| 2020 | "I am uncomfortable sharing what I can't see": Privacy Concerns of the Visually Impaired with Camera Based Assistive Applications. Taslima Akter, Bryan Dosono, Tousif Ahmed, Apu Kapadia, Bryan C. Semaan |
| 2020 | 'I have too much respect for my elders': Understanding South African Mobile Users' Perceptions of Privacy and Current Behaviors on Facebook and WhatsApp. Jake Reichel, Fleming C. Peck, Mikako Inaba, Bisrat Moges, Brahmnoor Singh Chawla, Marshini Chetty |
| 2020 | (Mostly) Exitless VM Protection from Untrusted Hypervisor through Disaggregated Nested Virtualization. Zeyu Mi, Dingji Li, Haibo Chen, Binyu Zang, Haibing Guan |
| 2020 | 29th USENIX Security Symposium, USENIX Security 2020, August 12-14, 2020 Srdjan Capkun, Franziska Roesner |
| 2020 | A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web. Elissa M. Redmiles, Noel Warford, Amritha Jayanti, Aravind Koneru, Sean Kross, Miraida Morales, Rock Stevens, Michelle L. Mazurek |
| 2020 | A Formal Analysis of IEEE 802.11's WPA2: Countering the Kracks Caused by Cracking the Counters. Cas Cremers, Benjamin Kiesl, Niklas Medinger |
| 2020 | A Longitudinal and Comprehensive Study of the DANE Ecosystem in Email. Hyeonmin Lee, Aniketh Gireesh, Roland van Rijswijk-Deij, Taekyoung Kwon, Taejoong Chung |
| 2020 | A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols. Guillaume Girol, Lucca Hirschi, Ralf Sasse, Dennis Jackson, Cas Cremers, David A. Basin |
| 2020 | A Tale of Two Headers: A Formal Analysis of Inconsistent Click-Jacking Protection on the Web. Stefano Calzavara, Sebastian Roth, Alvise Rabitti, Michael Backes, Ben Stock |
| 2020 | A different cup of TI? The added value of commercial threat intelligence. Xander Bouwman, Harm Griffioen, Jelle Egbers, Christian Doerr, Bram Klievink, Michel van Eeten |
| 2020 | APEX: A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise. Ivan De Oliveira Nunes, Karim Eldefrawy, Norrathep Rattanavipanon, Gene Tsudik |
| 2020 | AURORA: Statistical Crash Analysis for Automated Root Cause Explanation. Tim Blazytko, Moritz Schlögel, Cornelius Aschermann, Ali Abbasi, Joel Frank, Simon Wörner, Thorsten Holz |
| 2020 | Achieving Keyless CDNs with Conclaves. Stephen Herwig, Christina Garman, Dave Levin |
| 2020 | Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheck. Benjamin Andow, Samin Yaseer Mahmud, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, Serge Egelman |
| 2020 | Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks in Machine Learning. Erwin Quiring, David Klein, Daniel Arp, Martin Johns, Konrad Rieck |
| 2020 | Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints. Dokyung Song, Felicitas Hetzelt, Jonghwan Kim, Brent ByungHoon Kang, Jean-Pierre Seifert, Michael Franz |
| 2020 | An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem. Shunfan Zhou, Zhemin Yang, Jie Xiang, Yinzhi Cao, Min Yang, Yuan Zhang |
| 2020 | An Observational Investigation of Reverse Engineers' Processes. Daniel Votipka, Seth M. Rabin, Kristopher K. Micinski, Jeffrey S. Foster, Michelle L. Mazurek |
| 2020 | An Off-Chip Attack on Hardware Enclaves via the Memory Bus. Dayeol Lee, Dongha Jung, Ian T. Fang, Chia-Che Tsai, Raluca Ada Popa |
| 2020 | Analysis of DTLS Implementations Using Protocol State Fuzzing. Paul Fiterau-Brostean, Bengt Jonsson, Robert Merget, Joeri de Ruiter, Konstantinos Sagonas, Juraj Somorovsky |
