Abstract is missing.
- Privacy-preserving Voice Analysis via Disentangled RepresentationsRanya Aloufi, Hamed Haddadi, David Boyle. 1-14 [doi]
- Not one but many Tradeoffs: Privacy Vs. Utility in Differentially Private Machine LearningBenjamin Zi Hao Zhao, Mohamed Ali Kâafar, Nicolas Kourtellis. 15-26 [doi]
- Tiki-Taka: Attacking and Defending Deep Learning-based Intrusion Detection SystemsChaoyun Zhang, Xavier Costa-Pérez, Paul Patras. 27-39 [doi]
- GANRED: GAN-based Reverse Engineering of DNNs via Cache Side-ChannelYuntao Liu 0001, Ankur Srivastava. 41-52 [doi]
- Co-residency Attacks on Containers are RealSushrut Shringarputale, Patrick D. McDaniel, Kevin R. B. Butler, Thomas La Porta. 53-66 [doi]
- Towards Enabling Secure Web-Based Cloud Services using Client-Side EncryptionMartin Johns, Alexandra Dirksen. 67-76 [doi]
- MARTINI: Memory Access Traces to Detect AttacksYujun Qin, Samuel Gonzalez, Kevin Angstadt, Xiaowei Wang, Stephanie Forrest, Reetuparna Das, Kevin Leach, Westley Weimer. 77-90 [doi]
- bpfbox: Simple Precise Process Confinement with eBPFWilliam Findlay, Anil Somayaji, David Barrera 0003. 91-103 [doi]
- Homomorphic String Search with Constant Multiplicative DepthCharlotte Bonte, Ilia Iliashenko. 105-117 [doi]
- Short-Lived Forward-Secure Delegation for TLSLukas Alber, Stefan More, Sebastian Ramacher. 119-132 [doi]
- On the Detection of Disinformation Campaign Activity with Network AnalysisLuis Vargas, Patrick Emami, Patrick Traynor. 133-146 [doi]
- The Sound of Silence: Mining Security Vulnerabilities from Secret Integration Channels in Open-Source ProjectsRalf Ramsauer, Lukas Bulwahn, Daniel Lohmann, Wolfgang Mauerer. 147-157 [doi]
- Verifpal: Cryptographic Protocol Analysis for the Real WorldNadim Kobeissi, Georgio Nicolas, Mukesh Tiwari. 159 [doi]
- Following the Pebble Trail: Extending Return-Oriented Programming to RISC-VBogdan Pavel Deac, Adrian Colesa. 161 [doi]
- Non-Interactive Cryptographic Access Control for Secure Outsourced StorageWei Yuan. 163 [doi]
- ABSTRACT: Together We Can Fool Them: A Distributed Black-Box Adversarial Attack Based on Multi-Group Particle Swarm OptimizationNaufal Suryanto, Hyoeun Kang, Yongsu Kim, Youngyeo Yun, Harashta Tatimma Larasati, Howon Kim. 165 [doi]
- Securing Classifiers Against Both White-Box and Black-Box Attacks using Encrypted-Input ObfuscationGiovanni Di Crescenzo, Brian A. Coan, Lisa Bahler, Kurt Rohloff, Yuriy Polyakov, David Bruce Cousins. 167 [doi]