


default search action
25th CCS 2018: Toronto, ON, Canada
- David Lie, Mohammad Mannan, Michael Backes, XiaoFeng Wang:

Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, Toronto, ON, Canada, October 15-19, 2018. ACM 2018, ISBN 978-1-4503-5693-0
Keynote
- Helen Nissenbaum:

Achieving Meaningful Privacy in Digital Systems. 1-2
Session 1A: SDN 1
- Haopei Wang, Guangliang Yang, Phakpoom Chinprutthiwong, Lei Xu, Yangyong Zhang, Guofei Gu:

Towards Fine-grained Network Security Forensics and Diagnosis in the SDN Era. 3-16 - Hongda Li, Hongxin Hu, Guofei Gu, Gail-Joon Ahn

, Fuqiang Zhang:
vNIDS: Towards Elastic Security with Safe and Efficient Virtualization of Network Intrusion Detection Systems. 17-34
Session 1B: Privacy
- Payman Mohassel, Peter Rindal:

ABY3: A Mixed Protocol Framework for Machine Learning. 35-52 - Véronique Cortier, Joseph Lallemand:

Voting: You Can't Have Privacy without Individual Verifiability. 53-66
Session 1C: Smart Contracts
- Petar Tsankov, Andrei Marian Dan, Dana Drachsler-Cohen, Arthur Gervais, Florian Bünzli, Martin T. Vechev:

Securify: Practical Security Analysis of Smart Contracts. 67-82 - Massimo Bartoletti, Roberto Zunino

:
BitML: A Calculus for Bitcoin Smart Contracts. 83-100
Session 1D: ML for Deanonymization
- Mohammed Abuhamad

, Tamer AbuHmed
, Aziz Mohaisen, DaeHun Nyang:
Large-Scale and Language-Oblivious Code Authorship Identification. 101-114 - Nestor Hernandez, Mizanur Rahman, Ruben Recabarren, Bogdan Carbunar:

Fraud De-Anonymization for Fun and Profit. 115-130
Session 2A: Side Channels
- Young-joo Shin

, Hyung Chan Kim, Dokeun Kwon, Ji-Hoon Jeong, Junbeom Hur:
Unveiling Hardware-based Data Prefetcher, a Hidden Source of Information Leakage. 131-145 - Mohammad A. Islam

, Shaolei Ren
:
Ohm's Law in Data Centers: A Voltage Side Channel for Timing Power Attacks. 146-162 - Giovanni Camurati

, Sebastian Poeplau, Marius Muench
, Tom Hayes, Aurélien Francillon:
Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers. 163-177 - Jo Van Bulck

, Frank Piessens, Raoul Strackx:
Nemesis: Studying Microarchitectural Timing Leaks in Rudimentary CPU Interrupt Logic. 178-195
Session 2B: Differential Privacy 1
- Mehmet Emre Gursoy, Ling Liu, Stacey Truex, Lei Yu

, Wenqi Wei
:
Utility-Aware Synthesis of Differentially Private and Attack-Resilient Location Traces. 196-211 - Zhikun Zhang, Tianhao Wang

, Ninghui Li, Shibo He, Jiming Chen:
CALM: Consistent Adaptive Local Marginal for Marginal Release under Local Differential Privacy. 212-229 - Thee Chanyaswad, Alex Dytso

, H. Vincent Poor
, Prateek Mittal:
MVG Mechanism: Differential Privacy under Matrix-Valued Query. 230-246 - Sebastian Meiser, Esfandiar Mohammadi:

Tight on Budget?: Tight Bounds for r-Fold Approximate Differential Privacy. 247-264
Session 2C: Crypto Attacks
- Shaanan N. Cohney

, Matthew D. Green, Nadia Heninger:
Practical State Recovery Attacks against Legacy RNG Implementations. 265-280 - Martin R. Albrecht, Jake Massimo, Kenneth G. Paterson, Juraj Somorovsky:

Prime and Prejudice: Primality Testing Under Adversarial Conditions. 281-298 - Mathy Vanhoef

, Frank Piessens:
Release the Kraken: New KRACKs in the 802.11 Standard. 299-314 - Paul Grubbs, Marie-Sarah Lacharité, Brice Minaud, Kenneth G. Paterson:

Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries. 315-331
Session 2D: ML 1
- Guixin Ye, Zhanyong Tang, Dingyi Fang, Zhanxing Zhu, Yansong Feng, Pengfei Xu, Xiaojiang Chen, Zheng Wang

:
Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach. 332-348 - Yujie Ji, Xinyang Zhang