| 2020 | Automatic Hot Patch Generation for Android Kernels. Zhengzi Xu, Yulong Zhang, Longri Zheng, Liangzhao Xia, Chenfu Bao, Zhi Wang, Yang Liu |
| 2020 | Automatic Techniques to Systematically Discover New Heap Exploitation Primitives. Insu Yun, Dhaval Kapil, Taesoo Kim |
| 2020 | Automating the Development of Chosen Ciphertext Attacks. Gabrielle Beck, Maximilian Zinkus, Matthew Green |
| 2020 | BScout: Direct Whole Patch Presence Test for Java Executables. Jiarun Dai, Yuan Zhang, Zheyue Jiang, Yingtian Zhou, Junyan Chen, Xinyu Xing, Xiaohan Zhang, Xin Tan, Min Yang, Zhemin Yang |
| 2020 | BesFS: A POSIX Filesystem for Enclaves with a Mechanized Safety Proof. Shweta Shinde, Shengyi Wang, Pinghai Yuan, Aquinas Hobor, Abhik Roychoudhury, Prateek Saxena |
| 2020 | Big Numbers - Big Troubles: Systematically Analyzing Nonce Leakage in (EC)DSA Implementations. Samuel Weiser, David Schrammel, Lukas Bodner, Raphael Spreitzer |
| 2020 | BigMAC: Fine-Grained Policy Analysis of Android Firmware. Grant Hernandez, Dave (Jing) Tian, Anurag Swarnim Yadav, Byron J. Williams, Kevin R. B. Butler |
| 2020 | BlockSci: Design and applications of a blockchain analysis platform. Harry A. Kalodner, Malte Möser, Kevin Lee, Steven Goldfeder, Martin Plattner, Alishah Chator, Arvind Narayanan |
| 2020 | Boxer: Preventing fraud by scanning credit cards. Zain ul Abi Din, Hari Venugopalan, Jaime Park, Andy Li, Weisu Yin, Haohui Mai, Yong Jae Lee, Steven Liu, Samuel T. King |
| 2020 | Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks. Yue Zhang, Jian Weng, Rajib Dey, Yier Jin, Zhiqiang Lin, Xinwen Fu |
| 2020 | COUNTERFOIL: Verifying Provenance of Integrated Circuits using Intrinsic Package Fingerprints and Inexpensive Cameras. Siva Nishok Dhanuskodi, Xiang Li, Daniel E. Holcomb |
| 2020 | Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures. Mengjia Yan, Christopher W. Fletcher, Josep Torrellas |
| 2020 | Cached and Confused: Web Cache Deception in the Wild. Seyed Ali Mirheidari, Sajjad Arshad, Kaan Onarlioglu, Bruno Crispo, Engin Kirda, William Robertson |
| 2020 | Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE. David Rupprecht, Katharina Kohls, Thorsten Holz, Christina Pöpper |
| 2020 | Cardpliance: PCI DSS Compliance of Android Applications. Samin Yaseer Mahmud, Akhil Acharya, Benjamin Andow, William Enck, Bradley Reaves |
| 2020 | Certified Side Channels. Cesar Pereida García, Sohaib ul Hassan, Nicola Tuveri, Iaroslav Gridin, Alejandro Cabrera Aldaya, Billy Bob Brumley |
| 2020 | Chaperone: Real-time Locking and Loss Prevention for Smartphones. Jiayi Chen, Urs Hengartner, Hassan Khan, Mohammad Mannan |
| 2020 | Civet: An Efficient Java Partitioning Framework for Hardware Enclaves. Chia-Che Tsai, Jeongseok Son, Bhushan Jain, John McAvey, Raluca Ada Popa, Donald E. Porter |
| 2020 | Composition Kills: A Case Study of Email Sender Authentication. Jianjun Chen, Vern Paxson, Jian Jiang |
| 2020 | CopyCat: Controlled Instruction-Level Attacks on Enclaves. Daniel Moghimi, Jo Van Bulck, Nadia Heninger, Frank Piessens, Berk Sunar |
| 2020 | DECAF: Automatic, Adaptive De-bloating and Hardening of COTS Firmware. Jake Christensen, Ionut Mugurel Anghel, Rob Taglang, Mihai Chiroiu, Radu Sion |
| 2020 | DELF: Safeguarding deletion correctness in Online Social Networks. Katriel Cohn-Gordon, Georgios Damaskinos, Divino Neto, Joshi Cordova, Benoît Reitz, Benjamin Strahs, Daniel Obenshain, Paul Pearce, Ioannis Papagiannis, Available Media |
