Abstract is missing.
- AI2: Safety and Robustness Certification of Neural Networks with Abstract InterpretationTimon Gehr, Matthew Mirman, Dana Drachsler-Cohen, Petar Tsankov, Swarat Chaudhuri, Martin T. Vechev. 3-18 [doi]
- Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression LearningMatthew Jagielski, Alina Oprea, Battista Biggio, Chang Liu, Cristina Nita-Rotaru, Bo Li. 19-35 [doi]
- Stealing Hyperparameters in Machine LearningBinghui Wang, Neil Zhenqiang Gong. 36-52 [doi]
- A Machine Learning Approach to Prevent Malicious Calls over Telephony NetworksHuichen Li, Xiaojun Xu, Chang Liu, Teng Ren, Kun Wu, Xuezhi Cao, Weinan Zhang, Yong Yu, Dawn Song. 53-69 [doi]
- Surveylance: Automatically Detecting Online Survey ScamsAmin Kharraz, William K. Robertson, Engin Kirda. 70-86 [doi]
- Privacy Risks with Facebook's PII-Based Targeting: Auditing a Data Broker's Advertising InterfaceGiridhari Venkatadri, Athanasios Andreou, Yabing Liu, Alan Mislove, Krishna P. Gummadi, Patrick Loiseau, Oana Goga. 89-107 [doi]
- Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency - Choose TwoDebajyoti Das, Sebastian Meiser 0001, Esfandiar Mohammadi, Aniket Kate. 108-126 [doi]
- Locally Differentially Private Frequent Itemset MiningTianhao Wang 0001, Ninghui Li, Somesh Jha. 127-143 [doi]
- EyeTell: Video-Assisted Touchscreen Keystroke Inference from Eye MovementsYimin Chen, Tao Li, Rui Zhang 0007, Yanchao Zhang, Terri Hedgpeth. 144-160 [doi]
- Understanding Linux MalwareEmanuele Cozzi, Mariano Graziano, Yanick Fratantonio, Davide Balzarotti. 161-175 [doi]
- Racing in Hyperspace: Closing Hyper-Threading Side Channels on SGX with Contrived Data RacesGuoxing Chen, Wenhao Wang, Tianyu Chen, Sanchuan Chen, Yinqian Zhang, Xiaofeng Wang 0001, Ten-Hwang Lai, Dongdai Lin. 178-194 [doi]
- Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPUPietro Frigo, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi. 195-210 [doi]
- SoK: Keylogging Side ChannelsJohn V. Monaco. 211-228 [doi]
- FPGA-Based Remote Power Side-Channel AttacksMark Zhao, G. Edward Suh. 229-244 [doi]
- Another Flip in the Wall of Rowhammer DefensesDaniel Gruss, Moritz Lipp, Michael Schwarz 0001, Daniel Genkin, Jonas Juffinger, Sioli O'Connell, Wolfgang Schoechl, Yuval Yarom. 245-261 [doi]
- EnclaveDB: A Secure Database Using SGXChristian Priebe, Kapil Vaswani, Manuel Costa. 264-278 [doi]
- Oblix: An Efficient Oblivious Search IndexPratyush Mishra, Rishabh Poddar, Jerry Chen, Alessandro Chiesa, Raluca Ada Popa. 279-296 [doi]
- Improved Reconstruction Attacks on Encrypted Data Using Range Query LeakageMarie-Sarah Lacharité, Brice Minaud, Kenneth G. Paterson. 297-314 [doi]
- Bulletproofs: Short Proofs for Confidential Transactions and MoreBenedikt Bünz, Jonathan Bootle, Dan Boneh, Andrew Poelstra, Pieter Wuille, Greg Maxwell. 315-334 [doi]
- FuturesMEX: Secure, Distributed Futures Market ExchangeFabio Massacci, Chan Nam Ngo, Jing Nie, Daniele Venturi 0001, Julian Williams. 335-353 [doi]
- Implementing Conjunction Obfuscation Under Entropic Ring LWEDavid Bruce Cousins, Giovanni Di Crescenzo, Kamil Doruk Gür, Kevin King, Yuriy Polyakov, Kurt Rohloff, Gerard W. Ryan, Erkay Savas. 354-371 [doi]
- Hackers vs. Testers: A Comparison of Software Vulnerability Discovery ProcessesDaniel Votipka, Rock Stevens, Elissa M. Redmiles, Jeremy Hu, Michelle L. Mazurek. 374-391 [doi]
