| 2021 | 42nd IEEE Symposium on Security and Privacy, SP 2021, San Francisco, CA, USA, 24-27 May 2021 |
| 2021 | A Erkan Tairi, Pedro Moreno-Sanchez, Matteo Maffei |
| 2021 | A Decentralized and Encrypted National Gun Registry. Seny Kamara, Tarik Moataz, Andrew Park, Lucy Qin |
| 2021 | A First Look at Zoombombing. Chen Ling, Utkucan Balci, Jeremy Blackburn, Gianluca Stringhini |
| 2021 | A Novel Dynamic Analysis Infrastructure to Instrument Untrusted Execution Flow Across User-Kernel Spaces. Jiaqi Hong, Xuhua Ding |
| 2021 | A Secure and Formally Verified Linux KVM Hypervisor. Shih-Wei Li, Xupeng Li, Ronghui Gu, Jason Nieh, John Zhuang Hui |
| 2021 | A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer. Antoine Delignat-Lavaud, Cédric Fournet, Bryan Parno, Jonathan Protzenko, Tahina Ramananandro, Jay Bosamiya, Joseph Lallemand, Itsaka Rakotonirina, Yi Zhou |
| 2021 | ARBITRAR: User-Guided API Misuse Detection. Ziyang Li, Aravind Machiry, Binghong Chen, Mayur Naik, Ke Wang, Le Song |
| 2021 | Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding. Sahar Abdelnabi, Mario Fritz |
| 2021 | Adversary Instantiation: Lower Bounds for Differentially Private Machine Learning. Milad Nasr, Shuang Song, Abhradeep Thakurta, Nicolas Papernot, Nicholas Carlini |
| 2021 | An I/O Separation Model for Formal Verification of Kernel Implementations. Miao Yu, Virgil D. Gligor, Limin Jia |
| 2021 | An Interactive Prover for Protocol Verification in the Computational Model. David Baelde, Stéphanie Delaune, Charlie Jacomme, Adrien Koutsos, Solène Moreau |
| 2021 | Android Custom Permissions Demystified: From Privilege Escalation to Design Shortcomings. Rui Li, Wenrui Diao, Zhou Li, Jianqi Du, Shanqing Guo |
| 2021 | BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures. Cas Cremers, Samed Düzlü, Rune Fiedler, Marc Fischlin, Christian Janson |
| 2021 | Bitcoin-Compatible Virtual Channels. Lukas Aumayr, Matteo Maffei, Oguzhan Ersoy, Andreas Erwig, Sebastian Faust, Siavash Riahi, Kristina Hostáková, Pedro Moreno-Sanchez |
| 2021 | Black Widow: Blackbox Data-driven Web Scanning. Benjamin Eriksson, Giancarlo Pellegrino, Andrei Sabelfeld |
| 2021 | Bomberman: Defining and Defeating Hardware Ticking Timebombs at Design-time. Timothy Trippel, Kang G. Shin, Kevin B. Bush, Matthew Hicks |
| 2021 | Bookworm Game: Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis. Yi Chen, Yepeng Yao, Xiaofeng Wang, Dandan Xu, Chang Yue, Xiaozhong Liu, Kai Chen, Haixu Tang, Baoxu Liu |
| 2021 | Breaking the Specification: PDF Certification. Simon Rohlmann, Vladislav Mladenov, Christian Mainka, Jörg Schwenk |
| 2021 | CANNON: Reliable and Stealthy Remote Shutdown Attacks via Unaltered Automotive Microcontrollers. Sekar Kulandaivel, Shalabh Jain, Jorge Guajardo, Vyas Sekar |
| 2021 | CRYLOGGER: Detecting Crypto Misuses Dynamically. Luca Piccolboni, Giuseppe Di Guglielmo, Luca P. Carloni, Simha Sethumadhavan |
| 2021 | CacheOut: Leaking Data on Intel CPUs via Cache Evictions. Stephan van Schaik, Marina Minkin, Andrew Kwong, Daniel Genkin, Yuval Yarom |
| 2021 | CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability. Deepak Maram, Harjasleen Malvai, Fan Zhang, Nerla Jean-Louis, Alexander Frolov, Tyler Kell, Tyrone Lobban, Christine Moy, Ari Juels, Andrew Miller |
| 2021 | Co-Inflow: Coarse-grained Information Flow Control for Java-like Languages. Jian Xiang, Stephen Chong |
