Abstract is missing.
- Machine Learning and Security: The Good, The Bad, and The UglyWenke Lee. 1-2 [doi]
- Bypassing Tor Exit Blocking with Exit Bridge Onion ServicesZhao Zhang, Wenchao Zhou, Micah Sherr. 3-16 [doi]
- CLAPS: Client-Location-Aware Path Selection in TorFlorentin Rochet, Ryan Wails, Aaron Johnson, Prateek Mittal, Olivier Pereira. 17-34 [doi]
- Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communications by Parasitizing on WebRTCDiogo Barradas, Nuno Santos 0001, Luís E. T. Rodrigues, Vítor Nunes. 35-48 [doi]
- Censored Planet: An Internet-wide, Longitudinal Censorship ObservatoryRam Sundara Raman, Prerana Shenoy, Katharina Kohls, Roya Ensafi. 49-66 [doi]
- Gotta Catch'Em All: Using Honeypots to Catch Adversarial Attacks on Neural NetworksShawn Shan, Emily Wenger, Bolun Wang, Bo Li 0001, Haitao Zheng 0001, Ben Y. Zhao. 67-83 [doi]
- A Tale of Evil Twins: Adversarial Inputs versus Poisoned ModelsRen Pang, Hua Shen, Xinyang Zhang, Shouling Ji, Yevgeniy Vorobeychik, Xiapu Luo, Alex X. Liu, Ting Wang. 85-99 [doi]
- DeepDyve: Dynamic Verification for Deep Neural NetworksYu Li 0007, Min Li 0019, Bo Luo, Ye Tian 0010, Qiang Xu 0001. 101-112 [doi]
- Composite Backdoor Attack for Deep Neural Network by Mixing Existing Benign FeaturesJunyu Lin, Lei Xu, Yingqi Liu, Xiangyu Zhang 0001. 113-131 [doi]
- Devil is Virtual: Reversing Virtual Inheritance in C++ BinariesRukayat Ayomide Erinfolami, Aravind Prakash. 133-148 [doi]
- PatchScope: Memory Object Centric Patch DiffingLei Zhao, Yuncong Zhu, Jiang Ming 0002, Yichen Zhang, Haotian Zhang, Heng Yin. 149-165 [doi]
- FirmXRay: Detecting Bluetooth Link Layer Vulnerabilities From Bare-Metal FirmwareHaohuang Wen, Zhiqiang Lin, Yinqian Zhang. 167-180 [doi]
- Privaros: A Framework for Privacy-Compliant Delivery DronesRakesh Rajan Beck, Abhishek Vijeev, Vinod Ganapathy. 181-194 [doi]
- A Performant, Misuse-Resistant API for Primality TestingJake Massimo, Kenneth G. Paterson. 195-210 [doi]
- ProMACs: Progressive and Resynchronizing MACs for Continuous Efficient Authentication of Message StreamsFrederik Armknecht, Paul Walther, Gene Tsudik, Martin Beck, Thorsten Strufe. 211-223 [doi]
- LadderLeak: Breaking ECDSA with Less than One Bit of Nonce LeakageDiego F. Aranha, Felipe Rodrigues Novaes, Akira Takahashi 0002, Mehdi Tibouchi, Yuval Yarom. 225-242 [doi]
- Security of Streaming Encryption in Google's Tink LibraryViet Tung Hoang, Yaobin Shen. 243-262 [doi]
- Cyber-Physical Inconsistency Vulnerability Identification for Safety Checks in Robotic VehiclesHongjun Choi, Sayali Kate, Yousra Aafer, Xiangyu Zhang 0001, Dongyan Xu. 263-278 [doi]
- HoneyPLC: A Next-Generation Honeypot for Industrial Control SystemsEfrén López-Morales, Carlos E. Rubio-Medrano, Adam Doupé, Yan Shoshitaishvili, Ruoyu Wang 0001, Tiffany Bao, Gail-Joon Ahn. 279-291 [doi]
