Abstract is missing.
- Achieving Meaningful Privacy in Digital SystemsHelen Nissenbaum. 1-2 [doi]
- Towards Fine-grained Network Security Forensics and Diagnosis in the SDN EraHaopei Wang, Guangliang Yang, Phakpoom Chinprutthiwong, Lei Xu, Yangyong Zhang, Guofei Gu. 3-16 [doi]
- vNIDS: Towards Elastic Security with Safe and Efficient Virtualization of Network Intrusion Detection SystemsHongda Li, Hongxin Hu, Guofei Gu, Gail-Joon Ahn, Fuqiang Zhang. 17-34 [doi]
- 3: A Mixed Protocol Framework for Machine LearningPayman Mohassel, Peter Rindal. 35-52 [doi]
- Voting: You Can't Have Privacy without Individual VerifiabilityVéronique Cortier, Joseph Lallemand. 53-66 [doi]
- Securify: Practical Security Analysis of Smart ContractsPetar Tsankov, Andrei Marian Dan, Dana Drachsler-Cohen, Arthur Gervais, Florian Bünzli, Martin T. Vechev. 67-82 [doi]
- BitML: A Calculus for Bitcoin Smart ContractsMassimo Bartoletti, Roberto Zunino. 83-100 [doi]
- Large-Scale and Language-Oblivious Code Authorship IdentificationMohammed Abuhamad, Tamer AbuHmed, Aziz Mohaisen, DaeHun Nyang. 101-114 [doi]
- Fraud De-Anonymization for Fun and ProfitNestor Hernandez, Mizanur Rahman, Ruben Recabarren, Bogdan Carbunar. 115-130 [doi]
- Unveiling Hardware-based Data Prefetcher, a Hidden Source of Information LeakageYoung-joo Shin, Hyung Chan Kim, Dokeun Kwon, Ji-Hoon Jeong, Junbeom Hur. 131-145 [doi]
- Ohm's Law in Data Centers: A Voltage Side Channel for Timing Power AttacksMohammad A. Islam, Shaolei Ren. 146-162 [doi]
- Screaming Channels: When Electromagnetic Side Channels Meet Radio TransceiversGiovanni Camurati, Sebastian Poeplau, Marius Muench, Tom Hayes, Aurélien Francillon. 163-177 [doi]
- Nemesis: Studying Microarchitectural Timing Leaks in Rudimentary CPU Interrupt LogicJo Van Bulck, Frank Piessens, Raoul Strackx. 178-195 [doi]
- Utility-Aware Synthesis of Differentially Private and Attack-Resilient Location TracesMehmet Emre Gursoy, Ling Liu, Stacey Truex, Lei Yu, Wenqi Wei. 196-211 [doi]
- CALM: Consistent Adaptive Local Marginal for Marginal Release under Local Differential PrivacyZhikun Zhang, Tianhao Wang 0001, Ninghui Li, Shibo He, Jiming Chen. 212-229 [doi]
- MVG Mechanism: Differential Privacy under Matrix-Valued QueryThee Chanyaswad, Alex Dytso, H. Vincent Poor, Prateek Mittal. 230-246 [doi]
- Tight on Budget?: Tight Bounds for r-Fold Approximate Differential PrivacySebastian Meiser 0001, Esfandiar Mohammadi. 247-264 [doi]
- Practical State Recovery Attacks against Legacy RNG ImplementationsShaanan N. Cohney, Matthew D. Green, Nadia Heninger. 265-280 [doi]
- Prime and Prejudice: Primality Testing Under Adversarial ConditionsMartin R. Albrecht, Jake Massimo, Kenneth G. Paterson, Juraj Somorovsky. 281-298 [doi]
- Release the Kraken: New KRACKs in the 802.11 StandardMathy Vanhoef, Frank Piessens. 299-314 [doi]
- Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range QueriesPaul Grubbs, Marie-Sarah Lacharité, Brice Minaud, Kenneth G. Paterson. 315-331 [doi]
- Yet Another Text Captcha Solver: A Generative Adversarial Network Based ApproachGuixin Ye, Zhanyong Tang, Dingyi Fang, Zhanxing Zhu, Yansong Feng, Pengfei Xu, XiaoJiang Chen, Zheng Wang. 332-348 [doi]
- Model-Reuse Attacks on Deep Learning SystemsYujie Ji, Xinyang Zhang, Shouling Ji, Xiapu Luo, Ting Wang. 349-363 [doi]
- LEMNA: Explaining Deep Learning based Security ApplicationsWenbo Guo, Dongliang Mu, Jun Xu 0024, Purui Su, Gang Wang 0011, Xinyu Xing. 364-379 [doi]
- Effective Program Debloating via Reinforcement LearningKihong Heo, Woosuk Lee, Pardis Pashakhanloo, Mayur Naik. 380-394 [doi]
- Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking with Orders-of-Magnitude Performance BoostBinlin Cheng, Jiang Ming 0002, Jianming Fu, Guojun Peng, Ting Chen 0002, Xiaosong Zhang, Jean-Yves Marion. 395-411 [doi]
- K-Hunt: Pinpointing Insecure Cryptographic Keys from Execution TracesJuanru Li, Zhiqiang Lin, Juan Caballero, Yuanyuan Zhang, Dawu Gu. 412-425 [doi]
- Using Logic Programming to Recover C++ Classes and Methods from Compiled ExecutablesEdward J. Schwartz, Cory F. Cohen, Michael Duggan, Jeffrey Gennari, Jeffrey S. Havrilla, Charles Hines. 426-441 [doi]
- VMHunt: A Verifiable Approach to Partially-Virtualized Binary Code SimplificationDongpeng Xu, Jiang Ming 0002, Yu Fu, Dinghao Wu. 442-458 [doi]
- Preserving Both Privacy and Utility in Network Trace AnonymizationMeisam Mohammady, Lingyu Wang 0001, Yuan Hong, Habib Louafi, Makan Pourzandi, Mourad Debbabi. 459-474 [doi]
- Detecting Violations of Differential PrivacyZeyu Ding, Yuxin Wang, Guanhong Wang, Danfeng Zhang, Daniel Kifer. 475-489 [doi]
- Secure Computation with Differentially Private Access PatternsSahar Mazloom, S. Dov Gordon. 490-507 [doi]
- DP-Finder: Finding Differential Privacy Violations by Sampling and OptimizationBenjamin Bichsel, Timon Gehr, Dana Drachsler-Cohen, Petar Tsankov, Martin T. Vechev. 508-524 [doi]
- Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum SignaturesJonathan Katz, Vladimir Kolesnikov, Xiao Wang 0012. 525-537 [doi]
- Symbolic Proofs for Lattice-Based CryptographyGilles Barthe, Xiong Fan, Joshua Gancher, Benjamin Grégoire, Charlie Jacomme, Elaine Shi. 538-555 [doi]
- Lattice-Based zk-SNARKs from Square Span ProgramsRosario Gennaro, Michele Minelli, Anca Nitulescu, Michele Orrù. 556-573 [doi]
- Lattice-Based Group Signatures and Zero-Knowledge Proofs of Automorphism StabilityRafaël Del Pino, Vadim Lyubashevsky, Gregor Seiler. 574-591 [doi]
- Tiresias: Predicting Security Events Through Deep LearningYun Shen, Enrico Mariconti, Pierre-Antoine Vervier, Gianluca Stringhini. 592-605 [doi]
- DeepMem: Learning Graph Neural Network Models for Fast and Robust Memory Forensic AnalysisWei Song, Heng Yin, Chang Liu, Dawn Song. 606-618 [doi]
- Property Inference Attacks on Fully Connected Neural Networks using Permutation Invariant RepresentationsKaran Ganju, Qi Wang, Wei Yang 0013, Carl A. Gunter, Nikita Borisov. 619-633 [doi]
- Machine Learning with Membership Privacy using Adversarial RegularizationMilad Nasr, Reza Shokri, Amir Houmansadr. 634-646 [doi]
- Advanced Cryptography: Promise and ChallengesShai Halevi. 647 [doi]
- Cross-App Poisoning in Software-Defined NetworkingBenjamin E. Ujcich, Samuel Jero, Anne Edmundson, Qi Wang, Richard Skowyra, James Landry, Adam Bates, William H. Sanders, Cristina Nita-Rotaru, Hamed Okhravi. 648-663 [doi]
- AIM-SDN: Attacking Information Mismanagement in SDN-datastoresVaibhav Hemant Dixit, Adam Doupé, Yan Shoshitaishvili, Ziming Zhao 0001, Gail-Joon Ahn. 664-676 [doi]
- Fast Secure Computation for Small Population over the InternetMegha Byali, Arun Joseph, Arpita Patra, Divya Ravi. 677-694 [doi]
- An End-to-End System for Large Scale P2P MPC-as-a-Service and Low-Bandwidth MPC for Weak ParticipantsAssi Barak, Martin Hirt, Lior Koskas, Yehuda Lindell. 695-712 [doi]
- The Gap GameItay Tsabary, Ittay Eyal. 713-728 [doi]
- A Better Method to Analyze Blockchain ConsistencyLucianna Kiffer, Rajmohan Rajaraman, Abhi Shelat. 729-744 [doi]
- Result Pattern Hiding Searchable Encryption for Conjunctive QueriesShangqi Lai, Sikhar Patranabis, Amin Sakzad, Joseph K. Liu, Debdeep Mukhopadhyay, Ron Steinfeld, Shifeng Sun, Dongxi Liu, Cong Zuo. 745-762 [doi]
