Abstract is missing.
- Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection EstablishmentJianting Ning, Xinyi Huang, Geong Sen Poh, Shengmin Xu, Jia-Ch'ng Loh, Jian Weng 0001, Robert H. Deng. 3-22 [doi]
- Bulwark: Holistic and Verified Security Monitoring of Web ProtocolsLorenzo Veronese, Stefano Calzavara, Luca Compagna. 23-41 [doi]
- A Practical Model for Collaborative Databases: Securely Mixing, Searching and ComputingShweta Agrawal, Rachit Garg, Nishant Kumar 0001, Manoj Prabhakaran. 42-63 [doi]
- Deduplication-Friendly Watermarking for Multimedia Data in Public CloudsWeijing You, Bo Chen, Limin Liu, Jiwu Jing. 67-87 [doi]
- DANTE: A Framework for Mining and Monitoring Darknet TrafficDvir Cohen, Yisroel Mirsky, Manuel Kamp, Tobias Martin, Yuval Elovici, Rami Puzis, Asaf Shabtai. 88-109 [doi]
- Efficient Quantification of Profile Matching Risk in Social Networks Using Belief PropagationAnisa Halimi, Erman Ayday. 110-130 [doi]
- Anonymity Preserving Byzantine Vector ConsensusChristian Cachin, Daniel Collins, Tyler Crain, Vincent Gramoli. 133-152 [doi]
- CANSentry: Securing CAN-Based Cyber-Physical Systems against Denial and Spoofing AttacksAbdulmalik Humayed, FengJun Li, Jingqiang Lin, Bo Luo. 153-173 [doi]
- Distributed Detection of APTs: Consensus vs. ClusteringJuan E. Rubio, Cristina Alcaraz, Ruben Rios, Rodrigo Roman, Javier López 0001. 174-192 [doi]
- Designing Reverse Firewalls for the Real WorldAngèle Bossuat, Xavier Bultel, Pierre-Alain Fouque, Cristina Onete, Thyla Van der Merwe. 193-213 [doi]
- Follow the Blue Bird: A Study on Threat Data Published on TwitterFernando Alves, Ambrose Andongabo, Ilir Gashi, Pedro M. Ferreira 0001, Alysson Bessani. 217-236 [doi]
- Dynamic and Secure Memory Transformation in UserspaceRobert Lyerly, Xiaoguang Wang 0003, Binoy Ravindran. 237-256 [doi]
- Understanding the Security Risks of Docker HubPeiyu Liu, Shouling Ji, Lirong Fu, Kangjie Lu, Xuhong Zhang, Wei-Han Lee, Tao Lu, Wenzhi Chen, Raheem Beyah. 257-276 [doi]
- DE-auth of the Blue! Transparent De-authentication Using Bluetooth Low Energy BeaconMauro Conti, Pier Paolo Tricomi, Gene Tsudik. 277-294 [doi]
- Similarity of Binaries Across Optimization Levels and ObfuscationJianguo Jiang, Gengwang Li, Min Yu, Gang Li 0009, Chao Liu 0020, Zhiqiang Lv, Bin Lv, Weiqing Huang. 295-315 [doi]
- HART: Hardware-Assisted Kernel Module Tracing on ArmYunlan Du, Zhenyu Ning, Jun Xu 0024, Zhilong Wang, Yueh-Hsun Lin, Fengwei Zhang, Xinyu Xing, Bing Mao. 316-337 [doi]
- Zipper Stack: Shadow Stacks Without ShadowJinfeng Li, Liwei Chen, Qizhen Xu, Linan Tian, Gang Shi, Kai Chen, Dan Meng. 338-358 [doi]
- Restructured Cloning Vulnerability Detection Based on Function Semantic Reserving and Reiteration ScreeningWeipeng Jiang, Bin Wu, Xingxin Yu, Rui Xue, Zhengmin Yu. 359-376 [doi]