| 2021 | Compact Certificates of Collective Knowledge. Silvio Micali, Leonid Reyzin, Georgios Vlachos, Riad S. Wahby, Nickolai Zeldovich |
| 2021 | Compositional Non-Interference for Fine-Grained Concurrent Programs. Dan Frumin, Robbert Krebbers, Lars Birkedal |
| 2021 | Compositional Security for Reentrant Applications. Ethan Cecchetti, Siqiu Yao, Haobin Ni, Andrew C. Myers |
| 2021 | ConDySTA: Context-Aware Dynamic Supplement to Static Taint Analysis. Xueling Zhang, Xiaoyin Wang, Rocky Slavin, Jianwei Niu |
| 2021 | CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing. Penghui Zhang, Adam Oest, Haehyun Cho, Zhibo Sun, RC Johnson, Brad Wardman, Shaown Sarker, Alexandros Kapravelos, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn |
| 2021 | Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More). Amit Klein |
| 2021 | Cross-Domain Access Control Encryption: Arbitrary-policy, Constant-size, Efficient. Xiuhua Wang, Sherman S. M. Chow |
| 2021 | CrossTalk: Speculative Data Leaks Across Cores Are Real. Hany Ragab, Alyssa Milburn, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida |
| 2021 | CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU. Sijun Tan, Brian Knott, Yuan Tian, David J. Wu |
| 2021 | DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis. Alejandro Mera, Bo Feng, Long Lu, Engin Kirda |
| 2021 | DP-Sniper: Black-Box Discovery of Differential Privacy Violations using Classifiers. Benjamin Bichsel, Samuel Steffen, Ilija Bogunovic, Martin T. Vechev |
| 2021 | Data Privacy in Trigger-Action Systems. Yunang Chen, Amrita Roy Chowdhury, Ruizhe Wang, Andrei Sabelfeld, Rahul Chatterjee, Earlence Fernandes |
| 2021 | Defensive Technology Use by Political Activists During the Sudanese Revolution. Alaa Daffalla, Lucy Simko, Tadayoshi Kohno, Alexandru G. Bardas |
| 2021 | Detecting AI Trojans Using Meta Neural Analysis. Xiaojun Xu, Qi Wang, Huichen Li, Nikita Borisov, Carl A. Gunter, Bo Li |
| 2021 | Detecting Filter List Evasion with Event-Loop-Turn Granularity JavaScript Signatures. Quan Chen, Peter Snyder, Ben Livshits, Alexandros Kapravelos |
| 2021 | Diane: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices. Nilo Redini, Andrea Continella, Dipanjan Das, Giulio De Pasquale, Noah Spahn, Aravind Machiry, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna |
| 2021 | Did you mix me? Formally Verifying Verifiable Mix Nets in Electronic Voting. Thomas Haines, Rajeev Goré, Bhavesh Sharma |
| 2021 | DifuzzRTL: Differential Fuzz Testing to Find CPU Bugs. Jaewon Hur, Suhwan Song, Dongup Kwon, Eunjin Baek, Jangwoo Kim, Byoungyoung Lee |
| 2021 | Diogenes: Lightweight Scalable RSA Modulus Generation with a Dishonest Majority. Megan Chen, Carmit Hazay, Yuval Ishai, Yuriy Kashnikov, Daniele Micciancio, Tarik Riviere, Abhi Shelat, Muthuramakrishnan Venkitasubramaniam, Ruihan Wang |
| 2021 | Doing good by fighting fraud: Ethical anti-fraud systems for mobile payments. Zain ul Abi Din, Hari Venugopalan, Henry Lin, Adam Wushensky, Steven Liu, Samuel T. King |
| 2021 | DynPTA: Combining Static and Dynamic Analysis for Practical Selective Data Protection. Tapti Palit, Jarin Firose Moon, Fabian Monrose, Michalis Polychronakis |
| 2021 | Ebb-and-Flow Protocols: A Resolution of the Availability-Finality Dilemma. Joachim Neu, Ertem Nusret Tas, David Tse |
| 2021 | Epochal Signatures for Deniable Group Chats. Andreas Hülsing, Florian Weber |
| 2021 | Fingerprinting the Fingerprinters: Learning to Detect Browser Fingerprinting Behaviors. Umar Iqbal, Steven Englehardt, Zubair Shafiq |