- Practical Backward-Secure Searchable Encryption from Symmetric Puncturable EncryptionShifeng Sun, Xingliang Yuan, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Viet Vo, Surya Nepal. 763-780 [doi]
- Scission: Signal Characteristic-Based Sender Identification and Intrusion Detection in Automotive NetworksMarcel Kneib, Christopher Huth. 787-800 [doi]
- Detecting Attacks Against Robotic Vehicles: A Control Invariant ApproachHongjun Choi, Wen-Chuan Lee, Yousra Aafer, Fan Fei, Zhan Tu, Xiangyu Zhang, Dongyan Xu, Xinyan Xinyan. 801-816 [doi]
- Truth Will Out: Departure-Based Process-Level Detection of Stealthy Attacks on Control SystemsWissam Aoudi, Mikel Iturbe, Magnus Almgren. 817-831 [doi]
- On the Safety of IoT Device Physical Interaction ControlWenbo Ding, Hongxin Hu. 832-846 [doi]
- HyCC: Compilation of Hybrid Protocols for Practical Secure ComputationNiklas Büscher, Daniel Demmler, Stefan Katzenbeisser 0001, David Kretzmer, Thomas Schneider 0003. 847-861 [doi]
- NANOPI: Extreme-Scale Actively-Secure Multi-Party ComputationRuiyu Zhu, Darion Cassel, Amr Sabry, Yan Huang 0001. 862-879 [doi]
- Generalizing the SPDZ Compiler For Other ProtocolsToshinori Araki, Assi Barak, Jun Furukawa 0001, Marcel Keller, Yehuda Lindell, Kazuma Ohara, Hikaru Tsuchida. 880-895 [doi]
- Compressing Vector OLEElette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai. 896-912 [doi]
- Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic AvailabilityChristian Badertscher, Peter Gazi, Aggelos Kiayias, Alexander Russell, Vassilis Zikas. 913-930 [doi]
- RapidChain: Scaling Blockchain via Full ShardingMahdi Zamani, Mahnush Movahedi, Mariana Raykova 0001. 931-948 [doi]
- General State Channel NetworksStefan Dziembowski, Sebastian Faust, Kristina Hostáková. 949-966 [doi]
- FairSwap: How To Fairly Exchange Digital GoodsStefan Dziembowski, Lisa Eckey, Sebastian Faust. 967-984 [doi]
- Secure Search on Encrypted Data via Multi-Ring SketchAdi Akavia, Dan Feldman, Hayim Shaul. 985-1001 [doi]
- Private Stateful Information RetrievalSarvar Patel, Giuseppe Persiano, Kevin Yeo. 1002-1019 [doi]
- ALCHEMY: A Language and Compiler for Homomorphic Encryption Made easYEric Crockett, Chris Peikert, Chad Sharp. 1020-1037 [doi]
- New Constructions for Forward and Backward Private Symmetric Searchable EncryptionJavad Ghareh Chamani, Dimitrios Papadopoulos, Charalampos Papamanthou, Rasool Jalili. 1038-1055 [doi]
- Situational Access Control in the Internet of ThingsRoei Schuster, Vitaly Shmatikov, Eran Tromer. 1056-1073 [doi]
- HoMonit: Monitoring Smart Home Apps from Encrypted TrafficWei Zhang, Yan Meng, Yugeng Liu, Xiaokuan Zhang, Yinqian Zhang, Haojin Zhu. 1074-1088 [doi]
- Pinto: Enabling Video Privacy for Commodity IoT CamerasHyunwoo Yu, Jaemin Lim, Kiyeon Kim, Suk-Bok Lee. 1089-1101 [doi]
- If This Then What?: Controlling Flows in IoT AppsIulia Bastys, Musard Balliu, Andrei Sabelfeld. 1102-1119 [doi]
- ClickShield: Are You Hiding Something? Towards Eradicating Clickjacking on AndroidAndrea Possemato, Andrea Lanzi, Simon Pak Ho Chung, Wenke Lee, Yanick Fratantonio. 1120-1136 [doi]
- JN-SAF: Precise and Efficient NDK/JNI-aware Inter-language Static Analysis Framework for Security Vetting of Android Applications with Native CodeFengguo Wei, Xingwei Lin, Xinming Ou, Ting Chen 0002, Xiaosong Zhang. 1137-1150 [doi]
- Precise Android API Protection Mapping Derivation and ReasoningYousra Aafer, Guanhong Tao, JianJun Huang, Xiangyu Zhang, Ninghui Li. 1151-1164 [doi]
- Invetter: Locating Insecure Input Validations in Android ServicesLei Zhang, Zhemin Yang, Yuyu He, Zhenyu Zhang, Zhiyun Qian, Geng Hong, Yuan Zhang, Min Yang 0002. 1165-1178 [doi]
