Abstract is missing.
- Security and Machine LearningDavid A. Wagner 0001. 1 [doi]
- DUPLO: Unifying Cut-and-Choose for Garbled CircuitsVladimir Kolesnikov, Jesper Buus Nielsen, Mike Rosulek, Ni Trieu, Roberto Trifiletti. 3-20 [doi]
- Authenticated Garbling and Efficient Maliciously Secure Two-Party ComputationXiao Wang, Samuel Ranellucci, Jonathan Katz. 21-37 [doi]
- Global-Scale Secure Multiparty ComputationXiao Wang, Samuel Ranellucci, Jonathan Katz. 39-56 [doi]
- Hearing Your Voice is Not Enough: An Articulatory Gesture Based Liveness Detection for Voice AuthenticationLinghan Zhang, Sheng Tan, Jie Yang 0003. 57-71 [doi]
- VibWrite: Towards Finger-input Authentication on Ubiquitous Surfaces via Physical VibrationJian Liu, Chen Wang, Yingying Chen, Nitesh Saxena. 73-87 [doi]
- Presence Attestation: The Missing Link in Dynamic Trust BootstrappingZhangkai Zhang, Xuhua Ding, Gene Tsudik, Jinhua Cui, Zhoujun Li. 89-102 [doi]
- DolphinAttack: Inaudible Voice CommandsGuoming Zhang, Chen Yan, Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, Wenyuan Xu. 103-117 [doi]
- Evading Classifiers by Morphing in the DarkHung Dang, Yue Huang, Ee-Chien Chang. 119-133 [doi]
- MagNet: A Two-Pronged Defense against Adversarial ExamplesDongyu Meng, Hao Chen. 135-147 [doi]
- Hindsight: Understanding the Evolution of UI Vulnerabilities in Mobile BrowsersMeng Luo, Oleksii Starov, Nima Honarmand, Nick Nikiforakis. 149-162 [doi]
- Deterministic BrowserYinzhi Cao, Zhanhao Chen, Song Li, Shujiang Wu. 163-178 [doi]
- Most Websites Don't Need to Vibrate: A Cost-Benefit Approach to Improving Browser SecurityPeter Snyder, Cynthia Taylor, Chris Kanich. 179-194 [doi]
- Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on BitcoinYujin Kwon, Dohyun Kim, Yunmok Son, Eugene Y. Vasserman, Yongdae Kim. 195-209 [doi]
- Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud ComputingChangyu Dong, Yilei Wang, Amjad Aldweesh, Patrick McCorry, Aad van Moorsel. 211-227 [doi]
- Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for ServicesMatteo Campanelli, Rosario Gennaro, Steven Goldfeder, Luca Nizzardo. 229-243 [doi]
- Pool: Scalable On-Demand Secure Computation Service Against Malicious AdversariesRuiyu Zhu, Yan Huang, Darion Cassel. 245-257 [doi]
- A Framework for Constructing Fast MPC over Arithmetic Circuits with Malicious Adversaries and an Honest-MajorityYehuda Lindell, Ariel Nof. 259-276 [doi]
- Efficient, Constant-Round and Actively Secure MPC: Beyond the Three-Party CaseNishanth Chandran, Juan A. Garay, Payman Mohassel, Satyanarayana Vusirikala. 277-294 [doi]
- Let's Go in for a Closer Look: Observing Passwords in Their Natural HabitatSarah Pearman, Jeremy Thomas, Pardis Emami Naeini, Hana Habib, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Serge Egelman, Alain Forget. 295-310 [doi]
- Why Do Developers Get Password Storage Wrong?: A Qualitative Usability StudyAlena Naiakshina, Anastasia Danilova, Christian Tiefenau, Marco Herzog, Sergej Dechand, Matthew Smith 0001. 311-328 [doi]
- The TypTop System: Personalized Typo-Tolerant Password CheckingRahul Chatterjee, Joanne Woodage, Yuval Pnueli, Anusha Chowdhury, Thomas Ristenpart. 329-346 [doi]
- Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human AssistanceYan Shoshitaishvili, Michael Weissbacher, Lukas Dresel, Christopher Salls, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna. 347-362 [doi]
- Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity DetectionXiaojun Xu, Chang Liu, Qian Feng, Heng Yin, Le Song, Dawn Song. 363-376 [doi]
- RAIN: Refinable Attack Investigation with On-demand Inter-Process Information Flow TrackingYang Ji, Sangho Lee, Evan Downing, Weiren Wang, Mattia Fazzini, Taesoo Kim, Alessandro Orso, Wenke Lee. 377-390 [doi]
- Synthesis of Probabilistic Privacy EnforcementMartin Kucera, Petar Tsankov, Timon Gehr, Marco Guarnieri, Martin T. Vechev. 391-408 [doi]
