Abstract is missing.
- AI and Security: Lessons, Challenges and Future DirectionsDawn Song. 1 [doi]
- Proofs or Remote Execution and Mitigation of TOCTOU AttacksGene Tsudik. 2-3 [doi]
- Global Communication Guarantees in the Presence of AdversariesAdrian Perrig. 4-5 [doi]
- The Lazarus Effect: Healing Compromised Devices in the Internet of Small ThingsManuel Huber 0001, Stefan Hristozov, Simon Ott, Vasil Sarafov, Marcus Peinado. 6-19 [doi]
- AuthCTC: Defending Against Waveform Emulation Attack in Heterogeneous IoT EnvironmentsSihan Yu, Xiaonan Zhang, Pei Huang 0005, Linke Guo, Long Cheng, Kuangching Wang. 20-32 [doi]
- DeepPower: Non-intrusive and Deep Learning-based Detection of IoT Malware Using Power Side ChannelsFei Ding, Hongda Li, Feng Luo 0001, Hongxin Hu, Long Cheng, Hai Xiao, Rong Ge 0002. 33-46 [doi]
- Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT TrafficShuaike Dong, Zhou Li 0001, Di Tang, Jiongyi Chen, Menghan Sun, Kehuan Zhang. 47-59 [doi]
- PassTag: A Graphical-Textual Hybrid Fallback Authentication SystemJoon Kuy Han, Xiaojun Bi, Hyoungshick Kim, Simon S. Woo. 60-72 [doi]
- PISKES: Pragmatic Internet-Scale Key-Establishment SystemBenjamin Rothenberger, Dominik Roos, Markus Legner, Adrian Perrig. 73-86 [doi]
- Provable-Security Model for Strong Proximity-based Attacks: With Application to Contactless PaymentsIoana Boureanu, Liqun Chen, Sam Ivey. 87-100 [doi]
- Skeptic: Automatic, Justified and Privacy-Preserving Password Composition Policy SelectionSaul A. Johnson, João F. Ferreira, Alexandra Mendes, Julien Cordry. 101-115 [doi]
- Inspecting TLS Anytime Anywhere: A New Approach to TLS InterceptionJoonsang Baek, Jongkil Kim, Willy Susilo. 116-126 [doi]
- Preparing Network Intrusion Detection Deep Learning Models with Minimal Data Using Adversarial Domain AdaptationAnkush Singla, Elisa Bertino, Dinesh C. Verma. 127-140 [doi]
- Creating Character-based Templates for Log Data to Enable Security Event ClassificationMarkus Wurzenberger, Georg Höld, Max Landauer, Florian Skopik, Wolfgang Kastner. 141-152 [doi]
- In-Network Filtering of Distributed Denial-of-Service Traffic with Near-Optimal Rule SelectionDevkishen Sisodia, Jun Li, Lei Jiao. 153-164 [doi]
- Revisiting Shared Data Protection Against Key ExposureKatarzyna Kapusta, Matthieu Rambaud, Gérard Memmi. 165-177 [doi]
- Catch You If You Deceive Me: Verifiable and Privacy-Aware Truth Discovery in Crowdsensing SystemsGuowen Xu, Hongwei Li, Shengmin Xu, Hao Ren, Yinghui Zhang 0002, Jianfei Sun, Robert H. Deng. 178-192 [doi]
- Efficient Secure Computation of Order-Preserving EncryptionAnselme Tueno, Florian Kerschbaum. 193-207 [doi]
- Exploring Architectures for Cryptographic Access Control Enforcement in the Cloud for Fun and OptimizationStefano Berlato, Roberto Carbone, Adam J. Lee, Silvio Ranise. 208-221 [doi]
- Measuring the Impact of the GDPR on Data Sharing in Ad NetworksTobias Urban, Dennis Tatang, Martin Degeling, Thorsten Holz, Norbert Pohlmann. 222-235 [doi]
- Scam Augmentation and Customization: Identifying Vulnerable Users and Arming DefendersShahryar Baki, Rakesh M. Verma, Omprakash Gnawali. 236-247 [doi]
- What risk? I don't understand. An Empirical Study on Users' Understanding of the Terms Used in Security TextsTingmin Wu, Rongjunchen Zhang, Wanlun Ma, Sheng Wen, Xin Xia 0001, Cécile Paris, Surya Nepal, Yang Xiang 0001. 248-262 [doi]
