery Exercises.
Daniel Votipka, Eric Zhang, Michelle L. Mazurek
2021Happer: Unpacking Android Apps via a Hardware-Assisted Approach.
Lei Xue, Hao Zhou, Xiapu Luo, Yajin Zhou, Yang Shi, Guofei Gu, Fengwei Zhang, Man Ho Au
2021Hardware-Software Contracts for Secure Speculation.
Marco Guarnieri, Boris Köpf, Jan Reineke, Pepe Vila
2021Hear "No Evil", See "Kenansville"*: Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems.
Hadi Abdullah, Muhammad Sajidur Rahman, Washington Garcia, Kevin Warren, Anurag Swarnim Yadav, Tom Shrimpton, Patrick Traynor
2021High-Assurance Cryptography in the Spectre Era.
Gilles Barthe, Sunjay Cauligi, Benjamin Grégoire, Adrien Koutsos, Kevin Liao, Tiago Oliveira, Swarn Priya, Tamara Rezk, Peter Schwabe
2021High-Frequency Trading on Decentralized On-Chain Exchanges.
Liyi Zhou, Kaihua Qin, Christof Ferreira Torres, Duc Viet Le, Arthur Gervais
2021How Did That Get In My Phone? Unwanted App Distribution on Android Devices.
Platon Kotzias, Juan Caballero, Leyla Bilge
2021Improving Password Guessing via Representation Learning.
Dario Pasquini, Ankit Gangwal, Giuseppe Ateniese, Massimo Bernaschi, Mauro Conti
2021Invisible Probe: Timing Attacks with PCIe Congestion Side-channel.
Mingtian Tan, Junpeng Wan, Zhe Zhou, Zhou Li
2021Invisible for both Camera and LiDAR: Security of Multi-Sensor Fusion based Perception in Autonomous Driving Under Physical-World Attacks.
Yulong Cao, Ningfei Wang, Chaowei Xiao, Dawei Yang, Jin Fang, Ruigang Yang, Qi Alfred Chen, Mingyan Liu, Bo Li
2021Is Private Learning Possible with Instance Encoding?
Nicholas Carlini, Samuel Deng, Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Abhradeep Thakurta, Florian Tramèr
2021Keep the Dirt: Tainted TreeKEM, Adaptively and Actively Secure Continuous Group Key Agreement.
Karen Klein, Guillermo Pascual-Perez, Michael Walter, Chethan Kamath, Margarita Capretto, Miguel Cueto, Ilia Markov, Michelle Yeo, Joël Alwen, Krzysztof Pietrzak
2021Learning Differentially Private Mechanisms.
Subhajit Roy, Justin Hsu, Aws Albarghouthi
2021Lightweight Techniques for Private Heavy Hitters.
Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai
2021Linking Bluetooth LE & Classic and Implications for Privacy-Preserving Bluetooth-Based Protocols.
Norbert Ludant, Tien Dang Vo-Huu, Sashank Narain, Guevara Noubir
2021Lockable Signatures for Blockchains: Scriptless Scripts for All Signatures.
Sri Aravinda Krishnan Thyagarajan, Giulio Malavolta
2021MAD-HTLC: Because HTLC is Crazy-Cheap to Attack.
Itay Tsabary, Matan Yechieli, Alex Manuskin, Ittay Eyal
2021Machine Unlearning.
Lucas Bourtoule, Varun Chandrasekaran, Christopher A. Choquette-Choo, Hengrui Jia, Adelin Travers, Baiwu Zhang, David Lie, Nicolas Papernot
2021Manipulation Attacks in Local Differential Privacy.
Albert Cheu, Adam D. Smith, Jonathan R. Ullman
2021Many-out-of-Many Proofs and Applications to Anonymous Zether.
Benjamin E. Diamond
2021Merkle
Yuncong Hu, Kian Hooshmand, Harika Kalidhindi, Seung Jin Yang, Raluca Ada Popa
2021Method Confusion Attack on Bluetooth Pairing.
Maximilian von Tschirschnitz, Ludwig Peuckert, Fabian Franzen, Jens Grossklags
2021NtFuzz: Enabling Type-Aware Kernel Fuzzing on Windows with Static Binary Analysis.