- Towards Security and Privacy for Multi-user Augmented Reality: Foundations with End UsersKiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner. 392-408 [doi]
- Computer Security and Privacy for Refugees in the United StatesLucy Simko, Ada Lerner, Samia Ibtasam, Franziska Roesner, Tadayoshi Kohno. 409-423 [doi]
- On Enforcing the Digital Immunity of a Large Humanitarian OrganizationStevens Le-Blond, Alejandro Cuevas, Juan Ramón Troncoso-Pastoriza, Philipp Jovanovic, Bryan Ford, Jean-Pierre Hubaux. 424-440 [doi]
- The Spyware Used in Intimate Partner ViolenceRahul Chatterjee, Periwinkle Doerfler, Hadas Orgad, Sam Havron, Jackeline Palmer, Diana Freed, Karen Levy, Nicola Dell, Damon McCoy, Thomas Ristenpart. 441-458 [doi]
- Compiler-Assisted Code RandomizationHyungjoon Koo, Yaohui Chen, Long Lu, Vasileios P. Kemerlis, Michalis Polychronakis. 461-477 [doi]
- Protecting the Stack with Metadata Policies and Tagged HardwareNick Roessler, André DeHon. 478-495 [doi]
- Impossibility of Precise and Sound Termination-Sensitive Security EnforcementsMinh Ngo, Frank Piessens, Tamara Rezk. 496-513 [doi]
- Static Evaluation of Noninterference Using Approximate Model CountingZiqiao Zhou, Zhiyun Qian, Michael K. Reiter, Yinqian Zhang. 514-528 [doi]
- DEEPSEC: Deciding Equivalence Properties in Security Protocols Theory and PracticeVincent Cheval, Steve Kremer, Itsaka Rakotonirina. 529-546 [doi]
- Distance-Bounding Protocols: Verification without Time and LocationSjouke Mauw, Zach Smith, Jorge Toro-Pozo, Rolando Trujillo-Rasua. 549-566 [doi]
- Sonar: Detecting SS7 Redirection Attacks with Audio-Based Distance BoundingChristian Peeters, Hadi Abdullah, Nolen Scaife, Jasmine Bowers, Patrick Traynor, Bradley Reaves, Kevin R. B. Butler. 567-582 [doi]
- OmniLedger: A Secure, Scale-Out, Decentralized Ledger via ShardingEleftherios Kokoris-Kogias, Philipp Jovanovic, Linus Gasser, Nicolas Gailly, Ewa Syta, Bryan Ford. 583-598 [doi]
- Routing Around Congestion: Defeating DDoS Attacks and Adverse Network Conditions via Reactive BGP RoutingJared M. Smith, Max Schuchard. 599-617 [doi]
- Tracking Ransomware End-to-endDanny Yuxing Huang, Maxwell Matthaios Aliapoulios, Vector Guo Li, Luca Invernizzi, Elie Bursztein, Kylie McRoberts, Jonathan Levin, Kirill Levchenko, Alex C. Snoeren, Damon McCoy. 618-631 [doi]
- The Rise of the Citizen Developer: Assessing the Security Impact of Online App GeneratorsMarten Oltrogge, Erik Derr, Christian Stransky, Yasemin Acar, Sascha Fahl, Christian Rossow, Giancarlo Pellegrino, Sven Bugiel, Michael Backes 0001. 634-647 [doi]
- Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical SystemYuqi Chen 0001, Christopher M. Poskitt, Jun Sun 0001. 648-660 [doi]
- Precise and Scalable Detection of Double-Fetch Bugs in OS KernelsMeng Xu, Chenxiong Qian, Kangjie Lu, Michael Backes 0001, Taesoo Kim. 661-678 [doi]
- CollAFL: Path Sensitive FuzzingShuitao Gan, Chao Zhang, Xiaojun Qin, Xuwen Tu, Kang Li, Zhongyu Pei, Zuoning Chen. 679-696 [doi]
- T-Fuzz: Fuzzing by Program TransformationHui Peng, Yan Shoshitaishvili, Mathias Payer. 697-710 [doi]
- Angora: Efficient Fuzzing by Principled SearchPeng Chen, Hao Chen. 711-725 [doi]
- FP-STALKER: Tracking Browser Fingerprint EvolutionsAntoine Vastel, Pierre Laperdrix, Walter Rudametkin, Romain Rouvoy. 728-741 [doi]
