Abstract is missing.
- Message from the General ChairAlvaro A. Cárdenas. [doi]
- Discovering and Measuring Malicious URL Redirection Campaigns from Fake News DomainsZhouhan Chen, Juliana Freire. 1-6 [doi]
- Troubleshooting an Intrusion Detection Dataset: the CICIDS2017 Case StudyGints Engelen, Vera Rimmer, Wouter Joosen. 7-12 [doi]
- Training regime influences to semi-supervised learning for insider threat detectionDuc C. Le, Nur Zincir-Heywood, Malcolm I. Heywood. 13-18 [doi]
- Examining traffic microstructures to improve model developmentHenry Clausen, David Aspinall 0001. 19-24 [doi]
- On the feasibility of short-lived dynamic onion servicesTobias Höller, Thomas Raab, Michael Roland 0001, René Mayrhofer. 25-30 [doi]
- AMon: A Monitoring Multidimensional Feature Application to Secure Android EnvironmentsJosé Antonio Gómez-Hernández, Pedro García Teodoro, Juan Antonio Holgado Terriza, Gabriel Maciá-Fernández, José Camacho-Páez, M. Robles-Carrillo. 31-36 [doi]
- DPI Solutions in Practice: Benchmark and ComparisonTommaso Rescio, Thomas Favale, Francesca Soro, Marco Mellia, Idilio Drago. 37-42 [doi]
- Revisiting the Pervasiveness of Weak Keys in Network DevicesPhilippe Elbaz-Vincent, Mohamed Traoré. 43-48 [doi]
- Innocent Until Proven Guilty (IUPG): Building Deep Learning Models with Embedded Robustness to Out-Of-Distribution ContentBrody Kutt, William Hewlett, Oleksii Starov, Yuchen Zhou. 49-55 [doi]
- SAFELearn: Secure Aggregation for private FEderated LearningHossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Helen Möllering, Thien Duc Nguyen, Phillip Rieger, Ahmad-Reza Sadeghi, Thomas Schneider 0003, Hossein Yalame, Shaza Zeitouni. 56-62 [doi]
- Applying Deep Learning to Combat Mass RobocallsSharbani Pandit, Jienan Liu, Roberto Perdisci, Mustaque Ahamad. 63-70 [doi]
- MMGuard: Automatically Protecting On-Device Deep Learning Models in Android AppsJiayi Hua, Yuanchun Li, Haoyu Wang 0001. 71-77 [doi]
- BODMAS: An Open Dataset for Learning based Temporal Analysis of PE MalwareLimin Yang, Arridhana Ciptadi, Ihar Laziuk, Ali Ahmadzadeh, Gang Wang 0011. 78-84 [doi]
- Binary Black-Box Attacks Against Static Malware Detectors with Reinforcement Learning in Discrete Action SpacesMohammadReza Ebrahimi, Jason Pacheco, Weifeng Li 0002, James Lee Hu, Hsinchun Chen. 85-91 [doi]
- Verbatim: A Verified Lexer GeneratorDerek Egolf, Sam Lasser, Kathleen Fisher. 92-100 [doi]
- Formal Language Theory for Practical Security - Extended Abstract -Andreas Jakoby, Jannis Leuther, Stefan Lucks. 101-110 [doi]
- Formal Synthesis of Filter Components for Use in Security-Enhancing Architectural TransformationsDavid S. Hardin, Konrad L. Slind. 111-120 [doi]
- Research Report: Building a File Observatory for Secure Parser DevelopmentTim Allison, Wayne Burke, Chris Mattmann, Anastasija Mensikova, Philip Southam, Ryan Stonebraker. 121-127 [doi]
- Research Report: Parsing PEGs with Length Fields in Software and HardwareZephyr S. Lucas, Joanna Y. Liu, Prashant Anantharaman, Sean W. Smith. 128-133 [doi]
- Formal Languages, Deep Learning, Topology and AlgebraicWord ProblemsJoshua Ackerman, George Cybenko. 134-141 [doi]
- Accessible Formal Methods for Verified Parser DevelopmentLetitia W. Li, Greg Eakman, Elias J. M. Garcia, Sam Atman. 142-151 [doi]
- Differential analysis of x86-64 instruction decodersWilliam Woodruff, Niki Carroll, Sebastiaan Peters. 152-161 [doi]
- Bohemia - A Validator for Parser FrameworksAnish Paranjpe, Gang Tan. 162-170 [doi]
- RL-GRIT: Reinforcement Learning for Grammar InferenceWalt Woods. 171-183 [doi]
- Looking for non-compliant documents using error messages from multiple parsersMichael Robinson. 184-193 [doi]
- Mechanized Type Safety for Gradual Information FlowTianyu Chen, Jeremy G. Siek. 194-206 [doi]
- Alexa in Phishingland: Empirical Assessment of Susceptibility to Phishing Pretexting in Voice Assistant EnvironmentsFilipo Sharevski, Peter Jachim. 207-213 [doi]
- BLEKeeper: Response Time Behavior Based Man-In-The-Middle Attack DetectionMuhammed Ali Yurdagul, Husrev Taha Sencar. 214-220 [doi]