| 2020 | Data Recovery from "Scrubbed" NAND Flash Storage: Need for Analog Sanitization. Md. Mehedi Hasan, Biswajit Ray |
| 2020 | Datalog Disassembly. Antonio Flores-Montoya, Eric M. Schulte |
| 2020 | DatashareNetwork: A Decentralized Privacy-Preserving Search Engine for Investigative Journalists. Kasra Edalatnejad, Wouter Lueks, Julien Pierre Martin, Soline Ledésert, Anne L'Hôte, Bruno Thomas, Laurent Girod, Carmela Troncoso |
| 2020 | DeepHammer: Depleting the Intelligence of Deep Neural Networks through Targeted Chain of Bit Flips. Fan Yao, Adnan Siraj Rakin, Deliang Fan |
| 2020 | Delphi: A Cryptographic Inference Service for Neural Networks. Pratyush Mishra, Ryan Lehmkuhl, Akshayaram Srinivasan, Wenting Zheng, Raluca Ada Popa |
| 2020 | Detecting Stuffing of a User's Credentials at Her Own Accounts. Ke Coby Wang, Michael K. Reiter |
| 2020 | Devil's Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices. Yuxuan Chen, Xuejing Yuan, Jiangshan Zhang, Yue Zhao, Shengzhi Zhang, Kai Chen, Xiaofeng Wang |
| 2020 | Differentially-Private Control-Flow Node Coverage for Software Usage Analysis. Hailong Zhang, Sufian Latif, Raef Bassily, Atanas Rountev |
| 2020 | Digital Contact Tracing. Srdjan Capkun |
| 2020 | Donky: Domain Keys - Efficient In-Process Isolation for RISC-V and x86. David Schrammel, Samuel Weiser, Stefan Steinegger, Martin Schwarzl, Michael Schwarz, Stefan Mangard, Daniel Gruss |
| 2020 | Drift with Devil: Security of Multi-Sensor Fusion based Localization in High-Level Autonomous Driving under GPS Spoofing. Junjie Shen, Jun Yeon Won, Zeyuan Chen, Qi Alfred Chen |
| 2020 | Droplet: Decentralized Authorization and Access Control for Encrypted Data Streams. Hossein Shafagh, Lukas Burkhalter, Sylvia Ratnasamy, Anwar Hithnawi |
| 2020 | EPIC: Every Packet Is Checked in the Data Plane of a Path-Aware Internet. Markus Legner, Tobias Klenze, Marc Wyss, Christoph Sprenger, Adrian Perrig |
| 2020 | ETHBMC: A Bounded Model Checker for Smart Contracts. Joel Frank, Cornelius Aschermann, Thorsten Holz |
| 2020 | EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed Bandit. Tai Yue, Pengfei Wang, Yong Tang, Enze Wang, Bo Yu, Kai Lu, Xu Zhou |
| 2020 | Empirical Measurement of Systemic 2FA Usability. Joshua Reynolds, Nikita Samarin, Joseph D. Barnes, Taylor Judd, Joshua Mason, Michael D. Bailey, Serge Egelman |
| 2020 | Estonian Electronic Identity Card: Security Flaws in Key Management. Arnis Parsovs |
| 2020 | Everything Old is New Again: Binary Security of WebAssembly. Daniel Lehmann, Johannes Kinder, Michael Pradel |
| 2020 | Exploring Connections Between Active Learning and Model Extraction. Varun Chandrasekaran, Kamalika Chaudhuri, Irene Giacomelli, Somesh Jha, Songbai Yan |
| 2020 | FANS: Fuzzing Android Native System Services via Automated Interface Analysis. Baozheng Liu, Chao Zhang, Guang Gong, Yishun Zeng, Haifeng Ruan, Jianwei Zhuge |
| 2020 | FIRMSCOPE: Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware. Mohamed Elsabagh, Ryan Johnson, Angelos Stavrou, Chaoshun Zuo, Qingchuan Zhao, Zhiqiang Lin |
| 2020 | Fawkes: Protecting Privacy against Unauthorized Deep Learning Models. Shawn Shan, Emily Wenger, Jiayun Zhang, Huiying Li, Haitao Zheng, Ben Y. Zhao |
| 2020 | Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets. Jan Ruge, Jiska Classen, Francesco Gringoli, Matthias Hollick |
| 2020 | From Control Model to Program: Investigating Robotic Aerial Vehicle Accidents with MAYDAY. Taegyu Kim, Chung Hwan Kim, Altay Ozen, Fan Fei, Zhan Tu, Xiangyu Zhang, Xinyan Deng, Dave (Jing) Tian, Dongyan Xu |
