Abstract is missing.
- A Study of the Feasibility of Co-located App Attacks against BLE and a Large-Scale Analysis of the Current Application-Layer Security LandscapePallavi Sivakumaran, Jorge Blasco. 1-18 [doi]
- The CrossPath Attack: Disrupting the SDN Control Channel via Shared LinksJiahao Cao, Qi Li 0002, Renjie Xie, Kun Sun, Guofei Gu, Mingwei Xu, Yuan Yang 0001. 19-36 [doi]
- A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct LinkMilan Stute, Sashank Narain, Alex Mariotto, Alexander Heinrich, David Kreitschmann, Guevara Noubir, Matthias Hollick. 37-54 [doi]
- Hiding in Plain Signal: Physical Signal Overshadowing Attack on LTEHojoon Yang, Sangwook Bae, Mincheol Son, Hongil Kim, Song Min Kim, Yongdae Kim. 55-72 [doi]
- UWB-ED: Distance Enlargement Attack Detection in Ultra-WidebandMridula Singh, Patrick Leu, AbdelRahman Abdou, Srdjan Capkun. 73-88 [doi]
- Computer Security and Privacy in the Interactions Between Victim Service Providers and Human Trafficking SurvivorsChristine Chen, Nicola Dell, Franziska Roesner. 89-104 [doi]
- Clinical Computer Security for Victims of Intimate Partner ViolenceSam Havron, Diana Freed, Rahul Chatterjee 0001, Damon McCoy, Nicola Dell, Thomas Ristenpart. 105-122 [doi]
- Evaluating the Contextual Integrity of Privacy Regulation: Parents' IoT Toy Privacy Norms Versus COPPANoah Apthorpe, Sarah Varghese, Nick Feamster. 123-140 [doi]
- Secure Multi-User Content Sharing for Augmented Reality ApplicationsKimberly Ruth, Tadayoshi Kohno, Franziska Roesner. 141-158 [doi]
- Understanding and Improving Security and Privacy in Multi-User Smart Homes: A Design Exploration and In-Home User StudyEric Zeng, Franziska Roesner. 159-176 [doi]
- PAC it up: Towards Pointer Integrity using ARM Pointer AuthenticationHans Liljestrand, Thomas Nyman, Kui Wang, Carlos Chinea Perez, Jan-Erik Ekberg, N. Asokan. 177-194 [doi]
- Origin-sensitive Control Flow IntegrityMustakimur Khandaker, Wenqing Liu, Abu-Naser, Zhi Wang 0004, Jie Yang. 195-211 [doi]
- HardFails: Insights into Software-Exploitable Hardware BugsGhada Dessouky, David Gens, Patrick Haney, Garrett Persyn, Arun K. Kanuparthi, Hareesh Khattri, Jason M. Fung, Ahmad-Reza Sadeghi, Jeyavijayan Rajendran. 213-230 [doi]
- uXOM: Efficient eXecute-Only Memory on ARM Cortex-MDonghyun Kwon, Jangseop Shin, Giyeol Kim, Byoungyoung Lee, Yeongpil Cho, Yunheung Paek. 231-247 [doi]
- A Systematic Evaluation of Transient Execution Attacks and DefensesClaudio Canella, Jo Van Bulck, Michael Schwarz 0001, Moritz Lipp, Benjamin von Berg, Philipp Ortner, Frank Piessens, Dmitry Evtyushkin, Daniel Gruss. 249-266 [doi]
- The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural NetworksNicholas Carlini, Chang Liu 0021, Úlfar Erlingsson, Jernej Kos, Dawn Song. 267-284 [doi]
- Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved FeaturesLiang Tong, Bo Li 0026, Chen Hajaj, Chaowei Xiao, Ning Zhang 0017, Yevgeniy Vorobeychik. 285-302 [doi]
- ALOHA: Auxiliary Loss Optimization for Hypothesis AugmentationEthan M. Rudd, Felipe N. Ducau, Cody Wild, Konstantin Berlin, Richard E. Harang. 303-320 [doi]
- Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning AttacksAmbra Demontis, Marco Melis, Maura Pintor, Matthew Jagielski, Battista Biggio, Alina Oprea, Cristina Nita-Rotaru, Fabio Roli. 321-338 [doi]
- Stack Overflow Considered Helpful! Deep Learning Security Nudges Towards Stronger CryptographyFelix Fischer, Huang Xiao, Ching-yu Kao, Yannick Stachelscheid, Benjamin Johnson, Danial Razar, Paul Fawkesley, Nat Buckley, Konstantin Böttinger, Paul Muntean, Jens Grossklags. 339-356 [doi]
- Wireless Attacks on Aircraft Instrument Landing SystemsHarshad Sathaye, Domien Schepers, Aanjhan Ranganathan, Guevara Noubir. 357-372 [doi]
- Please Pay Inside: Evaluating Bluetooth-based Detection of Gas Pump SkimmersNishant Bhaskar, Maxwell Bland, Kirill Levchenko, Aaron Schulman. 373-388 [doi]
- CANvas: Fast and Inexpensive Automotive Network MappingSekar Kulandaivel, Tushar Goyal, Arnav Kumar Agrawal, Vyas Sekar. 389-405 [doi]
- Losing the Car Keys: Wireless PHY-Layer Insecurity in EV ChargingRichard Baker 0008, Ivan Martinovic. 407-424 [doi]
- RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through Control-Guided TestingTaeGyu Kim, Chung Hwan Kim, Junghwan Rhee, Fan Fei, Zhan Tu, Gregory Walkup, Xiangyu Zhang 0001, Xinyan Deng, Dongyan Xu. 425-442 [doi]
- Seeing is Not Believing: Camouflage Attacks on Image Scaling AlgorithmsQixue Xiao, Yufei Chen, Chao Shen, Yu Chen 0004, Kang Li 0001. 443-460 [doi]
- CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep LearningYisroel Mirsky, Tom Mahler, Ilan Shelef, Yuval Elovici. 461-478 [doi]
- Misleading Authorship Attribution of Source Code using Adversarial LearningErwin Quiring, Alwin Maier, Konrad Rieck. 479-496 [doi]
- Terminal Brain Damage: Exposing the Graceless Degradation in Deep Neural Networks Under Hardware Fault AttacksSanghyun Hong, Pietro Frigo, Yigitcan Kaya, Cristiano Giuffrida, Tudor Dumitras. 497-514 [doi]
- CSI NN: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side ChannelLejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek. 515-532 [doi]
- simTPM: User-centric TPM for Mobile DevicesDhiman Chakraborty, Lucjan Hanzlik, Sven Bugiel. 533-550 [doi]
- The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile BackendsOmar Alrawi, Chaoshun Zuo, Ruian Duan, Ranjita Pai Kasturi, Zhiqiang Lin, Brendan Saltaformaggio. 551-566 [doi]
- EnTrust: Regulating Sensor Access by Cooperating Programs via Delegation GraphsGiuseppe Petracca, Yuqiong Sun, Ahmad Atamli-Reineh, Patrick D. McDaniel, Jens Grossklags, Trent Jaeger. 567-584 [doi]
- PolicyLint: Investigating Internal Privacy Policy Contradictions on Google PlayBenjamin Andow, Samin Yaseer Mahmud, Wenyu Wang, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, Tao Xie 0001. 585-602 [doi]
- 50 Ways to Leak Your Data: An Exploration of Apps' Circumvention of the Android Permissions SystemJoel Reardon, Álvaro Feal, Primal Wijesekera, Amit Elazari Bar On, Narseo Vallina-Rodriguez, Serge Egelman. 603-620 [doi]
- SPOILER: Speculative Load Hazards Boost Rowhammer and Cache AttacksSaad Islam, Ahmad Moghimi, Ida Bruhns, Moritz Krebbel, Berk Gülmezoglu, Thomas Eisenbarth 0001, Berk Sunar. 621-637 [doi]
