Abstract is missing.
- Trustworthy Machine Learning: Past, Present, and FutureSomesh Jha. 1 [doi]
- Robust and Verifiable Information Embedding Attacks to Deep Neural Networks via Error-Correcting CodesJinyuan Jia, Binghui Wang, Neil Zhenqiang Gong. 2-13 [doi]
- IPGuard: Protecting Intellectual Property of Deep Neural Networks via Fingerprinting the Classification BoundaryXiaoyu Cao, Jinyuan Jia, Neil Zhenqiang Gong. 14-25 [doi]
- A Diversity Index based Scoring Framework for Identifying Smart Meters Launching Stealthy Data Falsification AttacksShameek Bhattacharjee, Venkata Praveen Kumar Madhavarapu, Sajal K. Das 0001. 26-39 [doi]
- Exploiting the Sensitivity of L2 Adversarial Examples to Erase-and-RestoreFei Zuo, Qiang Zeng 0001. 40-51 [doi]
- ConAML: Constrained Adversarial Machine Learning for Cyber-Physical SystemsJiangnan Li, Yingyuan Yang, Jinyuan Stella Sun, Kevin Tomsovic, Hairong Qi. 52-66 [doi]
- EchoVib: Exploring Voice Authentication via Unique Non-Linear Vibrations of Short Replayed SpeechS. Abhishek Anand, Jian Liu 0001, Chen Wang, Maliheh Shirvanian, Nitesh Saxena, Yingying Chen 0001. 67-81 [doi]
- HVAC: Evading Classifier-based Defenses in Hidden Voice AttacksYi Wu, Xiangyu Xu, Payton R. Walker, Jian Liu 0001, Nitesh Saxena, Yingying Chen 0001, Jiadi Yu. 82-94 [doi]
- Conware: Automated Modeling of Hardware PeripheralsChad Spensky, Aravind Machiry, Nilo Redini, Colin Unger, Graham Foster, Evan Blasband, Hamed Okhravi, Christopher Kruegel, Giovanni Vigna. 95-109 [doi]
- Careful Who You Trust: Studying the Pitfalls of Cross-Origin CommunicationGordon Meiser, Pierre Laperdrix, Ben Stock. 110-122 [doi]
- Oversharing Is Not Caring: How CNAME Cloaking Can Expose Your Session CookiesAssel Aliyeva, Manuel Egele. 123-134 [doi]
- P2DPI: Practical and Privacy-Preserving Deep Packet InspectionJongkil Kim, Seyit Camtepe, Joonsang Baek, Willy Susilo, Josef Pieprzyk, Surya Nepal. 135-146 [doi]
- Camoufler: Accessing The Censored Web By Utilizing Instant Messaging ChannelsPiyush Kumar Sharma, Devashish Gosain, Sambuddho Chakravarty. 147-161 [doi]
- Red Alert for Power Leakage: Exploiting Intel RAPL-Induced Side ChannelsZhenkai Zhang, Sisheng Liang, Fan Yao, Xing Gao. 162-175 [doi]
- PLI-TDC: Super Fine Delay-Time Based Physical-Layer Identification with Time-to-Digital Converter for In-Vehicle NetworksShuji Ohira, Araya Kibrom Desta, Ismail Arai, Kazutoshi Fujikawa. 176-186 [doi]
- HECTOR-V: A Heterogeneous CPU Architecture for a Secure RISC-V Execution EnvironmentPascal Nasahl, Robert Schilling, Mario Werner, Stefan Mangard. 187-199 [doi]
- CrypTag: Thwarting Physical and Logical Memory Vulnerabilities using Cryptographically Colored MemoryPascal Nasahl, Robert Schilling, Mario Werner, Jan Hoogerbrugge, Marcel Medwed, Stefan Mangard. 200-212 [doi]
- Efficient Verifiable Image Redacting based on zk-SNARKsHankyung Ko, Ingeun Lee, Seunghwa Lee, Jihye Kim, Hyunok Oh. 213-226 [doi]
- Secure Role and Rights Management for Automotive Access and Feature ActivationChristian Plappert, Lukas Jäger, Andreas Fuchs. 227-241 [doi]
- Pipa: Privacy-preserving Password Checkup via Homomorphic EncryptionJie Li, Yamin Liu, Shuang Wu. 242-251 [doi]
- Multi-User Collusion-Resistant Searchable Encryption with Optimal Search TimeYun Wang, Dimitrios Papadopoulos. 252-264 [doi]
- HoneyGen: Generating Honeywords Using Representation LearningAntreas Dionysiou, Vassilis Vassiliades, Elias Athanasopoulos. 265-279 [doi]
- On Detecting Deception in Space Situational AwarenessJames Pavur, Ivan Martinovic. 280-291 [doi]
- AMEBA: An Adaptive Approach to the Black-Box Evasion of Machine Learning ModelsStefano Calzavara, Lorenzo Cazzaro, Claudio Lucchese. 292-306 [doi]
- Stealing Deep Reinforcement Learning Models for Fun and ProfitKangjie Chen, Shangwei Guo, Tianwei Zhang 0004, Xiaofei Xie, Yang Liu. 307-319 [doi]