| 2020 | From Needs to Actions to Secure Apps? The Effect of Requirements and Developer Practices on App Security. Charles Weir, Ben Hermann, Sascha Fahl |
| 2020 | FuzzGen: Automatic Fuzzer Generation. Kyriakos K. Ispoglou, Daniel Austin, Vishwath Mohan, Mathias Payer |
| 2020 | FuzzGuard: Filtering out Unreachable Inputs in Directed Grey-box Fuzzing through Deep Learning. Peiyuan Zong, Tao Lv, Dawei Wang, Zizhuang Deng, Ruigang Liang, Kai Chen |
| 2020 | Fuzzing Error Handling Code using Context-Sensitive Software Fault Injection. Zu-Ming Jiang, Jia-Ju Bai, Kangjie Lu, Shi-Min Hu |
| 2020 | GREYONE: Data Flow Sensitive Fuzzing. Shuitao Gan, Chao Zhang, Peng Chen, Bodong Zhao, Xiaojun Qin, Dong Wu, Zuoning Chen |
| 2020 | HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation. Abraham A. Clements, Eric Gustafson, Tobias Scharnowski, Paul Grosen, David Fritz, Christopher Kruegel, Giovanni Vigna, Saurabh Bagchi, Mathias Payer |
| 2020 | Hall Spoofing: A Non-Invasive DoS Attack on Grid-Tied Solar Inverter. Anomadarshi Barua, Mohammad Abdullah Al Faruque |
| 2020 | High Accuracy and High Fidelity Extraction of Neural Networks. Matthew Jagielski, Nicholas Carlini, David Berthelot, Alex Kurakin, Nicolas Papernot |
| 2020 | Horizontal Privilege Escalation in Trusted Applications. Darius Suciu, Stephen E. McLaughlin, Laurent Simon, Radu Sion |
| 2020 | Human Distinguishable Visual Key Fingerprints. Mozhgan Azimpourkivi, Umut Topkara, Bogdan Carbunar |
| 2020 | HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments. Ghada Dessouky, Tommaso Frassetto, Ahmad-Reza Sadeghi |
| 2020 | Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries. Fnu Suya, Jianfeng Chi, David Evans, Yuan Tian |
| 2020 | Interpretable Deep Learning under Fire. Xinyang Zhang, Ningfei Wang, Hua Shen, Shouling Ji, Xiapu Luo, Ting Wang |
| 2020 | Justinian's GAAvernor: Robust Distributed Learning with Gradient Aggregation Agent. Xudong Pan, Mi Zhang, Duocai Wu, Qifan Xiao, Shouling Ji, Min Yang |
| 2020 | KOOBE: Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities. Weiteng Chen, Xiaochen Zou, Guoren Li, Zhiyun Qian |
| 2020 | Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems. Takeshi Sugawara, Benjamin Cyr, Sara Rampazzi, Daniel Genkin, Kevin Fu |
| 2020 | Liveness is Not Enough: Enhancing Fingerprint Authentication with Behavioral Biometrics to Defeat Puppet Attacks. Cong Wu, Kun He, Jing Chen, Ziming Zhao, Ruiying Du |
| 2020 | Local Model Poisoning Attacks to Byzantine-Robust Federated Learning. Minghong Fang, Xiaoyu Cao, Jinyuan Jia, Neil Zhenqiang Gong |
| 2020 | MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs. Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Dawn Song |
| 2020 | MUZZ: Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded Programs. Hongxu Chen, Shengjian Guo, Yinxing Xue, Yulei Sui, Cen Zhang, Yuekang Li, Haijun Wang, Yang Liu |
| 2020 | MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures. Yang Xiao, Bihuan Chen, Chendong Yu, Zhengzi Xu, Zimu Yuan, Feng Li, Binghong Liu, Yang Liu, Wei Huo, Wei Zou, Wenchang Shi |
| 2020 | McTiny: Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers. Daniel J. Bernstein, Tanja Lange |
| 2020 | Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines. Shuofei Zhu, Jianjun Shi, Limin Yang, Boqin Qin, Ziyi Zhang, Linhai Song, Gang Wang |
