Abstract is missing.
- Membership Inference Attacks Against Machine Learning ModelsReza Shokri, Marco Stronati, Congzheng Song, Vitaly Shmatikov. 3-18 [doi]
- SecureML: A System for Scalable Privacy-Preserving Machine LearningPayman Mohassel, Yupeng Zhang. 19-38 [doi]
- Towards Evaluating the Robustness of Neural NetworksNicholas Carlini, David A. Wagner 0001. 39-57 [doi]
- Is Interaction Necessary for Distributed Private Learning?Adam D. Smith, Abhradeep Thakurta, Jalaj Upadhyay. 58-77 [doi]
- Pyramid: Enhancing Selectivity in Big Data Protection with Count FeaturizationMathias Lécuyer, Riley Spahn, Roxana Geambasu, Tzu-Kuo Huang, Siddhartha Sen. 78-95 [doi]
- SoK: Science, Security and the Elusive Goal of Security as a Scientific PursuitCormac Herley, Paul C. van Oorschot. 99-120 [doi]
- Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application SecurityFelix Fischer, Konstantin Böttinger, Huang Xiao, Christian Stransky, Yasemin Acar, Michael Backes 0001, Sascha Fahl. 121-136 [doi]
- Obstacles to the Adoption of Secure Communication ToolsRuba Abu-Salma, M. Angela Sasse, Joseph Bonneau, Anastasia Danilova, Alena Naiakshina, Matthew Smith 0001. 137-153 [doi]
- Comparing the Usability of Cryptographic APIsYasemin Acar, Michael Backes 0001, Sascha Fahl, Simson L. Garfinkel, Doowon Kim, Michelle L. Mazurek, Christian Stransky. 154-171 [doi]
- SoK: Cryptographically Protected Database SearchBenjamin Fuller, Mayank Varia, Arkady Yerukhimovich, Emily Shen, Ariel Hamlin, Vijay Gadepally, Richard Shay, John Darby Mitchell, Robert K. Cunningham. 172-191 [doi]
- IoT Goes Nuclear: Creating a ZigBee Chain ReactionEyal Ronen, Adi Shamir, Achi-Or Weingarten, Colin O'Flynn. 195-212 [doi]
- SoK: Exploiting Network PrintersJens Muller, Vladislav Mladenov, Juraj Somorovsky, Jörg Schwenk. 213-230 [doi]
- How They Did It: An Analysis of Emission Defeat Devices in Modern AutomobilesMoritz Contag, Guo Li, Andre Pawlowski, Felix Domke, Kirill Levchenko, Thorsten Holz, Stefan Savage. 231-250 [doi]
- The Password Reset MitM AttackNethanel Gelernter, Senia Kalma, Bar Magnezi, Hen Porcilan. 251-267 [doi]
- An Experimental Security Analysis of an Industrial Robot ControllerDavide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, Andrea Maria Zanchettin, Stefano Zanero. 268-286 [doi]
- Protecting Bare-Metal Embedded Systems with Privilege OverlaysAbraham A. Clements, Naif Saleh Almakhdhub, Khaled S. Saab, Prashast Srivastava, Jinkyu Koo, Saurabh Bagchi, Mathias Payer. 289-303 [doi]
- NORAX: Enabling Execute-Only Memory for COTS Binaries on AArch64Yaohui Chen, Dongli Zhang, Ruowen Wang, Rui Qiao, Ahmed M. Azab, Long Lu, Hayawardh Vijayakumar, Wenbo Shen. 304-319 [doi]
- Securing Augmented Reality OutputKiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner. 320-337 [doi]
- SysPal: System-Guided Pattern Locks for AndroidGeumhwan Cho, Jun Ho Huh, Junsung Cho, Seongyeol Oh, Youngbae Song, Hyoungshick Kim. 338-356 [doi]
- Multi-touch Authentication Using Hand Geometry and Behavioral InformationYunpeng Song, Zhongmin Cai, Zhi-Li Zhang. 357-372 [doi]
- Hijacking Bitcoin: Routing Attacks on CryptocurrenciesMaria Apostolaki, Aviv Zohar, Laurent Vanbever. 375-392 [doi]
- Catena: Efficient Non-equivocation via BitcoinAlin Tomescu, Srinivas Devadas. 393-409 [doi]