- Phantom of the ADAS: Securing Advanced Driver-Assistance Systems from Split-Second Phantom AttacksBen Nassi, Yisroel Mirsky, Dudi Nassi, Raz Ben-Netanel, Oleg Drokin, Yuval Elovici. 293-308 [doi]
- T2Pair: Secure and Usable Pairing for Heterogeneous IoT DevicesXiaopeng Li, Qiang Zeng 0001, Lannan Luo, Tongbo Luo. 309-323 [doi]
- CrypTFlow2: Practical 2-Party Secure InferenceDeevashwer Rathee, Mayank Rathee, Nishant Kumar 0001, Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma 0001. 325-342 [doi]
- GAN-Leaks: A Taxonomy of Membership Inference Attacks against Generative ModelsDingfan Chen, Ning Yu, Yang Zhang, Mario Fritz. 343-362 [doi]
- Analyzing Information Leakage of Updates to Natural Language ModelsSantiago Zanella Béguelin, Lukas Wutschitz, Shruti Tople, Victor Rühle, Andrew Paverd, Olga Ohrimenko, Boris Köpf, Marc Brockschmidt. 363-375 [doi]
- Information Leakage in Embedding ModelsCongzheng Song, Ananth Raghunathan. 377-390 [doi]
- PPE Circuits: Formal Definition to Software AutomationSusan Hohenberger, Satyanarayana Vusirikala, Brent Waters. 391-408 [doi]
- Threshold Password-Hardened Encryption ServicesJulian Brost, Christoph Egger 0001, Russell W. F. Lai, Fritz Schmid, Dominique Schröder, Markus Zoppelt. 409-424 [doi]
- Minimal Symmetric PAKE and 1-out-of-N OT from Programmable-Once Public FunctionsIan McQuoid, Mike Rosulek, Lawrence Roy. 425-442 [doi]
- Full Database Reconstruction in Two DimensionsFrancesca Falzon, Evangelia Anna Markatou, Akshima, David Cash, Adam Rivkin, Jesse Stern, Roberto Tamassia. 443-460 [doi]
- Slimium: Debloating the Chromium Browser with Feature SubsettingChenxiong Qian, Hyungjoon Koo, ChangSeok Oh, Taesoo Kim, Wenke Lee. 461-476 [doi]
- You've Changed: Detecting Malicious Browser Extensions through their Update DeltasNikolaos Pantelaios, Nick Nikiforakis, Alexandros Kapravelos. 477-491 [doi]
- PMForce: Systematically Analyzing postMessage Handlers at ScaleMarius Steffens, Ben Stock. 493-505 [doi]
- Fill in the Blanks: Empirical Analysis of the Privacy Threats of Browser Form AutofillXu Lin, Panagiotis Ilia, Jason Polakis. 507-519 [doi]
- Lies in the Air: Characterizing Fake-base-station Spam Ecosystem in ChinaYiming Zhang 0009, Baojun Liu, Chaoyi Lu, Zhou Li 0001, Haixin Duan, Shuang Hao, Mingxuan Liu, Ying Liu, Dong Wang, Qiang Li. 521-534 [doi]
- VAHunt: Warding Off New Repackaged Android Malware in App-Virtualization's ClothingLuman Shi, Jiang Ming 0002, Jianming Fu, Guojun Peng, Dongpeng Xu, Kun Gao, Xuanchen Pan. 535-549 [doi]
- Deploying Android Security Updates: an Extensive Study Involving Manufacturers, Carriers, and End UsersKailani R. Jones, Ting-Fang Yen, Sathya Chandran Sundaramurthy, Alexandru G. Bardas. 551-567 [doi]
- Demystifying Resource Management Risks in Emerging Mobile App-in-App EcosystemsHaoran Lu, Luyi Xing, Yue Xiao, Yifan Zhang, Xiaojing Liao, Xiaofeng Wang 0001, Xueqiang Wang. 569-585 [doi]
