Abstract is missing.
- When Models Learn Too MuchDavid Evans. 1 [doi]
- Measurable and Deployable Security: Gaps, Successes, and OpportunitiesDanfeng (Daphne) Yao. 3 [doi]
- Membership Inference Attacks and Defenses in Classification ModelsJiacheng Li, Ninghui Li, Bruno Ribeiro 0001. 5-16 [doi]
- Using Single-Step Adversarial Training to Defend Iterative Adversarial ExamplesGuanxiong Liu, Issa Khalil, Abdallah Khreishah. 17-27 [doi]
- Real-Time Evasion Attacks against Deep Learning-Based Anomaly Detection from Distributed System LogsJ. Dinal Herath, Ping Yang, Guanhua Yan. 29-40 [doi]
- We Can Pay Less: Coordinated False Data Injection Attack Against Residential Demand Response in Smart GridsThusitha Dayaratne, Carsten Rudolph, Ariel Liebman, Mahsa Salehi. 41-52 [doi]
- Brittle Features of Device AuthenticationWashington Garcia, Animesh Chhotaray, Joseph I. Choi, Suman Kalyan Adari, Kevin R. B. Butler, Somesh Jha. 53-64 [doi]
- Role-Based Deception in Enterprise NetworksIffat Anjum, Mu Zhu, Isaac Polinsky, William Enck, Michael K. Reiter, Munindar P. Singh. 65-76 [doi]
- BFastPay: A Routing-free Protocol for Fast Payment in Bitcoin NetworkXinyu Lei, Guan-Hua Tu, Tian Xie, Sihan Wang. 77-87 [doi]
- Security Threats from Bitcoin Wallet Smartphone Applications: Vulnerabilities, Attacks, and CountermeasuresYiwen Hu, Sihan Wang, Guan-Hua Tu, Li Xiao, Tian Xie, Xinyu Lei, Chi-Yu Li. 89-100 [doi]
- BlockFLA: Accountable Federated Learning via Hybrid Blockchain ArchitectureHarsh Bimal Desai, Mustafa Safa Özdayi, Murat Kantarcioglu. 101-112 [doi]
- SteemOps: Extracting and Analyzing Key Operations in Steemit Blockchain-based Social Media PlatformChao Li, Balaji Palanisamy, Runhua Xu, Jinlai Xu, Jingzhe Wang. 113-118 [doi]
- Decentralized ReputationTassos Dimitriou. 119-130 [doi]
- Don't fool yourself with Forward Privacy, Your queries STILL belong to us!Khosro Salmani, Ken Barker 0001. 131-142 [doi]
- A Large Publicly Available Corpus of Website Privacy Policies Based on DMOZRazieh Nokhbeh Zaeem, K. Suzanne Barber. 143-148 [doi]
- Adaptive Fingerprinting: Website Fingerprinting over Few Encrypted TrafficChenggang Wang, Jimmy Dani, Xiang Li, Xiaodong Jia 0001, Boyang Wang. 149-160 [doi]
- UTrack: Enterprise User Tracking Based on OS-Level Audit LogsYue Li 0002, Zhenyu Wu, Haining Wang, Kun Sun 0001, Zhichun Li, Kangkook Jee, Junghwan Rhee, Haifeng Chen. 161-172 [doi]
- Graph-Based Specification of Admin-CBAC PoliciesClara Bertolissi, Maribel Fernández, Bhavani M. Thuraisingham. 173-184 [doi]
- Incremental Maintenance of ABAC PoliciesGunjan Batra, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural. 185-196 [doi]
- Formal Analysis of ReBAC Policy Mining FeasibilityShuvra Chakraborty, Ravi S. Sandhu. 197-207 [doi]
- Identifying and Characterizing COVID-19 Themed Malicious Domain CampaignsPengcheng Xia, Mohamed Nabeel, Issa Khalil, Haoyu Wang 0001, Ting Yu. 209-220 [doi]
- Contact Tracing Made Un-relay-ableMarco Casagrande, Mauro Conti, Eleonora Losiouk. 221-232 [doi]
- Ghost Thread: Effective User-Space Cache Side Channel ProtectionRobert Brotzman, Danfeng Zhang, Mahmut T. Kandemir, Gang Tan. 233-244 [doi]
- The Cost of OSCORE and EDHOC for Constrained DevicesStefan Hristozov, Manuel Huber 0001, Lei Xu, Jaro Fietz, Marco Liess, Georg Sigl. 245-250 [doi]
- Secure Pull Printing with QR Codes and National eID Cards: A Software-oriented Design and an Open-source ImplementationMatteo Leonelli, Umberto Morelli, Giada Sciarretta, Silvio Ranise. 251-256 [doi]
- Code Specialization through Dynamic Feature ObservationPriyam Biswas, Nathan Burow, Mathias Payer. 257-268 [doi]
- Towards Accurate Labeling of Android Apps for Reliable Malware DetectionAleieldin Salem. 269-280 [doi]
- SE-PAC: A Self-Evolving PAcker Classifier against rapid packers evolutionLamine Noureddine, Annelie Heuser, Cassius Puodzius, Olivier Zendra. 281-292 [doi]
- Quantum Obfuscation: Quantum Predicates with Entangled qubitsVivek Balachandran. 293-295 [doi]
- Neutralizing Hostile Drones with Surveillance DronesVivek Balachandran, Melissa Wan Jun Chua. 297-299 [doi]
- Blockchain-based Proof of Existence (PoE) Framework using Ethereum Smart ContractsLim Wei Ming Shawn, Purnima Murali Mohan, Peter Kok Keong Loh, Vivek Balachandran. 301-303 [doi]
- IIoT-ARAS: IIoT/ICS Automated Risk Assessment System for Prediction and PreventionBassam Zahran, Adamu Hussaini, Aisha Ali Gombe. 305-307 [doi]
- OBFUS: An Obfuscation Tool for Software Copyright and Vulnerability ProtectionSeoyeon Kang, Sujeong Lee, Yumin Kim, Seong-Kyun Mok, Eun-Sun Cho. 309-311 [doi]
- Object Allocation Pattern as an Indicator for Maliciousness - An Exploratory AnalysisAdamu Hussaini, Bassam Zahran, Aisha Ali Gombe. 313-315 [doi]
- Attribute-Based Access Control for NoSQL DatabasesEeshan Gupta, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri. 317-319 [doi]
- A Multi Perspective Access Control in a Smart HomeShravya Kanchi, Kamalakar Karlapalem. 321-323 [doi]
- Assessing the Alignment of Social Robots with Trustworthy AI Design Guidelines: A Preliminary Research StudyAnkur Chattopadhyay, Abdikadar Ali, Danielle Thaxton. 325-327 [doi]
- Towards Efficient Labeling of Network Incident Datasets Using Tcpreplay and SnortKohei Masumi, Chansu Han, Tao Ban, Takeshi Takahashi 0001. 329-331 [doi]
- AI for Security and Security for AIElisa Bertino, Murat Kantarcioglu, Cuneyt Gurcan Akcora, Sagar Samtani, Sudip Mittal, Maanak Gupta. 333-334 [doi]
- Is there a Security Mindset and Can it be Taught?Ambareen Siraj, Nigamanth Sridhar, John A. Drew Hamilton, Latifur Khan, Siddharth Kaza, Maanak Gupta, Sudip Mittal. 335-336 [doi]