Abstract is missing.
- Layered Symbolic Security Analysis in $\textsf {DY}^\star $Karthikeyan Bhargavan, Abhishek Bichhawat, Pedram Hosseyni, Ralf Küsters, Klaas Pruiksma, Guido Schmitz, Clara Waldmann, Tim Würtele. 3-21 [doi]
- Indirect Meltdown: Building Novel Side-Channel Attacks from Transient-Execution AttacksDaniel Weber 0007, Fabian Thomas, Lukas Gerlach 0001, Ruiyi Zhang, Michael Schwarz 0001. 22-42 [doi]
- Accessorize in the Dark: A Security Analysis of Near-Infrared Face RecognitionAmit Cohen, Mahmood Sharif. 43-61 [doi]
- A Rowhammer Reproduction Study Using the Blacksmith FuzzerLukas Gerlach 0001, Fabian Thomas, Robert Pietsch, Michael Schwarz 0001. 62-79 [doi]
- Reviving Meltdown 3aDaniel Weber 0007, Fabian Thomas, Lukas Gerlach 0001, Ruiyi Zhang, Michael Schwarz 0001. 80-99 [doi]
- Tamarin-Based Analysis of Bluetooth Uncovers Two Practical Pairing Confusion AttacksTristan Claverie, Gildas Avoine, Stéphanie Delaune, José Lopes-Esteves. 100-119 [doi]
- MARF: A Memory-Aware CLFLUSH-Based Intra- and Inter-CPU Side-Channel AttackSowoong Kim, Myeonggyun Han, Woongki Baek. 120-140 [doi]
- You Reset I Attack! A Master Password Guessing Attack Against Honey Password VaultsTingting Rao, Yixin Su, Peng Xu, Yubo Zheng, Wei Wang, Hai Jin 0001. 141-161 [doi]
- Attacking Logo-Based Phishing Website Detectors with Adversarial PerturbationsJehyun Lee, Zhe Xin, Melanie Ng Pei See, Kanav Sabharwal, Giovanni Apruzzese, Dinil Mon Divakaran. 162-182 [doi]
- Hiding Your Signals: A Security Analysis of PPG-Based Biometric AuthenticationLin Li 0066, Chao Chen 0015, Lei Pan, Yonghang Tai, Jun Zhang 0010, Yang Xiang 0001. 183-202 [doi]
- Exploring Genomic Sequence Alignment for Improving Side-Channel AnalysisHeitor Uchoa, Vipul Arora, Dennis Vermoen, Marco Ottavi, Nikolaos Alachiotis 0001. 203-221 [doi]
- The Grant Negotiation and Authorization Protocol: Attacking, Fixing, and Verifying an Emerging StandardFlorian Helmschmidt, Pedram Hosseyni, Ralf Küsters, Klaas Pruiksma, Clara Waldmann, Tim Würtele. 222-242 [doi]
- Everlasting ROBOT: The Marvin AttackHubert Kario. 243-262 [doi]
- JWTKey: Automatic Cryptographic Vulnerability Detection in JWT ApplicationsBowen Xu, Shijie Jia 0001, Jingqiang Lin, Fangyu Zheng, Yuan Ma, Limin Liu, Xiaozhuo Gu, Li Song. 263-282 [doi]
- When is Slower Block Propagation More Profitable for Large Miners?Zhichun Lu, Ren Zhang. 285-305 [doi]
- Bijack: Breaking Bitcoin Network with TCP VulnerabilitiesShaoyu Li, Shanghao Shi, Yang Xiao 0010, Chaoyu Zhang, Y. Thomas Hou 0001, Wenjing Lou. 306-326 [doi]
- Syntax-Aware Mutation for Testing the Solidity CompilerCharalambos Mitropoulos, Thodoris Sotiropoulos, Sotiris Ioannidis, Dimitris Mitropoulos. 327-347 [doi]
- Efficient Transparent Polynomial Commitments for zk-SNARKsSungwook Kim, Sungju Kim, Yulim Shin, Sunmi Kim, Jihye Kim, Hyunok Oh. 348-366 [doi]
- n-MVTL Attack: Optimal Transaction Reordering Attack on DeFiJianhuan Wang, Jichen Li, Zecheng Li, Xiaotie Deng, Bin Xiao. 367-386 [doi]
- stoRNA: Stateless Transparent Proofs of Storage-timeReyhaneh Rabaninejad, Behzad Abdolmaleki, Giulio Malavolta, Antonis Michalas, Amir Nabizadeh. 389-410 [doi]
- Secure Approximate Nearest Neighbor Search with Locality-Sensitive HashingShang Song, Lin Liu 0018, Rongmao Chen, Wei Peng 0005, Yi Wang. 411-430 [doi]
- ConGISATA: A Framework for Continuous Gamified Information Security Awareness Training and AssessmentOfir Cohen, Ron Bitton, Asaf Shabtai, Rami Puzis. 431-451 [doi]
- Tactics for Account Access GraphsLuca Arnaboldi 0001, David Aspinall 0001, Christina Kolb, Sasa Radomirovic. 452-470 [doi]
- Machine-Checked Proofs of Accountability: How to sElect Who is to BlameConstantin Catalin Dragan, François Dupressoir, Kristian Gjøsteen, Thomas Haines, Peter B. Rønne, Morten Rotvold Solberg. 471-491 [doi]