Abstract is missing.
- An Investigation of Online Reverse Engineering Community Discussions in the Context of GhidraDaniel Votipka, Mary Nicole Punzalan, Seth M. Rabin, Yla Tausczik, Michelle L. Mazurek. 1-20 [doi]
- Countering Concurrent Login Attacks in "Just Tap" Push-based Authentication: A Redesign and Usability EvaluationsJay Prakash, Clarice Chua Qing Yu, Tanvi Ravindra Thombre, Andrei Bytes, Mohammed Jubur, Nitesh Saxena, Lucienne Blessing, Jianying Zhou, Tony Q. S. Quek. 21-36 [doi]
- SoK: Context Sensing for Access Control in the Adversarial Home IoTWeijia He, Valerie Zhao, Olivia Morkved, Sabeeka Siddiqui, Earlence Fernandes, Josiah Hester, Blase Ur. 37-53 [doi]
- Secure Messaging Authentication against Active Man-in-the-Middle AttacksBenjamin Dowling, Britta Hale. 54-70 [doi]
- Press ${@}{\$}{@}{\$}$ to Login: Strong Wearable Second Factor Authentication via Short Memorywise Effortless Typing GesturesPrakash Shrestha, Nitesh Saxena, Diksha Shukla, Vir V. Phoha. 71-87 [doi]
- Fully Distributed Verifiable Random Functions and their Application to Decentralised Random BeaconsDavid Galindo, Jia Liu, Mihai Ordean, Jin-Mann Wong. 88-102 [doi]
- ConFuzzius: A Data Dependency-Aware Hybrid Fuzzer for Smart ContractsChristof Ferreira Torres, Antonio Ken Iannillo, Arthur Gervais, Radu State. 103-119 [doi]
- SoK: Cryptojacking MalwareEge Tekiner, Abbas Acar, A. Selcuk Uluagac, Engin Kirda, Ali Aydin Selçuk. 120-139 [doi]
- Cryptocurrencies with Security Policies and Two-Factor AuthenticationFlorian Breuer, Vipul Goyal, Giulio Malavolta. 140-158 [doi]
- Bullseye Polytope: A Scalable Clean-Label Poisoning Attack with Improved TransferabilityHojjat Aghakhani, Dongyu Meng, Yu-Xiang Wang 0003, Christopher Kruegel, Giovanni Vigna. 159-178 [doi]
- Trojaning Language Models for Fun and ProfitXinyang Zhang, Zheng Zhang, Shouling Ji, Ting Wang 0006. 179-197 [doi]
- Fall of Giants: How popular text-based MLaaS fall against a simple evasion attackLuca Pajola, Mauro Conti. 198-211 [doi]
- Sponge Examples: Energy-Latency Attacks on Neural NetworksIlia Shumailov, Yiren Zhao, Daniel Bates, Nicolas Papernot, Robert D. Mullins, Ross Anderson 0001. 212-231 [doi]
- On the (In)Feasibility of Attribute Inference Attacks on Machine Learning ModelsBenjamin Zi Hao Zhao, Aviral Agrawal, Catisha Coburn, Hassan Jameel Asghar, Raghav Bhaskar, Mohamed Ali Kâafar, Darren Webb, Peter Dickinson. 232-251 [doi]
- Privacy of DNS-over-HTTPS: Requiem for a Dream?Levente Csikor, Himanshu Singh, Min-Suk Kang, Dinil Mon Divakaran. 252-271 [doi]
- Epoque: Practical End-to-End Verifiable Post-Quantum-Secure E-VotingXavier Boyen, Thomas Haines, Johannes Müller 0001. 272-291 [doi]
- On the Privacy Risks of Algorithmic FairnessHongyan Chang, Reza Shokri. 292-303 [doi]
- Compression Boosts Differentially Private Federated LearningRaouf Kerkouche, Gergely Ács, Claude Castelluccia, Pierre Genevès. 304-318 [doi]
- We Built This Circuit: Exploring Threat Vectors in Circuit Establishment in TorTheodor Schnitzler, Christina Pöpper, Markus Dürmuth, Katharina Kohls. 319-336 [doi]
- Can ISPs Help Mitigate IoT Malware? A Longitudinal Study of Broadband ISP Security EffortsArman Noroozian, Elsa Rodríguez, Elmer Lastdrager, Takahiro Kasama, Michel van Eeten, Carlos Gañán. 337-352 [doi]
- Prognosis Negative: Evaluating Real-Time Behavioral Ransomware DetectorsAbhinav Gupta, Aditi Prakash, Nolen Scaife. 353-368 [doi]
- Remote Non-Intrusive Malware Detection for PLCs based on Chain of Trust Rooted in HardwarePrashant Hari Narayan Rajput, Esha Sarkar, Dimitrios Tychalas, Michail Maniatakos. 369-384 [doi]
- SoK: Attacks on Industrial Control Logic and Formal Verification-Based DefensesRuimin Sun, Alejandro Mera, Long Lu, David R. Choffnes. 385-402 [doi]
- Ephemeral Astroturfing Attacks: The Case of Fake Twitter TrendsTugrulcan Elmas, Rebekah Overdorf, Ahmed Furkan Özkalay, Karl Aberer. 403-422 [doi]
