Abstract is missing.
- Can AI be for Good in the Midst of Cyber Attacks and Privacy Violations?: A Position PaperBhavani M. Thuraisingham. 1-4 [doi]
- ProximiTEE: Hardened SGX Attestation by Proximity VerificationAritra Dhar, Ivan Puddu, Kari Kostiainen, Srdjan Capkun. 5-16 [doi]
- MOSE: Practical Multi-User Oblivious Storage via Secure EnclavesThang Hoang, Rouzbeh Behnia, Yeongjin Jang, Attila A. Yavuz. 17-28 [doi]
- DeepTrust: An Automatic Framework to Detect Trustworthy Users in Opinion-based SystemsEdoardo Serra, Anu Shrestha, Francesca Spezzano, Anna Cinzia Squicciarini. 29-38 [doi]
- TrustAV: Practical and Privacy Preserving Malware Analysis in the CloudDimitris Deyannis, Eva Papadogiannaki, Giorgos Kalivianakis, Giorgos Vasiliadis, Sotiris Ioannidis. 39-48 [doi]
- CREHMA: Cache-aware REST-ful HTTP Message AuthenticationHoai Viet Nguyen, Luigi Lo Iacono. 49-60 [doi]
- Tap-Pair: Using Spatial Secrets for Single-Tap Device Pairing of Augmented Reality HeadsetsIvo Sluganovic, Mihael Liskij, Ante Derek, Ivan Martinovic. 61-72 [doi]
- Admin-CBAC: An Administration Model for Category-Based Access ControlClara Bertolissi, Maribel Fernández, Bhavani M. Thuraisingham. 73-84 [doi]
- Random Spiking and Systematic Evaluation of Defenses Against Adversarial ExamplesHuangyi Ge, Sze Yiu Chau, Bruno Ribeiro 0001, Ninghui Li. 85-96 [doi]
- Backdoor Embedding in Convolutional Neural Network Models via Invisible PerturbationHaoti Zhong, Cong Liao, Anna Cinzia Squicciarini, Sencun Zhu, David J. Miller 0001. 97-108 [doi]
- Explore the Transformation Space for Adversarial ImagesJiyu Chen, David Wang, Hao Chen. 109-120 [doi]
- AuthPDB: Authentication of Probabilistic Queries on Outsourced Uncertain DataBo Zhang, Boxiang Dong, Haipei Sun, Wendy Hui Wang. 121-132 [doi]
- A Baseline for Attribute Disclosure Risk in Synthetic DataMarkus Hittmeir, Rudolf Mayer, Andreas Ekelhart. 133-143 [doi]
- Evaluation of Secure Remote Offering Service for Information BankKeita Kayaba, Hidenobu Oguri, Yuji Yamaoka. 144-146 [doi]
- A Score Fusion Method by Neural Network in Multi-Factor AuthenticationKatsuya Matsuoka, Mhd Irvan, Ryosuke Kobayashi, Rie Shigetomi Yamaguchi. 147-149 [doi]
- Service-Oriented Modeling for Cyber Threat AnalysisKees Leune, Sung Kim. 150-152 [doi]
- DRAT: A Drone Attack Tool for Vulnerability AssessmentMohammad Shameel bin Mohammad Fadilah, Vivek Balachandran, Peter Loh, Melissa Wan Jun Chua. 153-155 [doi]
- GRAMAC: A Graph Based Android Malware Classification MechanismDevyani Vij, Vivek Balachandran, Tony Thomas, Roopak Surendran. 156-158 [doi]
- A Performance Study on Cryptographic Algorithms for IoT DevicesEduardo Anaya, Jimil Patel, Prerak Shah, Vrushank Shah, Yuan Cheng. 159-161 [doi]
- A Performance Comparison of WireGuard and OpenVPNSteven Mackey, Ivan Mihov, Alex Nosenko, Francisco Vega, Yuan Cheng. 162-164 [doi]
- Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation QueriesPeeyush Gupta, Yin Li, Sharad Mehrotra, Nisha Panwar, Shantanu Sharma 0001. 165-167 [doi]
- Poisoning Attacks in Federated Learning: An Evaluation on Traffic Sign ClassificationFlorian Nuding, Rudolf Mayer. 168-170 [doi]
- On the Impact of Word Representation in Hate Speech and Offensive Language Detection and ExplanationRuijia (Roger) Hu, Wyatt Dorris, Nishant Vishwamitra, Feng Luo 0001, Matthew Costello. 171-173 [doi]