- IKP: Turning a PKI Around with Decentralized Automated IncentivesStephanos Matsumoto, Raphael M. Reischuk. 410-426 [doi]
- Augur: Internet-Wide Detection of Connectivity DisruptionsPaul Pearce, Roya Ensafi, Frank Li, Nick Feamster, Vern Paxson. 427-443 [doi]
- Scalable Bias-Resistant Distributed RandomnessEwa Syta, Philipp Jovanovic, Eleftherios Kokoris-Kogias, Nicolas Gailly, Linus Gasser, Ismail Khoffi, Michael J. Fischer, Bryan Ford. 444-460 [doi]
- Implementing and Proving the TLS 1.3 Record LayerAntoine Delignat-Lavaud, Cédric Fournet, Markulf Kohlweiss, Jonathan Protzenko, Aseem Rastogi, Nikhil Swamy, Santiago Zanella Béguelin, Karthikeyan Bhargavan, Jianyang Pan, Jean Karim Zinzindohoue. 463-482 [doi]
- Verified Models and Reference Implementations for the TLS 1.3 Standard CandidateKarthikeyan Bhargavan, Bruno Blanchet, Nadim Kobeissi. 483-502 [doi]
- SymCerts: Practical Symbolic Execution for Exposing Noncompliance in X.509 Certificate Validation ImplementationsSze Yiu Chau, Omar Chowdhury, Md. Endadul Hoque, Huangyi Ge, Aniket Kate, Cristina Nita-Rotaru, Ninghui Li. 503-520 [doi]
- HVLearn: Automated Black-Box Analysis of Hostname Verification in SSL/TLS ImplementationsSuphannee Sivakorn, George Argyros, Kexin Pei, Angelos D. Keromytis, Suman Jana. 521-538 [doi]
- CRLite: A Scalable System for Pushing All TLS Revocations to All BrowsersJames Larisch, David R. Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo Wilson. 539-556 [doi]
- Finding and Preventing Bugs in JavaScript BindingsFraser Brown, Shravan Narayan, Riad S. Wahby, Dawson R. Engler, Ranjit Jhala, Deian Stefan. 559-578 [doi]
- Skyfire: Data-Driven Seed Generation for FuzzingJunjie Wang, Bihuan Chen, Lei Wei, Yang Liu. 579-594 [doi]
- VUDDY: A Scalable Approach for Vulnerable Code Clone DiscoverySeulbae Kim, Seunghoon Woo, Heejo Lee, Hakjoo Oh. 595-614 [doi]
- NEZHA: Efficient Domain-Independent Differential TestingTheofilos Petsios, Adrian Tang, Salvatore J. Stolfo, Angelos D. Keromytis, Suman Jana. 615-632 [doi]
- Backward-Bounded DSE: Targeting Infeasibility Questions on Obfuscated CodesSébastien Bardin, Robin David, Jean-Yves Marion. 633-651 [doi]
- Leakage-Abuse Attacks against Order-Revealing EncryptionPaul Grubbs, Kevin Sekniqi, Vincent Bindschaedler, Muhammad Naveed 0001, Thomas Ristenpart. 655-672 [doi]
- Side-Channel Attacks on Shared Search IndexesLiang Wang, Paul Grubbs, Jiahui Lu, Vincent Bindschaedler, David Cash, Thomas Ristenpart. 673-692 [doi]
- From Trash to Treasure: Timing-Sensitive Garbage CollectionMathias V. Pedersen, Aslan Askarov. 693-709 [doi]
- Verifying and Synthesizing Constant-Resource Implementations with TypesVan Chan Ngo, Mario Dehesa-Azuara, Matthew Fredrikson, Jan Hoffmann. 710-728 [doi]
- CoSMeDis: A Distributed Social Media Platform with Formally Verified Confidentiality GuaranteesThomas Bauereiß, Armando Pesenti Gritti, Andrei Popescu 0001, Franco Raimondi. 729-748 [doi]
- How to Learn Klingon without a Dictionary: Detection and Measurement of Black Keywords Used by the Underground EconomyHao Yang, Xiulin Ma, Kun Du, Zhou Li, Hai-Xin Duan, XiaoDong Su, Guang Liu, Zhifeng Geng, Jianping Wu. 751-769 [doi]