- Robust Website Fingerprinting Through the Cache Occupancy ChannelAnatoly Shusterman, Lachlan Kang, Yarden Haskal, Yosef Meltser, Prateek Mittal, Yossi Oren, Yuval Yarom. 639-656 [doi]
- Identifying Cache-Based Side Channels through Secret-Augmented Abstract InterpretationShuai Wang 0011, Yuyan Bao, Xiao Liu, Pei Wang 0007, Danfeng Zhang, Dinghao Wu. 657-674 [doi]
- ScatterCache: Thwarting Cache Attacks via Cache Set RandomizationMario Werner, Thomas Unterluggauer, Lukas Giner, Michael Schwarz 0001, Daniel Gruss, Stefan Mangard. 675-692 [doi]
- Pythia: Remote Oracles for the MassesShin-Yeh Tsai, Mathias Payer, Yiying Zhang. 693-710 [doi]
- HideMyApp: Hiding the Presence of Sensitive Apps on AndroidAnh Pham, Italo Dacosta, Eleonora Losiouk, John Stephan, Kévin Huguenin, Jean-Pierre Hubaux. 711-728 [doi]
- TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and TimeFeargus Pendlebury, Fabio Pierazzi, Roberto Jordaney, Johannes Kinder, Lorenzo Cavallaro. 729-746 [doi]
- Devils in the Guidance: Predicting Logic Vulnerabilities in Payment Syndication Services through Automated Documentation AnalysisYi Chen, Luyi Xing, Yue Qin, Xiaojing Liao, Xiaofeng Wang 0001, Kai Chen 0012, Wei Zou. 747-764 [doi]
- Understanding iOS-based Crowdturfing Through Hidden UI AnalysisYeonjoon Lee, Xueqiang Wang, Kwangwuk Lee, Xiaojing Liao, Xiaofeng Wang 0001, Tongxin Li, Xianghang Mi. 765-781 [doi]
- BITE: Bitcoin Lightweight Client Privacy using Trusted ExecutionSinisa Matetic, Karl Wüst, Moritz Schneider, Kari Kostiainen, Ghassan Karame, Srdjan Capkun. 783-800 [doi]
- FastKitten: Practical Smart Contracts on BitcoinPoulami Das 0003, Lisa Eckey, Tommaso Frassetto, David Gens, Kristina Hostáková, Patrick Jauernig, Sebastian Faust, Ahmad-Reza Sadeghi. 801-818 [doi]
- StrongChain: Transparent and Collaborative Proof-of-Work ConsensusPawel Szalachowski, Daniël Reijsbergen, Ivan Homoliak, Siwei Sun. 819-836 [doi]
- Tracing Transactions Across Cryptocurrency LedgersHaaroon Yousaf, George Kappos, Sarah Meiklejohn. 837-850 [doi]
- Reading the Tea leaves: A Comparative Analysis of Threat IntelligenceVector Guo Li, Matthew Dunn, Paul Pearce, Damon McCoy, Geoffrey M. Voelker, Stefan Savage. 851-867 [doi]
- Towards the Detection of Inconsistencies in Public Security Vulnerability ReportsYing Dong, Wenbo Guo, Yueqi Chen, Xinyu Xing, Yuqing Zhang, Gang Wang 0011. 869-885 [doi]
- Understanding and Securing Device Vulnerabilities through Automated Bug Report AnalysisXuan Feng, Xiaojing Liao, Xiaofeng Wang 0001, Haining Wang, Qiang Li 0007, Kai Yang, Hongsong Zhu, Limin Sun. 887-903 [doi]
- ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the Evolution of CyberattacksYun Shen, Gianluca Stringhini. 905-921 [doi]
- Leaky Images: Targeted Privacy Attacks in the WebCristian-Alexandru Staicu, Michael Pradel. 923-939 [doi]
- All Your Clicks Belong to Me: Investigating Click Interception on the WebMingxue Zhang, Wei Meng, Sangho Lee 0001, Byoungyoung Lee, Xinyu Xing. 941-957 [doi]
- What Are You Searching For? A Remote Keylogging Attack on Search Engine AutocompleteJohn V. Monaco. 959-976 [doi]