| 2021 | Good Bot, Bad Bot: Characterizing Automated Browsing Activity. Xigao Li, Babak Amin Azad, Amir Rahmati, Nick Nikiforakis |
| 2021 | HackEd: A Pedagogical Analysis of Online Vulnerability Discovery Exercises. Daniel Votipka, Eric Zhang, Michelle L. Mazurek |
| 2021 | Happer: Unpacking Android Apps via a Hardware-Assisted Approach. Lei Xue, Hao Zhou, Xiapu Luo, Yajin Zhou, Yang Shi, Guofei Gu, Fengwei Zhang, Man Ho Au |
| 2021 | Hardware-Software Contracts for Secure Speculation. Marco Guarnieri, Boris Köpf, Jan Reineke, Pepe Vila |
| 2021 | Hear "No Evil", See "Kenansville"*: Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems. Hadi Abdullah, Muhammad Sajidur Rahman, Washington Garcia, Kevin Warren, Anurag Swarnim Yadav, Tom Shrimpton, Patrick Traynor |
| 2021 | High-Assurance Cryptography in the Spectre Era. Gilles Barthe, Sunjay Cauligi, Benjamin Grégoire, Adrien Koutsos, Kevin Liao, Tiago Oliveira, Swarn Priya, Tamara Rezk, Peter Schwabe |
| 2021 | High-Frequency Trading on Decentralized On-Chain Exchanges. Liyi Zhou, Kaihua Qin, Christof Ferreira Torres, Duc Viet Le, Arthur Gervais |
| 2021 | How Did That Get In My Phone? Unwanted App Distribution on Android Devices. Platon Kotzias, Juan Caballero, Leyla Bilge |
| 2021 | Improving Password Guessing via Representation Learning. Dario Pasquini, Ankit Gangwal, Giuseppe Ateniese, Massimo Bernaschi, Mauro Conti |
| 2021 | Invisible Probe: Timing Attacks with PCIe Congestion Side-channel. Mingtian Tan, Junpeng Wan, Zhe Zhou, Zhou Li |
| 2021 | Invisible for both Camera and LiDAR: Security of Multi-Sensor Fusion based Perception in Autonomous Driving Under Physical-World Attacks. Yulong Cao, Ningfei Wang, Chaowei Xiao, Dawei Yang, Jin Fang, Ruigang Yang, Qi Alfred Chen, Mingyan Liu, Bo Li |
| 2021 | Is Private Learning Possible with Instance Encoding? Nicholas Carlini, Samuel Deng, Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Abhradeep Thakurta, Florian Tramèr |
| 2021 | Keep the Dirt: Tainted TreeKEM, Adaptively and Actively Secure Continuous Group Key Agreement. Karen Klein, Guillermo Pascual-Perez, Michael Walter, Chethan Kamath, Margarita Capretto, Miguel Cueto, Ilia Markov, Michelle Yeo, Joël Alwen, Krzysztof Pietrzak |
| 2021 | Learning Differentially Private Mechanisms. Subhajit Roy, Justin Hsu, Aws Albarghouthi |
| 2021 | Lightweight Techniques for Private Heavy Hitters. Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai |
| 2021 | Linking Bluetooth LE & Classic and Implications for Privacy-Preserving Bluetooth-Based Protocols. Norbert Ludant, Tien Dang Vo-Huu, Sashank Narain, Guevara Noubir |
| 2021 | Lockable Signatures for Blockchains: Scriptless Scripts for All Signatures. Sri Aravinda Krishnan Thyagarajan, Giulio Malavolta |
| 2021 | MAD-HTLC: Because HTLC is Crazy-Cheap to Attack. Itay Tsabary, Matan Yechieli, Alex Manuskin, Ittay Eyal |
| 2021 | Machine Unlearning. Lucas Bourtoule, Varun Chandrasekaran, Christopher A. Choquette-Choo, Hengrui Jia, Adelin Travers, Baiwu Zhang, David Lie, Nicolas Papernot |
| 2021 | Manipulation Attacks in Local Differential Privacy. Albert Cheu, Adam D. Smith, Jonathan R. Ullman |
| 2021 | Many-out-of-Many Proofs and Applications to Anonymous Zether. Benjamin E. Diamond |
| 2021 | Merkle Yuncong Hu, Kian Hooshmand, Harika Kalidhindi, Seung Jin Yang, Raluca Ada Popa |