, Shouling Ji, Xiapu Luo, Ting Wang:
Model-Reuse Attacks on Deep Learning Systems. 349-363 - Wenbo Guo

, Dongliang Mu, Jun Xu, Purui Su, Gang Wang, Xinyu Xing:
LEMNA: Explaining Deep Learning based Security Applications. 364-379 - Kihong Heo, Woosuk Lee, Pardis Pashakhanloo, Mayur Naik:

Effective Program Debloating via Reinforcement Learning. 380-394
Session 3A: Binary Analysis
- Binlin Cheng, Jiang Ming, Jianming Fu, Guojun Peng, Ting Chen, Xiaosong Zhang, Jean-Yves Marion:

Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking with Orders-of-Magnitude Performance Boost. 395-411 - Juanru Li, Zhiqiang Lin, Juan Caballero, Yuanyuan Zhang, Dawu Gu:

K-Hunt: Pinpointing Insecure Cryptographic Keys from Execution Traces. 412-425 - Edward J. Schwartz, Cory F. Cohen, Michael Duggan, Jeffrey Gennari, Jeffrey S. Havrilla, Charles Hines:

Using Logic Programming to Recover C++ Classes and Methods from Compiled Executables. 426-441 - Dongpeng Xu

, Jiang Ming, Yu Fu, Dinghao Wu:
VMHunt: A Verifiable Approach to Partially-Virtualized Binary Code Simplification. 442-458
Session 3B: Differential Privacy 2
- Meisam Mohammady, Lingyu Wang, Yuan Hong

, Habib Louafi, Makan Pourzandi, Mourad Debbabi
:
Preserving Both Privacy and Utility in Network Trace Anonymization. 459-474 - Zeyu Ding

, Yuxin Wang
, Guanhong Wang, Danfeng Zhang
, Daniel Kifer
:
Detecting Violations of Differential Privacy. 475-489 - Sahar Mazloom, S. Dov Gordon:

Secure Computation with Differentially Private Access Patterns. 490-507 - Benjamin Bichsel, Timon Gehr, Dana Drachsler-Cohen, Petar Tsankov, Martin T. Vechev:

DP-Finder: Finding Differential Privacy Violations by Sampling and Optimization. 508-524
Session 3C: Crypto: ZKPs and Lattices
- Jonathan Katz, Vladimir Kolesnikov, Xiao Wang

:
Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum Signatures. 525-537 - Gilles Barthe

, Xiong Fan, Joshua Gancher, Benjamin Grégoire, Charlie Jacomme
, Elaine Shi:
Symbolic Proofs for Lattice-Based Cryptography. 538-555 - Rosario Gennaro, Michele Minelli, Anca Nitulescu, Michele Orrù

:
Lattice-Based zk-SNARKs from Square Span Programs. 556-573 - Rafaël del Pino, Vadim Lyubashevsky, Gregor Seiler:

Lattice-Based Group Signatures and Zero-Knowledge Proofs of Automorphism Stability. 574-591
Session 3D: ML 2
- Yun Shen, Enrico Mariconti

, Pierre-Antoine Vervier, Gianluca Stringhini:
Tiresias: Predicting Security Events Through Deep Learning. 592-605 - Wei Song, Heng Yin

, Chang Liu, Dawn Song:
DeepMem: Learning Graph Neural Network Models for Fast and Robust Memory Forensic Analysis. 606-618 - Karan Ganju, Qi Wang, Wei Yang, Carl A. Gunter, Nikita Borisov

:
Property Inference Attacks on Fully Connected Neural Networks using Permutation Invariant Representations. 619-633 - Milad Nasr, Reza Shokri

, Amir Houmansadr:
Machine Learning with Membership Privacy using Adversarial Regularization. 634-646
Keynote
- Shai Halevi:

Advanced Cryptography: Promise and Challenges. 647
Session 4A: SDN 2
- Benjamin E. Ujcich

, Samuel Jero, Anne Edmundson, Qi Wang, Richard Skowyra, James Landry, Adam Bates, William H. Sanders, Cristina Nita-Rotaru, Hamed Okhravi
:
Cross-App Poisoning in Software-Defined Networking. 648-663 - Vaibhav Hemant Dixit, Adam Doupé, Yan Shoshitaishvili, Ziming Zhao

, Gail-Joon Ahn
:
AIM-SDN: Attacking Information Mismanagement in SDN-datastores. 664-676
Session 4B: Secure Computation 1
- Megha Byali, Arun Joseph

, Arpita Patra, Divya Ravi
:
Fast Secure Computation for Small Population over the Internet. 677-694 - Assi Barak, Martin Hirt, Lior Koskas, Yehuda Lindell