- Iframes/Popups Are Dangerous in Mobile WebView: Studying and Mitigating Differential Context VulnerabilitiesGuangliang Yang, Jeff Huang 0001, Guofei Gu. 977-994 [doi]
- Small World with High Risks: A Study of Security Threats in the npm EcosystemMarkus Zimmermann, Cristian-Alexandru Staicu, Cam Tenny, Michael Pradel. 995-1010 [doi]
- "Johnny, you are fired!" - Spoofing OpenPGP and S/MIME Signatures in EmailsJens Müller 0007, Marcus Brinkmann, Damian Poddebniak, Hanno Böck, Sebastian Schinzel, Juraj Somorovsky, Jörg Schwenk. 1011-1028 [doi]
- Scalable Scanning and Automatic Classification of TLS Padding Oracle VulnerabilitiesRobert Merget, Juraj Somorovsky, Nimrod Aviram, Craig Young, Janis Fliegenschmidt, Jörg Schwenk, Yuval Shavitt. 1029-1046 [doi]
- The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDRDaniele Antonioli, Nils Ole Tippenhauer, Kasper Bonne Rasmussen. 1047-1061 [doi]
- From IP ID to Device ID and KASLR BypassAmit Klein, Benny Pinkas. 1063-1080 [doi]
- When the Signal is in the Noise: Exploiting Diffix's Sticky NoiseAndrea Gadotti, Florimond Houssiau, Luc Rocher, Benjamin Livshits, Yves-Alexandre de Montjoye. 1081-1098 [doi]
- FIRM-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process EmulationYaowen Zheng, Ali Davanian, Heng Yin, Chengyu Song, Hongsong Zhu, Limin Sun. 1099-1114 [doi]
- Not Everything is Dark and Gloomy: Power Grid Protections Against IoT Demand AttacksBing Huang, Alvaro A. Cárdenas, Ross Baldick. 1115-1132 [doi]
- Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home PlatformsWei Zhou 0026, Yan Jia, Yao Yao, Lipeng Zhu, Le Guan, Yuhang Mao, Peng Liu 0005, Yuqing Zhang. 1133-1150 [doi]
- Looking from the Mirror: Evaluating IoT Device Security through Mobile Companion AppsXueqiang Wang, Yuqiong Sun, Susanta Nanda, Xiaofeng Wang 0001. 1151-1167 [doi]
- All Things Considered: An Analysis of IoT Devices on Home NetworksDeepak Kumar, Kelly Shen, Benton Case, Deepali Garg, Galina Alperovich, Dmitry Kuznetsov, Rajarshi Gupta, Zakir Durumeric. 1169-1185 [doi]
- KEPLER: Facilitating Control-flow Hijacking Primitive Evaluation for Linux Kernel VulnerabilitiesWei Wu, Yueqi Chen, Xinyu Xing, Wei Zou. 1187-1204 [doi]
- PeX: A Permission Check Analysis Framework for Linux KernelTong Zhang, Wenbo Shen, Dongyoon Lee, Changhee Jung, Ahmed M. Azab, Ruowen Wang. 1205-1220 [doi]
- ERIM: Secure, Efficient In-process Isolation with Protection Keys (MPK)Anjo Vahldiek-Oberwagner, Eslam Elnikety, Nuno O. Duarte, Michael Sammler, Peter Druschel, Deepak Garg 0001. 1221-1238 [doi]
- SafeHidden: An Efficient and Secure Information Hiding Technique Using Re-randomizationZhe Wang, Chenggang Wu, Yinqian Zhang, Bowen Tang, Pen-Chung Yew, Mengyao Xie, Yuanming Lai, Yan Kang, Yueqiang Cheng, Zhiping Shi. 1239-1256 [doi]
- Exploiting Unprotected I/O Operations in AMD's Secure Encrypted VirtualizationMengyuan Li, Yinqian Zhang, Zhiqiang Lin, Yan Solihin. 1257-1272 [doi]
- Detecting and Characterizing Lateral Phishing at ScaleGrant Ho, Asaf Cidon, Lior Gavish, Marco Schweighauser, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David A. Wagner 0001. 1273-1290 [doi]
