Abstract is missing.
- Stealing Machine Learning Models: Attacks and Countermeasures for Generative Adversarial NetworksHailong Hu, Jun Pang 0001. 1-16 [doi]
- The Many-faced God: Attacking Face Verification System with Embedding and Image RecoveryMingtian Tan, Zhe Zhou 0001, Zhou Li 0001. 17-30 [doi]
- Two Souls in an Adversarial Image: Towards Universal Adversarial Example Detection using Multi-view InconsistencySohaib Kiani, Sana Awan, Chao Lan, FengJun Li, Bo Luo. 31-44 [doi]
- Efficient, Private and Robust Federated LearningMeng Hao, Hongwei Li, Guowen Xu, Hanxiao Chen, Tianwei Zhang 0004. 45-60 [doi]
- Morphence: Moving Target Defense Against Adversarial ExamplesAbderrahmen Amich, Birhanu Eshete. 61-75 [doi]
- Heterogeneous-PAKE: Bridging the Gap between PAKE Protocols and Their Real-World DeploymentRong Wei, Fangyu Zheng, Lili Gao, Jiankuo Dong, Guang Fan, Lipeng Wan, Jingqiang Lin, Yuewu Wang. 76-90 [doi]
- A formal analysis of IKEv2's post-quantum extensionStefan-Lukas Gazdag, Sophia Grundner-Culemann, Tobias Guggemos, Tobias Heider, Daniel Loebenberger. 91-105 [doi]
- Optimized Paillier's Cryptosystem with Fast Encryption and DecryptionHuanyu Ma, Shuai Han, Hao Lei. 106-118 [doi]
- Towards Practical Post-quantum Signatures for Resource-Limited Internet of ThingsRouzbeh Behnia, Attilla Altay Yavuz. 119-130 [doi]
- VASA: Vector AES Instructions for Security ApplicationsJean-Pierre Münch, Thomas Schneider 0003, Hossein Yalame. 131-145 [doi]
- Program Obfuscation via ABI DebiasingDavid Demicco, Rukayat Erinfolami, Aravind Prakash. 146-157 [doi]
- A Look Back on a Function Identification ProblemHyungjoon Koo, Soyeon Park, Taesoo Kim. 158-168 [doi]
- SoftMark: Software Watermarking via a Binary Function RelocationHonggoo Kang, Yonghwi Kwon 0001, Sangjin Lee, Hyungjoon Koo. 169-181 [doi]
- Dynamic Taint Analysis versus Obfuscated Self-CheckingSebastian Banescu, Samuel Valenzuela, Marius Guggenmos, Mohsen Ahmadvand, Alexander Pretschner. 182-193 [doi]
- Dicos: Discovering Insecure Code Snippets from Stack Overflow Posts by Leveraging User DiscussionsHyunji Hong, Seunghoon Woo, Heejo Lee. 194-206 [doi]
- ARID: Anonymous Remote IDentification of Unmanned Aerial VehiclesPietro Tedeschi, Savio Sciancalepore, Roberto Di Pietro. 207-218 [doi]
- Sipster: Settling IOU Privately and Quickly with Smart MetersSherman S. M. Chow, Ming Li 0006, Yongjun Zhao 0001, Wenqiang Jin. 219-234 [doi]
- TEEKAP: Self-Expiring Data Capsule using Trusted Execution EnvironmentMingyuan Gao, Hung Dang, Ee-Chien Chang. 235-247 [doi]
- BAPM: Block Attention Profiling Model for Multi-tab Website Fingerprinting Attacks on TorZhong Guan, Gang Xiong, Gaopeng Gou, Zhen Li, Mingxin Cui, Chang Liu. 248-259 [doi]
- Try before You Buy: Privacy-preserving Data Evaluation on Cloud-based Machine Learning Data MarketplaceQiYang Song, Jiahao Cao, Kun Sun 0001, Qi Li 0002, Ke Xu 0002. 260-272 [doi]
- VIA: Analyzing Device Interfaces of Protected Virtual MachinesFelicitas Hetzelt, Martin Radev, Robert Buhren, Mathias Morbitzer, Jean-Pierre Seifert. 273-284 [doi]
- Rocky: Replicating Block Devices for Tamper and Failure Resistant Edge-based Virtualized Desktop InfrastructureBeom Heyn Kim, Hyoungshick Kim. 285-296 [doi]