- Streamlet: An Absurdly Simple, Textbook Blockchain ProtocolElaine Shi. 320 [doi]
- REFIT: A Unified Watermark Removal Framework For Deep Learning Systems With Limited DataXinyun Chen, Wenxiao Wang 0002, Chris Bender, Yiming Ding, Ruoxi Jia, Bo Li, Dawn Song. 321-335 [doi]
- Recompose Event Sequences vs. Predict Next Events: A Novel Anomaly Detection Approach for Discrete Event LogsLun-Pin Yuan, Peng Liu, Sencun Zhu. 336-348 [doi]
- Robust Roadside Physical Adversarial Attack Against Deep Learning in Lidar Perception ModulesKaichen Yang, Tzungyu Tsai, Honggang Yu, Max Panoff, Tsung-Yi Ho, Yier Jin. 349-362 [doi]
- DeepSweep: An Evaluation Framework for Mitigating DNN Backdoor Attacks using Data AugmentationHan Qiu 0001, Yi Zeng, Shangwei Guo, Tianwei Zhang 0004, Meikang Qiu, Bhavani M. Thuraisingham. 363-377 [doi]
- Morshed: Guiding Behavioral Decision-Makers towards Better Security Investment in Interdependent SystemsMustafa Abdallah, Daniel Woods, Parinaz Naghizadeh, Issa Khalil, Timothy N. Cason, Shreyas Sundaram, Saurabh Bagchi. 378-392 [doi]
- Analyzing the Overhead of File Protection by Linux Security ModulesWenhui Zhang, Peng Liu, Trent Jaeger. 393-406 [doi]
- Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing EcosystemDoowon Kim, Haehyun Cho, Yonghwi Kwon, Adam Doupé, Sooel Son, Gail-Joon Ahn, Tudor Dumitras. 407-420 [doi]
- ARGUS: Assessing Unpatched Vulnerable Devices on the Internet via Efficient Firmware RecognitionWei Xie, Chao Zhang, Pengfei Wang, Zhenhua Wang, Qiang Yang. 421-431 [doi]
- Filtering DDoS Attacks from Unlabeled Network Traffic Data Using Online Deep LearningWesley Joon-Wie Tann, Jackie Tan Jin Wei, Joanna Purba, Ee-Chien Chang. 432-446 [doi]
- Bypassing Push-based Second Factor and Passwordless Authentication with Human-Indistinguishable NotificationsMohammed Jubur, Prakash Shrestha, Nitesh Saxena, Jay Prakash. 447-461 [doi]
- Click This, Not That: Extending Web Authentication with DeceptionTimothy Barron, Johnny So, Nick Nikiforakis. 462-474 [doi]
- Analyzing Spatial Differences in the TLS Security of Delegated Web ServicesJoonhee Lee, Hyunwoo Lee 0001, Jongheon Jeong, Doowon Kim, Ted Taekyoung Kwon. 475-487 [doi]
- Hash-Enabled Garbling and the Insecurity of Free-Hashing Garbled CircuitsRuiyu Zhu, Yan Huang 0001. 488-500 [doi]
- Look Before You Leap: Secure Connection Bootstrapping for 5G Networks to Defend Against Fake Base-StationsAnkush Singla, Rouzbeh Behnia, Syed Rafiul Hussain, Attila A. Yavuz, Elisa Bertino. 501-515 [doi]
- Efficient Graph Encryption Scheme for Shortest Path QueriesEsha Ghosh, Seny Kamara, Roberto Tamassia. 516-525 [doi]
- How to Take Over DronesSebastian Plotz, Frederik Armknecht, Christian Bunse. 526-536 [doi]
- Localizing Vulnerabilities Statistically From One ExploitShiqi Shen, Aashish Kolluri, Zhen Dong, Prateek Saxena, Abhik Roychoudhury. 537-549 [doi]
- Cali: Compiler-Assisted Library IsolationMarkus Bauer, Christian Rossow. 550-564 [doi]
- Privilege-Escalation Vulnerability Discovery for Large-scale RPC Services: Principle, Design, and DeploymentZhuotao Liu, Hao Zhao, Sainan Li, Qi Li, Tao Wei, Yu Wang. 565-577 [doi]
- Measuring User Perception for Detecting Unexpected Access to Sensitive Resource in Mobile AppsTrung Tin Nguyen, Duc-Cuong Nguyen, Michael Schilling, Gang Wang, Michael Backes 0001. 578-592 [doi]
- Low-Cost Hiding of the Query PatternMaryam Sepehri, Florian Kerschbaum. 593-603 [doi]
- Horizontal Privacy-Preserving Linear Regression Which is Highly Efficient for Dataset of Low DimensionLinpeng Lu, Ning Ding. 604-615 [doi]
- Accelerating Secure (2+1)-Party Computation by Insecure but Efficient Building BlocksKeitaro Hiwatashi, Ken Ogura, Satsuya Ohata, Koji Nuida. 616-627 [doi]
- Encrypted Databases: Progresses and ChallengesKui Ren. 628 [doi]