- Be the Phisher - Understanding Users' Perception of Malicious DomainsFlorian Quinkert, Martin Degeling, Jim Blythe, Thorsten Holz. 263-276 [doi]
- Privacy-Preserving OpenID ConnectSven Hammann, Ralf Sasse, David A. Basin. 277-289 [doi]
- Assessing the Privacy Benefits of Domain Name EncryptionNguyen Phong Hoang, Arian Akhavan Niaki, Nikita Borisov, Phillipa Gill, Michalis Polychronakis. 290-304 [doi]
- Can We Use Split Learning on 1D CNN Models for Privacy Preserving Training?Sharif Abuadbba, Kyuyeon Kim, Minki Kim, Chandra Thapa, Seyit Ahmet Çamtepe, Yansong Gao, Hyoungshick Kim, Surya Nepal. 305-318 [doi]
- Privacy-Preserving Incentive Systems with Highly Efficient Point-CollectionJan Bobolz, Fabian Eidens, Stephan Krenn, Daniel Slamanig, Christoph Striecks. 319-333 [doi]
- Adversarial Attack against Deep Reinforcement Learning with Static Reward Impact MapPatrick P. K. Chan, Yaxuan Wang, Daniel S. Yeung. 334-343 [doi]
- Membership Encoding for Deep LearningCongzheng Song, Reza Shokri. 344-356 [doi]
- SirenAttack: Generating Adversarial Audio for End-to-End Acoustic SystemsTianyu Du, Shouling Ji, Jinfeng Li, Qinchen Gu, Ting Wang, Raheem Beyah. 357-369 [doi]
- Adversarial Attacks on Link Prediction Algorithms Based on Graph Neural NetworksWanyu Lin, Shengxiang Ji, Baochun Li. 370-380 [doi]
- On the Security of Randomized Defenses Against Adversarial SamplesKumar Sharad, Giorgia Azzurra Marson, Hien Thi Thu Truong, Ghassan Karame. 381-393 [doi]
- To Get Lost is to Learn the Way: Automatically Collecting Multi-step Social Engineering Attacks on the WebTakashi Koide, Daiki Chiba 0001, Mitsuaki Akiyama. 394-408 [doi]
- CORSICA: Cross-Origin Web Service IdentificationChristian Dresen, Fabian Ising, Damian Poddebniak, Tobias Kappert, Thorsten Holz, Sebastian Schinzel. 409-419 [doi]
- Assessing the Impact of Script Gadgets on CSP at ScaleSebastian Roth, Michael Backes 0001, Ben Stock. 420-431 [doi]
- Contextual and Granular Policy Enforcement in Database-backed ApplicationsAbhishek Bichhawat, Matt Fredrikson, Jean Yang, Akash Trehan. 432-444 [doi]
- You shall not pass: Mitigating SQL Injection Attacks on Legacy Web ApplicationsRasoul Jahanshahi, Adam Doupé, Manuel Egele. 445-457 [doi]
- NativeX: Native Executioner Freezes AndroidQinsheng Hou, Yao Cheng, Lingyun Ying. 458-470 [doi]
- Return-Oriented Programming on RISC-VGeorges-Axel Jaloyan, Konstantinos Markantonakis, Raja Naeem Akram, David Robin, Keith Mayes, David Naccache. 471-480 [doi]
- KASLR: Break It, Fix It, RepeatClaudio Canella, Michael Schwarz 0001, Martin Haubenwallner, Martin Schwarzl, Daniel Gruss. 481-493 [doi]
- CoDaRR: Continuous Data Space Randomization against Data-Only AttacksPrabhu Rajasekaran, Stephen Crane, David Gens, Yeoul Na, Stijn Volckaert, Michael Franz. 494-505 [doi]
- Fail-safe Watchtowers and Short-lived Assertions for Payment ChannelsBowen Liu, Pawel Szalachowski, Siwei Sun. 506-518 [doi]
- Investigating MMM Ponzi Scheme on BitcoinYazan Boshmaf, Charitha Elvitigala, Husam Al Jawaheri, Primal Wijesekera, Mashael Al Sabah. 519-530 [doi]
- Utilizing Public Blockchains for the Sybil-Resistant Bootstrapping of Distributed Anonymity ServicesRoman Matzutt, Jan Pennekamp, Erik Buchholz, Klaus Wehrle. 531-542 [doi]
