Abstract is missing.
- Establishing and Maintaining Root of Trust on Commodity Computer SystemsVirgil D. Gligor. 1-2 [doi]
- Control-Flow Carrying CodeYan Lin 0003, Xiaoyang Cheng, Debin Gao. 3-14 [doi]
- SoK: Using Dynamic Binary Instrumentation for Security (And How You May Get Caught Red Handed)Daniele Cono D'Elia, Emilio Coppa, Simone Nicchi, Federico Palmaro, Lorenzo Cavallaro. 15-27 [doi]
- DeClassifier: Class-Inheritance Inference Engine for Optimized C++ BinariesRukayat Ayomide Erinfolami, Aravind Prakash. 28-40 [doi]
- GraphSE²: An Encrypted Graph Database for Privacy-Preserving Social SearchShangqi Lai, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Yuhong Liu, Dongxi Liu. 41-54 [doi]
- Identity-Based Broadcast Encryption with Outsourced Partial Decryption for Hybrid Security Models in Edge ComputingJongkil Kim, Seyit Camtepe, Willy Susilo, Surya Nepal, Joonsang Baek. 55-66 [doi]
- Unveiling Systematic Biases in Decisional Processes: An Application to Discrimination DiscoveryLaura Genga, Luca Allodi, Nicola Zannone. 67-72 [doi]
- The SEVerESt Of Them All: Inference Attacks Against Secure Virtual EnclavesJan Werner, Joshua Mason, Manos Antonakakis, Michalis Polychronakis, Fabian Monrose. 73-85 [doi]
- ObliDC: An SGX-based Oblivious Distributed Computing Framework with Formal ProofPengfei Wu, Qingni Shen, Robert H. Deng, Ximeng Liu, Yinghui Zhang, Zhonghai Wu. 86-99 [doi]
- A Hybrid Approach to Secure Function Evaluation using SGXJoseph I. Choi, Dave (Jing) Tian, Grant Hernandez, Christopher Patton, Benjamin Mood, Thomas Shrimpton, Kevin R. B. Butler, Patrick Traynor. 100-113 [doi]
- Running Language Interpreters Inside SGX: A Lightweight, Legacy-Compatible Script Code Hardening ApproachHuibo Wang, Erick Bauman, Vishal Karande, Zhiqiang Lin, Yueqiang Cheng, Yinqian Zhang. 114-121 [doi]
- Multi-Writer Searchable Encryption: An LWE-based Realization and ImplementationLei Xu 0019, Xingliang Yuan, Ron Steinfeld, Cong Wang, Chungen Xu. 122-133 [doi]
- Delegatable Order-Revealing EncryptionYuan Li, Hongbing Wang, Yunlei Zhao. 134-147 [doi]
- MPC Joins The Dark SideJohn Cartlidge, Nigel P. Smart, Younes Talibi Alaoui. 148-159 [doi]
- Flexibly and Securely Shape Your Data Disclosed to OthersQing-Qing Xie, Yantian Hou, Ke Cheng, Gaby G. Dagher, Liangmin Wang, Shucheng Yu. 160-167 [doi]
- Waves of Malice: A Longitudinal Measurement of the Malicious File Delivery Ecosystem on the WebColin C. Ife, Yun Shen, Steven J. Murdoch, Gianluca Stringhini. 168-180 [doi]
- What Happens After You Leak Your Password: Understanding Credential Sharing on Phishing SitesPeng Peng, Chao Xu, Luke Quinn, Hang Hu 0002, Bimal Viswanath, Gang Wang. 181-192 [doi]
- A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity BlacklistsBenjamin Zi Hao Zhao, Muhammad Ikram, Hassan Jameel Asghar, Mohamed Ali Kâafar, Abdelberi Chaabane, Kanchana Thilakarathna. 193-205 [doi]
- Mobile Friendly or Attacker Friendly?: A Large-scale Security Evaluation of Mobile-first WebsitesTom van Goethem, Victor Le Pochat, Wouter Joosen. 206-213 [doi]
- Undermining User Privacy on Mobile Devices Using AIBerk Gülmezoglu, Andreas Zankl, M. Caner Tol, Saad Islam, Thomas Eisenbarth 0001, Berk Sunar. 214-227 [doi]
- Robust Watermarking of Neural Network with Exponential WeightingRyota Namba, Jun Sakuma. 228-240 [doi]
- A Closer Look Tells More: A Facial Distortion Based Liveness Detection for Face AuthenticationYan Li, Zilong Wang, Yingjiu Li, Robert H. Deng, Binbin Chen, Weizhi Meng, Hui Li. 241-246 [doi]
- R2Q: A Risk Quantification Framework to Authorize Requests in Web-based CollaborationsNirnay Ghosh, Rishabh Singhal, Sajal K. Das. 247-254 [doi]