| 2020 | Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis. Daniel Moghimi, Moritz Lipp, Berk Sunar, Michael Schwarz |
| 2020 | Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer. Suyoung Lee, HyungSeok Han, Sang Kil Cha, Sooel Son |
| 2020 | NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities. Yehuda Afek, Anat Bremler-Barr, Lior Shafir |
| 2020 | NetWarden: Mitigating Network Covert Channels while Preserving Performance. Jiarong Xing, Qiao Kang, Ang Chen |
| 2020 | On Training Robust PDF Malware Classifiers. Yizheng Chen, Shiqi Wang, Dongdong She, Suman Jana |
| 2020 | P2IM: Scalable and Hardware-independent Firmware Testing via Automatic Peripheral Interface Modeling. Bo Feng, Alejandro Mera, Long Lu |
| 2020 | PARTEMU: Enabling Dynamic Analysis of Real-World TrustZone Software Using Emulation. Lee Harrison, Hayawardh Vijayakumar, Rohan Padhye, Koushik Sen, Michael Grace |
| 2020 | PCKV: Locally Differentially Private Correlated Key-Value Data Collection with Optimized Utility. Xiaolan Gu, Ming Li, Yueqiang Cheng, Li Xiong, Yang Cao |
| 2020 | PHMon: A Programmable Hardware Monitor and Its Security Use Cases. Leila Delshadtehrani, Sadullah Canakci, Boyou Zhou, Schuyler Eldridge, Ajay Joshi, Manuel Egele |
| 2020 | PKU Pitfalls: Attacks on PKU-based Memory Isolation Systems. R. Joseph Connor, Tyler McDaniel, Jared M. Smith, Max Schuchard |
| 2020 | Pancake: Frequency Smoothing for Encrypted Data Stores. Paul Grubbs, Anurag Khandelwal, Marie-Sarah Lacharité, Lloyd Brown, Lucy Li, Rachit Agarwal, Thomas Ristenpart |
| 2020 | ParmeSan: Sanitizer-guided Greybox Fuzzing. Sebastian Österlund, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida |
| 2020 | PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists. Adam Oest, Yeganeh Safaei, Penghui Zhang, Brad Wardman, Kevin Tyers, Yan Shoshitaishvili, Adam Doupé |
| 2020 | Pixel: Multi-signatures for Consensus. Manu Drijvers, Sergey Gorbunov, Gregory Neven, Hoeteck Wee |
| 2020 | Plug-N-Pwned: Comprehensive Vulnerability Analysis of OBD-II Dongles as A New Over-the-Air Attack Surface in Automotive IoT. Haohuang Wen, Qi Alfred Chen, Zhiqiang Lin |
| 2020 | Poison Over Troubled Forwarders: A Cache Poisoning Attack Targeting DNS Forwarding Devices. Xiaofeng Zheng, Chaoyi Lu, Jian Peng, Qiushi Yang, Dongjie Zhou, Baojun Liu, Keyu Man, Shuang Hao, Haixin Duan, Zhiyun Qian |
| 2020 | Preech: A System for Privacy-Preserving Speech Transcription. Shimaa Ahmed, Amrita Roy Chowdhury, Kassem Fawaz, Parmesh Ramanathan |
| 2020 | Programmable In-Network Security for Context-aware BYOD Policies. Qiao Kang, Lei Xue, Adam Morrison, Yuxin Tang, Ang Chen, Xiapu Luo |
| 2020 | RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks. Samira Briongos, Pedro Malagón, José Manuel Moya, Thomas Eisenbarth |
| 2020 | Remote Side-Channel Attacks on Anonymous Transactions. Florian Tramèr, Dan Boneh, Kenny Paterson |
| 2020 | Retrofitting Fine Grain Isolation in the Firefox Renderer. Shravan Narayan, Craig Disselkoen, Tal Garfinkel, Nathan Froyd, Eric Rahm, Sorin Lerner, Hovav Shacham, Deian Stefan |
| 2020 | SANNS: Scaling Up Secure Approximate k-Nearest Neighbors Search. Hao Chen, Ilaria Chillotti, Yihe Dong, Oxana Poburinnaya, Ilya P. Razenshteyn, M. Sadegh Riazi |
| 2020 | SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants. Raul Quinonez, Jairo Giraldo, Luis E. Salazar, Erick Bauman, Alvaro A. Cárdenas, Zhiqiang Lin |