- LegIoT: Ledgered Trust Management Platform for IoTJens Neureither, Alexandra Dmitrienko, David Koisser, Ferdinand Brasser, Ahmad-Reza Sadeghi. 377-396 [doi]
- PrivColl: Practical Privacy-Preserving Collaborative Machine LearningYanjun Zhang, Guangdong Bai, Xue Li 0001, Caitlin Curtis, Chen Chen 0056, Ryan K. L. Ko. 399-418 [doi]
- An Efficient 3-Party Framework for Privacy-Preserving Neural Network InferenceLiyan Shen, Xiaojun Chen 0004, Jinqiao Shi, Ye Dong, Binxing Fang. 419-439 [doi]
- Deep Learning Side-Channel Analysis on Large-Scale Traces - A Case Study on a Polymorphic AESLoïc Masure, Nicolas Belleville, Eleonora Cagli, Marie-Angela Cornelie, Damien Couroussé, Cécile Dumas, Laurent Maingault. 440-460 [doi]
- Towards Poisoning the Neural Collaborative Filtering-Based Recommender SystemsYihe Zhang, Jiadong Lou, Li Chen, Xu Yuan, Jin Li, Tom Johnsten, Nian-Feng Tzeng. 461-479 [doi]
- Data Poisoning Attacks Against Federated Learning SystemsVale Tolpegin, Stacey Truex, Mehmet Emre Gursoy, Ling Liu 0001. 480-501 [doi]
- Interpretable Probabilistic Password Strength Meters via Deep LearningDario Pasquini, Giuseppe Ateniese, Massimo Bernaschi. 502-522 [doi]
- Polisma - A Framework for Learning Attribute-Based Access Control PoliciesAmani Abu Jabal, Elisa Bertino, Jorge Lobo 0001, Mark Law, Alessandra Russo, Seraphin B. Calo, Dinesh C. Verma. 523-544 [doi]
- A Framework for Evaluating Client Privacy Leakages in Federated LearningWenqi Wei, Ling Liu 0001, Margaret Loper, Ka Ho Chow, Mehmet Emre Gursoy, Stacey Truex, Yanzhao Wu. 545-566 [doi]
- An Accountable Access Control Scheme for Hierarchical Content in Named Data Networks with RevocationNazatul Haque Sultan, Vijay Varadharajan, Seyit Camtepe, Surya Nepal. 569-590 [doi]
- PGC: Decentralized Confidential Payment System with AuditabilityYu Chen, Xuecheng Ma, Cong Tang, Man Ho Au. 591-610 [doi]
- Secure Cloud Auditing with Efficient Ownership TransferJun Shen 0006, Fuchun Guo, Xiaofeng Chen 0001, Willy Susilo. 611-631 [doi]
- Encrypt-to-Self: Securely Outsourcing StorageJeroen Pijnenburg, Bertram Poettering. 635-654 [doi]
- PGLP: Customizable and Rigorous Location Privacy Through Policy GraphYang Cao 0011, Yonghui Xiao, Shun Takagi, Li Xiong 0001, Masatoshi Yoshikawa, Yilin Shen, Jinfei Liu, Hongxia Jin, Xiaofeng Xu. 655-676 [doi]
- Where Are You Bob? Privacy-Preserving Proximity Testing with a Napping PartyIvan Oleynikov, Elena Pagnin, Andrei Sabelfeld. 677-697 [doi]
- Distributed PCFG Password CrackingRadek Hranický, Lukás Zobal, Ondrej Rysavý, Dusan Kolár, Dávid Mikus. 701-719 [doi]
- Your PIN Sounds Good! Augmentation of PIN Guessing Strategies via Audio LeakageMatteo Cardaioli, Mauro Conti, Kiran S. Balagani, Paolo Gasti. 720-735 [doi]
- GDPR - Challenges for Reconciling Legal Rules with Technical RealityMiroslaw Kutylowski, Anna Lauks-Dutka, Moti Yung. 736-755 [doi]