:
An End-to-End System for Large Scale P2P MPC-as-a-Service and Low-Bandwidth MPC for Weak Participants. 695-712
Session 4C: Blockchain 1
- Itay Tsabary, Ittay Eyal:

The Gap Game. 713-728 - Lucianna Kiffer, Rajmohan Rajaraman, Abhi Shelat:

A Better Method to Analyze Blockchain Consistency. 729-744
Session 4D: Encrypted Search & Computation 1
- Shangqi Lai

, Sikhar Patranabis, Amin Sakzad
, Joseph K. Liu, Debdeep Mukhopadhyay, Ron Steinfeld, Shifeng Sun, Dongxi Liu, Cong Zuo:
Result Pattern Hiding Searchable Encryption for Conjunctive Queries. 745-762 - Shifeng Sun, Xingliang Yuan, Joseph K. Liu, Ron Steinfeld, Amin Sakzad

, Viet Vo, Surya Nepal
:
Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption. 763-780
Session 5A: Cyberphysical Systems
- Marcel Kneib, Christopher Huth:

Scission: Signal Characteristic-Based Sender Identification and Intrusion Detection in Automotive Networks. 787-800 - Hongjun Choi

, Wen-Chuan Lee, Yousra Aafer, Fan Fei, Zhan Tu
, Xiangyu Zhang, Dongyan Xu, Xinyan Deng:
Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach. 801-816 - Wissam Aoudi

, Mikel Iturbe
, Magnus Almgren
:
Truth Will Out: Departure-Based Process-Level Detection of Stealthy Attacks on Control Systems. 817-831 - Wenbo Ding, Hongxin Hu:

On the Safety of IoT Device Physical Interaction Control. 832-846
Session 5B: Secure Computation 2
- Niklas Büscher, Daniel Demmler, Stefan Katzenbeisser, David Kretzmer, Thomas Schneider

:
HyCC: Compilation of Hybrid Protocols for Practical Secure Computation. 847-861 - Ruiyu Zhu, Darion Cassel, Amr Sabry

, Yan Huang:
NANOPI: Extreme-Scale Actively-Secure Multi-Party Computation. 862-879 - Toshinori Araki, Assi Barak, Jun Furukawa

, Marcel Keller
, Yehuda Lindell
, Kazuma Ohara
, Hikaru Tsuchida
:
Generalizing the SPDZ Compiler For Other Protocols. 880-895 - Elette Boyle, Geoffroy Couteau

, Niv Gilboa
, Yuval Ishai:
Compressing Vector OLE. 896-912
Session 5C: Blockchain 2
- Christian Badertscher

, Peter Gazi, Aggelos Kiayias, Alexander Russell
, Vassilis Zikas:
Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability. 913-930 - Mahdi Zamani, Mahnush Movahedi, Mariana Raykova:

RapidChain: Scaling Blockchain via Full Sharding. 931-948 - Stefan Dziembowski

, Sebastian Faust, Kristina Hostáková:
General State Channel Networks. 949-966 - Stefan Dziembowski

, Lisa Eckey, Sebastian Faust:
FairSwap: How To Fairly Exchange Digital Goods. 967-984
Session 5D: Encrypted Search & Computation 2
- Adi Akavia, Dan Feldman, Hayim Shaul:

Secure Search on Encrypted Data via Multi-Ring Sketch. 985-1001 - Sarvar Patel, Giuseppe Persiano, Kevin Yeo:

Private Stateful Information Retrieval. 1002-1019 - Eric Crockett, Chris Peikert, Chad Sharp:

ALCHEMY: A Language and Compiler for Homomorphic Encryption Made easY. 1020-1037 - Javad Ghareh Chamani, Dimitrios Papadopoulos, Charalampos Papamanthou, Rasool Jalili:

New Constructions for Forward and Backward Private Symmetric Searchable Encryption. 1038-1055
Session 6A: IoT Security
- Roei Schuster, Vitaly Shmatikov, Eran Tromer:

Situational Access Control in the Internet of Things. 1056-1073 - Wei Zhang, Yan Meng, Yugeng Liu, Xiaokuan Zhang, Yinqian Zhang, Haojin Zhu

:
HoMonit: Monitoring Smart Home Apps from Encrypted Traffic. 1074-1088 - Hyunwoo Yu, Jaemin Lim, Kiyeon Kim, Suk-Bok Lee:

Pinto: Enabling Video Privacy for Commodity IoT Cameras. 1089-1101 - Iulia Bastys