- Fast Multiparty Threshold ECDSA with Fast Trustless SetupRosario Gennaro, Steven Goldfeder. 1179-1194 [doi]
- On the Security of the PKCS#1 v1.5 Signature SchemeTibor Jager, Saqib A. Kakvi, Alexander May 0001. 1195-1208 [doi]
- Secure Outsourced Matrix Computation and Application to Neural NetworksXiaoqian Jiang, Miran Kim, Kristin E. Lauter, Yongsoo Song. 1209-1222 [doi]
- Labeled PSI from Fully Homomorphic Encryption with Malicious SecurityHao Chen, Zhicong Huang, Kim Laine, Peter Rindal. 1223-1237 [doi]
- Asking for a Friend: Evaluating Response Biases in Security User StudiesElissa M. Redmiles, Ziyun Zhu, Sean Kross, Dhruv Kuchhal, Tudor Dumitras, Michelle L. Mazurek. 1238-1255 [doi]
- Towards Usable Checksums: Automating the Integrity Verification of Web Downloads for the MassesMauro Cherubini, Alexandre Meylan, Bertil Chapuis, Mathias Humbert, Igor Bilogrevic, Kévin Huguenin. 1256-1271 [doi]
- Investigating System Operators' Perspective on Security MisconfigurationsConstanze Dietrich, Katharina Krombholz, Kevin Borgolte, Tobias Fiebig. 1272-1289 [doi]
- Peeling the Onion's User Experience Layer: Examining Naturalistic Use of the Tor BrowserKevin Gallagher, Sameer Patil, Brendan Dolan-Gavitt, Damon McCoy, Nasir D. Memon. 1290-1305 [doi]
- PrinTracker: Fingerprinting 3D Printers using Commodity ScannersZhengxiong Li, Aditya Singh Rathore, Chen Song, Sheng Wei 0004, Yanzhi Wang, Wenyao Xu. 1306-1323 [doi]
- NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality AnalysisYutao Tang, Ding Li, Zhichun Li, Mu Zhang, Kangkook Jee, Xusheng Xiao, Zhenyu Wu, Junghwan Rhee, Fengyuan Xu, Qun Li. 1324-1337 [doi]
- EviHunter: Identifying Digital Evidence in the Permanent Storage of Android Devices via Static AnalysisChris Chao-Chun Cheng, Chen Shi, Neil Zhenqiang Gong, Yong Guan. 1338-1350 [doi]
- When Good Components Go Bad: Formally Secure Compilation Despite Dynamic CompromiseCarmine Abate, Arthur Azevedo de Amorim, Roberto Blanco, Ana Nora Evans, Guglielmo Fachini, Catalin Hritcu, Théo Laurent, Benjamin C. Pierce, Marco Stronati, Andrew Tolmach. 1351-1368 [doi]
- Towards Verified, Constant-time Floating Point OperationsMarc Andrysco, Andres Nötzli, Fraser Brown, Ranjit Jhala, Deian Stefan. 1369-1382 [doi]
- A Formal Analysis of 5G AuthenticationDavid A. Basin, Jannik Dreier, Lucca Hirschi, Sasa Radomirovic, Ralf Sasse, Vincent Stettler. 1383-1396 [doi]
- Pseudo Constant Time Implementations of TLS Are Only Pseudo SecureEyal Ronen, Kenneth G. Paterson, Adi Shamir. 1397-1414 [doi]
- Partially Specified Channels: The TLS 1.3 Record Layer without ElisionChristopher Patton, Thomas Shrimpton. 1415-1428 [doi]
- The Multi-user Security of GCM, Revisited: Tight Bounds for Nonce RandomizationViet Tung Hoang, Stefano Tessaro, Aishwarya Thiruvengadam. 1429-1440 [doi]
- Lord of the x86 Rings: A Portable User Mode Privilege Separation Architecture on x86HoJoon Lee, Chihyun Song, Brent ByungHoon Kang. 1441-1454 [doi]
- Milkomeda: Safeguarding the Mobile GPU Interface Using WebGL Security ChecksZhihao Yao, Saeed Mirzamohammadi, Ardalan Amiri Sani, Mathias Payer. 1455-1469 [doi]
- Enforcing Unique Code Target Property for Control-Flow IntegrityHong Hu, Chenxiong Qian, Carter Yagemann, Simon Pak Ho Chung, William R. Harris, Taesoo Kim, Wenke Lee. 1470-1486 [doi]
- Predicting Impending Exposure to Malicious Content from User BehaviorMahmood Sharif, Jumpei Urakawa, Nicolas Christin, Ayumu Kubota, Akira Yamada. 1487-1501 [doi]
- Clock Around the Clock: Time-Based Device FingerprintingIskander Sánchez-Rola, Igor Santos, Davide Balzarotti. 1502-1514 [doi]