| 2020 | SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage. Ioannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou, Saurabh Shintre |
| 2020 | SENG, the SGX-Enforcing Network Gateway: Authorizing Communication from Shielded Clients. Fabian Schwarz, Christian Rossow |
| 2020 | SHA-1 is a Shambles: First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust. Gaëtan Leurent, Thomas Peyrin |
| 2020 | Scaling Verifiable Computation Using Efficient Set Accumulators. Alex Ozdemir, Riad S. Wahby, Barry Whitehat, Dan Boneh |
| 2020 | Secure Multi-party Computation of Differentially Private Median. Jonas Böhler, Florian Kerschbaum |
| 2020 | Secure parallel computation on national scale volumes of data. Sahar Mazloom, Phi Hung Le, Samuel Ranellucci, S. Dov Gordon |
| 2020 | Security Analysis of Unified Payments Interface and Payment Apps in India. Renuka Kumar, Sreesh Kishore, Hao Lu, Atul Prakash |
| 2020 | See No Evil: Phishing for Permissions with False Transparency. Güliz Seray Tuncay, Jingyu Qian, Carl A. Gunter |
| 2020 | ShadowMove: A Stealthy Lateral Movement Strategy. Amirreza Niakanlahiji, Jinpeng Wei, Md Rabbi Alam, Qingyang Wang, Bei-Tseng Chu |
| 2020 | Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation. Bin Yuan, Yan Jia, Luyi Xing, Dongfang Zhao, Xiaofeng Wang, Deqing Zou, Hai Jin, Yuqing Zhang |
| 2020 | Shim Shimmeny: Evaluating the Security and Privacy Contributions of Link Shimming in the Modern Web. Frank Li |
| 2020 | Silhouette: Efficient Protected Shadow Stacks for Embedded Systems. Jie Zhou, Yufei Du, Zhuojia Shen, Lele Ma, John Criswell, Robert J. Walls |
| 2020 | SkillExplorer: Understanding the Behavior of Skills in Large Scale. Zhixiu Guo, Zijin Lin, Pan Li, Kai Chen |
| 2020 | SmartVerif: Push the Limit of Automation Capability of Verifying Security Protocols by Dynamic Strategies. Yan Xiong, Cheng Su, Wenchao Huang, Fuyou Miao, Wansen Wang, Hengyi Ouyang |
| 2020 | SpecFuzz: Bringing Spectre-type vulnerabilities to the surface. Oleksii Oleksenko, Bohdan Trach, Mark Silberstein, Christof Fetzer |
| 2020 | Stealthy Tracking of Autonomous Vehicles with Cache Side Channels. Mulong Luo, Andrew C. Myers, G. Edward Suh |
| 2020 | Stolen Memories: Leveraging Model Memorization for Calibrated White-Box Membership Inference. Klas Leino, Matt Fredrikson |
| 2020 | Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale. Adam Oest, Penghui Zhang, Brad Wardman, Eric Nunes, Jakub Burgis, Ali Zand, Kurt Thomas, Adam Doupé, Gail-Joon Ahn |
| 2020 | Symbolic execution with SymCC: Don't interpret, compile! Sebastian Poeplau, Aurélien Francillon |
| 2020 | Sys: A Static/Symbolic Tool for Finding Good Bugs in Good (Browser) Code. Fraser Brown, Deian Stefan, Dawson R. Engler |
| 2020 | TPM-FAIL: TPM meets Timing and Lattice Attacks. Daniel Moghimi, Berk Sunar, Thomas Eisenbarth, Nadia Heninger |
| 2020 | TXSPECTOR: Uncovering Attacks in Ethereum from Transactions. Mengya Zhang, Xiaokuan Zhang, Yinqian Zhang, Zhiqiang Lin |
| 2020 | TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves. Tobias Cloosters, Michael Rodler, Lucas Davi |
| 2020 | Temporal System Call Specialization for Attack Surface Reduction. Seyedhamed Ghavamnia, Tapti Palit, Shachee Mishra, Michalis Polychronakis |
| 2020 | TextShield: Robust Text Classification Based on Multimodal Embedding and Neural Machine Translation. Jinfeng Li, Tianyu Du, Shouling Ji, Rong Zhang, Quan Lu, Min Yang, Ting Wang |