- ACE: Asynchronous and Concurrent Execution of Complex Smart ContractsKarl Wüst, Sinisa Matetic, Silvan Egli, Kari Kostiainen, Srdjan Capkun. 587-600 [doi]
- BDoS: Blockchain Denial-of-ServiceMichael Mirkin, Yan Ji, Jonathan Pang, Ariah Klages-Mundt, Ittay Eyal, Ari Juels. 601-619 [doi]
- eThor: Practical and Provably Sound Static Analysis of Ethereum Smart ContractsClara Schneidewind, Ilya Grishchenko, Markus Scherer, Matteo Maffei. 621-640 [doi]
- WI is Almost Enough: Contingent Payment All Over AgainKy Nguyen, Miguel Ambrona, Masayuki Abe. 641-656 [doi]
- Private Summation in the Multi-Message Shuffle ModelBorja Balle, James Bell 0001, Adrià Gascón, Kobbi Nissim. 657-676 [doi]
- R2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal DistributionsMeisam Mohammady, Shangyu Xie, Yuan Hong, Mengyuan Zhang, Lingyu Wang 0001, Makan Pourzandi, Mourad Debbabi. 677-696 [doi]
- Estimating g-Leakage via Machine LearningMarco Romanelli 0002, Konstantinos Chatzikokolakis 0001, Catuscia Palamidessi, Pablo Piantanida. 697-716 [doi]
- Implementing the Exponential Mechanism with Base-2 Differential PrivacyChristina Ilvento. 717-742 [doi]
- Examining Mirai's Battle over the Internet of ThingsHarm Griffioen, Christian Doerr. 743-756 [doi]
- Enhancing State-of-the-art Classifiers with API Semantics to Detect Evolved Android MalwareXiaohan Zhang, Yuan Zhang, Ming Zhong, Daizong Ding, Yinzhi Cao, Yukun Zhang, Mi Zhang, Min Yang. 757-770 [doi]
- Towards Attribution in Mobile Markets: Identifying Developer Account PolymorphismSilvia Sebastián, Juan Caballero. 771-785 [doi]
- Mnemosyne: An Effective and Efficient Postmortem Watering Hole Attack Investigation SystemJoey Allen, Zheng Yang, Matthew Landen, Raghav Bhat, Harsh Grover, Andrew Chang, Yang Ji 0002, Roberto Perdisci, Wenke Lee. 787-802 [doi]
- Dumbo: Faster Asynchronous BFT ProtocolsBingyong Guo, Zhenliang Lu, Qiang Tang 0005, Jing Xu, Zhenfeng Zhang. 803-818 [doi]
- Tight Consistency Bounds for BitcoinPeter Gazi, Aggelos Kiayias, Alexander Russell. 819-838 [doi]
- On the Optimality of Optimistic ResponsivenessNibesh Shrestha, Ittai Abraham, Ling Ren 0001, Kartik Nayak. 839-857 [doi]
- Everything is a Race and Nakamoto Always WinsAmir Dembo, Sreeram Kannan, Ertem Nusret Tas, David Tse, Pramod Viswanath, Xuechao Wang, Ofer Zeitouni. 859-878 [doi]
- Security Analysis and Implementation of Relay-Resistant Contactless PaymentsIoana Boureanu, Tom Chothia, Alexandre Debant, Stéphanie Delaune. 879-898 [doi]
- HACLxN: Verified Generic SIMD Crypto (for all your favourite platforms)Marina Polubelova, Karthikeyan Bhargavan, Jonathan Protzenko, Benjamin Beurdouche, Aymeric Fromherz, Natalia Kulatova, Santiago Zanella Béguelin. 899-918 [doi]
- CheckDP: An Automated and Integrated Approach for Proving Differential Privacy or Finding Precise CounterexamplesYuxin Wang, Zeyu Ding, Daniel Kifer, Danfeng Zhang. 919-938 [doi]
