Abstract is missing.
- False Sense of Security: A Study on the Effectivity of Jailbreak Detection in Banking AppsAnsgar Kellner, Micha Horlboge, Konrad Rieck, Christian Wressnegger. 1-14 [doi]
- Up-To-Crash: Evaluating Third-Party Library Updatability on AndroidJie Huang, Nataniel Borges, Sven Bugiel, Michael Backes 0001. 15-30 [doi]
- Challenges in Designing Exploit Mitigations for Deeply Embedded SystemsAli Abbasi, Jos Wetzels, Thorsten Holz, Sandro Etalle. 31-46 [doi]
- DroidEvolver: Self-Evolving Android Malware Detection SystemKe Xu, Yingjiu Li, Robert H. Deng, Kai Chen, Jiayun Xu. 47-62 [doi]
- Programming with Flow-Limited Authorization: Coarser is BetterMathias Vorreiter Pedersen, Stephen Chong. 63-78 [doi]
- Information-Flow Control for Database-Backed ApplicationsMarco Guarnieri, Musard Balliu, Daniel Schoepe, David A. Basin, Andrei Sabelfeld. 79-94 [doi]
- Adaptive Call-Site Sensitive Control Flow IntegrityMustakimur Khandaker, Abu-Naser, Wenqing Liu, Zhi Wang 0004, Yajin Zhou, Yueqiang Cheng. 95-110 [doi]
- STEROIDS for DOPed Applications: A Compiler for Automated Data-Oriented ProgrammingJannik Pewny, Philipp Koppe, Thorsten Holz. 111-126 [doi]
- A Symbolic Analysis of ECC-Based Direct Anonymous AttestationJorden Whitefield, Liqun Chen, Ralf Sasse, Steve Schneider, Helen Treharne, Stephan Wesemeyer. 127-141 [doi]
- SgxPectre: Stealing Intel Secrets from SGX Enclaves Via Speculative ExecutionGuoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, Ten-Hwang Lai. 142-157 [doi]
- ReplicaTEE: Enabling Seamless Replication of SGX Enclaves in the CloudClaudio Soriente, Ghassan Karame, Wenting Li, Sergey Fedorov. 158-171 [doi]
- Deanonymization and Linkability of Cryptocurrency Transactions Based on Network AnalysisAlex Biryukov, Sergei Tikhomirov. 172-184 [doi]
- Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart ContractsRaymond Cheng, Fan Zhang 0022, Jernej Kos, Warren He, Nicholas Hynes, Noah M. Johnson, Ari Juels, Andrew Miller 0001, Dawn Song. 185-200 [doi]
- Understanding eWhoringAlice Hutchings, Sergio Pastrana. 201-214 [doi]
- Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public KeyZhen Liu, Guomin Yang, Duncan S. Wong, Khoa Nguyen, Huaxiong Wang. 215-230 [doi]
- A Mechanised Cryptographic Proof of the WireGuard Virtual Private Network ProtocolBenjamin Lipp, Bruno Blanchet, Karthikeyan Bhargavan. 231-246 [doi]
- The Case of Adversarial Inputs for Secure Similarity Approximation ProtocolsEvgenios M. Kornaropoulos, Petros Efstathopoulos. 247-262 [doi]
- A Practical Attestation Protocol for Autonomous Embedded SystemsFlorian Kohnhäuser, Niklas Büscher, Stefan Katzenbeisser 0001. 263-278 [doi]
- IFAL: Issue First Activate Later Certificates for V2XEric R. Verheul, Christopher Hicks, Flavio D. Garcia. 279-293 [doi]
- SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated RatchetingOlivier Blazy, Angèle Bossuat, Xavier Bultel, Pierre-Alain Fouque, Cristina Onete, Elena Pagnin. 294-309 [doi]
- SoK: Benchmarking Flaws in Systems SecurityErik van der Kouwe, Gernot Heiser, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida. 310-325 [doi]