- To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the WildBrown Farinholt, Mohammad Rezaeirad, Paul Pearce, Hitesh Dharmdasani, Haikuo Yin, Stevens Le-Blond, Damon McCoy, Kirill Levchenko. 770-787 [doi]
- A Lustrum of Malware Network Communication: Evolution and InsightsChaz Lever, Platon Kotzias, Davide Balzarotti, Juan Caballero, Manos Antonakakis. 788-804 [doi]
- Under the Shadow of Sunshine: Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider NetworksSumayah A. Alrwais, Xiaojing Liao, Xianghang Mi, Peng Wang, Xiaofeng Wang, Feng Qian, Raheem A. Beyah, Damon McCoy. 805-823 [doi]
- Your Exploit is Mine: Automatic Shellcode Transplant for Remote ExploitsTiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, David Brumley. 824-839 [doi]
- Optimized Honest-Majority MPC for Malicious Adversaries - Breaking the 1 Billion-Gate Per Second BarrierToshinori Araki, Assi Barak, Jun Furukawa, Tamar Lichter, Yehuda Lindell, Ariel Nof, Kazuma Ohara, Adi Watzman, Or Weinstein. 843-862 [doi]
- vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced DatabasesYupeng Zhang, Daniel Genkin, Jonathan Katz, Dimitrios Papadopoulos, Charalampos Papamanthou. 863-880 [doi]
- A Framework for Universally Composable Diffie-Hellman Key ExchangeRalf Küsters, Daniel Rausch. 881-900 [doi]
- One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous AttestationJan Camenisch, Liqun Chen, Manu Drijvers, Anja Lehmann, David Novick, Rainer Urian. 901-920 [doi]
- Cryptographic Function Detection in Obfuscated Binaries via Bit-Precise Symbolic Loop MappingDongpeng Xu, Jiang Ming, Dinghao Wu. 921-937 [doi]
- XHOUND: Quantifying the Fingerprintability of Browser ExtensionsOleksii Starov, Nick Nikiforakis. 941-956 [doi]
- Identifying Personal DNA Methylation Profiles by Genotype InferenceMichael Backes 0001, Pascal Berrang, Matthias Bieg, Roland Eils, Carl Herrmann, Mathias Humbert, Irina Lehmann. 957-976 [doi]
- Counter-RAPTOR: Safeguarding Tor Against Active Routing AttacksYixin Sun, Anne Edmundson, Nick Feamster, Mung Chiang, Prateek Mittal. 977-992 [doi]
- Machine-Checked Proofs of Privacy for Electronic Voting ProtocolsVéronique Cortier, Constantin Catalin Dragan, François Dupressoir, Benedikt Schmidt, Pierre-Yves Strub, Bogdan Warinschi. 993-1008 [doi]
- Spotless Sandboxes: Evading Malware Analysis Systems Using Wear-and-Tear ArtifactsNajmeh Miramirkhani, Mahathi Priya Appini, Nick Nikiforakis, Michalis Polychronakis. 1009-1024 [doi]
- Hardening Java's Access Control by Abolishing Implicit Privilege ElevationPhilipp Holzinger, Ben Hermann, Johannes Lerch, Eric Bodden, Mira Mezini. 1027-1040 [doi]
- Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback LoopYanick Fratantonio, Chenxiong Qian, Simon P. Chung, Wenke Lee. 1041-1057 [doi]
- SmarPer: Context-Aware and Automatic Runtime-Permissions for Mobile DevicesKatarzyna Olejnik, Italo Dacosta, Joana Soares Machado, Kévin Huguenin, Mohammad Emtiyaz Khan, Jean-Pierre Hubaux. 1058-1076 [doi]
- The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User PreferencesPrimal Wijesekera, Arjun Baokar, Lynn Tsai, Joel Reardon, Serge Egelman, David Wagner, Konstantin Beznosov. 1077-1093 [doi]
- IVD: Automatic Learning and Enforcement of Authorization Rules in Online Social NetworksPaul Marinescu, Chad Parry, Marjori Pomarole, Yuan Tian, Patrick Tague, Ioannis Papagiannis. 1094-1109 [doi]