- A Type System for Privacy PropertiesVéronique Cortier, Niklas Grimm, Joseph Lallemand, Matteo Maffei. 409-423 [doi]
- Generating Synthetic Decentralized Social Graphs with Local Differential PrivacyZhan Qin, Ting Yu, Yin Yang, Issa Khalil, Xiaokui Xiao, Kui Ren 0001. 425-438 [doi]
- Revive: Rebalancing Off-Blockchain Payment NetworksRami Khalil, Arthur Gervais. 439-453 [doi]
- Concurrency and Privacy with Payment-Channel NetworksGiulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, Srivatsan Ravi. 455-471 [doi]
- Bolt: Anonymous Payment Channels for Decentralized CurrenciesMatthew Green 0001, Ian Miers. 473-489 [doi]
- 3ORAM: A Computation-Efficient and Constant Client Bandwidth Blowup ORAM with Shamir Secret SharingThang Hoang, Ceyhun D. Ozkaptan, Attila A. Yavuz, Jorge Guajardo, Tam Nguyen. 491-505 [doi]
- Deterministic, Stash-Free Write-Only ORAMDaniel S. Roche, Adam J. Aviv, Seung Geol Choi, Travis Mayberry. 507-521 [doi]
- Scaling ORAM for Secure ComputationJack Doerner, Abhi Shelat. 523-535 [doi]
- Don't Let One Rotten Apple Spoil the Whole Barrel: Towards Automated Detection of Shadowed DomainsDaiping Liu, Zhou Li, Kun Du, Haining Wang, Baojun Liu, Hai-Xin Duan. 537-552 [doi]
- Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared HostingSamaneh Tajalizadehkhoob, Tom van Goethem, Maciej Korczynski, Arman Noroozian, Rainer Böhme, Tyler Moore, Wouter Joosen, Michel van Eeten. 553-567 [doi]
- Hiding in Plain Sight: A Longitudinal Study of Combosquatting AbusePanagiotis Kintis, Najmeh Miramirkhani, Charles Lever, Yizheng Chen, Rosa Romero Gómez, Nikolaos Pitropakis, Nick Nikiforakis, Manos Antonakakis. 569-586 [doi]
- Machine Learning Models that Remember Too MuchCongzheng Song, Thomas Ristenpart, Vitaly Shmatikov. 587-601 [doi]
- Deep Models Under the GAN: Information Leakage from Collaborative Deep LearningBriland Hitaj, Giuseppe Ateniese, Fernando Pérez-Cruz. 603-618 [doi]
- Oblivious Neural Network Predictions via MiniONN TransformationsJian Liu, Mika Juuti, Yao Lu, N. Asokan. 619-631 [doi]
- Verifying Security Policies in Multi-agent Workflows with LoopsBernd Finkbeiner, Christian Müller 0008, Helmut Seidl, Eugen Zalinescu. 633-645 [doi]
- Attribute-Based Encryption in the Generic Group Model: Automated Proofs and New ConstructionsMiguel Ambrona, Gilles Barthe, Romain Gay, Hoeteck Wee. 647-664 [doi]
- FAME: Fast Attribute-based Message EncryptionShashank Agrawal, Melissa Chase. 665-682 [doi]
- Practical UC-Secure Delegatable Credentials with Attributes and Their Application to BlockchainJan Camenisch, Manu Drijvers, Maria Dubovitskaya. 683-699 [doi]
- Solidus: Confidential Distributed Ledger Transactions via PVORMEthan Cecchetti, Fan Zhang, Yan Ji, Ahmed E. Kosba, Ari Juels, Elaine Shi. 701-717 [doi]
- Fairness in an Unfair World: Fair Multiparty Computation from Public Bulletin BoardsArka Rai Choudhuri, Matthew Green 0001, Abhishek Jain 0002, Gabriel Kaptchuk, Ian Miers. 719-728 [doi]
- 5Gen-C: Multi-input Functional Encryption and Program Obfuscation for Arithmetic CircuitsBrent Carmer, Alex J. Malozemoff, Mariana Raykova 0001. 747-764 [doi]
- IRON: Functional Encryption using Intel SGXBen Fisch, Dhinakaran Vinayagamurthy, Dan Boneh, Sergey Gorbunov. 765-782 [doi]
- Implementing BP-Obfuscation Using Graph-Induced EncodingShai Halevi, Tzipora Halevi, Victor Shoup, Noah Stephens-Davidowitz. 783-798 [doi]
- AUTHSCOPE: Towards Automatic Discovery of Vulnerable Authorizations in Online ServicesChaoshun Zuo, Qingchuan Zhao, Zhiqiang Lin. 799-813 [doi]
- Mass Discovery of Android Traffic Imprints through Instantiated Partial ExecutionYi Chen, Wei You, Yeonjoon Lee, Kai Chen, Xiaofeng Wang, Wei Zou. 815-828 [doi]
- Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViewsTongxin Li, Xueqiang Wang, Mingming Zha, Kai Chen, Xiaofeng Wang, Luyi Xing, Xiaolong Bai, Nan Zhang, Xinhui Han. 829-844 [doi]
- May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519Daniel Genkin, Luke Valenta, Yuval Yarom. 845-858 [doi]
- STACCO: Differentially Analyzing Side-Channel Traces for Detecting SSL/TLS Vulnerabilities in Secure EnclavesYuan Xiao, Mengyuan Li, Sanchuan Chen, Yinqian Zhang. 859-874 [doi]
- Precise Detection of Side-Channel Vulnerabilities using Quantitative Cartesian Hoare LogicJia Chen, Yu Feng, Isil Dillig. 875-890 [doi]
- Better Than Advertised: Improved Collision-Resistance Guarantees for MD-Based Hash FunctionsMihir Bellare, Joseph Jaeger, Julia Len. 891-906 [doi]
- Generic Semantic Security against a Kleptographic AdversaryAlexander Russell, Qiang Tang 0005, Moti Yung, Hong-Sheng Zhou. 907-922 [doi]
- Defending Against Key Exfiltration: Efficiency Improvements for Big-Key Cryptography via Large-Alphabet Subkey PredictionMihir Bellare, Wei Dai. 923-940 [doi]
- Client-side Name Collision Vulnerability in the New gTLD Era: A Systematic StudyQi Alfred Chen, Matthew Thomas, Eric Osterweil, Yulong Cao, Jie You, Zhuoqing Morley Mao. 941-956 [doi]
- The Wolf of Name Street: Hijacking Domains Through Their NameserversThomas Vissers, Timothy Barron, Tom van Goethem, Wouter Joosen, Nick Nikiforakis. 957-970 [doi]
- Faulds: A Non-Parametric Iterative Classifier for Internet-Wide OS FingerprintingZain Shamsi, Daren B. H. Cline, Dmitri Loguinov. 971-982 [doi]
- T/Key: Second-Factor Authentication From Secure Hash ChainsDmitry Kogan, Nathan Manohar, Dan Boneh. 983-999 [doi]
- Practical Graphs for Optimal Side-Channel Resistant Memory-Hard FunctionsJoël Alwen, Jeremiah Blocki, Ben Harsha. 1001-1017 [doi]
- Better Bounds for Block Cipher Modes of Operation via Nonce-Based Key DerivationShay Gueron, Yehuda Lindell. 1019-1036 [doi]
- The ART of App Compartmentalization: Compiler-based Library Privilege Separation on Stock AndroidJie Huang, Oliver Schranz, Sven Bugiel, Michael Backes 0001. 1037-1049 [doi]
- Vulnerable Implicit Service: A RevisitLingguang Lei, Yi He, Kun Sun, Jiwu Jing, Yuewu Wang, Qi Li, Jian Weng. 1051-1063 [doi]
- A Stitch in Time: Supporting Android Developers in WritingSecure CodeDuc-Cuong Nguyen, Dominik Wermke, Yasemin Acar, Michael Backes 0001, Charles Weir, Sascha Fahl. 1065-1077 [doi]
- Exploiting a Thermal Side Channel for Power Attacks in Multi-Tenant Data CentersMohammad A. Islam, Shaolei Ren, Adam Wierman. 1079-1094 [doi]
- Watch Me, but Don't Touch Me! Contactless Control Flow Monitoring via Electromagnetic EmanationsYi Han, Sriharsha Etigowni, Hua Liu, Saman A. Zonouz, Athina P. Petropulu. 1095-1108 [doi]
- Viden: Attacker Identification on In-Vehicle NetworksKyong-Tak Cho, Kang G. Shin. 1109-1123 [doi]
- Practical Attacks Against Graph-based ClusteringYizheng Chen, Yacin Nadji, Athanasios Kountouras, Fabian Monrose, Roberto Perdisci, Manos Antonakakis, Nikolaos Vasiloglou 0002. 1125-1142 [doi]
- Automated Crowdturfing Attacks and Defenses in Online Review SystemsYuanshun Yao, Bimal Viswanath, Jenna Cryan, Haitao Zheng, Ben Y. Zhao. 1143-1158 [doi]
- POISED: Spotting Twitter Spam Off the Beaten PathsShirin Nilizadeh, Francois Labreche, Alireza Sedighian, Ali Zand, José M. Fernandez, Christopher Kruegel, Gianluca Stringhini, Giovanni Vigna. 1159-1174 [doi]
- Practical Secure Aggregation for Privacy-Preserving Machine LearningKeith Bonawitz, Vladimir Ivanov, Ben Kreuter, Antonio Marcedone, H. Brendan McMahan, Sarvar Patel, Daniel Ramage, Aaron Segal, Karn Seth. 1175-1191 [doi]
- Use Privacy in Data-Driven Systems: Theory and Experiments with Machine Learnt ProgramsAnupam Datta, Matthew Fredrikson, Gihyuk Ko, Piotr Mardziel, Shayak Sen. 1193-1210 [doi]
- SGX-BigMatrix: A Practical Encrypted Data Analytic Framework With Trusted ProcessorsFahad Shaon, Murat Kantarcioglu, Zhiqiang Lin, Latifur Khan. 1211-1228 [doi]
