Abstract is missing.
- How (Not) to Deploy Cryptography on the InternetHaya Shulman. 1 [doi]
- Predicting Asymptotic Behavior of Network Covert Channels: Experimental ResultsCatherine Meadows. 2-3 [doi]
- GINN: Fast GPU-TEE Based Integrity for Neural Network TrainingAref Asvadishirehjini, Murat Kantarcioglu, Bradley A. Malin. 4-15 [doi]
- EG-Booster: Explanation-Guided Booster of ML Evasion AttacksAbderrahmen Amich, Birhanu Eshete. 16-28 [doi]
- Leveraging Synthetic Data and PU Learning For Phishing Email DetectionFatima Zahra Qachfar, Rakesh M. Verma, Arjun Mukherjee. 29-40 [doi]
- DP-UTIL: Comprehensive Utility Analysis of Differential Privacy in Machine LearningIsmat Jarin, Birhanu Eshete. 41-52 [doi]
- Privacy-Preserving Maximum Matching on General Graphs and its Application to Enable Privacy-Preserving Kidney ExchangeMalte Breuer, Ulrike Meyer, Susanne Wetzel. 53-64 [doi]
- Towards Automated Content-based Photo Privacy Control in User-Centered Social NetworksNishant Vishwamitra, Yifang Li, Hongxin Hu, Kelly Caine, Long Cheng 0005, Ziming Zhao 0001, Gail-Joon Ahn. 65-76 [doi]
- Genomic Data Sharing under Dependent Local Differential PrivacyEmre Yilmaz, Tianxi Ji, Erman Ayday, Pan Li 0001. 77-88 [doi]
- Prediction of Mobile App Privacy Preferences with User Profiles via Federated LearningAndré Brandão, Ricardo Mendes, João P. Vilela. 89-100 [doi]
- Building a Commit-level Dataset of Real-world VulnerabilitiesAlexis Challande, Robin David, Guénaël Renault. 101-106 [doi]
- ReSIL: Revivifying Function Signature Inference using Deep Learning with Domain-Specific KnowledgeYan Lin 0003, Debin Gao, David Lo 0001. 107-118 [doi]
- A Modular and Extensible Framework for Securing TLSMatteo Rizzi, Salvatore Manfredi, Giada Sciarretta, Silvio Ranise. 119-124 [doi]
- Recovering Structure of Input of a Binary ProgramSeshagiri Prabhu Narasimha, Arun Lakhotia. 125-136 [doi]
- Hardening with Scapolite: A DevOps-based Approach for Improved Authoring and Testing of Security-Configuration Guides in Large-Scale OrganizationsPatrick Stöckle, Ionut Pruteanu, Bernd Grobauer, Alexander Pretschner. 137-142 [doi]
- Toward Deep Learning Based Access ControlMohammad Nur Nobi, Ram Krishnan, Yufei Huang, Mehrnoosh Shakarami, Ravi S. Sandhu. 143-154 [doi]
- ProSPEC: Proactive Security Policy Enforcement for ContainersHugo Kermabon-Bobinnec, Mahmood Gholipourchoubeh, Sima Bagheri, Suryadipta Majumdar, Yosr Jarraya, Makan Pourzandi, Lingyu Wang 0001. 155-166 [doi]
- NEUTRON: A Graph-based Pipeline for Zero-trust Network ArchitecturesCharalampos Katsis, Fabrizio Cicala, Dan Thomsen, Nathan Ringo, Elisa Bertino. 167-178 [doi]
- Landmark Privacy: Configurable Differential Privacy Protection for Time SeriesManos Katsomallos, Katerina Tzompanaki, Dimitris Kotzinos. 179-190 [doi]
- Securing Smart Grids Through an Incentive Mechanism for Blockchain-Based Data SharingDaniël Reijsbergen, Aung Maw, Tien Tuan Anh Dinh, Wen-Tai Li, Chau Yuen. 191-202 [doi]
- Security Analysis of IoT Frameworks using Static Taint AnalysisTuba Yavuz, Christopher Brant. 203-213 [doi]
- Toward a Resilient Key Exchange Protocol for IoTZhangxiang Hu, Jun Li 0001, Samuel Mergendahl, Christopher Wilson. 214-225 [doi]
- A TOCTOU Attack on DICE AttestationStefan Hristozov, Moritz Wettermann, Manuel Huber 0001. 226-235 [doi]