- OptiSwap: Fast Optimistic Fair ExchangeLisa Eckey, Sebastian Faust, Benjamin Schlosser. 543-557 [doi]
- BOREALIS: Building Block for Sealed Bid Auctions on BlockchainsErik-Oliver Blass, Florian Kerschbaum. 558-571 [doi]
- Rational Manager in Bitcoin Mining Pool: Dynamic Strategies to Gain Extra RewardsFeifan Yu, Na Ruan, Siyuan Cheng 0006. 572-583 [doi]
- ÆGIS: Shielding Vulnerable Smart Contracts Against AttacksChristof Ferreira Torres, Mathis Baden, Robert Norvill, Beltran Borja Fiz Pontiveros, Hugo Jonker, Sjouke Mauw. 584-597 [doi]
- PathAFL: Path-Coverage Assisted FuzzingShengbo Yan, Chenlu Wu, Hang Li, Wei Shao, Chunfu Jia. 598-609 [doi]
- XSS Vulnerabilities in Cloud-Application Add-OnsThanh Bui, Siddharth Prakash Rao, Markku Antikainen, Tuomas Aura. 610-621 [doi]
- The Taint Rabbit: Optimizing Generic Taint Analysis with Dynamic Fast Path GenerationJohn Galea, Daniel Kroening. 622-636 [doi]
- A Comb for Decompiled C CodeAndrea Gussoni, Alessandro Di Federico, Pietro Fezzardi, Giovanni Agosta. 637-651 [doi]
- BOTection: Bot Detection by Building Markov Chain Models of Bots Network BehaviorBushra A. Alahmadi, Enrico Mariconti, Riccardo Spolaor, Gianluca Stringhini, Ivan Martinovic. 652-664 [doi]
- Cybersecurity Event Detection with New and Re-emerging WordsHyejin Shin, Woochul Shim, Jiin Moon, Jae Woo Seo, Sol Lee, Yong Ho Hwang. 665-678 [doi]
- AMSI-Based Detection of Malicious PowerShell Code Using Contextual EmbeddingsDanny Hendler, Shay Kels, Amir Rubin. 679-693 [doi]
- Hidden in Plain Sight: Obfuscated Strings Threatening Your PrivacyLeonid Glanz, Patrick Müller, Lars Baumgärtner, Michael Reif, Sven Amann, Pauline Anthonysamy, Mira Mezini. 694-707 [doi]
- Social Botnet Community Detection: A Novel Approach based on Behavioral Similarity in Twitter Network using Deep LearningGreeshma Lingam, Rashmi Ranjan Rout, Durvasula V. L. N. Somayajulu, Sajal K. Das 0002. 708-718 [doi]
- LiS: Lightweight Signature Schemes for Continuous Message Authentication in Cyber-Physical SystemsZheng Yang 0001, Chenglu Jin, Yangguang Tian, Junyu Lai, Jianying Zhou 0001. 719-731 [doi]
- Hunting Sybils in Participatory Mobile Consensus-Based NetworksNickolai Verchok, Alex Orailoglu. 732-743 [doi]
- I came, I saw, I hacked: Automated Generation of Process-independent Attacks for Industrial Control SystemsEsha Sarkar, Hadjer Benkraouda, Michail Maniatakos. 744-758 [doi]
- Detecting Insecure Code Patterns in Industrial Robot ProgramsMarcello Pogliani, Federico Maggi, Marco Balduzzi, Davide Quarta, Stefano Zanero. 759-771 [doi]
- EchoLock: Towards Low-effort Mobile User Identification Leveraging Structure-borne EchosYilin Yang, Yan Wang, Yingying Chen, Chen Wang. 772-783 [doi]
- Formal Analysis and Implementation of a TPM 2.0-based Direct Anonymous Attestation SchemeStephan Wesemeyer, Christopher J. P. Newton, Helen Treharne, Liqun Chen, Ralf Sasse, Jorden Whitefield. 784-798 [doi]
- DISKSHIELD: A Data Tamper-Resistant Storage for Intel SGXJinwoo Ahn, JungHee Lee, Yungwoo Ko, Donghyun Min, Jiyun Park, Sungyong Park, Youngjae Kim 0001. 799-812 [doi]
- Take A Way: Exploring the Security Implications of AMD's Cache Way PredictorsMoritz Lipp, Vedad Hazic, Michael Schwarz 0001, Arthur Perais, Clémentine Maurice, Daniel Gruss. 813-825 [doi]