- Asynchronous Remote Key Generation: An Analysis of Yubico's Proposal for W3C WebAuthnNick Frymann, Daniel Gardham, Franziskus Kiefer, Emil Lundberg, Mark Manulis, Dain Nilsson. 939-954 [doi]
- SQUIRREL: Testing Database Management Systems with Language Validity and Coverage FeedbackRui Zhong, Yongheng Chen, Hong Hu 0004, Hangfan Zhang, Wenke Lee, Dinghao Wu. 955-970 [doi]
- FREEDOM: Engineering a State-of-the-Art DOM FuzzerWen Xu 0002, Soyeon Park, Taesoo Kim. 971-986 [doi]
- BlackMirror: Preventing Wallhacks in 3D Online FPS GamesSeonghyun Park, Adil Ahmad, Byoungyoung Lee. 987-1000 [doi]
- Cache-in-the-Middle (CITM) Attacks: Manipulating Sensitive Data in Isolated Execution EnvironmentsJie Wang, Kun Sun 0001, Lingguang Lei, Shengye Wan, Yuewu Wang, Jiwu Jing. 1001-1015 [doi]
- Deterministic Wallets in a Quantum WorldNabil Alkeilani Alkadri, Poulami Das 0003, Andreas Erwig, Sebastian Faust, Juliane Krämer, Siavash Riahi 0002, Patrick Struck. 1017-1031 [doi]
- SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel AnalysisOkan Seker, Sebastian Berndt, Luca Wilke, Thomas Eisenbarth 0001. 1033-1049 [doi]
- Practical Lattice-Based Zero-Knowledge Proofs for Integer RelationsVadim Lyubashevsky, Ngoc Khanh Nguyen 0001, Gregor Seiler. 1051-1070 [doi]
- QuantumHammer: A Practical Hybrid Attack on the LUOV Signature SchemeKoksal Mus, Saad Islam, Berk Sunar. 1071-1084 [doi]
- TEMPEST Comeback: A Realistic Audio Eavesdropping Threat on Mixed-signal SoCsJieun Choi, Hae-Yong Yang, Dong-Ho Cho. 1085-1101 [doi]
- When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech RecognitionShu Wang, Jiahao Cao, Xu He, Kun Sun 0001, Qi Li 0002. 1103-1119 [doi]
- AdvPulse: Universal, Synchronization-free, and Targeted Audio Adversarial Attacks via Subsecond PerturbationsZhuohang Li, Yi Wu, Jian Liu 0001, Yingying Chen 0001, Bo Yuan 0001. 1121-1134 [doi]
- Harnessing the Ambient Radio Frequency Noise for Wearable Device PairingWenqiang Jin, Ming Li, Srinivasan Murali, Linke Guo. 1135-1148 [doi]
- PDiff: Semantic-based Patch Presence Testing for Downstream KernelsZheyue Jiang, Yuan Zhang, Jun Xu, Qi Wen, Zhenghe Wang, Xiaohan Zhang, Xinyu Xing, Min Yang, Zhemin Yang. 1149-1163 [doi]
- A Systematic Study of Elastic Objects in Kernel ExploitationYueqi Chen, Zhenpeng Lin, Xinyu Xing. 1165-1184 [doi]
- iDEA: Static Analysis on the Security of Apple Kernel DriversXiaolong Bai, Luyi Xing, Min Zheng, Fuping Qu. 1185-1202 [doi]
- Exaggerated Error Handling Hurts! An In-Depth Study and Context-Aware DetectionAditya Pakki, Kangjie Lu. 1203-1218 [doi]
- LEAF: A Faster Secure Search Algorithm via Localization, Extraction, and ReconstructionRui Wen, Yu Yu, Xiang Xie, Yang Zhang. 1219-1232 [doi]
- Blinder - Scalable, Robust Anonymous Committed BroadcastIttai Abraham, Benny Pinkas, Avishay Yanai. 1233-1252 [doi]