- Shared Multi-Keyboard and Bilingual Datasets to Support Keystroke Dynamics ResearchAhmed Anu Wahab, Daqing Hou, Mahesh K. Banavar, Stephanie Schuckers, Kenneth Eaton, Jacob Baldwin, Robert Wright. 236-241 [doi]
- Leveraging Disentangled Representations to Improve Vision-Based Keystroke Inference Attacks Under Low Data ConstraintsJohn Lim, Jan-Michael Frahm, Fabian Monrose. 242-251 [doi]
- Cache Shaping: An Effective Defense Against Cache-Based Website FingerprintingHaiPeng Li, Nan Niu, Boyang Wang. 252-263 [doi]
- Quantifying the Risk of Wormhole Attacks on Bluetooth Contact TracingStefan Czybik, Daniel Arp, Konrad Rieck. 264-275 [doi]
- Towards Resiliency of Heavy Vehicles through Compromised Sensor Data ReconstructionHossein Shirazi, William Pickard, Indrakshi Ray, Haonan Wang. 276-287 [doi]
- Parallel Operations over TFHE-Encrypted Multi-Digit IntegersJakub Klemsa, Melek Önen. 288-299 [doi]
- Private Lives Matter: A Differential Private Functional Encryption SchemeAlexandros Bakas, Antonis Michalas, Tassos Dimitriou. 300-311 [doi]
- Efficient Dynamic Searchable Encryption with Forward Privacy under the Decent LeakageYohei Watanabe 0001, Kazuma Ohara, Mitsugu Iwamoto, Kazuo Ohta. 312-323 [doi]
- RS-PKE: Ranked Searchable Public-Key Encryption for Cloud-Assisted Lightweight PlatformsIsrat Jahan Mouri, Muhammad Ridowan, Muhammad Abdullah Adnan. 324-335 [doi]
- Security and Privacy for Emerging IoT and CPS DomainsElisa Bertino, Ravi S. Sandhu, Bhavani M. Thuraisingham, Indrakshi Ray, Wenjia Li, Maanak Gupta, Sudip Mittal. 336-337 [doi]
- Enforcement of Laws and Privacy Preferences in Modern Computing SystemsMurat Kantarcioglu, Barbara Carminati, Sagar Samtani, Sudip Mittal, Maanak Gupta. 338-339 [doi]
- I Don't Know Why You Need My Data: A Case Study of Popular Social Media Privacy PoliciesElizabeth Miller, Md. Rashedur Rahman, Moinul Hossain, Aisha I. Ali-Gombe. 340-342 [doi]
- Disclosure Risk from Homogeneity Attack in Differentially Private Release of Frequency DistributionFang Liu, Xingyuan Zhao. 343-345 [doi]
- A New Bound for Privacy Loss from Bayesian Posterior SamplingXingyuan Zhao, Fang Liu. 346-348 [doi]
- Does Deception Leave a Content Independent Stylistic Trace?Victor Zeng, Xuting Liu, Rakesh M. Verma. 349-351 [doi]
- Transforming Memory Image to Sound Wave Signals for an Effective IoT FingerprintingRamyapandian Vijayakanthan, Irfan Ahmed 0001, Aisha I. Ali-Gombe. 352-354 [doi]
- Using Adversarial Defences Against Image Classification CAPTCHAShawn Chua, Kai Yuan Tay, Melissa Wan Jun Chua, Vivek Balachandran. 355-357 [doi]
- Poisoning Attacks against Feature-Based Image ClassificationRobin Mayerhofer, Rudolf Mayer. 358-360 [doi]
- Demystifying Video Traffic from IoT (Spy) Camera using Undecrypted Network TrafficPriyanka Rushikesh Chaudhary, Avinash Narasimhan, Rajib Ranjan Maiti. 361-363 [doi]
- kTRACKER: Passively Tracking KRACK using ML ModelAnand Agrawal, Urbi Chatterjee, Rajib Ranjan Maiti. 364-366 [doi]
- Qubit Reset and Refresh: A Gamechanger for Random Number GenerationJulie Germain, Ram Dantu, Mark A. Thompson. 367-369 [doi]
- Towards Robust Detection of PDF-based MalwareKai Yuan Tay, Shawn Chua, Melissa Wan Jun Chua, Vivek Balachandran. 370-372 [doi]
- Macro-level Inference in Collaborative LearningRudolf Mayer, Andreas Ekelhart. 373-375 [doi]
- MK-RS-PKE: Multi-Keyword Ranked Searchable Public-Key Encryption for Cloud-Assisted Lightweight PlatformsIsrat Jahan Mouri, Muhammad Ridowan, Muhammad Abdullah Adnan. 376-378 [doi]