- Deployment-quality and Accessible Solutions for Cryptography Code DevelopmentSazzadur Rahaman, Ya Xiao, Sharmin Afrose, Ke Tian, Miles Frantz, Na Meng, Barton P. Miller, Fahad Shaon, Murat Kantarcioglu, Danfeng (Daphne) Yao. 174-176 [doi]
- A Comprehensive Benchmark on Java Cryptographic API MisusesSharmin Afrose, Sazzadur Rahaman, Danfeng (Daphne) Yao. 177-178 [doi]
- Defensive Charging: Mitigating Power Side-Channel Attacks on Charging SmartphonesRichard Matovu, Abdul Serwadda, Argenis V. Bilbao, Isaac Griswold-Steiner. 179-190 [doi]
- Dissecting Android Cryptocurrency MinersStanislav Dashevskyi, Yury Zhauniarovich, Olga Gadyatskaya, Aleksandr Pilgun, Hamza Ouhssain. 191-202 [doi]
- Understanding Privacy Awareness in Android App Descriptions Using Deep LearningJohannes Feichtner, Stefan Gruber. 203-214 [doi]
- FridgeLock: Preventing Data Theft on Suspended Linux with Usable Memory EncryptionFabian Franzen, Manuel Andreas, Manuel Huber. 215-219 [doi]
- Developing A Compelling Vision for Winning the Cybersecurity Arms RaceElisa Bertino, Anoop Singhal, Srivathsan Srinivasagopalan, Rakesh M. Verma. 220-222 [doi]
- The Good, the Bad and the (Not So) Ugly of Out-of-Band Authentication with eID Cards and Push Notifications: Design, Formal and Risk AnalysisMarco Pernpruner, Roberto Carbone, Silvio Ranise, Giada Sciarretta. 223-234 [doi]
- n-m-Variant Systems: Adversarial-Resistant Software Rejuvenation for Cloud-Based Web ApplicationsIsaac Polinsky, Kyle Martin, William Enck, Michael K. Reiter. 235-246 [doi]
- ZeroLender: Trustless Peer-to-Peer Bitcoin Lending PlatformYi Xie, Joshua Holmes, Gaby G. Dagher. 247-258 [doi]
- Attacking and Protecting Tunneled Traffic of Smart Home DevicesAhmed Alshehri, Jacob Granley, Chuan Yue. 259-270 [doi]
- SeCaS: Secure Capability Sharing Framework for IoT Devices in a Structured P2P NetworkAngeliki Aktypi, Kübra Kalkan, Kasper B. Rasmussen. 271-282 [doi]
- IoT Expunge: Implementing Verifiable Retention of IoT DataNisha Panwar, Shantanu Sharma 0001, Peeyush Gupta, Dhrubajyoti Ghosh, Sharad Mehrotra, Nalini Venkatasubramanian. 283-294 [doi]
- CREPE: A Privacy-Enhanced Crash Reporting SystemKiavash Satvat, Maliheh Shirvanian, Mahshid Hosseini, Nitesh Saxena. 295-306 [doi]
- A Hypothesis Testing Approach to Sharing Logs with ConfidenceYunhui Long, Le Xu, Carl A. Gunter. 307-318 [doi]
- Rényi Differentially Private ADMM for Non-Smooth Regularized OptimizationChen Chen, Jaewoo Lee. 319-328 [doi]
- PREDICT: Efficient Private Disease Susceptibility Testing in Direct-to-Consumer ModelChibuike Ugwuoke, Zekeriya Erkin, Marcel J. T. Reinders, Reginald L. Lagendijk. 329-340 [doi]
- Deceiving Portable Executable Malware Classifiers into Targeted Misclassification with Practical Adversarial ExamplesYunus Kucuk, Guanhua Yan. 341-352 [doi]
- DANdroid: A Multi-View Discriminative Adversarial Network for Obfuscated Android Malware DetectionStuart Millar, Niall McLaughlin, Jesús Martinez del Rincón, Paul C. Miller, Ziming Zhao 0001. 353-364 [doi]
- PESC: A Per System-Call Stack Canary Design for Linux KernelJiadong Sun, Xia Zhou, Wenbo Shen, Yajin Zhou, Kui Ren 0001. 365-375 [doi]
- ISAdetect: Usable Automated Detection of CPU Architecture and Endianness for Executable Binary Files and Object CodeSami Kairajärvi, Andrei Costin, Timo Hämäläinen 0002. 376-380 [doi]