- Malicious-Secure Private Set Intersection via Dual ExecutionPeter Rindal, Mike Rosulek. 1229-1242 [doi]
- Fast Private Set Intersection from Homomorphic EncryptionHao Chen, Kim Laine, Peter Rindal. 1243-1255 [doi]
- Practical Multi-party Private Set Intersection from Symmetric-Key TechniquesVladimir Kolesnikov, Naor Matania, Benny Pinkas, Mike Rosulek, Ni Trieu. 1257-1272 [doi]
- Detecting Structurally Anomalous Logins Within Enterprise NetworksHossein Siadati, Nasir D. Memon. 1273-1284 [doi]
- DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep LearningMin Du, Feifei Li 0001, Guineng Zheng, Vivek Srikumar. 1285-1298 [doi]
- RiskTeller: Predicting the Risk of Cyber IncidentsLeyla Bilge, Yufei Han, Matteo Dell'Amico. 1299-1311 [doi]
- Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2Mathy Vanhoef, Frank Piessens. 1313-1328 [doi]
- CCCP: Closed Caption Crypto Phones to Resist MITM Attacks, Human Errors and Click-ThroughMaliheh Shirvanian, Nitesh Saxena. 1329-1342 [doi]
- No-Match Attacks and Robust Partnering Definitions: Defining Trivial Attacks for Security Protocols is Not TrivialYong Li, Sven Schäge. 1343-1360 [doi]
- Querying for Queries: Indexes of Queries for Efficient and Expressive IT-PIRSyed Mahbub Hafiz, Ryan Henry. 1361-1373 [doi]
- PeGaSus: Data-Adaptive Differentially Private Stream ProcessingYan Chen, Ashwin Machanavajjhala, Michael Hay, Gerome Miklau. 1375-1388 [doi]
- Composing Differential Privacy and Secure Computation: A Case Study on Scaling Private Record LinkageXi He, Ashwin Machanavajjhala, Cheryl J. Flynn, Divesh Srivastava. 1389-1406 [doi]
- Where the Wild Warnings Are: Root Causes of Chrome HTTPS Certificate ErrorsMustafa Emre Acer, Emily Stark, Adrienne Porter Felt, Sascha Fahl, Radhika Bhargava, Bhanu Dev, Matt Braithwaite, Ryan Sleevi, Parisa Tabriz. 1407-1420 [doi]
- Data Breaches, Phishing, or Malware?: Understanding the Risks of Stolen CredentialsKurt Thomas, Frank Li, Ali Zand, Jacob Barrett, Juri Ranieri, Luca Invernizzi, Yarik Markov, Oxana Comanescu, Vijay Eranti, Angelika Moscicki, Daniel Margolis, Vern Paxson, Elie Bursztein. 1421-1434 [doi]
- Certified Malware: Measuring Breaches of Trust in the Windows Code-Signing PKIDoowon Kim, Bum Jun Kwon, Tudor Dumitras. 1435-1448 [doi]
- Forward Secure Dynamic Searchable Symmetric Encryption with Efficient UpdatesKee Sung Kim, Minkyu Kim, Dongsoo Lee, Je Hong Park, Woo-Hwan Kim. 1449-1463 [doi]
- Forward and Backward Private Searchable Encryption from Constrained Cryptographic PrimitivesRaphaël Bost, Brice Minaud, Olga Ohrimenko. 1465-1482 [doi]
- Economic Factors of Vulnerability Trade and ExploitationLuca Allodi. 1483-1499 [doi]
- Quantifying the Pressure of Legal Risks on Third-party Vulnerability ResearchAlexander Gamero-Garrido, Stefan Savage, Kirill Levchenko, Alex C. Snoeren. 1501-1513 [doi]
- Identity-Based Format-Preserving EncryptionMihir Bellare, Viet Tung Hoang. 1515-1532 [doi]
- Standardizing Bad Cryptographic Practice: A Teardown of the IEEE Standard for Protecting Electronic-design Intellectual PropertyAnimesh Chhotaray, Adib Nahiyan, Thomas Shrimpton, Domenic Forte, Mark Tehranipoor. 1533-1546 [doi]
- New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai ProofsGottfried Herold, Max Hoffmann, Michael Klooß, Carla Ràfols, Andy Rupp. 1547-1564 [doi]
- Practical Quantum-Safe Voting from LatticesRafaël Del Pino, Vadim Lyubashevsky, Gregory Neven, Gregor Seiler. 1565-1581 [doi]
- A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted ComponentsVasilios Mavroudis, Andrea Cerulli, Petr Svenda, Dan Cvrcek, Dusan Klinec, George Danezis. 1583-1600 [doi]
- Provably-Secure Logic Locking: From Theory To PracticeMuhammad Yasin, Abhrajit Sengupta, Mohammed Thari Nabeel, Mohammed Ashraf, Jeyavijayan Rajendran, Ozgur Sinanoglu. 1601-1618 [doi]