- On Detecting Growing-Up Behaviors of Malicious Accounts in Privacy-Centric Mobile Social NetworksZijie Yang, Binghui Wang, Haoran Li, Dong Yuan, Zhuotao Liu, Neil Zhenqiang Gong, Chang Liu, Qi Li, Xiao Liang, Shaofeng Hu. 297-310 [doi]
- ReCFA: Resilient Control-Flow AttestationYumei Zhang, Xinzhi Liu, Cong Sun 0001, Dongrui Zeng, Gang Tan, Xiao Kan, Siqi Ma. 311-322 [doi]
- Practical Attestation for Edge Devices Running Compute Heavy Machine Learning ApplicationsIsmi Abidi, Vireshwar Kumar, Rijurekha Sen. 323-336 [doi]
- Is Visualization Enough? Evaluating the Efficacy of MUD-Visualizer in Enabling Ease of Deployment for Manufacturer Usage Description (MUD)Vafa Andalibi, Jayati Dev, DongInn Kim, Eliot Lear, L. Jean Camp. 337-348 [doi]
- A Cross-role and Bi-national Analysis on Security Efforts and Constraints of Software Development ProjectsFumihiro Kanei, Ayako Akiyama Hasegawa, Eitaro Shioji, Mitsuaki Akiyama. 349-364 [doi]
- An Efficient Man-Machine Recognition Method Based On Mouse Trajectory Feature De-redundancyXiaofeng Lu, Zhenhan Feng, Jupeng Xia. 365-374 [doi]
- OPay: an Orientation-based Contactless Payment Solution Against Passive AttacksMahshid Mehr Nezhad, Feng Hao. 375-384 [doi]
- What's in a Cyber Threat Intelligence sharing platform?: A mixed-methods user experience investigation of MISPBorce Stojkovski, Gabriele Lenzini, Vincent Koenig, Salvador Rivas. 385-398 [doi]
- They See Me Rollin': Inherent Vulnerability of the Rolling Shutter in CMOS Image SensorsSebastian Köhler, Giulio Lovisotto, Simon Birnbach, Richard Baker 0008, Ivan Martinovic. 399-413 [doi]
- Evaluating the Effectiveness of Protection Jamming Devices in Mitigating Smart Speaker Eavesdropping Attacks Using Gaussian White NoisePayton Walker, Nitesh Saxena. 414-424 [doi]
- S2-CAN: Sufficiently Secure Controller Area NetworkMert D. Pesé, Jay W. Schauer, Junhui Li, Kang G. Shin. 425-438 [doi]
- Crypto-Chain: A Relay Resilience Framework for Smart VehiclesAbubakar Sadiq Sani, Dong Yuan, Elisa Bertino, Zhao Yang Dong. 439-454 [doi]
- Advanced System Resiliency Based on Virtualization Techniques for IoT DevicesJonas Röckl, Mykolai Protsenko, Monika Huber, Tilo Müller, Felix C. Freiling. 455-467 [doi]
- Global Feature Analysis and Comparative Evaluation of Freestyle In-Air-Handwriting Passcode for User AuthenticationDuo Lu, Yuli Deng, Dijiang Huang. 468-481 [doi]
- 2D-2FA: A New Dimension in Two-Factor AuthenticationMaliheh Shirvanian, Shashank Agrawal. 482-496 [doi]
- Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of LocationZheng Yang 0001, Chenglu Jin, Jianting Ning, Zengpeng Li, Anh Dinh, Jianying Zhou 0001. 497-512 [doi]
- Digit Semantics based Optimization for Practical Password Cracking ToolsHaodong Zhang, Chuanwang Wang, Wenqiang Ruan, Junjie Zhang, Ming Xu 0006, Weili Han. 513-527 [doi]
- Systematization of Password ManagerUse Cases and Design ParadigmsJames Simmons, Oumar Diallo, Sean Oesch, Scott Ruoti. 528-540 [doi]
- Eluding ML-based Adblockers With Actionable Adversarial ExamplesShitong Zhu, Zhongjie Wang 0002, Xun Chen, Shasha Li, Keyu Man, Umar Iqbal, Zhiyun Qian, Kevin S. Chan, Srikanth V. Krishnamurthy, Zubair Shafiq, Yu Hao, Guoren Li, Zheng Zhang, Xiaochen Zou. 541-553 [doi]