| 2020 | That Was Then, This Is Now: A Security Evaluation of Password Generation, Storage, and Autofill in Browser-Based Password Managers. Sean Oesch, Scott Ruoti |
| 2020 | The 2020 Election: Remote Voting, Disinformation, and Audit. Avi Rubin |
| 2020 | The Ballot is Busted Before the Blockchain: A Security Analysis of Voatz, the First Internet Voting Application Used in U.S. Federal Elections. Michael A. Specter, James Koppel, Daniel J. Weitzner |
| 2020 | The Impact of Ad-Blockers on Product Search and Purchase Behavior: A Lab Experiment. Alisa Frik, Amelia Haviland, Alessandro Acquisti |
| 2020 | The Industrial Age of Hacking. Timothy Nosco, Jared Ziegler, Zechariah Clark, Davy Marrero, Todd Finkler, Andrew Barbarello, W. Michael Petullo |
| 2020 | The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums. Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart |
| 2020 | The Unpatchable Silicon: A Full Break of the Bitstream Encryption of Xilinx 7-Series FPGAs. Maik Ender, Amir Moradi, Christof Paar |
| 2020 | Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections. Tom van Goethem, Christina Pöpper, Wouter Joosen, Mathy Vanhoef |
| 2020 | Towards HTTPS Everywhere on Android: We Are Not There Yet. Andrea Possemato, Yanick Fratantonio |
| 2020 | Towards Robust LiDAR-based Perception in Autonomous Driving: General Black-box Adversarial Sensor Attack and Countermeasures. Jiachen Sun, Yulong Cao, Qi Alfred Chen, Z. Morley Mao |
| 2020 | USBFuzz: A Framework for Fuzzing USB Drivers by Device Emulation. Hui Peng, Mathias Payer |
| 2020 | Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It. Daniel Votipka, Kelsey R. Fulton, James Parker, Matthew Hou, Michelle L. Mazurek, Michael Hicks |
| 2020 | Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning. Ahmed Salem, Apratim Bhattacharya, Michael Backes, Mario Fritz, Yang Zhang |
| 2020 | V0LTpwn: Attacking x86 Processor Integrity from Software. Zijo Kenjar, Tommaso Frassetto, David Gens, Michael Franz, Ahmad-Reza Sadeghi |
| 2020 | Visor: Privacy-Preserving Video Analytics as a Cloud Service. Rishabh Poddar, Ganesh Ananthanarayanan, Srinath T. V. Setty, Stavros Volos, Raluca Ada Popa |
| 2020 | Void: A fast and light voice liveness detection system. Muhammad Ejaz Ahmed, Il-Youp Kwak, Jun Ho Huh, Iljoo Kim, Taekkyung Oh, Hyoungshick Kim |
| 2020 | VoteAgain: A scalable coercion-resistant voting system. Wouter Lueks, Iñigo Querejeta-Azurmendi, Carmela Troncoso |
| 2020 | Walking Onions: Scaling Anonymity Networks while Protecting Users. Chelsea Komlo, Nick Mathewson, Ian Goldberg |
| 2020 | What Twitter Knows: Characterizing Ad Targeting Practices, User Perceptions, and Ad Explanations Through Users' Own Twitter Data. Miranda Wei, Madison Stamos, Sophie Veys, Nathan Reitinger, Justin Goodman, Margot Herman, Dorota Filipczuk, Ben Weinshel, Michelle L. Mazurek, Blase Ur |
| 2020 | Who's Calling? Characterizing Robocalls through Audio and Metadata Analysis. Sathvik Prasad, Elijah Robert Bouma-Sims, Athishay Kiran Mylappan, Bradley Reaves |
| 2020 | You Are What You Broadcast: Identification of Mobile and IoT Devices from (Public) WiFi. Lingjing Yu, Bo Luo, Jun Ma, Zhaoyu Zhou, Qingyun Liu |
| 2020 | Zero-delay Lightweight Defenses against Website Fingerprinting. Jiajun Gong, Tao Wang |
| 2020 | iOS, Your OS, Everybody's OS: Vetting and Analyzing Network Services of iOS Applications. Zhushou Tang, Ke Tang, Minhui Xue, Yuan Tian, Sen Chen, Muhammad Ikram, Tielei Wang, Haojin Zhu |