Abstract is missing.
- More Efficient Post-quantum KEMTLS with Pre-distributed Public KeysPeter Schwabe, Douglas Stebila, Thom Wiggers. 3-22 [doi]
- How to (Legally) Keep Secrets from Mobile OperatorsGhada Arfaoui, Olivier Blazy, Xavier Bultel, Pierre-Alain Fouque, Thibaut Jacques, Adina Nedelcu, Cristina Onete. 23-43 [doi]
- A Formal Security Analysis of Session Resumption Across HostnamesKai Gellert, Tobias Handirk. 44-64 [doi]
- Caught in the Web: DoS Vulnerabilities in Parsers for Structured DataShawn Rasheed, Jens Dietrich 0001, Amjed Tahir. 67-85 [doi]
- PoW-How: An Enduring Timing Side-Channel to Evade Online Malware SandboxesAntonio Nappa, Panagiotis Papadopoulos, Matteo Varvello, Daniel Aceituno Gomez, Juan Tapiador, Andrea Lanzi. 86-109 [doi]
- Characterizing GPU Overclocking FaultsEldad Zuberi, Avishai Wool. 110-130 [doi]
- ARIstoteles - Dissecting Apple's Baseband InterfaceTobias Kröll, Stephan Kleber, Frank Kargl, Matthias Hollick, Jiska Classen. 133-151 [doi]
- webFuzz: Grey-Box Fuzzing for Web ApplicationsOrpheas van Rooij, Marcos Antonios Charalambous, Demetris Kaizer, Michalis Papaevripides, Elias Athanasopoulos. 152-172 [doi]
- My Fuzzer Beats Them All! Developing a Framework for Fair Evaluation and Comparison of FuzzersDavid Paaßen, Sebastian Surminski, Michael Rodler, Lucas Davi. 173-193 [doi]
- Rope: Covert Multi-process Malware Execution with Return-Oriented ProgrammingDaniele Cono D'Elia, Lorenzo Invidia, Leonardo Querzoni. 197-217 [doi]
- Towards Automating Code-Reuse Attacks Using Synthesized Gadget ChainsMoritz Schlögel, Tim Blazytko, Julius Basler, Fabian Hemmer, Thorsten Holz. 218-239 [doi]
- Peeler: Profiling Kernel-Level Events to Detect RansomwareMuhammad Ejaz Ahmed, Hyoungshick Kim, Seyit Camtepe, Surya Nepal. 240-260 [doi]
- Mingling of Clear and Muddy Water: Understanding and Detecting Semantic Confusion in Blackhat SEOHao Yang, Kun Du, Yubao Zhang, Shuai Hao, Haining Wang, Jia Zhang, Haixin Duan. 263-284 [doi]
- An Explainable Online Password Strength EstimatorLiron David, Avishai Wool. 285-304 [doi]
- Detecting Video-Game Injectors Exchanged in Game Cheating CommunitiesPanicos Karkallis, Jorge Blasco, Guillermo Suarez-Tangil, Sergio Pastrana. 305-324 [doi]
- Revocable Policy-Based Chameleon HashShengmin Xu, Jianting Ning, Jinhua Ma, Guowen Xu, Jiaming Yuan, Robert H. Deng. 327-347 [doi]
- Fair Peer-to-Peer Content Delivery via BlockchainSonglin He, Yuan Lu 0001, Qiang Tang 0005, Guiling Wang, Chase Qishi Wu. 348-369 [doi]
- Conclave: A Collective Stake Pool ProtocolDimitris Karakostas, Aggelos Kiayias, Mario Larangeira. 370-389 [doi]
- Probabilistic Micropayments with TransferabilityTaisei Takahashi, Akira Otsuka. 390-406 [doi]
- MiniLedger: Compact-Sized Anonymous and Auditable Distributed PaymentsPanagiotis Chatzigiannis, Foteini Baldimtsi. 407-429 [doi]
- Succinct Scriptable NIZK via Trusted HardwareBingsheng Zhang, Yuan Chen, Jiaqi Li, Yajin Zhou, Phuc Thai, Hong-Sheng Zhou, Kui Ren 0001. 430-451 [doi]
- CONTRA: Defending Against Poisoning Attacks in Federated LearningSana Awan, Bo Luo, FengJun Li. 455-475 [doi]
- Romoa: Robust Model Aggregation for the Resistance of Federated Learning to Model Poisoning AttacksYunlong Mao, Xinyu Yuan, Xinyang Zhao, Sheng Zhong. 476-496 [doi]
- FLOD: Oblivious Defender for Private Byzantine-Robust Federated Learning with Dishonest-MajorityYe Dong, Xiaojun Chen, Kaiyun Li, Dakui Wang, Shuai Zeng. 497-518 [doi]
- [inline-graphic not available: see fulltext] : Towards Secure and Lightweight Deep Learning as a Medical Diagnostic ServiceXiaoning Liu, Yifeng Zheng, Xingliang Yuan, Xun Yi. 519-541 [doi]
- TAFA: A Task-Agnostic Fingerprinting Algorithm for Neural NetworksXudong Pan, Mi Zhang, Yifan Lu, Min Yang. 542-562 [doi]
- DA3G: Detecting Adversarial Attacks by Analysing GradientsJan-Philipp Schulze, Philip Sperl, Konstantin Böttinger. 563-583 [doi]
- Common Component in Black-Boxes Is Prone to AttacksJiyi Zhang, Wesley Joon-Wie Tann, Ee-Chien Chang, Hwee Kuan Lee. 584-604 [doi]
- LiMNet: Early-Stage Detection of IoT Botnets with Lightweight Memory NetworksLodovico Giaretta, Ahmed Lekssays, Barbara Carminati, Elena Ferrari, Sarunas Girdzijauskas. 605-625 [doi]
- Adversarial Activity Detection Using Keystroke AcousticsAmin Fallahi, Vir V. Phoha. 626-648 [doi]
- Tell Me How You Re-Charge, I Will Tell You Where You Drove To: Electric Vehicles Profiling Based on Charging-Current DemandAlessandro Brighente, Mauro Conti, Izza Sadaf. 651-667 [doi]
- CAN-SQUARE - Decimeter Level Localization of Electronic Control Units on CAN BusesBogdan Groza, Pal-Stefan Murvay, Lucian Popa 0003, Camil Jichici. 668-690 [doi]
- Shadow-Catcher: Looking into Shadows to Detect Ghost Objects in Autonomous Vehicle 3D SensingZhongyuan Hau, Soteris Demetriou, Luis Muñoz-González, Emil C. Lupu. 691-711 [doi]
- AutoGuard: A Dual Intelligence Proactive Anomaly Detection at Application-Layer in 5G NetworksTaous Madi, Hyame Assem Alameddine, Makan Pourzandi, Amine Boukhtouta, Moataz Shoukry Samir, Chadi Assi. 715-735 [doi]
- MORTON: Detection of Malicious Routines in Large-Scale DNS TrafficYael Daihes, Hen Tzaban, Asaf Nadler, Asaf Shabtai. 736-756 [doi]
- Iterative Selection of Categorical Variables for Log Data Anomaly DetectionMax Landauer, Georg Höld, Markus Wurzenberger, Florian Skopik, Andreas Rauber. 757-777 [doi]