| 2021 | Method Confusion Attack on Bluetooth Pairing. Maximilian von Tschirschnitz, Ludwig Peuckert, Fabian Franzen, Jens Grossklags |
| 2021 | NtFuzz: Enabling Type-Aware Kernel Fuzzing on Windows with Static Binary Analysis. Jaeseung Choi, Kangsu Kim, Daejin Lee, Sang Kil Cha |
| 2021 | OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary. Zhuo Zhang, Yapeng Ye, Wei You, Guanhong Tao, Wen-Chuan Lee, Yonghwi Kwon, Yousra Aafer, Xiangyu Zhang |
| 2021 | On the Anonymity Guarantees of Anonymous Proof-of-Stake Protocols. Markulf Kohlweiss, Varun Madathil, Kartik Nayak, Alessandra Scafuro |
| 2021 | On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols. Liyi Zhou, Kaihua Qin, Antoine Cully, Benjamin Livshits, Arthur Gervais |
| 2021 | One Engine to Fuzz 'em All: Generic Language Processor Testing with Semantic Validation. Yongheng Chen, Rui Zhong, Hong Hu, Hangfan Zhang, Yupeng Yang, Dinghao Wu, Wenke Lee |
| 2021 | PEGASUS: Bridging Polynomial and Non-polynomial Evaluations in Homomorphic Encryption. Wen-jie Lu, Zhicong Huang, Cheng Hong, Yiping Ma, Hunter Qu |
| 2021 | PLATYPUS: Software-based Power Side-Channel Attacks on x86. Moritz Lipp, Andreas Kogler, David F. Oswald, Michael Schwarz, Catherine Easdon, Claudio Canella, Daniel Gruss |
| 2021 | Poltergeist: Acoustic Adversarial Machine Learning against Cameras and Computer Vision. Xiaoyu Ji, Yushi Cheng, Yuepeng Zhang, Kai Wang, Chen Yan, Wenyuan Xu, Kevin Fu |
| 2021 | Post-quantum WireGuard. Andreas Hülsing, Kai-Chun Ning, Peter Schwabe, Florian Weber, Philip R. Zimmermann |
| 2021 | Proof-of-Learning: Definitions and Practice. Hengrui Jia, Mohammad Yaghini, Christopher A. Choquette-Choo, Natalie Dullerud, Anvith Thudi, Varun Chandrasekaran, Nicolas Papernot |
| 2021 | Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks! But We Can Fix It. Wei Song, Boya Li, Zihan Xue, Zhenzhen Li, Wenhao Wang, Peng Liu |
| 2021 | Reading Between the Lines: An Extensive Evaluation of the Security and Privacy Implications of EPUB Reading Systems. Gertjan Franken, Tom van Goethem, Wouter Joosen |
| 2021 | Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model. Thilo Krachenfels, Fatemeh Ganji, Amir Moradi, Shahin Tajik, Jean-Pierre Seifert |
| 2021 | Red Belly: A Secure, Fair and Scalable Open Blockchain. Tyler Crain, Christopher Natoli, Vincent Gramoli |
| 2021 | Refresh When You Wake Up: Proactive Threshold Wallets with Offline Devices. Yashvanth Kondi, Bernardo Magri, Claudio Orlandi, Omer Shlomovits |
| 2021 | Response-Hiding Encrypted Ranges: Revisiting Security via Parametrized Leakage-Abuse Attacks. Evgenios M. Kornaropoulos, Charalampos Papamanthou, Roberto Tamassia |
| 2021 | Revealer: Detecting and Exploiting Regular Expression Denial-of-Service Vulnerabilities. Yinxi Liu, Mingxue Zhang, Wei Meng |
| 2021 | Runtime Recovery of Web Applications under Zero-Day ReDoS Attacks. Zhihao Bai, Ke Wang, Hang Zhu, Yinzhi Cao, Xin Jin |
| 2021 | SGUARD: Towards Fixing Vulnerable Smart Contracts Automatically. Tai D. Nguyen, Long H. Pham, Jun Sun |
| 2021 | Self-Supervised Euphemism Detection and Identification for Content Moderation. Wanzheng Zhu, Hongyu Gong, Rohan Bansal, Zachary Weinberg, Nicolas Christin, Giulia Fanti, Suma Bhat |
| 2021 | SiRnn: A Math Library for Secure RNN Inference. Deevashwer Rathee, Mayank Rathee, Rahul Kranti Kiran Goli, Divya Gupta, Rahul Sharma, Nishanth Chandran, Aseem Rastogi |