- Study and Mitigation of Origin Stripping Vulnerabilities in Hybrid-postMessage Enabled Mobile ApplicationsGuangliang Yang, Jeff Huang 0001, Guofei Gu, Abner Mendoza. 742-755 [doi]
- Mobile Application Web API Reconnaissance: Web-to-Mobile Inconsistencies & VulnerabilitiesAbner Mendoza, Guofei Gu. 756-769 [doi]
- Enumerating Active IPv6 Hosts for Large-Scale Security Scans via DNSSEC-Signed Reverse ZonesKevin Borgolte, Shuang Hao, Tobias Fiebig, Giovanni Vigna. 770-784 [doi]
- Tracking Certificate Misissuance in the WildDeepak Kumar, Zhengping Wang, Matthew Hyder, Joseph Dickinson, Gabrielle Beck, David Adrian, Joshua Mason, Zakir Durumeric, J. Alex Halderman, Michael Bailey. 785-798 [doi]
- A Formal Treatment of Accountable Proxying Over TLSKarthikeyan Bhargavan, Ioana Boureanu, Antoine Delignat-Lavaud, Pierre-Alain Fouque, Cristina Onete. 799-816 [doi]
- Secure Device Bootstrapping Without Secrets Resistant to Signal Manipulation AttacksNirnimesh Ghose, Loukas Lazos, Ming Li. 819-835 [doi]
- Do You Feel What I Hear? Enabling Autonomous IoT Device Pairing Using Different Sensor TypesJun Han 0001, Albert Jin Chung, Manal Kumar Sinha, Madhumitha Harishankar, Shijia Pan, Hae Young Noh, Pei Zhang, Patrick Tague. 836-852 [doi]
- On the Economics of Offline Password CrackingJeremiah Blocki, Benjamin Harsha, Samson Zhou. 853-871 [doi]
- A Tale of Two Studies: The Best and Worst of YubiKey UsabilityJoshua Reynolds, Trevor-Smith, Ken Reese, Luke Dickinson, Scott Ruoti, Kent E. Seamons. 872-888 [doi]
- When Your Fitness Tracker Betrays You: Quantifying the Predictability of Biometric Features Across ContextsSimon Eberz, Giulio Lovisotto, Andrea Patane, Marta Kwiatkowska, Vincent Lenders, Ivan Martinovic. 889-905 [doi]
- vRAM: Faster Verifiable RAM with Program-Independent PreprocessingYupeng Zhang, Daniel Genkin, Jonathan Katz, Dimitrios Papadopoulos, Charalampos Papamanthou. 908-925 [doi]
- Doubly-Efficient zkSNARKs Without Trusted SetupRiad S. Wahby, Ioanna Tzialla, Abhi Shelat, Justin Thaler, Michael Walfish. 926-943 [doi]
- xJsnark: A Framework for Efficient Verifiable ComputationAhmed E. Kosba, Charalampos Papamanthou, Elaine Shi. 944-961 [doi]
- PIR with Compressed Queries and Amortized Query ProcessingSebastian Angel, Hao Chen, Kim Laine, Srinath T. V. Setty. 962-979 [doi]
- Secure Two-party Threshold ECDSA from ECDSA AssumptionsJack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat. 980-997 [doi]
- Speechless: Analyzing the Threat to Speech Privacy from Smartphone Motion SensorsS. Abhishek Anand, Nitesh Saxena. 1000-1017 [doi]
- Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing AttacksKai Jansen, Matthias Schäfer 0002, Daniel Moser, Vincent Lenders, Christina Pöpper, Jens B. Schmitt. 1018-1031 [doi]
- SoK: "Plug & Pray" Today - Understanding USB Insecurity in Versions 1 Through CJing (Dave) Tian, Nolen Scaife, Deepak Kumar, Michael Bailey, Adam M. Bates, Kevin R. B. Butler. 1032-1047 [doi]
- Blue Note: How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating SystemsConnor Bolton, Sara Rampazzi, Chaohao Li, Andrew Kwong, Wenyuan Xu, Kevin Fu. 1048-1062 [doi]
- The Cards Aren't Alright: Detecting Counterfeit Gift Cards Using Encoding JitterNolen Scaife, Christian Peeters, Camilo Velez, Hanqing Zhao, Patrick Traynor, David P. Arnold. 1063-1076 [doi]