- The Web's Sixth Sense: A Study of Scripts Accessing Smartphone SensorsAnupam Das 0001, Gunes Acar, Nikita Borisov, Amogh Pradeep. 1515-1532 [doi]
- Reinforcing System-Assigned Passphrases Through Implicit LearningZeinab Joudaki, Julie Thorpe, Miguel Vargas Martin. 1533-1548 [doi]
- "What was that site doing with my Facebook password?": Designing Password-Reuse NotificationsMaximilian Golla, Miranda Wei, Juliette Hainline, Lydia Filipe, Markus Dürmuth, Elissa M. Redmiles, Blase Ur. 1549-1566 [doi]
- On the Accuracy of Password Strength MetersMaximilian Golla, Markus Dürmuth. 1567-1582 [doi]
- HyperFlow: A Processor Architecture for Nonmalleable, Timing-Safe Information Flow SecurityAndrew Ferraiuolo, Mark Zhao, Andrew C. Myers, G. Edward Suh. 1583-1600 [doi]
- Runtime Analysis of Whole-System ProvenanceThomas F. J.-M. Pasquier, Xueyuan Han, Thomas Moyer, Adam M. Bates, Olivier Hermant, David M. Eyers, Jean Bacon, Margo Seltzer. 1601-1616 [doi]
- Faceted Secure Multi ExecutionThomas Schmitz, Maximilian Algehed, Cormac Flanagan, Alejandro Russo. 1617-1634 [doi]
- A Robust and Efficient Defense against Use-after-Free Exploits via Concurrent Pointer SweepingDaiping Liu, Mingwei Zhang, Haining Wang. 1635-1648 [doi]
- An Exploratory Analysis of Microcode as a Building Block for System DefensesBenjamin Kollenda, Philipp Koppe, Marc Fyrbiak, Christian Kison, Christof Paar, Thorsten Holz. 1649-1666 [doi]
- Debin: Predicting Debug Information in Stripped BinariesJingxuan He, Pesho Ivanov, Petar Tsankov, Veselin Raychev, Martin T. Vechev. 1667-1680 [doi]
- Mystique: Uncovering Information Leakage from Browser ExtensionsQuan Chen, Alexandros Kapravelos. 1687-1700 [doi]
- How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real WorldGeng Hong, Zhemin Yang, Sen Yang, Lei Zhang, Yuhong Nan, Zhibo Zhang, Min Yang 0002, Yuan Zhang, Zhiyun Qian, Hai-Xin Duan. 1701-1713 [doi]
- MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its DefenseRadhesh Krishnan Konoth, Emanuele Vineti, Veelasha Moonsamy, Martina Lindorfer, Christopher Kruegel, Herbert Bos, Giovanni Vigna. 1714-1730 [doi]
- Pride and Prejudice in Progressive Web Apps: Abusing Native App-like Features in Web ApplicationsJiyeon Lee, Hayeon Kim, Junghwan Park, Insik Shin, Sooel Son. 1731-1746 [doi]
- No Training Hurdles: Fast Training-Agnostic Attacks to Infer Your TypingSong Fang, Ian D. Markwood, Yao Liu, Shangqing Zhao, Zhuo Lu, Haojin Zhu. 1747-1760 [doi]
- Lawful Device Access without Mass Surveillance Risk: A Technical Design DiscussionStefan Savage. 1761-1774 [doi]
- PatternListener: Cracking Android Pattern Lock Using Acoustic SignalsMan Zhou, Qian Wang, Jingxiao Yang, Qi Li, Feng Xiao, Zhibo Wang, Xiaofen Chen. 1775-1787 [doi]
- Phishing Attacks on Modern AndroidSimone Aonzo, Alessio Merlo, Giulio Tavella, Yanick Fratantonio. 1788-1801 [doi]
- On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security GuaranteesKatriel Cohn-Gordon, Cas Cremers, Luke Garratt, Jon Millican, Kevin Milner. 1802-1819 [doi]
- Bandwidth-Hard Functions: Reductions and Lower BoundsJeremiah Blocki, Ling Ren 0001, Samson Zhou. 1820-1836 [doi]
- Fast Secure Multiparty ECDSA with Practical Distributed Key Generation and Applications to Cryptocurrency CustodyYehuda Lindell, Ariel Nof. 1837-1854 [doi]
- TACHYON: Fast Signatures from Compact KnapsackRouzbeh Behnia, Muslum Ozgur Ozmen, Attila A. Yavuz, Mike Rosulek. 1855-1867 [doi]
- Block Oriented Programming: Automating Data-Only AttacksKyriakos K. Ispoglou, Bader AlBassam, Trent Jaeger, Mathias Payer. 1868-1882 [doi]