- Tell Me You Fixed It: Evaluating Vulnerability Notifications via Quarantine NetworksOrçun Çetin, Carlos Gañán, Lisette Altena, Samaneh Tajalizadehkhoob, Michel van Eeten. 326-339 [doi]
- Discovering Correlations: A Formal Definition of Causal Dependency Among Heterogeneous EventsCharles Xosanavongsa, Eric Totel, Olivier Bettan. 340-355 [doi]
- Noise Explorer: Fully Automated Modeling and Verification for Arbitrary Noise ProtocolsNadim Kobeissi, Georgio Nicolas, Karthikeyan Bhargavan. 356-370 [doi]
- Degenerate Fault Attacks on Elliptic Curve Parameters in OpenSSLAkira Takahashi 0002, Mehdi Tibouchi. 371-386 [doi]
- On Aggregation of Information in Timing AttacksItsaka Rakotonirina, Boris Köpf. 387-400 [doi]
- In Encryption We Don't Trust: The Effect of End-to-End Encryption to the Masses on User PerceptionSergej Dechand, Alena Naiakshina, Anastasia Danilova, Matthew Smith 0001. 401-415 [doi]
- Rethinking Location Privacy for Unknown Mobility BehaviorsSimon Oya, Carmela Troncoso, Fernando Pérez-González. 416-431 [doi]
- Revisiting User Privacy for Certificate TransparencyDaniel Kales, Olamide Omolola, Sebastian Ramacher. 432-447 [doi]
- PILOT: Practical Privacy-Preserving Indoor Localization Using OuTsourcingKimmo Järvinen 0001, Helena Leppäkoski, Elena Simona Lohan, Philipp Richter, Thomas Schneider 0003, Oleksandr Tkachenko, Zheng Yang. 448-463 [doi]
- The 5G-AKA Authentication Protocol PrivacyAdrien Koutsos. 464-479 [doi]
- Towards Understanding Limitations of Pixel Discretization Against Adversarial AttacksJiefeng Chen, Xi Wu 0001, Vaibhav Rastogi, Yingyu Liang, Somesh Jha. 480-495 [doi]
- EzPC: Programmable and Efficient Secure Two-Party Computation for Machine LearningNishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma, Shardul Tripathi. 496-511 [doi]
- PRADA: Protecting Against DNN Model Stealing AttacksMika Juuti, Sebastian Szyller, Samuel Marchal, N. Asokan. 512-527 [doi]
- Mitch: A Machine Learning Approach to the Black-Box Detection of CSRF VulnerabilitiesStefano Calzavara, Mauro Conti, Riccardo Focardi, Alvise Rabitti, Gabriele Tolomei. 528-543 [doi]
- Domain Impersonation is Feasible: A Study of CA Domain Validation VulnerabilitiesLorenz Schwittmann, Matthäus Wander, Torben Weis. 544-559 [doi]
- TraffickStop: Detecting and Measuring Illicit Traffic Monetization Through Large-Scale DNS AnalysisBaojun Liu, Zhou Liu, Peiyuan Zong, Chaoyi Lu, Hai-Xin Duan, Ying Liu, Sumayah A. Alrwais, Xiaofeng Wang 0001, Shuang Hao, Yaoqi Jia, Yiming Zhang, Kai Chen 0012, Zaifeng Zhang. 560-575 [doi]
- StopGuessing: Using Guessed Passwords to Thwart Online GuessingStuart E. Schechter, Yuan Tian, Cormac Herley. 576-589 [doi]
- MALPITY: Automatic Identification and Exploitation of Tarpit Vulnerabilities in MalwareWalla Sebastian, Christian Rossow. 590-605 [doi]
- Private Votes on Untrusted Platforms: Models, Attacks and Provable SchemeSergiu Bursuc, Constantin Catalin Dragan, Steve Kremer. 606-620 [doi]
- Is Your Vote Overheard? A New Scalable Side-Channel Attack Against Paper VotingKristjan Krips, Jan Willemson, Sebastian Värv. 621-634 [doi]
- Improving Automated Symbolic Analysis of Ballot Secrecy for E-Voting Protocols: A Method Based on Sufficient ConditionsLucca Hirschi, Cas Cremers. 635-650 [doi]