- Secure Single-Server Aggregation with (Poly)Logarithmic OverheadJames Henry Bell, Kallista A. Bonawitz, Adrià Gascón, Tancrède Lepoint, Mariana Raykova 0001. 1253-1269 [doi]
- Fast Database Joins and PSI for Secret Shared DataPayman Mohassel, Peter Rindal, Mike Rosulek. 1271-1287 [doi]
- The Boon and Bane of Cross-Signing: Shedding Light on a Common Practice in Public Key InfrastructuresJens Hiller, Johanna Amann, Oliver Hohlfeld. 1289-1306 [doi]
- Zombie Awakening: Stealthy Hijacking of Active Domains through DNS Hosting ReferralEihal Alowaisheq, Siyuan Tang, ZhiHao Wang, Fatemah Alharbi, Xiaojing Liao, Xiaofeng Wang 0001. 1307-1322 [doi]
- Off-Path TCP Exploits of the Mixed IPID AssignmentXuewei Feng, Chuanpu Fu, Qi Li, Kun Sun, Ke Xu 0002. 1323-1335 [doi]
- DNS Cache Poisoning Attack Reloaded: Revolutions with Side ChannelsKeyu Man, Zhiyun Qian, Zhongjie Wang 0002, Xiaofeng Zheng, Youjun Huang, Haixin Duan. 1337-1350 [doi]
- Game-Set-MATCH: Using Mobile Devices for Seamless External-Facing Biometric MatchingShashank Agrawal, Saikrishna Badrinarayanan, Pratyay Mukherjee, Peter Rindal. 1351-1370 [doi]
- Usage Patterns of Privacy-Enhancing TechnologiesKovila P. L. Coopamootoo. 1371-1390 [doi]
- Text Captcha Is Dead? A Large Scale Deployment and Empirical StudyChenghui Shi, Shouling Ji, Qianjun Liu, Changchang Liu, Yuefeng Chen, Yuan He, Zhe Liu, Raheem Beyah, Ting Wang. 1391-1406 [doi]
- Practical Recommendations for Stronger, More Usable Passwords Combining Minimum-strength, Minimum-length, and Blocklist RequirementsJoshua Tan, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor. 1407-1426 [doi]
- Oracle Simulation: A Technique for Protocol Composition with Long Term Shared SecretsHubert Comon, Charlie Jacomme, Guillaume Scerri. 1427-1444 [doi]
- The Signal Private Group System and Anonymous Credentials Supporting Efficient Verifiable EncryptionMelissa Chase, Trevor Perrin, Greg Zaverucha. 1445-1459 [doi]
- Post-Quantum TLS Without Handshake SignaturesPeter Schwabe, Douglas Stebila, Thom Wiggers. 1461-1480 [doi]
- Clone Detection in Secure Messaging: Improving Post-Compromise Security in PracticeCas Cremers, Jaiden Fairoze, Benjamin Kiesl, Aurora Naska. 1481-1495 [doi]
- A Forensically Sound Method of Identifying Downloaders and Uploaders in FreenetBrian Neil Levine, Marc Liberatore, Brian Lynn, Matthew Wright 0001. 1497-1512 [doi]
- A Qualitative Study of Dependency Management and Its Security ImplicationsIvan Pashchenko, Duc Ly Vu, Fabio Massacci. 1513-1531 [doi]
- Forensic Analysis in Access Control: Foundations and a Case-Study from PracticeNahid Juma, Xiaowei Huang, Mahesh Tripunitara. 1533-1550 [doi]
- Logging to the Danger Zone: Race Condition Attacks and Defenses on System Audit FrameworksRiccardo Paccagnella, Kevin Liao, Dave Tian, Adam Bates 0001. 1551-1574 [doi]