- The Return of Coppersmith's Attack: Practical Factorization of Widely Used RSA ModuliMatús Nemec, Marek Sýs, Petr Svenda, Dusan Klinec, Vashek Matyas. 1631-1648 [doi]
- Algorithm Substitution Attacks from a Steganographic PerspectiveSebastian Berndt, Maciej Liskiewicz. 1649-1660 [doi]
- On the Power of Optical Contactless Probing: Attacking Bitstream Encryption of FPGAsShahin Tajik, Heiko Lohrke, Jean-Pierre Seifert, Christian Boit. 1661-1674 [doi]
- The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years LaterVictor van der Veen, Dennis Andriesse, Manolis Stamatogiannakis, Xi Chen, Herbert Bos, Cristiano Giuffrida. 1675-1689 [doi]
- Capturing Malware Propagations with Code Injections and Code-Reuse AttacksDavid Korczynski, Heng Yin. 1691-1708 [doi]
- Code-Reuse Attacks for the Web: Breaking Cross-Site Scripting Mitigations via Script GadgetsSebastian Lekies, Krzysztof Kotowicz, Samuel Groß, Eduardo A. Vela Nava, Martin Johns. 1709-1723 [doi]
- Tail Attacks on Web ApplicationsHuasong Shan, Qingyang Wang, Calton Pu. 1725-1739 [doi]
- Rewriting History: Changing the Archived Web from the PresentAda Lerner, Tadayoshi Kohno, Franziska Roesner. 1741-1755 [doi]
- Deemon: Detecting CSRF with Dynamic Analysis and Property GraphsGiancarlo Pellegrino, Martin Johns, Simon Koch, Michael Backes 0001, Christian Rossow. 1757-1771 [doi]
- A Comprehensive Symbolic Analysis of TLS 1.3Cas Cremers, Marko Horvat, Jonathan Hoyland, Sam Scott, Thyla Van der Merwe. 1773-1788 [doi]
- HACL*: A Verified Modern Cryptographic LibraryJean Karim Zinzindohoué, Karthikeyan Bhargavan, Jonathan Protzenko, Benjamin Beurdouche. 1789-1806 [doi]
- Jasmin: High-Assurance and High-Speed CryptographyJosé Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Arthur Blot, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Hugo Pacheco, Benedikt Schmidt, Pierre-Yves Strub. 1807-1823 [doi]
- Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key PrimitivesMelissa Chase, David Derler, Steven Goldfeder, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig, Greg Zaverucha. 1825-1842 [doi]
- To BLISS-B or not to be: Attacking strongSwan's Implementation of Post-Quantum SignaturesPeter Pessl, Leon Groot Bruinderink, Yuval Yarom. 1843-1855 [doi]
- Side-Channel Attacks on BLISS Lattice-Based Signatures: Exploiting Branch Tracing against strongSwan and Electromagnetic Emanations in MicrocontrollersThomas Espitau, Pierre-Alain Fouque, Benoît Gérard, Mehdi Tibouchi. 1857-1874 [doi]
- Nonmalleable Information Flow ControlEthan Cecchetti, Andrew C. Myers, Owen Arden. 1875-1891 [doi]
- Cryptographically Secure Information Flow Control on Key-Value StoresLucas Waye, Pablo Buiras, Owen Arden, Alejandro Russo, Stephen Chong. 1893-1907 [doi]
- Object Flow IntegrityWenhao Wang, Xiaoyang Xu, Kevin W. Hamlen. 1909-1924 [doi]
- BBA+: Improving the Security and Applicability of Privacy-Preserving Point CollectionGunnar Hartung, Max Hoffmann, Matthias Nagel 0001, Andy Rupp. 1925-1942 [doi]
- walk2friends: Inferring Social Links from Mobility ProfilesMichael Backes 0001, Mathias Humbert, Jun Pang, Yang Zhang. 1943-1957 [doi]
- Back to the Drawing Board: Revisiting the Design of Optimal Location Privacy-preserving MechanismsSimon Oya, Carmela Troncoso, Fernando Pérez-González. 1959-1972 [doi]
- Certified Verification of Algebraic Properties on Low-Level Mathematical Constructs in Cryptographic ProgramsMing-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang. 1973-1987 [doi]
- A Fast and Verified Software Stack for Secure Function EvaluationJosé Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Vitor Pereira. 1989-2006 [doi]
- Verified Correctness and Security of mbedTLS HMAC-DRBGKatherine Q. Ye, Matthew Green, Naphat Sanguansin, Lennart Beringer, Adam Petcher, Andrew W. Appel. 2007-2020 [doi]