- Cryptographic Key Derivation from Biometric Inferences for Remote AuthenticationErkam Uzun, Carter Yagemann, Simon P. Chung, Vladimir Kolesnikov, Wenke Lee. 629-643 [doi]
- Understanding the Privacy Implications of Adblock Plus's Acceptable AdsAhsan Zafar, Aafaq Sabir, Dilawer Ahmed, Anupam Das 0001. 644-657 [doi]
- Privacy-preserving Density-based ClusteringBeyza Bozdemir, Sébastien Canard, Orhan Ermis, Helen Möllering, Melek Önen, Thomas Schneider 0003. 658-671 [doi]
- DySan: Dynamically Sanitizing Motion Sensor Data Against Sensitive Inferences through Adversarial NetworksAntoine Boutet, Carole Frindel, Sébastien Gambs, Théo Jourdan, Rosin Claude Ngueveu. 672-686 [doi]
- SoK: Enabling Security Analyses of Embedded Systems via RehostingAndrew Fasano, Tiemoko Ballo, Marius Muench, Tim Leek, Alexander Bulekov, Brendan Dolan-Gavitt, Manuel Egele, Aurélien Francillon, Long Lu, Nick Gregory, Davide Balzarotti, William Robertson 0002. 687-701 [doi]
- BugGraph: Differentiating Source-Binary Code Similarity with Graph Triplet-Loss NetworkYuede Ji, Lei Cui, H. Howie Huang. 702-715 [doi]
- Evaluating Synthetic BugsJoshua Bundt, Andrew Fasano, Brendan Dolan-Gavitt, William Robertson 0002, Tim Leek. 716-730 [doi]
- Bran: Reduce Vulnerability Search Space in Large Open Source Repositories by Learning Bug SymptomsDongyu Meng, Michele Guerriero, Aravind Machiry, Hojjat Aghakhani, Priyanka Bose, Andrea Continella, Christopher Kruegel, Giovanni Vigna. 731-743 [doi]
- Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable BytesKeane Lucas, Mahmood Sharif, Lujo Bauer, Michael K. Reiter, Saurabh Shintre. 744-758 [doi]
- Identifying Behavior Dispatchers for Malware AnalysisKyuhong Park, Burak Sahin, Yongheng Chen, Jisheng Zhao, Evan Downing, Hong Hu 0004, Wenke Lee. 759-773 [doi]
- MalPhase: Fine-Grained Malware Detection Using Network Flow DataMichal Piskozub, Fabio De Gaspari, Freddie Barr-Smith, Luigi V. Mancini, Ivan Martinovic. 774-786 [doi]
- Targeting the Weakest Link: Social Engineering Attacks in Ethereum Smart ContractsNikolay Ivanov, Jianzhi Lou, Ting Chen, Jin Li 0002, Qiben Yan. 787-801 [doi]
- PSec: Programming Secure Distributed Systems using EnclavesShivendra Kushwah, Ankush Desai, Pramod Subramanyan, Sanjit A. Seshia. 802-816 [doi]
- Fact and Fiction: Challenging the Honest Majority Assumption of Permissionless BlockchainsRunchao Han, Zhimei Sui, Jiangshan Yu, Joseph K. Liu, Shiping Chen 0001. 817-831 [doi]
- Non-Intrusive and High-Efficient Balance Tomography in the Lightning NetworkYan Qiao, Kui Wu, Majid Khabbazian. 832-843 [doi]
- Redactable Blockchain Supporting Supervision and Self-ManagementYanxue Jia, Shifeng Sun, Yi Zhang, Zhiqiang Liu, Dawu Gu. 844-858 [doi]
- Non-Equivocation in Blockchain: Double-Authentication-Preventing Signatures Gone ContractualYannan Li, Willy Susilo, Guomin Yang, Yong Yu 0002, Tran Viet Xuan Phuong, Dongxi Liu. 859-871 [doi]
- (Mis)managed: A Novel TLB-based Covert Channel on GPUsAjay Nayak, B. Pratheek, Vinod Ganapathy, Arkaprava Basu. 872-885 [doi]
- Scanning the Cycle: Timing-based Authentication on PLCsChuadhry Mujeeb Ahmed, Martín Ochoa, Jianying Zhou 0001, Aditya Mathur. 886-900 [doi]
- Transduction Shield: A Low-Complexity Method to Detect and Correct the Effects of EMI Injection Attacks on SensorsYazhou Tu, Vijay Srinivas Tida, Zhongqi Pan, Xiali Hei. 901-915 [doi]
- Analysis and Takeover of the Bitcoin-Coordinated Pony MalwareTsuyoshi Taniguchi, Harm Griffioen, Christian Doerr. 916-930 [doi]
- See through Walls: Detecting Malware in SGX Enclaves with SGX-BouncerZeyu Zhang, Xiaoli Zhang, Qi Li 0002, Kun Sun 0001, Yinqian Zhang, Songsong Liu, Yukun Liu, Xiaoning Li. 931-943 [doi]
- UltraPIN: Inferring PIN Entries via UltrasoundXiming Liu, Yingjiu Li, Robert H. Deng. 944-957 [doi]