- Uranus: Simple, Efficient SGX Programming and its ApplicationsJianyu Jiang, Xusheng Chen, Tsz On Li, Cheng Wang, Tianxiang Shen, Shixiong Zhao, Heming Cui, Cho-Li Wang, Fengwei Zhang. 826-840 [doi]
- Post-Quantum TLS on Embedded Systems: Integrating and Evaluating Kyber and SPHINCS+ with mbed TLSKevin Bürstinghaus-Steinbach, Christoph Krauß, Ruben Niederhagen, Michael Schneider 0002. 841-852 [doi]
- ModFalcon: Compact Signatures Based On Module-NTRU LatticesChitchanok Chuengsatiansup, Thomas Prest, Damien Stehlé, Alexandre Wallet, Keita Xagawa. 853-866 [doi]
- Lattice Klepto RevisitedZhaomin Yang, Tianyuan Xie, Yanbin Pan. 867-873 [doi]
- It all Started with Compression: Another Look at Reconciliation MechanismTianyuan Xie, Yanbin Pan. 874-885 [doi]
- POSTER: How Do Suspicious Accounts Participate in Online Political Discussions? A Preliminary Study in TaiwanMing-Hung Wang, Yu-Chen Dai. 886-888 [doi]
- POSTER: Towards Automating Detection of Anomalous HTTP Requests with Joint Probability Estimation of CharactersPratibha Khandait, Neminath Hubballi, Katrin Franke. 889-891 [doi]
- POSTER: Dynamic Software Vulnerabilities Threat Prediction through Social Media Contextual AnalysisShin-Ying Huang, Yiju Wu. 892-894 [doi]
- POSTER: Oblivious Access System on Decentralized Database over Parallel Smart Contract ModelZhong-Yi Guo, Yu-Chi Chen, Hsiu-Ping Lin. 895-897 [doi]
- POSTER: Data Leakage Detection for Health Information System based on Memory IntrospectionSanoop Mallissery, Min-Chieh Wu, Chun-An Bau, Guan-Zhang Huang, Chen-Yu Yang, Wei-Chun Lin, Yu-Sung Wu. 898-900 [doi]
- POSTER: Attacks to Federated Learning: Responsive Web User Interface to Recover Training Data from User GradientsHans Albert Lianto, Yang Zhao, Jun Zhao. 901-903 [doi]
- POSTER: SecretSVM - Secret Sharing-Based SVM for Preventing Collusion in IoT Data AnalysisSong-Yi Hsu, Xin Xie, Yu-Chi Chen. 904-906 [doi]
- POSTER: Content-Agnostic Identification of Cryptojacking in Network TrafficYebo Feng, Devkishen Sisodia, Jun Li. 907-909 [doi]
- POSTER: Data Collection via Local Differential Privacy with Secret ParametersShun Takagi, Yang Cao 0011, Masatoshi Yoshikawa. 910-912 [doi]
- POSTER: Protecting Location Privacy on Road NetworksShun Takagi, Yang Cao 0011, Yasuhito Asano, Masatoshi Yoshikawa. 913-915 [doi]
- POSTER: Distributed SSH Bruteforce Attack Detection with Flow Content Similarity and Login Failure ReputationNeminath Hubballi, Namrata Tiwari, Pratibha Khandait. 916-918 [doi]
- POSTER: Mitigating Memory Sharing-based Side-channel Attack by Embedding Random Values in Binary for Cloud EnvironmentTaehun Kim, Youngjoo Shin. 919-921 [doi]
- POSTER: Detecting Suspicious Processes from Log-Data via a Bayesian Block ModelDaniel Andrade, Yusuke Takahashi, Daichi Hasumi. 922-924 [doi]
- POSTER: Blockchain-Based Differential Privacy Cost Management SystemLeong Mei Han, Yang Zhao, Jun Zhao. 925-927 [doi]
- POSTER: Expanding a Programmable CPS Testbed for Network Attack AnalysisSeungoh Choi, Jeong-Han Yun, Byung-gil Min, HyoungChun Kim. 928-930 [doi]
- Poster: Challenges in Stopping Ticket Scalping BotsHao-Cheng Yang, Hsun Lee, Hsu-Chun Hsiao. 931-933 [doi]
- POSTER: Construct macOS Cyber Range for Red/Blue TeamsYi-Hsien Chen, Yen-Da Lin, Chung-Kuan Chen, Chin-Laung Lei, Chun-Ying Huang. 934-936 [doi]