- How Unique is Your .onion?: An Analysis of the Fingerprintability of Tor Onion ServicesRebekah Overdorf, Mark Juárez, Gunes Acar, Rachel Greenstadt, Claudia Díaz. 2021-2036 [doi]
- The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing AttacksMilad Nasr, Hadi Zolfaghari, Amir Houmansadr. 2037-2052 [doi]
- Compressive Traffic Analysis: A New Paradigm for Scalable Traffic AnalysisMilad Nasr, Amir Houmansadr, Arya Mazumdar. 2053-2069 [doi]
- Full Accounting for Verifiable OutsourcingRiad S. Wahby, Ye Ji, Andrew J. Blumberg, Abhi Shelat, Justin Thaler, Michael Walfish, Thomas Wies. 2071-2086 [doi]
- Ligero: Lightweight Sublinear Arguments Without a Trusted SetupScott Ames, Carmit Hazay, Yuval Ishai, Muthuramakrishnan Venkitasubramaniam. 2087-2104 [doi]
- Homomorphic Secret Sharing: Optimizations and ApplicationsElette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Michele Orrù. 2105-2122 [doi]
- DIFUZE: Interface Aware Fuzzing for Kernel DriversJake Corina, Aravind Machiry, Christopher Salls, Yan Shoshitaishvili, Shuang Hao, Christopher Kruegel, Giovanni Vigna. 2123-2138 [doi]
- SemFuzz: Semantics-based Automatic Generation of Proof-of-Concept ExploitsWei You, Peiyuan Zong, Kai Chen, Xiaofeng Wang, Xiaojing Liao, Pan Bian, Bin Liang. 2139-2154 [doi]
- SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity VulnerabilitiesTheofilos Petsios, Jason Zhao, Angelos D. Keromytis, Suman Jana. 2155-2168 [doi]
- Identifying Open-Source License Violation and 1-day Security Risk at Large ScaleRuian Duan, Ashish Bijlani, Meng Xu, Taesoo Kim, Wenke Lee. 2169-2185 [doi]
- Keep me Updated: An Empirical Study of Third-Party Library Updatability on AndroidErik Derr, Sven Bugiel, Sascha Fahl, Yasemin Acar, Michael Backes 0001. 2187-2200 [doi]
- A Large-Scale Empirical Study of Security PatchesFrank Li, Vern Paxson. 2201-2215 [doi]
- DEFTL: Implementing Plausibly Deniable Encryption in Flash Translation LayerShijie Jia, Luning Xia, Bo Chen, Peng Liu. 2217-2229 [doi]
- FlashGuard: Leveraging Intrinsic Flash Properties to Defend Against Encryption RansomwareJian Huang, Jun Xu, Xinyu Xing, Peng Liu, Moinuddin K. Qureshi. 2231-2244 [doi]
- FirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic ExecutionGrant Hernandez, Farhaan Fowze, Dave (Jing) Tian, Tuba Yavuz, Kevin R. B. Butler. 2245-2262 [doi]
- TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious Linear Function EvaluationNico Döttling, Satrajit Ghosh, Jesper Buus Nielsen, Tobias Nilges, Roberto Trifiletti. 2263-2276 [doi]
- Efficient Public Trace and Revoke from Standard Assumptions: Extended AbstractShweta Agrawal, Sanjay Bhattacherjee, Duong Hieu Phan, Damien Stehlé, Shota Yamada 0001. 2277-2293 [doi]
- Distributed Measurement with Private Set-Union CardinalityEllis Fenske, Akshaya Mani, Aaron Johnson, Micah Sherr. 2295-2312 [doi]
- Designing New Operating Primitives to Improve Fuzzing PerformanceWen Xu, Sanidhya Kashyap, Changwoo Min, Taesoo Kim. 2313-2328 [doi]
- Directed Greybox FuzzingMarcel Böhme, Van-Thuan Pham, Manh-Dung Nguyen, Abhik Roychoudhury. 2329-2344 [doi]
- IMF: Inferred Model-based FuzzerHyungseok Han, Sang Kil Cha. 2345-2358 [doi]
- PtrSplit: Supporting General Pointers in Automatic Program PartitioningShen Liu, Gang Tan, Trent Jaeger. 2359-2371 [doi]
- HexType: Efficient Detection of Type Confusion Errors for C++Yuseok Jeon, Priyam Biswas, Scott A. Carr, Byoungyoung Lee, Mathias Payer. 2373-2387 [doi]
- FreeGuard: A Faster Secure Heap AllocatorSam Silvestro, Hongyu Liu, Corey Crosser, Zhiqiang Lin, Tongping Liu. 2389-2403 [doi]
- JITGuard: Hardening Just-in-time Compilers with SGXTommaso Frassetto, David Gens, Christopher Liebchen, Ahmad-Reza Sadeghi. 2405-2419 [doi]
- Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGXWenhao Wang, Guoxing Chen, Xiaorui Pan, Yinqian Zhang, Xiaofeng Wang, Vincent Bindschaedler, Haixu Tang, Carl A. Gunter. 2421-2434 [doi]
- A Formal Foundation for Secure Remote Execution of EnclavesPramod Subramanyan, Rohit Sinha 0001, Ilia A. Lebedev, Srinivas Devadas, Sanjit A. Seshia. 2435-2450 [doi]
- DEMO: Akatosh: Automated Cyber Incident Verification and Impact AnalysisJared M. Smith, Elliot Greenlee, Aaron Ferber. 2463-2465 [doi]
- Poster: Adversarial Examples for Classifiers in High-Dimensional Network DataMuhammad Ejaz Ahmed, Hyoungshick Kim. 2467-2469 [doi]
- POSTER: An Empirical Measurement Study on Multi-tenant Deployment Issues of CDNsZixi Cai, Zigang Cao, Gang Xiong, Zhen Li, Wei Xia. 2471-2473 [doi]
- POSTER: Actively Detecting Implicit Fraudulent TransactionsShaosheng Cao, Xinxing Yang, Jun Zhou, Xiaolong Li, Yuan (Alan) Qi, Kai Xiao. 2475-2477 [doi]
- POSTER: Semi-supervised Classification for Dynamic Android Malware DetectionLi Chen, Mingwei Zhang, Chih-Yuan Yang, Ravi Sahita. 2479-2481 [doi]
- POSTER: Detection of CPS Program Anomalies by Enforcing Cyber-Physical Execution SemanticsLong Cheng, Ke Tian, Danfeng (Daphne) Yao. 2483-2485 [doi]
- POSTER: A Comprehensive Study of Forged Certificates in the WildMingxin Cui, Zigang Cao, Gang Xiong, Junzheng Shi. 2487-2489 [doi]
- POSTER: Rust SGX SDK: Towards Memory Safety in Intel SGX EnclaveYu Ding, Ran Duan, Long Li, Yueqiang Cheng, Yulong Zhang, Tanghui Chen, Tao Wei, Huibo Wang. 2491-2493 [doi]
- POSTER: Finding Vulnerabilities in P4 Programs with Assertion-based VerificationLucas Freire, Miguel C. Neves, Alberto E. Schaeffer Filho, Marinho P. Barcellos. 2495-2497 [doi]
- POSTER: Covert Channel Based on the Sequential Analysis in Android SystemsJun-Won Ho, KyungRok Won, Jee Sun Kim. 2499-2501 [doi]
- POSTER: Why Are You Going That Way? Measuring Unnecessary Exposure of Network Traffic to Nation StatesJordan Holland, Max Schuchard. 2503-2505 [doi]
- POSTER: PriReMat: A Distributed Tool for Privacy Preserving Record Linking in HealthcareDiptendu Mohan Kar, Ibrahim Lazrig, Indrajit Ray, Indrakshi Ray. 2507-2509 [doi]
- POSTER: AFL-based Fuzzing for Java with KelinciRody Kersten, Kasper Søe Luckow, Corina S. Pasareanu. 2511-2513 [doi]
- POSTER: Rethinking Fingerprint Identification on SmartphonesSeungyeon Kim, Hoyeon Lee, Taekyoung Kwon. 2515-2517 [doi]
- POSTER: X-Ray Your DNSAmit Klein, Vladimir Kravtsov, Alon Perlmuter, Haya Shulman, Michael Waidner. 2519-2521 [doi]
- POSTER: Hidden in Plain Sight: A Filesystem for Data Integrity and ConfidentialityAnne Kohlbrenner, Frederico Araujo, Teryl Taylor, Marc Ph. Stoecklin. 2523-2525 [doi]
- POSTER: Watch Out Your Smart Watch When PairedYoungjoo Lee, WonSeok Yang, Taekyoung Kwon. 2527-2529 [doi]
- POSTER: Intrusion Detection System for In-vehicle Networks using Sensor Correlation and IntegrationHuaxin Li, Li Zhao, Marcio Juliato, Shabbir Ahmed, Manoj R. Sastry, Lily L. Yang. 2531-2533 [doi]
- POSTER: Practical Fraud Transaction PredictionLongfei Li, Jun Zhou, Xiaolong Li, Tao Chen. 2535-2537 [doi]
- POSTER: Vulnerability Discovery with Function Representation Learning from Unlabeled ProjectsGuanjun Lin, Jun Zhang, Wei Luo, Lei Pan, Yang Xiang. 2539-2541 [doi]
- POSTER: Neural Network-based Graph Embedding for Malicious Accounts DetectionZiqi Liu, Chaochao Chen, Jun Zhou, Xiaolong Li, Feng Xu, Tao Chen, Le Song. 2543-2545 [doi]
- POSTER: A Unified Framework of Differentially Private Synthetic Data Release with Generative Adversarial NetworkPei-Hsuan Lu, Chia-Mu Yu. 2547-2549 [doi]
- POSTER: TOUCHFLOOD: A Novel Class of Attacks against Capacitive TouchscreensSeita Maruyama, Satohiro Wakabayashi, Tatsuya Mori. 2551-2553 [doi]
- POSTER: TouchTrack: How Unique are your Touch Gestures?Rahat Masood, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Moahmed Ali Kâafar. 2555-2557 [doi]