- Threat Intelligence ComputingXiaokui Shu, Frederico Araujo, Douglas Lee Schales, Marc Ph. Stoecklin, Jiyong Jang, Heqing Huang, Josyula R. Rao. 1883-1898 [doi]
- Check It Again: Detecting Lacking-Recheck Bugs in OS KernelsWenwen Wang, Kangjie Lu, Pen-Chung Yew. 1899-1913 [doi]
- Revery: From Proof-of-Concept to ExploitableYan Wang, Chao Zhang 0008, Xiaobo Xiang, Zixuan Zhao, Wenjie Li, Xiaorui Gong, Bingchang Liu, Kaixiang Chen, Wei Zou. 1914-1927 [doi]
- Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep LearningPayap Sirinam, Mohsen Imani, Marc Juárez, Matthew Wright 0001. 1928-1943 [doi]
- Privacy-Preserving Dynamic Learning of Tor Network TrafficRob Jansen, Matthew Traudt, Nicholas Hopper. 1944-1961 [doi]
- DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep LearningMilad Nasr, Alireza Bahramali, Amir Houmansadr. 1962-1976 [doi]
- Measuring Information Leakage in Website Fingerprinting Attacks and DefensesShuai Li, Huajun Guo, Nicholas Hopper. 1977-1992 [doi]
- DiSE: Distributed Symmetric-key EncryptionShashank Agrawal, Payman Mohassel, Pratyay Mukherjee, Peter Rindal. 1993-2010 [doi]
- Mitigating Risk while Complying with Data Retention LawsLuis Vargas, Gyan Hazarika, Rachel Culpepper, Kevin R. B. Butler, Thomas Shrimpton, Doug Szajda, Patrick Traynor. 2011-2027 [doi]
- BEAT: Asynchronous BFT Made PracticalSisi Duan, Michael K. Reiter, Haibin Zhang. 2028-2041 [doi]
- PASTA: PASsword-based Threshold AuthenticationShashank Agrawal, Peihan Miao, Payman Mohassel, Pratyay Mukherjee. 2042-2059 [doi]
- Domain Validation++ For MitM-Resilient PKIMarkus Brandt, Tianxiang Dai, Amit Klein, Haya Shulman, Michael Waidner. 2060-2076 [doi]
- Secure Opportunistic Multipath Key ExchangeSergiu Costea, Marios O. Choudary, Doru Gucea, Björn Tackmann, Costin Raiciu. 2077-2094 [doi]
- Hawkeye: Towards a Desired Directed Grey-box FuzzerHongxu Chen, Yinxing Xue, Yuekang Li, Bihuan Chen, Xiaofei Xie, Xiuheng Wu, Yang Liu. 2095-2108 [doi]
- ret2spec: Speculative Execution Using Return Stack BuffersGiorgi Maisuradze, Christian Rossow. 2109-2122 [doi]
- Evaluating Fuzz TestingGeorge Klees, Andrew Ruef, Benji Cooper, Shiyi Wei, Michael Hicks 0001. 2123-2138 [doi]
- Rendered Insecure: GPU Side Channel Attacks are PracticalHoda Naghibijouybari, Ajaya Neupane, Zhiyun Qian, Nael B. Abu-Ghazaleh. 2139-2153 [doi]
- Wild Patterns: Ten Years After the Rise of Adversarial Machine LearningBattista Biggio, Fabio Roli. 2154-2156 [doi]
- Secure Multi-Party ComputationFattaneh Bayatbabolghani, Marina Blanton. 2157-2159 [doi]
- Building Applications with Homomorphic EncryptionRoger A. Hallman, Kim Laine, Wei Dai, Nicolas Gama, Alex J. Malozemoff, Yuriy Polyakov, Sergiu Carpov. 2160-2162 [doi]
- Game Theory Meets Network Security: A TutorialQuanyan Zhu, Stefan Rass. 2163-2165 [doi]
- 11th International Workshop on Artificial Intelligence and Security (AISec 2018)Sadia Afroz, Battista Biggio, Yuval Elovici, David Freeman, Asaf Shabtai. 2166-2167 [doi]
- ASHES 2018- Workshop on Attacks and Solutions in Hardware SecurityChip-Hong Chang, Jorge Guajardo, Daniel Holcomb, Francesco Regazzoni, Ulrich Rührmair. 2168-2170 [doi]
- CPS-SPC 2018: Fourth Workshop on Cyber-Physical Systems Security and PrivaCyAwais Rashid, Nils Ole Tippenhauer. 2171-2172 [doi]
- 2nd International Workshop on Multimedia Privacy and SecurityRoger A. Hallman, Shujun Li, Victor Chang. 2173-2174 [doi]
- MTD 2018: 5th ACM Workshop on Moving Target Defense (MTD)Massimiliano Albanese, Dijiang Huang. 2175-2176 [doi]
- SecArch'18: 1st Workshop of Security-Oriented Designs of Computer Architectures and ProcessorsDan Meng. 2177 [doi]
- PLAS 2018 - ACM SIGSAC Workshop on Programming Languages and Analysis for SecurityMário S. Alvim, Stéphanie Delaune. 2178-2179 [doi]