Jaeseung Choi, Kangsu Kim, Daejin Lee, Sang Kil Cha
2021OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary.
Zhuo Zhang, Yapeng Ye, Wei You, Guanhong Tao, Wen-Chuan Lee, Yonghwi Kwon, Yousra Aafer, Xiangyu Zhang
2021On the Anonymity Guarantees of Anonymous Proof-of-Stake Protocols.
Markulf Kohlweiss, Varun Madathil, Kartik Nayak, Alessandra Scafuro
2021On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols.
Liyi Zhou, Kaihua Qin, Antoine Cully, Benjamin Livshits, Arthur Gervais
2021One Engine to Fuzz 'em All: Generic Language Processor Testing with Semantic Validation.
Yongheng Chen, Rui Zhong, Hong Hu, Hangfan Zhang, Yupeng Yang, Dinghao Wu, Wenke Lee
2021PEGASUS: Bridging Polynomial and Non-polynomial Evaluations in Homomorphic Encryption.
Wen-jie Lu, Zhicong Huang, Cheng Hong, Yiping Ma, Hunter Qu
2021PLATYPUS: Software-based Power Side-Channel Attacks on x86.
Moritz Lipp, Andreas Kogler, David F. Oswald, Michael Schwarz, Catherine Easdon, Claudio Canella, Daniel Gruss
2021Poltergeist: Acoustic Adversarial Machine Learning against Cameras and Computer Vision.
Xiaoyu Ji, Yushi Cheng, Yuepeng Zhang, Kai Wang, Chen Yan, Wenyuan Xu, Kevin Fu
2021Post-quantum WireGuard.
Andreas Hülsing, Kai-Chun Ning, Peter Schwabe, Florian Weber, Philip R. Zimmermann
2021Proof-of-Learning: Definitions and Practice.
Hengrui Jia, Mohammad Yaghini, Christopher A. Choquette-Choo, Natalie Dullerud, Anvith Thudi, Varun Chandrasekaran, Nicolas Papernot
2021Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks! But We Can Fix It.
Wei Song, Boya Li, Zihan Xue, Zhenzhen Li, Wenhao Wang, Peng Liu
2021Reading Between the Lines: An Extensive Evaluation of the Security and Privacy Implications of EPUB Reading Systems.
Gertjan Franken, Tom van Goethem, Wouter Joosen
2021Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model.
Thilo Krachenfels, Fatemeh Ganji, Amir Moradi, Shahin Tajik, Jean-Pierre Seifert
2021Red Belly: A Secure, Fair and Scalable Open Blockchain.
Tyler Crain, Christopher Natoli, Vincent Gramoli
2021Refresh When You Wake Up: Proactive Threshold Wallets with Offline Devices.
Yashvanth Kondi, Bernardo Magri, Claudio Orlandi, Omer Shlomovits
2021Response-Hiding Encrypted Ranges: Revisiting Security via Parametrized Leakage-Abuse Attacks.
Evgenios M. Kornaropoulos, Charalampos Papamanthou, Roberto Tamassia
2021Revealer: Detecting and Exploiting Regular Expression Denial-of-Service Vulnerabilities.
Yinxi Liu, Mingxue Zhang, Wei Meng
2021Runtime Recovery of Web Applications under Zero-Day ReDoS Attacks.
Zhihao Bai, Ke Wang, Hang Zhu, Yinzhi Cao, Xin Jin
2021SGUARD: Towards Fixing Vulnerable Smart Contracts Automatically.
Tai D. Nguyen, Long H. Pham, Jun Sun
2021Self-Supervised Euphemism Detection and Identification for Content Moderation.
Wanzheng Zhu, Hongyu Gong, Rohan Bansal, Zachary Weinberg, Nicolas Christin, Giulia Fanti, Suma Bhat
2021SiRnn: A Math Library for Secure RNN Inference.
Deevashwer Rathee, Mayank Rathee, Rahul Kranti Kiran Goli, Divya Gupta, Rahul Sharma, Nishanth Chandran, Aseem Rastogi
2021SmartPulse: Automated Checking of Temporal Properties in Smart Contracts.