- High Precision Detection of Business Email CompromiseAsaf Cidon, Lior Gavish, Itay Bleier, Nadia Korshun, Marco Schweighauser, Alexey Tsitkin. 1291-1307 [doi]
- Cognitive Triaging of Phishing AttacksAmber van der Heijden, Luca Allodi. 1309-1326 [doi]
- Users Really Do Answer Telephone ScamsHuahong Tu, Adam Doupé, Ziming Zhao 0001, Gail-Joon Ahn. 1327-1340 [doi]
- Platforms in Everything: Analyzing Ground-Truth Data on the Anatomy and Economics of Bullet-Proof HostingArman Noroozian, Jan Koenders, Eelco van Veldhuizen, Carlos Hernandez Gañán, Sumayah A. Alrwais, Damon McCoy, Michel van Eeten. 1341-1356 [doi]
- Protecting Cloud Virtual Machines from Hypervisor and Host Operating System ExploitsShih-wei Li, John S. Koh, Jason Nieh. 1357-1374 [doi]
- WAVE: A Decentralized Authorization Framework with Transitive DelegationMichael P. Andersen, Sam Kumar, Moustafa AbdelBaky, Gabe Fierro, John Kolb, Hyung-Sin Kim, David E. Culler, Raluca Ada Popa. 1375-1392 [doi]
- in-toto: Providing farm-to-table guarantees for bits and bytesSantiago Torres-Arias, Hammad Afzali, Trishank Karthik Kuppusamy, Reza Curtmola, Justin Cappos. 1393-1410 [doi]
- IODINE: Verifying Constant-Time Execution of HardwareKlaus von Gleissenthall, Rami Gökhan Kici, Deian Stefan, Ranjit Jhala. 1411-1428 [doi]
- VRASED: A Verified Hardware/Software Co-Design for Remote AttestationIvan De Oliveira Nunes, Karim Eldefrawy, Norrathep Rattanavipanon, Michael Steiner, Gene Tsudik. 1429-1446 [doi]
- Mobile Private Contact Discovery at ScaleDaniel Kales, Christian Rechberger, Thomas Schneider 0003, Matthias Senker, Christian Weinert. 1447-1464 [doi]
- EverParse: Verified Secure Zero-Copy Parsers for Authenticated Message FormatsTahina Ramananandro, Antoine Delignat-Lavaud, Cédric Fournet, Nikhil Swamy, Tej Chajed, Nadim Kobeissi, Jonathan Protzenko. 1465-1482 [doi]
- Blind Bernoulli Trials: A Noninteractive Protocol For Hidden-Weight Coin FlipsR. Joseph Connor, Max Schuchard. 1483-1500 [doi]
- XONN: XNOR-based Oblivious Deep Neural Network InferenceM. Sadegh Riazi, Mohammad Samragh, Hao Chen 0030, Kim Laine, Kristin E. Lauter, Farinaz Koushanfar. 1501-1518 [doi]
- JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoTSam Kumar, Yuncong Hu, Michael P. Andersen, Raluca Ada Popa, David E. Culler. 1519-1536 [doi]
- Birthday, Name and Bifacial-security: Understanding Passwords of Chinese Web UsersDing Wang 0002, Ping Wang 0003, Debiao He, Yuan Tian. 1537-1555 [doi]
- Protecting accounts from credential stuffing with password breach alertingKurt Thomas, Jennifer Pullman, Kevin Yeo, Ananth Raghunathan, Patrick Gage Kelley, Luca Invernizzi, Borbala Benko, Tadek Pietraszek, Sarvar Patel, Dan Boneh, Elie Bursztein. 1556-1571 [doi]
- Probability Model Transforming Encoders Against Encoding AttacksHaibo Cheng, Zhixiong Zheng, Wenting Li, Ping Wang 0003, Chao-Hsien Chu. 1573-1590 [doi]
- The Art of The Scam: Demystifying Honeypots in Ethereum Smart ContractsChristof Ferreira Torres, Mathis Steichen, Radu State. 1591-1607 [doi]
- The Anatomy of a Cryptocurrency Pump-and-Dump SchemeJiahua Xu, Benjamin Livshits. 1609-1625 [doi]
- Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet ScaleHugo L. J. Bijmans, Tim M. Booij, Christian Doerr. 1627-1644 [doi]