- BadNL: Backdoor Attacks against NLP Models with Semantic-preserving ImprovementsXiaoyi Chen, Ahmed Salem 0001, Dingfan Chen, Michael Backes 0001, ShiQing Ma, Qingni Shen, Zhonghai Wu, Yang Zhang 0016. 554-569 [doi]
- MISA: Online Defense of Trojaned Models using MisattributionsPanagiota Kiourti, Wenchao Li, Anirban Roy, Karan Sikka, Susmit Jha. 570-585 [doi]
- Detecting Audio Adversarial Examples with Logit NoisingNamgyu Park, Sangwoo Ji, Jong Kim 0001. 586-595 [doi]
- Can We Leverage Predictive Uncertainty to Detect Dataset Shift and Adversarial Examples in Android Malware Detection?Deqiang Li, Tian Qiu, Shuo Chen, Qianmu Li, Shouhuai Xu. 596-608 [doi]
- TLB Poisoning Attacks on AMD Secure Encrypted VirtualizationMengyuan Li, Yinqian Zhang, Huibo Wang, Kang Li, Yueqiang Cheng. 609-619 [doi]
- Reinhardt: Real-time Reconfigurable Hardware Architecture for Regular Expression Matching in DPITaejune Park, Jaehyun Nam, Seung Ho Na, JaeWoong Chung, Seungwon Shin. 620-633 [doi]
- Understanding the Threats of Trojaned Quantized Neural Network in Model Supply ChainsXudong Pan, Mi Zhang, Yifan Yan, Min Yang. 634-645 [doi]
- FlexFilt: Towards Flexible Instruction Filtering for SecurityLeila Delshadtehrani, Sadullah Canakci, William Blair, Manuel Egele, Ajay Joshi. 646-659 [doi]
- RingRAM: A Unified Hardware SecurityPrimitive for IoT Devices that Gets Better with AgeMichael Moukarzel, Matthew Hicks. 660-674 [doi]
- SODA: A System for Cyber Deception Orchestration and AutomationMd Sajidul Islam Sajid, Jinpeng Wei, Basel Abdeen, Ehab Al-Shaer, Md Mazharul Islam, Walter Diong, Latifur Khan. 675-689 [doi]
- Reproducible and Adaptable Log Data Generation for Sound Cybersecurity ExperimentsRafael Uetz, Christian Hemminghaus, Louis Hackländer, Philipp Schlipper, Martin Henze. 690-705 [doi]
- Obfuscation Revealed: Leveraging Electromagnetic Signals for Obfuscated Malware ClassificationDuy-Phuc Pham, Damien Marion 0001, Matthieu Mastio, Annelie Heuser. 706-719 [doi]
- CommanderGabble: A Universal Attack Against ASR Systems Leveraging Fast SpeechZhaohe (John) Zhang, Edwin Yang, Song Fang. 720-731 [doi]
- Physical Logic Bombs in 3D Printers via Emerging 4D TechniquesTuan Le, Sriharsha Etigowni, Sizhuang Liang, Xirui Peng, H. Jerry Qi, Mehdi Javanmard, Saman A. Zonouz, Raheem Beyah. 732-747 [doi]
- SolSaviour: A Defending Framework for Deployed Defective Smart ContractsZecheng Li, Yu Zhou, Songtao Guo, Bin Xiao 0001. 748-760 [doi]
- Improving Streaming Cryptocurrency Transaction Classification via Biased Sampling and Graph FeedbackShaltiel Eloul, Sean J. Moran, Jacob Mendel. 761-772 [doi]
- Mitosis: Practically Scaling Permissioned BlockchainsGiorgia Azzurra Marson, Sébastien Andreina, Lorenzo Alluminio, Konstantin Munichev, Ghassan Karame. 773-783 [doi]
- An Exploration of ARM System-Level Cache and GPU Side ChannelsPatrick Cronin, Xing Gao 0001, Haining Wang, Chase Cotton. 784-795 [doi]
- LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped SystemsNiclas Kühnapfel, Stefan Preußler, Maximilian Noppel, Thomas Schneider, Konrad Rieck, Christian Wressnegger. 796-811 [doi]
