Abstract is missing.
- Analysis and Mitigation of Function Interaction Risks in Robot AppsYuan Xu, Tianwei Zhang 0004, Yungang Bao. 1-16 [doi]
- An Investigation of Byzantine Threats in Multi-Robot SystemsGelei Deng, Yuan Zhou, Yuan Xu, Tianwei Zhang 0004, Yang Liu. 17-32 [doi]
- SniffMislead: Non-Intrusive Privacy Protection against Wireless Packet Sniffers in Smart HomesXuanyu Liu, Qiang Zeng 0001, Xiaojiang Du, Siva Likitha Valluru, Chenglong Fu 0002, Xiao Fu, Bin Luo. 33-47 [doi]
- BSOD: Binary-only Scalable fuzzing Of device DriversDominik Maier, Fabian Toepfer. 48-61 [doi]
- LeanSym: Efficient Hybrid Fuzzing Through Conservative Constraint DebloatingXianya Mi, Sanjay Rawat 0001, Cristiano Giuffrida, Herbert Bos. 62-77 [doi]
- UFuzzer: Lightweight Detection of PHP-Based Unrestricted File Upload Vulnerabilities Via Static-Fuzzing Co-AnalysisJin Huang, Junjie Zhang 0004, Jialun Liu, Chuang Li, Rui Dai. 78-90 [doi]
- SecureFS: A Secure File System for Intel SGXSandeep Kumar, Smruti R. Sarangi. 91-102 [doi]
- BasicBlocker: ISA Redesign to Make Spectre-Immune CPUs FasterJan Philipp Thoma, Jakob Feldtkeller, Markus Krausz, Tim Güneysu, Daniel J. Bernstein. 103-118 [doi]
- Fast Intra-kernel Isolation and Security with IskiOSSpyridoula Gravani, Mohammad Hedayati, John Criswell, Michael L. Scott. 119-134 [doi]
- Encryption is Futile: Reconstructing 3D-Printed Models Using the Power Side-ChannelJacob Gatlin, Sofia Belikovetsky, Yuval Elovici, Anthony Skjellum, Joshua Lubell, Paul Witherell, Mark Yampolskiy. 135-147 [doi]
- DisCo: Combining Disassemblers for Improved PerformanceSri Shaila G, Ahmad Darki, Michalis Faloutsos, Nael B. Abu-Ghazaleh, Manu Sridharan. 148-161 [doi]
- iTOP: Automating Counterfeit Object-Oriented Programming AttacksPaul Muntean, Richard Viehoever, Zhiqiang Lin, Gang Tan, Jens Grossklags, Claudia Eckert 0001. 162-176 [doi]
- Lost in the Loader: The Many Faces of the Windows PE File FormatDario Nisi, Mariano Graziano, Yanick Fratantonio, Davide Balzarotti. 177-192 [doi]
- Crafting Adversarial Example to Bypass Flow-&ML- based Botnet Detector via RLJunnan Wang, Qixu Liu, Di Wu, Ying Dong, Xiang Cui. 193-204 [doi]
- CADUE: Content-Agnostic Detection of Unwanted Emails for Enterprise SecurityMohamed Nabeel, Enes Altinisik, Haipei Sun, Issa Khalil, Wendy Hui Wang, Ting Yu. 205-219 [doi]
- GrandDetAuto: Detecting Malicious Nodes in Large-Scale Autonomous NetworksTigist Abera, Ferdinand Brasser, Lachlan J. Gunn, Patrick Jauernig, David Koisser, Ahmad-Reza Sadeghi. 220-234 [doi]
- AttkFinder: Discovering Attack Vectors in PLC Programs using Information Flow AnalysisJohn Henry Castellanos, Martín Ochoa, Alvaro A. Cárdenas, Owen Arden, Jianying Zhou 0001. 235-250 [doi]
- HandLock: Enabling 2-FA for Smart Home Voice Assistants using Inaudible Acoustic SignalShaohu Zhang, Anupam Das. 251-265 [doi]
- What Did You Add to My Additive Manufacturing Data?: Steganographic Attacks on 3D Printing FilesMark Yampolskiy, Lynne Graves, Jacob Gatlin, Anthony Skjellum, Moti Yung. 266-281 [doi]
- Practical Speech Re-use Prevention in Voice-driven ServicesYangyong Zhang, Sunpreet S. Arora, Maliheh Shirvanian, Jianwei Huang, Guofei Gu. 282-295 [doi]
- μSCOPE: A Methodology for Analyzing Least-Privilege Compartmentalization in Large Software ArtifactsNick Roessler, Lucas Atayde, Imani Palmer, Derrick Paul McKee, Jai Pandey, Vasileios P. Kemerlis, Mathias Payer, Adam Bates, Jonathan M. Smith, André DeHon, Nathan Dautenhahn. 296-311 [doi]
- The Service Worker Hiding in Your Browser: The Next Web Attack Target?Phakpoom Chinprutthiwong, Raj Vardhan, Guangliang Yang, Yangyong Zhang, Guofei Gu. 312-323 [doi]
- Designing Media Provenance Indicators to Combat Fake MediaImani N. Sherman, Jack W. Stokes, Elissa M. Redmiles. 324-339 [doi]
- Marked for Disruption: Tracing the Evolution of Malware Delivery Operations Targeted for TakedownColin C. Ife, Yun Shen, Steven J. Murdoch, Gianluca Stringhini. 340-353 [doi]
- The Evolution of DNS-based Email Authentication: Measuring Adoption and Finding FlawsDennis Tatang, Florian Zettl, Thorsten Holz. 354-369 [doi]
- Where We Stand (or Fall): An Analysis of CSRF Defenses in Web FrameworksXhelal Likaj, Soheil Khodayari, Giancarlo Pellegrino. 370-385 [doi]
- On the Usability (In)Security of In-App Browsing Interfaces in Mobile AppsZicheng Zhang. 386-398 [doi]
- Stratosphere: Finding Vulnerable Cloud Storage BucketsJack Cable, Drew Gregory, Liz Izhikevich, Zakir Durumeric. 399-411 [doi]
- The Curse of Correlations for Robust Fingerprinting of Relational DatabasesTianxi Ji, Emre Yilmaz, Erman Ayday, Pan Li 0001. 412-427 [doi]
- Mini-Me, You Complete Me! Data-Driven Drone Security via DNN-based Approximate ComputingAolin Ding, Praveen Murthy, Luis Garcia, Pengfei Sun, Matthew Chan, Saman A. Zonouz. 428-441 [doi]
- Living-Off-The-Land Command Detection Using Active LearningTalha Ongun, Jack W. Stokes, Jonathan Bar Or, Ke Tian, Farid Tajaddodianfar, Joshua Neil, Christian Seifert, Alina Oprea, John C. Platt. 442-455 [doi]
- SyML: Guiding Symbolic Execution Toward Vulnerable States Through Pattern LearningNicola Ruaro, Kyle Zeng, Lukas Dresel, Mario Polino, Tiffany Bao, Andrea Continella, Stefano Zanero, Christopher Kruegel, Giovanni Vigna. 456-468 [doi]