- Rendered Private: Making GLSL Execution Uniform to Prevent WebGL-based Browser FingerprintingShujiang Wu, Song Li, Yinzhi Cao, Ningfei Wang. 1645-1660 [doi]
- Site Isolation: Process Separation for Web Sites within the BrowserCharles Reis, Alexander Moshchuk, Nasko Oskov. 1661-1678 [doi]
- Everyone is Different: Client-side Diversification for Defending Against Extension FingerprintingErik Trickel, Oleksii Starov, Alexandros Kapravelos, Nick Nikiforakis, Adam Doupé. 1679-1696 [doi]
- Less is More: Quantifying the Security Benefits of Debloating Web ApplicationsBabak Amin Azad, Pierre Laperdrix, Nick Nikiforakis. 1697-1714 [doi]
- The Web's Identity Crisis: Understanding the Effectiveness of Website Identity IndicatorsChristopher Thompson, Martin Shelton, Emily Stark, Max Walker, Emily Schechter, Adrienne Porter Felt. 1715-1732 [doi]
- RAZOR: A Framework for Post-deployment Software DebloatingChenxiong Qian, Hong Hu, Mansour Alharthi, Simon Pak Ho Chung, Taesoo Kim, Wenke Lee. 1733-1750 [doi]
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic TechniquesFabio Pagani, Davide Balzarotti. 1751-1768 [doi]
- Detecting Missing-Check Bugs via Semantic- and Context-Aware Criticalness and Constraints InferencesKangjie Lu, Aditya Pakki, Qiushi Wu. 1769-1786 [doi]
- DEEPVSA: Facilitating Value-set Analysis with Deep Learning for Postmortem Program AnalysisWenbo Guo, Dongliang Mu, Xinyu Xing, Min Du, Dawn Song. 1787-1804 [doi]
- CONFIRM: Evaluating Compatibility and Relevance of Control-flow Integrity Protections for Modern SoftwareXiaoyang Xu, Masoud Ghaffarinia, Wenhao Wang, Kevin W. Hamlen, Zhiqiang Lin. 1805-1821 [doi]
- Point Break: A Study of Bandwidth Denial-of-Service Attacks against TorRob Jansen, Tavish Vaidya, Micah Sherr. 1823-1840 [doi]
- No Right to Remain Silent: Isolating Malicious MixesHemi Leibowitz, Ania M. Piotrowska, George Danezis, Amir Herzberg. 1841-1858 [doi]
- On (The Lack Of) Location Privacy in Crowdsourcing ApplicationsSpyros Boukoros, Mathias Humbert, Stefan Katzenbeisser 0001, Carmela Troncoso. 1859-1876 [doi]
- Utility-Optimized Local Differential Privacy Mechanisms for Distribution EstimationTakao Murakami, Yusuke Kawamoto 0001. 1877-1894 [doi]
- Evaluating Differentially Private Machine Learning in PracticeBargav Jayaraman, David Evans 0001. 1895-1912 [doi]
- Fuzzification: Anti-Fuzzing TechniquesJinho Jung, Hong Hu, David Solodukhin, Daniel Pagan, Kyu Hyung Lee, Taesoo Kim. 1913-1930 [doi]
- AntiFuzz: Impeding Fuzzing Audits of Binary ExecutablesEmre Güler, Cornelius Aschermann, Ali Abbasi, Thorsten Holz. 1931-1947 [doi]
- MOPT: Optimized Mutation Scheduling for FuzzersChenyang Lyu, Shouling Ji, Chao Zhang, Yuwei Li, Wei-Han Lee, Yu Song, Raheem Beyah. 1949-1966 [doi]
- EnFuzz: Ensemble Fuzzing with Seed Synchronization among Diverse FuzzersYuanliang Chen, Yu Jiang 0001, Fuchen Ma, Jie Liang, Mingzhe Wang, Chijin Zhou, Xun Jiao, Zhuo Su. 1967-1983 [doi]
- GRIMOIRE: Synthesizing Structure while FuzzingTim Blazytko, Cornelius Aschermann, Moritz Schlögel, Ali Abbasi, Sergej Schumilo, Simon Wörner, Thorsten Holz. 1985-2002 [doi]