- MP-SPDZ: A Versatile Framework for Multi-Party ComputationMarcel Keller. 1575-1590 [doi]
- Is the Classical GMW Paradigm Practical? The Case of Non-Interactive Actively Secure 2PCJackson Abascal, Mohammad Hossein Faghihi Sereshgi, Carmit Hazay, Yuval Ishai, Muthuramakrishnan Venkitasubramaniam. 1591-1605 [doi]
- Ferret: Fast Extension for Correlated OT with Small CommunicationKang Yang, Chenkai Weng, Xiao Lan, Jiang Zhang, Xiao Wang. 1607-1626 [doi]
- More Efficient MPC from Improved Triple Generation and Authenticated GarblingKang Yang, Xiao Wang, Jiang Zhang. 1627-1646 [doi]
- Mitigation of Attacks on Email End-to-End EncryptionJörg Schwenk, Marcus Brinkmann, Damian Poddebniak, Jens Müller 0007, Juraj Somorovsky, Sebastian Schinzel. 1647-1664 [doi]
- Impersonation-as-a-Service: Characterizing the Emerging Criminal Infrastructure for User Impersonation at ScaleMichele Campobasso, Luca Allodi. 1665-1680 [doi]
- VisualPhishNet: Zero-Day Phishing Website Detection by Visual SimilaritySahar Abdelnabi, Katharina Krombholz, Mario Fritz. 1681-1698 [doi]
- Dangerous Skills Got Certified: Measuring the Trustworthiness of Skill Certification in Voice Personal Assistant PlatformsLong Cheng, Christin Wilson, Song Liao, Jeffrey Young, Daniel Dong, Hongxin Hu. 1699-1716 [doi]
- MuSig-DN: Schnorr Multi-Signatures with Verifiably Deterministic NoncesJonas Nick, Tim Ruffing, Yannick Seurin, Pieter Wuille. 1717-1731 [doi]
- Verifiable Timed Signatures Made PracticalSri Aravinda Krishnan Thyagarajan, Adithya Bhat, Giulio Malavolta, Nico Döttling, Aniket Kate, Dominique Schröder. 1733-1750 [doi]
- Asynchronous Distributed Key Generation for Computationally-Secure Randomness, Consensus, and Threshold SignaturesEleftherios Kokoris-Kogias, Dahlia Malkhi, Alexander Spiegelman. 1751-1767 [doi]
- UC Non-Interactive, Proactive, Threshold ECDSA with Identifiable AbortsRan Canetti, Rosario Gennaro, Steven Goldfeder, Nikolaos Makriyannis, Udi Peled. 1769-1787 [doi]
- A Generic Technique for Automatically Finding Defense-Aware Code Reuse AttacksEdward J. Schwartz, Cory F. Cohen, Jeffrey S. Gennari, Stephanie M. Schwartz. 1789-1801 [doi]
- Methodologies for Quantifying (Re-)randomization Security and Timing under JIT-ROPSalman Ahmed, Ya Xiao, Kevin Z. Snow, Gang Tan, Fabian Monrose, Danfeng (Daphne) Yao. 1803-1820 [doi]
- Finding Cracks in Shields: On the Security of Control Flow Integrity MechanismsYuan Li, Mingzhe Wang, Chao Zhang, Xingman Chen, Songtao Yang, Ying Liu. 1821-1835 [doi]
- RTFM! Automatic Assumption Discovery and Verification Derivation from Library Document for API Misuse DetectionTao Lv, Ruishi Li, Yi Yang, Kai Chen, Xiaojing Liao, Xiaofeng Wang 0001, Peiwei Hu, Luyi Xing. 1837-1852 [doi]
- InSpectre: Breaking and Fixing Microarchitectural Vulnerabilities by Formal AnalysisRoberto Guanciale, Musard Balliu, Mads Dam. 1853-1869 [doi]