- SysTEX'18: 2018 Workshop on System Software for Trusted ExecutionBaris Kasikci, Mark Silberstein. 2180 [doi]
- 17th Workshop on Privacy in the Electronic Society (WPES 2018)Aaron Johnson, Ryan Henry. 2181-2182 [doi]
- WAHC'18: 6th Workshop on Encrypted Computing and Applied Homomorphic CryptographyMichael Brenner 0003, Kurt Rohloff. 2183-2184 [doi]
- FEAST'18 - 2018 Workshop on Forming an Ecosystem around Software TransformationYan Shoshitaishvili, Mayur Naik. 2185-2186 [doi]
- A Discussion on Security Education in AcademiaKevin R. B. Butler, Robert K. Cunningham, Paul C. van Oorschot, Reihaneh Safavi-Naini, Ashraf Matrawy, Jeremy Clark. 2187-2188 [doi]
- An Effective Android Code Coverage ToolAleksandr Pilgun, Olga Gadyatskaya, Stanislav Dashevskyi, Yury Zhauniarovich, Artsiom Kushniarou. 2189-2191 [doi]
- PrivacyBuDe: Privacy Buckets Demo Tight Differential Privacy Guarantees made SimpleDavid M. Sommer, Sebastian Meiser 0001, Esfandiar Mohammadi. 2192-2194 [doi]
- A Re-evaluation of Intrusion Detection Accuracy: Alternative Evaluation StrategySaid Al-Riyami, Frans Coenen, Alexei Lisitsa. 2195-2197 [doi]
- How to Choose Suitable Secure Multiparty Computation Using Generalized SPDZToshinori Araki, Assi Barak, Jun Furukawa 0001, Marcel Keller, Kazuma Ohara, Hikaru Tsuchida. 2198-2200 [doi]
- Hardware Acceleration of Searchable EncryptionArnab Bag, Sikhar Patranabis, L. Tribhuvan, Debdeep Mukhopadhyay. 2201-2203 [doi]
- Practical Fault Attack on Deep Neural NetworksJakub Breier, Xiaolu Hou, Dirmanto Jap, Lei Ma, Shivam Bhasin, Yang Liu 0003. 2204-2206 [doi]
- FlowNotation: An Annotation System for Statically Enforcing Information Flow Policies in CDarion Cassel, Yan Huang 0001, Limin Jia. 2207-2209 [doi]
- Cracking the TSCH Channel Hopping in IEEE 802.15.4eXia Cheng, Mo Sha 0001. 2210-2212 [doi]
- Off-Path Attacks Against PKITianxiang Dai, Haya Shulman, Michael Waidner. 2213-2215 [doi]
- The Influence of Code Coverage Metrics on Automated Testing Efficiency in AndroidStanislav Dashevskyi, Olga Gadyatskaya, Aleksandr Pilgun, Yury Zhauniarovich. 2216-2218 [doi]
- Toward Trustworthy Deep Learning in SecurityWooyoung Go, DaeWoo Lee. 2219-2221 [doi]
- Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound BeamsRyo Iijima, Shota Minami, Zhou Yunao, Tatsuya Takehisa, Takeshi Takahashi 0001, Yasuhiro Oikawa, Tatsuya Mori. 2222-2224 [doi]
- Adversarial Traces for Website Fingerprinting DefenseMohsen Imani, Mohammad Saidur Rahman, Matthew Wright 0001. 2225-2227 [doi]
- Towards Understanding the Dynamics of Adversarial AttacksYujie Ji, Ting Wang. 2228-2230 [doi]
- Circular AON: A Very Fast Scheme to Protect Encrypted Data Against Key ExposureKatarzyna Kapusta, Gérard Memmi. 2231-2233 [doi]
- CipherLocker: Encrypted File Sharing with Ranked Search https: //cipherlocker.comJan Kasiak, Bogdan Carbunar, Jake Christensen, Maria Lyukova, Sumeet Bajaj, Mike Boruta, Radu Sion, Viorel Popescu, Alex Sorodoc, Gabriel Stan. 2234-2236 [doi]
- A Guided Approach to Behavioral AuthenticationYeeun Ku, Leo Hyun Park, Sooyeon Shin, Taekyoung Kwon 0002. 2237-2239 [doi]
- Cryptographically Secure Detection of Injection AttacksYun Lu, Konstantinos Mitropoulos, Rafail Ostrovsky, Avraham Weinstock, Vassilis Zikas. 2240-2242 [doi]
- Can Browser Add-Ons Protect Your Children from Online Tracking?Zachary Matthews, Natalija Vlajic. 2243-2245 [doi]
- Spartan Networks: Self-Feature-Squeezing Networks for Increased Robustness in Adversarial SettingsFrançois Menet, Paul Berthier, Michel Gagnon, José M. Fernandez 0001. 2246-2248 [doi]