Jon Stephens, Kostas Ferles, Benjamin Mariano, Shuvendu K. Lahiri, Isil Dillig
2021SoK: All You Ever Wanted to Know About x86/x64 Binary Disassembly But Were Afraid to Ask.
Chengbin Pang, Ruotong Yu, Yaohui Chen, Eric Koskinen, Georgios Portokalidis, Bing Mao, Jun Xu
2021SoK: Computer-Aided Cryptography.
Manuel Barbosa, Gilles Barthe, Karthik Bhargavan, Bruno Blanchet, Cas Cremers, Kevin Liao, Bryan Parno
2021SoK: Fully Homomorphic Encryption Compilers.
Alexander Viand, Patrick Jattke, Anwar Hithnawi
2021SoK: Hate, Harassment, and the Changing Landscape of Online Abuse.
Kurt Thomas, Devdatta Akhawe, Michael D. Bailey, Dan Boneh, Elie Bursztein, Sunny Consolvo, Nicola Dell, Zakir Durumeric, Patrick Gage Kelley, Deepak Kumar, Damon McCoy, Sarah Meiklejohn, Thomas Ristenpart, Gianluca Stringhini
2021SoK: Quantifying Cyber Risk.
Daniel W. Woods, Rainer Böhme
2021SoK: Security and Privacy in the Age of Commercial Drones.
Ben Nassi, Ron Bitton, Ryusuke Masuoka, Asaf Shabtai, Yuval Elovici
2021SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems.
Hadi Abdullah, Kevin Warren, Vincent Bindschaedler, Nicolas Papernot, Patrick Traynor
2021StochFuzz: Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting.
Zhuo Zhang, Wei You, Guanhong Tao, Yousra Aafer, Xuwei Liu, Xiangyu Zhang
2021Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land.
Frederick Barr-Smith, Xabier Ugarte-Pedrero, Mariano Graziano, Riccardo Spolaor, Ivan Martinovic
2021Systematic Analysis of Randomization-based Protected Cache Architectures.
Antoon Purnal, Lukas Giner, Daniel Gruss, Ingrid Verbauwhede
2021The EMV Standard: Break, Fix, Verify.
David A. Basin, Ralf Sasse, Jorge Toro-Pozo
2021The Provable Security of Ed25519: Theory and Practice.
Jacqueline Brendel, Cas Cremers, Dennis Jackson, Mang Zhao
2021They Would do Better if They Worked Together: The Case of Interaction Problems Between Password Managers and Websites.
Nicolas Huaman, Sabrina Amft, Marten Oltrogge, Yasemin Acar, Sascha Fahl
2021Trouble Over-The-Air: An Analysis of FOTA Apps in the Android Ecosystem.
Eduardo Blázquez, Sergio Pastrana, Álvaro Feal, Julien Gamba, Platon Kotzias, Narseo Vallina-Rodriguez, Juan Tapiador
2021Trust, But Verify: A Longitudinal Analysis Of Android OEM Compliance and Customization.
Andrea Possemato, Simone Aonzo, Davide Balzarotti, Yanick Fratantonio
2021Using Selective Memoization to Defeat Regular Expression Denial of Service (ReDoS).
James C. Davis, Francisco Servant, Dongyoon Lee
2021When Function Signature Recovery Meets Compiler Optimization.
Yan Lin, Debin Gao
2021When LoRa Meets EMR: Electromagnetic Covert Channels Can Be Super Resilient.
Cheng Shen, Tian Liu, Jun Huang, Rui Tan
2021Which Privacy and Security Attributes Most Impact Consumers' Risk Perception and Willingness to Purchase IoT Devices?
Pardis Emami Naeini, Janarth Dheenadhayalan, Yuvraj Agarwal, Lorrie Faith Cranor
2021Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems.
Guangke Chen, Sen Chen, Lingling Fan, Xiaoning Du, Zhe Zhao, Fu Song, Yang Liu
2021Wolverine: Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits.
Chenkai Weng, Kang Yang, Jonathan Katz, Xiao Wang
2021Zero Knowledge for Everything and Everyone: Fast ZK Processor with Cached ORAM for ANSI C Programs.
David Heath, Yibin Yang, David Devecsery, Vladimir Kolesnikov