- POSTER: PenJ1939: An Interactive Framework for Design and Dissemination of Exploits for Commercial VehiclesSubhojeet Mukherjee, Noah Cain, Jacob Walker, David White, Indrajit Ray, Indrakshi Ray. 2559-2561 [doi]
- POSTER: Cyber Attack Prediction of Threats from Unconventional Resources (CAPTURE)Ahmet Okutan, Gordon Werner, Katie McConky, Shanchieh Jay Yang. 2563-2565 [doi]
- POSTER: Towards Precise and Automated Verification of Security Protocols in CoqHernan M. Palombo, Hao Zheng, Jay Ligatti. 2567-2569 [doi]
- POSTER: Probing Tor Hidden Service with DockersJonghyeon Park, Youngseok Lee. 2571-2573 [doi]
- POSTER: Evaluating Reflective Deception as a Malware Mitigation StrategyThomas Shaw, James Arrowood, Michael Kvasnicka, Shay Taylor, Kyle Cook, John Hale. 2575-2577 [doi]
- POSTER: Improving Anonymity of Services Deployed Over Tor by Changing Guard SelectionAbhishek Singh. 2579-2581 [doi]
- POSTER: Inaudible Voice CommandsLiwei Song, Prateek Mittal. 2583-2585 [doi]
- POSTER: Is Active Electromagnetic Side-channel Attack Practical?Satohiro Wakabayashi, Seita Maruyama, Tatsuya Mori, Shigeki Goto, Masahiro Kinugawa, Yu-ichi Hayashi. 2587-2589 [doi]
- POSTER: BGPCoin: A Trustworthy Blockchain-based Resource Management Solution for BGP SecurityQianqian Xing, Baosheng Wang, Xiaofeng Wang. 2591-2593 [doi]
- POSTER: Who was Behind the Camera? - Towards Some New ForensicsJeff Yan, Aurélien Bourquard. 2595-2597 [doi]
- POSTER: A PU Learning based System for Potential Malicious URL DetectionYa Lin Zhang, Longfei Li, Jun Zhou, Xiaolong Li, Yujiang Liu, Yuanchao Zhang, Zhi-Hua Zhou. 2599-2601 [doi]
- Identity Related Threats, Vulnerabilities and Risk Mitigation in Online Social Networks: A TutorialLeila Bahri. 2603-2605 [doi]
- Web Tracking Technologies and Protection MechanismsNataliia Bielova. 2607-2609 [doi]
- Tutorial: Private Information RetrievalRyan Henry. 2611-2612 [doi]
- CCS'17 Tutorial Abstract / SGX Security and PrivacyTaesoo Kim, Zhiqiang Lin, Chia-che Tsai. 2613-2614 [doi]
- Cliptography: Post-Snowden CryptographyQiang Tang 0005, Moti Yung. 2615-2616 [doi]
- Cache Side Channels: State of the Art and Research OpportunitiesYinqian Zhang. 2617-2619 [doi]
- 10th International Workshop on Artificial Intelligence and Security (AISec 2017)Battista Biggio, David Freeman 0001, Brad Miller, Arunesh Sinha. 2621-2622 [doi]
- ASHES 2017: Workshop on Attacks and Solutions in Hardware SecurityChip-Hong Chang, Marten van Dijk, Farinaz Koushanfar, Ulrich Rührmair, Mark Tehranipoor. 2623-2625 [doi]
- CCSW'17: 2017 ACM Cloud Computing SecurityGhassan O. Karame, Angelos Stavrou. 2627-2628 [doi]
- CPS-SPC 2017: Third Workshop on Cyber-Physical Systems Security and PrivaCyRakesh B. Bobba, Awais Rashid. 2629-2630 [doi]
- CCS 2017: Women in Cyber Security (CyberW) WorkshopDanfeng (Daphne) Yao, Elisa Bertino. 2631-2632 [doi]
- FEAST 2017: The Second Workshop on Forming an Ecosystem Around Software TransformationTaesoo Kim, Dinghao Wu. 2633-2634 [doi]
- MIST 2017: 9th International Workshop on Managing Insider Security ThreatsIlsun You, Elisa Bertino. 2635-2636 [doi]
- MTD 2017: Fourth ACM Workshop on Moving Target Defense (MTD)Hamed Okhravi, Xinming Ou. 2637-2638 [doi]
- PLAS 2017: ACM SIGSAC Workshop on Programming Languages and Analysis for SecurityNataliia Bielova, Marco Gaboardi. 2639-2640 [doi]
- SafeConfig'17: Applying the Scientific Method to Active Cyber Defense ResearchNicholas J. Multari, Anoop Singhal, Erin Miller. 2641-2642 [doi]
- 16th Workshop on Privacy in the Electronic Society (WPES 2017)Adam J. Lee. 2643-2644 [doi]
- Workshop on Multimedia Privacy and SecurityRoger Hallman, Kurt Rohloff, Victor Chang. 2645-2646 [doi]
- IoT S&P 2017: First Workshop on Internet of Things Security and PrivacyTheophilus Benson, Peng Liu, Srikanth Sundaresan, Yuqing Zhang. 2647-2648 [doi]