- LIRA-V: Lightweight Remote Attestation for Constrained RISC-V DevicesCarlton Shepherd, Konstantinos Markantonakis, Georges-Axel Jaloyan. 221-227 [doi]
- HybriDiagnostics: Evaluating Security Issues in Hybrid SmartHome Companion AppsAbhinav Mohanty, Meera Sridhar. 228-234 [doi]
- On the Safety Implications of Misordered Events and Commands in IoT SystemsFurkan Göksel, Muslum Ozgur Ozmen, Michael Reeves, Basavesh Shivakumar, Z. Berkay Celik. 235-241 [doi]
- Demo: Attacking Multi-Sensor Fusion based Localization in High-Level Autonomous DrivingJunjie Shen 0001, Jun Yeon Won, Zeyuan Chen, Qi Alfred Chen. 242 [doi]
- Demo: Security of Camera-based Perception for Autonomous Driving under Adversarial AttackChristopher DiPalma, Ningfei Wang, Takami Sato, Qi Alfred Chen. 243 [doi]
- Demo: Security of Deep Learning based Automated Lane Centering under Physical-World AttackTakami Sato, Junjie Shen 0001, Ningfei Wang, Yunhan Jack Jia, Xue Lin, Qi Alfred Chen. 244 [doi]
- Demo: ROI Attacks on Traffic Light Detection in High-Level Autonomous DrivingKanglan Tang, Junjie Shen 0001, Qi Alfred Chen. 245 [doi]
- A Containerization-Based Backfit Approach for Industrial Control System ResiliencyJames Schaffter, Aviel Rubin, Lanier Watkins. 246-252 [doi]
- HIOA-CPS: Combining Hybrid Input-Output Automaton and Game Theory for Security Modeling of Cyber-Physical SystemsMustafa Abdallah, Sayan Mitra, Shreyas Sundaram, Saurabh Bagchi. 253-259 [doi]
- Protecting IoT Devices through Localized Detection of BGP Hijacks for Individual ThingsDongInn Kim, Vafa Andalibi, Linda Jean Camp. 260-267 [doi]
- Egocentric abstractions for modeling and safety verification of distributed cyber-physical systemsSung Woo Jeon, Sayan Mitra. 268-276 [doi]
- DeepFake-o-meter: An Open Platform for DeepFake DetectionYuezun Li, Cong Zhang, Pu Sun, Lipeng Ke, Yan Ju, Honggang Qi, Siwei Lyu. 277-281 [doi]
- User Identification in Dynamic Web Traffic via Deep Temporal FeaturesJihye Kim, John V. Monaco. 282-290 [doi]
- Nomen est Omen - The Role of Signatures in Ascribing Email Author Identity with Transformer Neural NetworksSudarshan Srinivasan, Edmon Begoli, Maria Mahbub, Kathryn Knight. 291-297 [doi]
- Protected Process Light is not Protected: MemoryRanger Fills The Gap AgainIgor Korkin. 298-308 [doi]
- Machine Learning Based Approach for the Automated Mapping of Discovered Vulnerabilities to Adversial TacticsYosra Lakhdhar, Slim Rekhis. 309-317 [doi]
- Forensic Analysis of Fitbit Versa: Android vs iOSJoseph Williams, Áine MacDermott, Kellyann Stamp, Farkhund Iqbal. 318-326 [doi]
- BADUSB-C: Revisiting BadUSB with Type-CHongyi Lu, Yechang Wu, Shuqing Li, You Lin, Chaozu Zhang, Fengwei Zhang. 327-338 [doi]
- BlueMirror: Reflections on Bluetooth Pairing and Provisioning ProtocolsTristan Claverie, José Lopes-Esteves. 339-351 [doi]
- An In-memory Embedding of CPython for Offensive UseAteeq Sharfuddin, Brian Chapman, Chris Balles. 352-360 [doi]
- Evaluation of the Executional Power in Windows using Return Oriented ProgrammingDaniel Uroz, Ricardo J. Rodríguez. 361-372 [doi]
- Identifying Valuable Pointers in Heap DataJames Roney, Troy Appel, Prateek Pinisetti, James Mickens. 373-382 [doi]
- Empirical Study of PLC Authentication Protocols in Industrial Control SystemsAdeen Ayub, Hyunguk Yoo, Irfan Ahmed. 383-397 [doi]
- Your Censor is My Censor: Weaponizing Censorship Infrastructure for Availability AttacksKevin Bock 0001, Pranav Bharadwaj, Jasraj Singh, Dave Levin. 398-409 [doi]
- Zero Conf Protocols and their numerous Man in the Middle (MITM) AttacksDhia Farrah, Marc Dacier. 410-421 [doi]
- A Low-Cost Attack against the hCaptcha SystemMd Imran Hossen, Xiali Hei. 422-431 [doi]
- The Remote on the Local: Exacerbating Web Attacks Via Service Workers CachesMarco Squarcina, Stefano Calzavara, Matteo Maffei. 432-443 [doi]
- SEVerity: Code Injection Attacks against Encrypted Virtual MachinesMathias Morbitzer, Sergej Proskurin, Martin Radev, Marko Dorfhuber, Erick Quintanar Salas. 444-455 [doi]
- undeSErVed trust: Exploiting Permutation-Agnostic Remote AttestationLuca Wilke, Jan Wichelmann, Florian Sieck, Thomas Eisenbarth 0001. 456-466 [doi]