- Security is the Weakest Link: Prevalent Culture of Victim Blaming in CyberattacksSurya Nepal. 255-256 [doi]
- Exploiting Sound Masking for Audio Privacy in SmartphonesYu-Chih Tung, Kang G. Shin. 257-268 [doi]
- MoSSOT: An Automated Blackbox Tester for Single Sign-On Vulnerabilities in Mobile ApplicationsShangcheng Shi, Xianbo Wang, Wing Cheong Lau. 269-282 [doi]
- MagAttack: Guessing Application Launching and Operation via SmartphoneYushi Cheng, Xiaoyu Ji, Wenyuan Xu, Hao Pan, Zhuangdi Zhu, Chuang-wen You, Yi-Chao Chen, Lili Qiu. 283-294 [doi]
- Towards Understanding Android System Vulnerabilities: Techniques and InsightsDaoyuan Wu, Debin Gao, Eric K. T. Cheng, Yichen Cao, Jintao Jiang, Robert H. Deng. 295-306 [doi]
- AndrEnsemble: Leveraging API Ensembles to Characterize Android Malware FamiliesOmid Mirzaei, Guillermo Suarez-Tangil, José María de Fuentes, Juan Tapiador, Gianluca Stringhini. 307-314 [doi]
- EPISODE: Efficient Privacy-PreservIng Similar Sequence Queries on Outsourced Genomic DatabasEsThomas Schneider 0003, Oleksandr Tkachenko. 315-327 [doi]
- Revisiting Assumptions for Website Fingerprinting AttacksWeiqi Cui, Tao Chen, Christian Fields, Julianna Chen, Anthony Sierra, Eric Chan-Tin. 328-339 [doi]
- Can I Opt Out Yet?: GDPR and the Global Illusion of Cookie ControlIskander Sánchez-Rola, Matteo Dell'Amico, Platon Kotzias, Davide Balzarotti, Leyla Bilge, Pierre-Antoine Vervier, Igor Santos. 340-351 [doi]
- Understanding Users' Risk Perceptions about Personal Health Records Shared on Social Networking ServicesYuri Son, Geumhwan Cho, Hyoungshick Kim, Simon S. Woo. 352-365 [doi]
- Purchased Fame: Exploring the Ecosystem of Private Blog NetworksTom van Goethem, Najmeh Miramirkhani, Wouter Joosen, Nick Nikiforakis. 366-378 [doi]
- TweetScore: Scoring Tweets via Social Attribute Relationships for Twitter Spammer DetectionYihe Zhang, Hao Zhang, Xu Yuan, Nian-Feng Tzeng. 379-390 [doi]
- ScriptProtect: Mitigating Unsafe Third-Party JavaScript PracticesMarius Musch, Marius Steffens, Sebastian Roth, Ben Stock, Martin Johns. 391-402 [doi]
- SoK: On DFA Vulnerabilities of Substitution-Permutation NetworksMustafa Khairallah, Xiaolu Hou, Zakaria Najm, Jakub Breier, Shivam Bhasin, Thomas Peyrin. 403-414 [doi]
- Practical Side-Channel Attacks against WPA-TKIPDomien Schepers, Aanjhan Ranganathan, Mathy Vanhoef. 415-426 [doi]
- Exploiting Determinism in Lattice-based Signatures: Practical Fault Attacks on pqm4 Implementations of NIST CandidatesPrasanna Ravi, Mahabir Prasad Jhanwar, James Howe, Anupam Chattopadhyay, Shivam Bhasin. 427-440 [doi]
- Process-Aware Cyberattacks for Thermal Desalination PlantsPrashant Hari Narayan Rajput, Pankaj Rajput, Marios Sazos, Michail Maniatakos. 441-452 [doi]
- Misbinding Attacks on Secure Device Pairing and BootstrappingMohit Sethi, Aleksi Peltonen, Tuomas Aura. 453-464 [doi]
- Alexa Lied to Me: Skill-based Man-in-the-Middle Attacks on Virtual AssistantsRichard Mitev, Markus Miettinen, Ahmad-Reza Sadeghi. 465-478 [doi]
- HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT DevicesDominik Breitenbacher, Ivan Homoliak, Yan Lin Aung, Nils Ole Tippenhauer, Yuval Elovici. 479-484 [doi]
- A Pilot Study on Consumer IoT Device Vulnerability Disclosure and Patch Release in Japan and the United StatesAsuka Nakajima, Takuya Watanabe 0001, Eitaro Shioji, Mitsuaki Akiyama, Maverick Woo. 485-492 [doi]
- E-Spion: A System-Level Intrusion Detection System for IoT DevicesAnand Mudgerikar, Puneet Sharma, Elisa Bertino. 493-500 [doi]