- Rupair: Towards Automatic Buffer Overflow Detection and Rectification for RustBaojian Hua, Wanrong Ouyang, Chengman Jiang, Qiliang Fan, Zhizhong Pan. 812-823 [doi]
- Keeping Safe Rust Safe with GaleedElijah Rivera, Samuel Mergendahl, Howard E. Shrobe, Hamed Okhravi, Nathan Burow. 824-836 [doi]
- DistAppGaurd: Distributed Application Behaviour Profiling in Cloud-Based EnvironmentMohammad Mahdi Ghorbani, Fereydoun Farrahi Moghaddam, Mengyuan Zhang, Makan Pourzandi, Kim Khoa Nguyen, Mohamed Cheriet. 837-848 [doi]
- ICS3Fuzzer: A Framework for Discovering Protocol Implementation Bugs in ICS Supervisory Software by FuzzingDongliang Fang, Zhanwei Song, Le Guan, Puzhuo Liu, Anni Peng, Kai Cheng, Yaowen Zheng, Peng Liu, Hongsong Zhu, Limin Sun. 849-860 [doi]
- argXtract: Deriving IoT Security Configurations via Automated Static Analysis of Stripped ARM Cortex-M BinariesPallavi Sivakumaran, Jorge Blasco. 861-876 [doi]
- On Key Reinstallation Attacks over 4G LTE Control-Plane: Feasibility and Negative ImpactMuhammad Taqi Raza, Yunqi Guo, Songwu Lu, Fatima Muhammad Anwar. 877-886 [doi]
- Security of Multicarrier Time-of-Flight RangingPatrick Leu, Martin Kotuliak, Marc Roeschlin, Srdjan Capkun. 887-899 [doi]
- Don't hand it Over: Vulnerabilities in the Handover Procedure of Cellular TelecommunicationsEvangelos Bitsikas, Christina Pöpper. 900-915 [doi]
- Time to Rethink the Design of Qi Standard? Security and Privacy Vulnerability Analysis of Qi Wireless ChargingYi Wu, Zhuohang Li, Nicholas Van Nostrand, Jian Liu 0001. 916-929 [doi]
- Detecting and Characterizing SMS Spearphishing AttacksMingxuan Liu, Yiming Zhang 0009, Baojun Liu, Zhou Li 0001, Haixin Duan, Donghong Sun. 930-943 [doi]
- Characterizing Improper Input Validation Vulnerabilities of Mobile Crowdsourcing ServicesSojhal Ismail Khan, Dominika C. Woszczyk, Chengzeng You, Soteris Demetriou, Muhammad Naveed 0001. 944-956 [doi]
- Towards Stalkerware Detection with Precise WarningsYufei Han, Kevin Alejandro Roundy, Acar Tamersoy. 957-969 [doi]
- Repack Me If You Can: An Anti-Repackaging Solution Based on Android VirtualizationAntonio Ruggia, Eleonora Losiouk, Luca Verderame, Mauro Conti, Alessio Merlo. 970-981 [doi]
- Westworld: Fuzzing-Assisted Remote Dynamic Symbolic Execution of Smart Apps on IoT Cloud PlatformsLannan Luo, Qiang Zeng 0001, Bokai Yang, Fei Zuo, Junzhe Wang. 982-995 [doi]
- The Emperor's New Autofill Framework: A Security Analysis of Autofill on iOS and AndroidSean Oesch, Anuj Gautam, Scott Ruoti. 996-1010 [doi]
- FINN: Fingerprinting Network Flows using Neural NetworksFatemeh Rezaei, Amir Houmansadr. 1011-1024 [doi]
- MAppGraph: Mobile-App Classification on Encrypted Network Traffic using Deep Graph Convolution Neural NetworksThai-Dien Pham, Thien-Lac Ho, Tram Truong Huu, Tien-Dung Cao, Hong-Linh Truong 0001. 1025-1038 [doi]
- SMap: Internet-wide Scanning for SpoofingTianxiang Dai, Haya Shulman. 1039-1050 [doi]
- MineHunter: A Practical Cryptomining Traffic Detection Algorithm Based on Time Series TrackingShize Zhang, Zhiliang Wang, Jiahai Yang, Xin Cheng, Xiaoqian Ma, Hui Zhang, Bo Wang, Zimu Li, Jianping Wu. 1051-1063 [doi]
- Platform-Oblivious Anti-Spam GatewayYihe Zhang, Xu Yuan, Nian-Feng Tzeng. 1064-1077 [doi]