| 2021 | SmartPulse: Automated Checking of Temporal Properties in Smart Contracts. Jon Stephens, Kostas Ferles, Benjamin Mariano, Shuvendu K. Lahiri, Isil Dillig |
| 2021 | SoK: All You Ever Wanted to Know About x86/x64 Binary Disassembly But Were Afraid to Ask. Chengbin Pang, Ruotong Yu, Yaohui Chen, Eric Koskinen, Georgios Portokalidis, Bing Mao, Jun Xu |
| 2021 | SoK: Computer-Aided Cryptography. Manuel Barbosa, Gilles Barthe, Karthik Bhargavan, Bruno Blanchet, Cas Cremers, Kevin Liao, Bryan Parno |
| 2021 | SoK: Fully Homomorphic Encryption Compilers. Alexander Viand, Patrick Jattke, Anwar Hithnawi |
| 2021 | SoK: Hate, Harassment, and the Changing Landscape of Online Abuse. Kurt Thomas, Devdatta Akhawe, Michael D. Bailey, Dan Boneh, Elie Bursztein, Sunny Consolvo, Nicola Dell, Zakir Durumeric, Patrick Gage Kelley, Deepak Kumar, Damon McCoy, Sarah Meiklejohn, Thomas Ristenpart, Gianluca Stringhini |
| 2021 | SoK: Quantifying Cyber Risk. Daniel W. Woods, Rainer Böhme |
| 2021 | SoK: Security and Privacy in the Age of Commercial Drones. Ben Nassi, Ron Bitton, Ryusuke Masuoka, Asaf Shabtai, Yuval Elovici |
| 2021 | SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems. Hadi Abdullah, Kevin Warren, Vincent Bindschaedler, Nicolas Papernot, Patrick Traynor |
| 2021 | StochFuzz: Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting. Zhuo Zhang, Wei You, Guanhong Tao, Yousra Aafer, Xuwei Liu, Xiangyu Zhang |
| 2021 | Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land. Frederick Barr-Smith, Xabier Ugarte-Pedrero, Mariano Graziano, Riccardo Spolaor, Ivan Martinovic |
| 2021 | Systematic Analysis of Randomization-based Protected Cache Architectures. Antoon Purnal, Lukas Giner, Daniel Gruss, Ingrid Verbauwhede |
| 2021 | The EMV Standard: Break, Fix, Verify. David A. Basin, Ralf Sasse, Jorge Toro-Pozo |
| 2021 | The Provable Security of Ed25519: Theory and Practice. Jacqueline Brendel, Cas Cremers, Dennis Jackson, Mang Zhao |
| 2021 | They Would do Better if They Worked Together: The Case of Interaction Problems Between Password Managers and Websites. Nicolas Huaman, Sabrina Amft, Marten Oltrogge, Yasemin Acar, Sascha Fahl |
| 2021 | Trouble Over-The-Air: An Analysis of FOTA Apps in the Android Ecosystem. Eduardo Blázquez, Sergio Pastrana, Álvaro Feal, Julien Gamba, Platon Kotzias, Narseo Vallina-Rodriguez, Juan Tapiador |
| 2021 | Trust, But Verify: A Longitudinal Analysis Of Android OEM Compliance and Customization. Andrea Possemato, Simone Aonzo, Davide Balzarotti, Yanick Fratantonio |
| 2021 | Using Selective Memoization to Defeat Regular Expression Denial of Service (ReDoS). James C. Davis, Francisco Servant, Dongyoon Lee |
| 2021 | When Function Signature Recovery Meets Compiler Optimization. Yan Lin, Debin Gao |
| 2021 | When LoRa Meets EMR: Electromagnetic Covert Channels Can Be Super Resilient. Cheng Shen, Tian Liu, Jun Huang, Rui Tan |
| 2021 | Which Privacy and Security Attributes Most Impact Consumers' Risk Perception and Willingness to Purchase IoT Devices? Pardis Emami Naeini, Janarth Dheenadhayalan, Yuvraj Agarwal, Lorrie Faith Cranor |
| 2021 | Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling Fan, Xiaoning Du, Zhe Zhao, Fu Song, Yang Liu |
| 2021 | Wolverine: Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits. Chenkai Weng, Kang Yang, Jonathan Katz, Xiao Wang |
| 2021 | Zero Knowledge for Everything and Everyone: Fast ZK Processor with Cached ORAM for ANSI C Programs. David Heath, Yibin Yang, David Devecsery, Vladimir Kolesnikov |