- K2SN-MSS: An Efficient Post-Quantum SignatureSabyasachi Karati, Reihaneh Safavi-Naini. 501-514 [doi]
- Proper Usage of the Group Signature Scheme in ISO/IEC 20008-2Ai Ishida, Yusuke Sakai 0001, Keita Emura, Goichiro Hanaoka, Keisuke Tanaka. 515-528 [doi]
- Practical Aggregate Signature from General Elliptic Curves, and Applications to BlockchainYunlei Zhao. 529-538 [doi]
- Examining DES-based Cipher Suite Support within the TLS EcosystemVanessa Frost, Dave (Jing) Tian, Christie Ruales, Vijay Prakash, Patrick Traynor, Kevin R. B. Butler. 539-546 [doi]
- From Attacker Models to Reliable SecurityHeiko Mantel. 547-548 [doi]
- Pinpoint Rowhammer: Suppressing Unwanted Bit Flips on Rowhammer AttacksSangwoo Ji, Youngjoo Ko, Saeyoung Oh, Jong Kim 0001. 549-560 [doi]
- RIP-RH: Preventing Rowhammer-based Inter-Process AttacksCarsten Bock, Ferdinand Brasser, David Gens, Christopher Liebchen, Ahmad-Reza Sadeghi. 561-572 [doi]
- eHIFS: An Efficient History Independent File SystemBiao Gao, Bo Chen, Shijie Jia, Luning Xia. 573-585 [doi]
- Thermanator: Thermal Residue-Based Post Factum Attacks on Keyboard Data EntryTyler Kaczmarek, Ercan Ozturk, Gene Tsudik. 586-593 [doi]
- Design Procedure of Knowledge Base for Practical Attack Graph GenerationMasaki Inokuchi, Yoshinobu Ohta, Shunichi Kinoshita, Tomohiko Yagyu, Orly Stan, Ron Bitton, Yuval Elovici, Asaf Shabtai. 594-601 [doi]
- On the Difficulty of Hiding the Balance of Lightning Network ChannelsJordi Herrera-Joancomartí, Guillermo Navarro-Arribas, Alejandro Ranchal Pedrosa, Cristina Pérez-Solà, Joaquin García-Alfaro. 602-612 [doi]
- A New Blind ECDSA Scheme for Bitcoin Transaction AnonymityXun Yi, Kwok-Yan Lam. 613-620 [doi]
- On The Unforkability of MoneroDimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu, Jiangshan Yu. 621-632 [doi]
- PTrix: Efficient Hardware-Assisted Fuzzing for COTS BinaryYaohui Chen, Dongliang Mu, Jun Xu, Zhichuang Sun, Wenbo Shen, Xinyu Xing, Long Lu, Bing Mao. 633-645 [doi]
- An Empirical Study of Prioritizing JavaScript Engine Crashes via Machine LearningSunnyeo Park, Dohyeok Kim, Sooel Son. 646-657 [doi]
- A Feature-Oriented Corpus for Understanding, Evaluating and Improving Fuzz TestingXiaogang Zhu, Xiaotao Feng, Tengyun Jiao, Sheng Wen, Yang Xiang 0001, Seyit Camtepe, Jingling Xue. 658-663 [doi]
- How to Securely Record Logs based on ARM TrustZoneSeungho Lee, Wonsuk Choi, Hyo Jin Jo, Dong Hoon Lee 0001. 664-666 [doi]
- Characterizing Adversarial Subspaces by Mutual InformationChia-Yi Hsu, Pin-Yu Chen, Chia-Mu Yu. 667-669 [doi]
- A Data Life Cycle Modeling Proposal by Means of Formal MethodsMadalina G. Ciobanu, Fausto Fasano, Fabio Martinelli, Francesco Mercaldo, Antonella Santone. 670-672 [doi]
- Cracking the Graph Routes in WirelessHART NetworksXia Cheng, Junyang Shi, Mo Sha 0001. 673-675 [doi]
- Fidelity: A Property of Deep Neural Networks to Measure the Trustworthiness of Prediction ResultsZiqi Yang. 676-678 [doi]
- Towards Identifying Early Indicators of a Malware InfectionSareena Karapoola, Chester Rebeiro, Unnati Parekh, Kamakoti Veezhinathan. 679-681 [doi]
- Vendor-Independent Monitoring on Programmable Logic Controller Status for ICS Security Log ManagementJongwon Choi, HyungKwan Kim, Seungoh Choi, Jeong-Han Yun, Byung-gil Min, HyoungChun Kim. 682-684 [doi]
- IoT Application-Centric Access Control (ACAC)Mohammed Al-Shaboti, Ian Welch, Aaron Chen. 685-687 [doi]
- High Efficiency, Low-noise Meltdown Attack by using a Return Stack BufferTaehyun Kim, Youngjoo Shin. 688-690 [doi]
- Smart Contract-based Miner Registration and Block ValidationShijie Zhang, Jong-Hyouk Lee. 691-693 [doi]