- Speculative Probing: Hacking Blind in the Spectre EraEnes Göktas, Kaveh Razavi, Georgios Portokalidis, Herbert Bos, Cristiano Giuffrida. 1871-1885 [doi]
- Déjà Vu: Side-Channel Analysis of Mozilla's NSSSohaib ul Hassan, Iaroslav Gridin, Ignacio M. Delgado-Lozano, Cesar Pereida García, Jesús-Javier Chi-Domínguez, Alejandro Cabrera Aldaya, Billy Bob Brumley. 1887-1902 [doi]
- TRUSTORE: Side-Channel Resistant Storage for SGX using Intel Hybrid CPU-FPGAHyunyoung Oh, Adil Ahmad, Seonghyun Park, Byoungyoung Lee, Yunheung Paek. 1903-1918 [doi]
- DECO: Liberating Web Data Using Decentralized Oracles for TLSFan Zhang 0022, Deepak Maram, Harjasleen Malvai, Steven Goldfeder, Ari Juels. 1919-1938 [doi]
- Talking with Familiar Strangers: An Empirical Study on HTTPS Context Confusion AttacksMingming Zhang, Xiaofeng Zheng, Kaiwen Shen, Ziqiao Kong, Chaoyi Lu, Yu Wang, Haixin Duan, Shuang Hao, Baojun Liu, Min Yang. 1939-1952 [doi]
- The Cookie Hunter: Automated Black-box Auditing for Web Authentication and Authorization FlawsKostas Drakonakis, Sotiris Ioannidis, Jason Polakis. 1953-1970 [doi]
- TrafficSliver: Fighting Website Fingerprinting Attacks with Traffic SplittingWladimir De la Cadena, Asya Mitseva, Jens Hiller, Jan Pennekamp, Sebastian Reuter, Julian Filter, Thomas Engel 0001, Klaus Wehrle, Andriy Panchenko 0001. 1971-1985 [doi]
- Lift-and-Shift: Obtaining Simulation Extractable Subversion and Updatable SNARKs GenericallyBehzad Abdolmaleki, Sebastian Ramacher, Daniel Slamanig. 1987-2005 [doi]
- Pointproofs: Aggregating Proofs for Multiple Vector CommitmentsSergey Gorbunov 0001, Leonid Reyzin, Hoeteck Wee, Zhenfei Zhang. 2007-2023 [doi]
- Ligero++: A New Optimized Sublinear IOPRishabh Bhadauria, Zhiyong Fang, Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Tiancheng Xie, Yupeng Zhang 0001. 2025-2038 [doi]
- Zero Knowledge Proofs for Decision Tree Predictions and AccuracyJiaheng Zhang, Zhiyong Fang, Yupeng Zhang, Dawn Song. 2039-2053 [doi]
- A 2.1 KHz Zero-Knowledge Processor with BubbleRAMDavid Heath, Vladimir Kolesnikov. 2055-2074 [doi]
- Realistic Threats and Realistic Users: Lessons from the ElectionAlex Stamos. 2075 [doi]
- PhishBench 2.0: A Versatile and Extendable Benchmarking Framework for PhishingVictor Zeng, Xin Zhou, Shahryar Baki, Rakesh M. Verma. 2077-2079 [doi]
- Benchmarking Label Dynamics of VirusTotal EnginesShuofei Zhu, Ziyi Zhang, Limin Yang, Linhai Song, Gang Wang. 2081-2083 [doi]
- VRLifeTime - An IDE Tool to Avoid Concurrency and Memory Bugs in RustZiyi Zhang, Boqin Qin, Yilun Chen, Linhai Song, Yiying Zhang. 2085-2087 [doi]
- LPET - Mining MS-Windows Software Privilege Escalation Vulnerabilities by Monitoring Interactive BehaviorCan Huang, Xinhui Han, Guorui Yu. 2089-2091 [doi]