- BGPeek-a-Boo: Active BGP-based Traceback for Amplification DDoS AttacksJohannes Krupp, Christian Rossow. 423-439 [doi]
- SoK: A Framework for Asset Discovery: Systematizing Advances in Network Measurements for Protecting OrganizationsMathew Vermeer, Jonathan West, Alejandro Cuevas, Shuonan Niu, Nicolas Christin, Michel van Eeten, Tobias Fiebig, Carlos Gañán, Tyler Moore 0001. 440-456 [doi]
- AppJitsu: Investigating the Resiliency of Android ApplicationsOnur Zungur, Antonio Bianchi, Gianluca Stringhini, Manuel Egele. 457-471 [doi]
- SoK: In Search of Lost Time: A Review of JavaScript Timers in BrowsersThomas Rokicki, Clémentine Maurice, Pierre Laperdrix. 472-486 [doi]
- SoK: Secure FPGA Multi-Tenancy in the Cloud: Challenges and OpportunitiesGhada Dessouky, Ahmad-Reza Sadeghi, Shaza Zeitouni. 487-506 [doi]
- Nonce@Once: A Single-Trace EM Side Channel Attack on Several Constant-Time Elliptic Curve Implementations in Mobile PlatformsMonjur Alam, Baki Berkay Yilmaz, Frank Werner 0005, Niels Samwel, Alenka G. Zajic, Daniel Genkin, Yuval Yarom, Milos Prvulovic. 507-522 [doi]
- $\text{DY}^{\star}$: A Modular Symbolic Verification Framework for Executable Cryptographic Protocol CodeKarthikeyan Bhargavan, Abhishek Bichhawat, Quoc Huy Do 0001, Pedram Hosseyni, Ralf Küsters, Guido Schmitz, Tim Würtele. 523-542 [doi]
- Nontransitive Policies TranspiledMohammad M. Ahmadpanah, Aslan Askarov, Andrei Sabelfeld. 543-561 [doi]
- ANDRuspex: Leveraging Graph Representation Learning to Predict Harmful App Installations on Mobile DevicesYun Shen, Gianluca Stringhini. 562-577 [doi]
- D-Fence: A Flexible, Efficient, and Comprehensive Phishing Email Detection SystemJehyun Lee, Farren Tang, Pingxiao Ye, Fahim Abbasi, Phil Hay, Dinil Mon Divakaran. 578-597 [doi]
- Extractor: Extracting Attack Behavior from Threat ReportsKiavash Satvat, Rigel Gjomemo, V. N. Venkatakrishnan. 598-615 [doi]
- FastSpec: Scalable Generation and Detection of Spectre Gadgets Using Neural EmbeddingsM. Caner Tol, Berk Gülmezoglu, Koray Yurtseven, Berk Sunar. 616-632 [doi]
- Bypassing memory safety mechanisms through speculative control flow hijacksAndrea Mambretti, Alexandra Sandulescu, Alessandro Sorniotti, William Robertson 0002, Engin Kirda, Anil Kurmus. 633-649 [doi]
- NoVT: Eliminating C++ Virtual Calls to Mitigate Vtable HijackingMarkus Bauer 0004, Christian Rossow. 650-666 [doi]
- Compiler-Assisted Hardening of Embedded Software Against Interrupt Latency Side-Channel AttacksHans Winderix, Jan Tobias Mühlberg, Frank Piessens. 667-682 [doi]
- Aim, Wait, Shoot: How the CacheSniper Technique Improves Unprivileged Cache AttacksSamira Briongos, Ida Bruhns, Pedro Malagón, Thomas Eisenbarth 0001, José Manuel Moya. 683-700 [doi]
- Poster: Angry Birding: Evaluating Application Exceptions as Attack CanariesTolga Ünlü, Lynsay A. Shepherd, Natalie Coull, Colin McLean. 701-703 [doi]
- Poster: DyPolDroid: User-Centered Counter-Policies Against Android Permission-Abuse AttacksMatthew Hill, Carlos E. Rubio-Medrano, Luis Claramunt, JaeJong Baek, Gail-Joon Ahn. 704-706 [doi]
- Poster: FLATEE: Federated Learning Across Trusted Execution EnvironmentsArup Mondal, Yash More, Ruthu Hulikal Rooparaghunath, Debayan Gupta. 707-709 [doi]
- Poster: Obfuscation Revealed - Using Electromagnetic Emanation to Identify and Classify MalwareDuy-Phuc Pham, Damien Marion 0001, Annelie Heuser. 710-712 [doi]
- Poster: Preventing Spatial and Privacy Attacks in Mobile Augmented Reality TechnologiesLuis Claramunt, Larissa Pokam Epse, Carlos E. Rubio-Medrano, JaeJong Baek, Gail-Joon Ahn. 713-715 [doi]
- Poster: Reducing Data Leakage on Personal Data Management SystemsRobin Carpentier, Iulian Sandu Popa, Nicolas Anciaux. 716-718 [doi]
- Poster: The Need for a Collaborative Approach to Cyber Security EducationGregor Langner, Jerry Andriessen, Gerald Quirchmayr, Steven Furnell, Vittorio Scarano, Teemu Tokola. 719-721 [doi]
- Poster: Towards Verifiable Mutability for BlockchainsErik Daniel, Florian Tschorsch. 722-724 [doi]