- Knowledge Seeking on The Shadow BrokersSeung Ho Na, KwanWoo Kim, Seungwon Shin. 2249-2251 [doi]
- Assessing Non-Visual SSL Certificates with Desktop and Mobile Screen ReadersDaniela Napoli, Sonia Chiasson. 2252-2254 [doi]
- The House That Knows You: User Authentication Based on IoT DataTalha Ongun, Alina Oprea, Cristina Nita-Rotaru, Mihai Christodorescu, Negin Salajegheh. 2255-2257 [doi]
- A Storage-level Detection Mechanism against Crypto-RansomwareJoon-Young Paik, Joong-Hyun Choi, Rize Jin, Jianming Wang, Eun-Sun Cho. 2258-2260 [doi]
- The Price of Privacy in Collaborative LearningBalázs Pejó, Qiang Tang 0001, Gergely Biczók. 2261-2263 [doi]
- Enabling Fair ML Evaluations for SecurityFeargus Pendlebury, Fabio Pierazzi, Roberto Jordaney, Johannes Kinder, Lorenzo Cavallaro. 2264-2266 [doi]
- Towards Architecture and OS-Independent Malware Detection via Memory ForensicsRachel Petrik, Berat Arik, Jared M. Smith. 2267-2269 [doi]
- Equitable Security: Optimizing Distribution of Nudges and ResourcesElissa M. Redmiles, John P. Dickerson, Krishna P. Gummadi, Michelle L. Mazurek. 2270-2272 [doi]
- Public Order Preserving Cipher Generation Scheme for Distributed ComputingAmrita Roy Chowdhury, Parameswaran Ramanathan. 2273-2275 [doi]
- AST-Based Deep Learning for Detecting Malicious PowerShellGili Rusak, Abdullah Al-Dujaili, Una-May O'Reilly. 2276-2278 [doi]
- Aggregated Machine Learning on Indicators of Compromise in Android DevicesJohn M. San Miguel, Megan E. M. Kline, Roger A. Hallman, Scott M. Slayback, Alexis Rogers, Stefanie S. F. Chang. 2279-2281 [doi]
- End-to-End Secure Mobile Group Messaging with Conversation Integrity and Minimal Metadata LeakageMichael Schliep, Nicholas Hopper. 2282-2284 [doi]
- Not All Pixels are Born Equal: An Analysis of Evasion Attacks under Locality ConstraintsVikash Sehwag, Chawin Sitawarin, Arjun Nitin Bhagoji, Arsalan Mosenia, Mung Chiang, Prateek Mittal. 2285-2287 [doi]
- Post-quantum Security using Channel NoiseSetareh Sharifian, Reihaneh Safavi-Naini, Fuchun Lin. 2288-2290 [doi]
- Image Disguising for Privacy-preserving Deep LearningSagar Sharma, Keke Chen. 2291-2293 [doi]
- Privacy-Preserving Boosting with Random Linear ClassifiersSagar Sharma, Keke Chen. 2294-2296 [doi]
- Restricting Control Flow During Speculative ExecutionZhuojia Shen, Jie Zhou, Divya Ojha, John Criswell. 2297-2299 [doi]
- Removing the Bottleneck for Practical 2PCKris Shrishak, Haya Shulman, Michael Waidner. 2300-2302 [doi]
- Cashing in on the File-System CacheTrishita Tiwari, Ari Trachtenberg. 2303-2305 [doi]
- Facilitating Privacy-preserving Recommendation-as-a-Service with Machine LearningJun Wang 0020, Afonso Arriaga, Qiang Tang 0001, Peter Y. A. Ryan. 2306-2308 [doi]
- Medical Devices are at Risk: Information Security on Diagnostic Imaging SystemZhiqiang Wang, Pingchuan Ma 0004, Yaping Chi, Jianyi Zhang. 2309-2311 [doi]
- Practical and Privacy-Aware Truth Discovery in Mobile Crowd Sensing SystemsGuowen Xu, Hongwei Li, Rongxing Lu. 2312-2314 [doi]
- MORPH: Enhancing System Security through Interactive Customization of Application and Communication Protocol FeaturesHongfa Xue, Yurong Chen, Guru Venkataramani, Tian Lan, Guang Jin, Jason Li. 2315-2317 [doi]
- A Bitstream Reverse Engineering Tool for FPGA Hardware Trojan DetectionJunghwan Yoon, Yezee Seo, Jaedong Jang, Mingi Cho, JinGoog Kim, Hyeonsook Kim, Taekyoung Kwon. 2318-2320 [doi]
- A Markov Decision Process to Determine Optimal Policies in Moving TargetJianjun Zheng, Akbar Siami Namin. 2321-2323 [doi]
- Adversarial Product Review Generation with Word ReplacementsYimin Zhu, Simon S. Woo. 2324-2326 [doi]