- Towards Using Source Code Repositories to Identify Software Supply Chain AttacksDuc Ly Vu, Ivan Pashchenko, Fabio Massacci, Henrik Plate, Antonino Sabetta. 2093-2095 [doi]
- Cybersecurity Research and Training for Power Distribution Grids - A BlueprintMartin Henze, Lennart Bader, Julian Filter, Olav Lamberts, Simon Ofner, Dennis van der Velde. 2097-2099 [doi]
- Continuous and Multiregional Monitoring of Malicious HostsShota Fujii, Takayuki Sato, Sho Aoki, Yu Tsuda, Yusuke Okano, Tomohiro Shigemoto, Nobutaka Kawaguchi, Masato Terada. 2101-2103 [doi]
- Facilitating Protocol-independent Industrial Intrusion Detection SystemsKonrad Wolsing, Eric Wagner 0003, Martin Henze. 2105-2107 [doi]
- Bento: Bringing Network Function Virtualization to TorMichael Reininger, Arushi Arora, Stephen Herwig, Nicholas Francino, Christina Garman, Dave Levin. 2109-2111 [doi]
- RIPT - An Efficient Multi-Core Record-Replay SystemJiashuo Liang, Guancheng Li, Chao Zhang, Ming Yuan, Xingman Chen, Xinhui Han. 2113-2115 [doi]
- Impact of Energy Consumption Attacks on LoRaWAN-Enabled Devices in Industrial ContextMuhammad Nouman Nafees, Neetesh Saxena, Pete Burnap, Bong-Jun Choi. 2117-2119 [doi]
- A Multi-phased Multi-faceted IoT Honeypot EcosystemArmin Ziaie Tabari, Xinming Ou. 2121-2123 [doi]
- Voice-Indistinguishability - Protecting Voiceprint with Differential Privacy under an Untrusted ServerYaowei Han, Yang Cao 0011, Sheng Li 0010, Qiang Ma 0001, Masatoshi Yoshikawa. 2125-2127 [doi]
- rProfiler - Assessing Insider Influence on Enterprise AssetsManish Shukla 0001, Sachin Lodha. 2129-2131 [doi]
- CCSW'20: 2020 Cloud Computing Security WorkshopRadu Sion, Yinqian Zhang. 2133-2134 [doi]
- CPSIOTSEC'20: 2020 Joint Workshop on CPS&IoT Security and PrivacyMichail Maniatakos, Yuqing Zhang. 2135-2136 [doi]
- MTD'20: 7th ACM Workshop on Moving Target DefenseHamed Okhravi, Cliff Wang. 2137-2138 [doi]
- PPMLP 2020: Workshop on Privacy-Preserving Machine Learning In PracticeBenyu Zhang, Matei Zaharia, Shouling Ji, Raluca Ada Popa, Guofei Gu. 2139-2140 [doi]
- 19th Workshop on Privacy in the Electronic Society (WPES 2020)Wouter Lueks, Paul Syverson. 2141-2142 [doi]
- AISec'20: 13th Workshop on Artificial Intelligence and SecuritySadia Afroz, Nicholas Carlini, Ambra Demontis. 2143-2144 [doi]
- ASHES 2020: 4th Workshop on Attacks and Solutions in Hardware SecurityChip-Hong Chang, Stefan Katzenbeisser 0001, Ulrich Rührmair, Patrick Schaumont. 2145-2146 [doi]
- 2nd Workshop on Cyber-Security Arms Race (CYSARM 2020)Thanassis Giannetsos, Daniele Sgandurra. 2147-2148 [doi]
- FEAST'20: Fifth Workshop on Forming an Ecosystem Around Software TransformationKevin W. Hamlen, Long Lu. 2149-2150 [doi]
- PLAS'20: 15th Workshop on Programming Languages and Analysis for SecurityAlley Stoughton, Marco Vassena. 2151-2152 [doi]
- TPDP'20: 6th Workshop on Theory and Practice of Differential PrivacyRachel Cummings, Michael Hay. 2153-2154 [doi]