, Musard Balliu, Andrei Sabelfeld:
If This Then What?: Controlling Flows in IoT Apps. 1102-1119
Session 6B: Mobile Security 1
- Andrea Possemato, Andrea Lanzi, Simon Pak Ho Chung, Wenke Lee, Yanick Fratantonio:

ClickShield: Are You Hiding Something? Towards Eradicating Clickjacking on Android. 1120-1136 - Fengguo Wei, Xingwei Lin, Xinming Ou, Ting Chen, Xiaosong Zhang:

JN-SAF: Precise and Efficient NDK/JNI-aware Inter-language Static Analysis Framework for Security Vetting of Android Applications with Native Code. 1137-1150 - Yousra Aafer, Guanhong Tao, Jianjun Huang, Xiangyu Zhang, Ninghui Li:

Precise Android API Protection Mapping Derivation and Reasoning. 1151-1164 - Lei Zhang

, Zhemin Yang, Yuyu He, Zhenyu Zhang, Zhiyun Qian
, Geng Hong, Yuan Zhang, Min Yang:
Invetter: Locating Insecure Input Validations in Android Services. 1165-1178
Session 6C: Crypto 1
- Rosario Gennaro, Steven Goldfeder:

Fast Multiparty Threshold ECDSA with Fast Trustless Setup. 1179-1194 - Tibor Jager, Saqib A. Kakvi

, Alexander May
:
On the Security of the PKCS#1 v1.5 Signature Scheme. 1195-1208 - Xiaoqian Jiang, Miran Kim

, Kristin E. Lauter, Yongsoo Song
:
Secure Outsourced Matrix Computation and Application to Neural Networks. 1209-1222 - Hao Chen, Zhicong Huang, Kim Laine, Peter Rindal:

Labeled PSI from Fully Homomorphic Encryption with Malicious Security. 1223-1237
Session 6D: Usable Security
- Elissa M. Redmiles, Ziyun Zhu, Sean Kross, Dhruv Kuchhal, Tudor Dumitras, Michelle L. Mazurek:

Asking for a Friend: Evaluating Response Biases in Security User Studies. 1238-1255 - Mauro Cherubini

, Alexandre Meylan, Bertil Chapuis, Mathias Humbert, Igor Bilogrevic, Kévin Huguenin
:
Towards Usable Checksums: Automating the Integrity Verification of Web Downloads for the Masses. 1256-1271 - Constanze Dietrich, Katharina Krombholz, Kevin Borgolte, Tobias Fiebig

:
Investigating System Operators' Perspective on Security Misconfigurations. 1272-1289 - Kevin Gallagher

, Sameer Patil
, Brendan Dolan-Gavitt, Damon McCoy, Nasir D. Memon
:
Peeling the Onion's User Experience Layer: Examining Naturalistic Use of the Tor Browser. 1290-1305
Session 7A: Forensics
- Zhengxiong Li, Aditya Singh Rathore, Chen Song, Sheng Wei, Yanzhi Wang, Wenyao Xu:

PrinTracker: Fingerprinting 3D Printers using Commodity Scanners. 1306-1323 - Yutao Tang, Ding Li, Zhichun Li, Mu Zhang

, Kangkook Jee, Xusheng Xiao
, Zhenyu Wu, Junghwan Rhee, Fengyuan Xu, Qun Li
:
NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis. 1324-1337 - Chris Chao-Chun Cheng, Chen Shi, Neil Zhenqiang Gong, Yong Guan:

EviHunter: Identifying Digital Evidence in the Permanent Storage of Android Devices via Static Analysis. 1338-1350
Session 7B: Formal Methods and Language Security
- Carmine Abate, Arthur Azevedo de Amorim, Roberto Blanco, Ana Nora Evans, Guglielmo Fachini, Catalin Hritcu, Théo Laurent

, Benjamin C. Pierce, Marco Stronati, Andrew Tolmach:
When Good Components Go Bad: Formally Secure Compilation Despite Dynamic Compromise. 1351-1368 - Marc Andrysco, Andres Nötzli

, Fraser Brown, Ranjit Jhala, Deian Stefan:
Towards Verified, Constant-time Floating Point Operations. 1369-1382 - David A. Basin

, Jannik Dreier, Lucca Hirschi
, Sasa Radomirovic
, Ralf Sasse
, Vincent Stettler:
A Formal Analysis of 5G Authentication. 1383-1396
Session 7C: TLS
- Eyal Ronen, Kenneth G. Paterson, Adi Shamir:

Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure. 1397-1414 - Christopher Patton, Thomas Shrimpton:

Partially Specified Channels: The TLS 1.3 Record Layer without Elision. 1415-1428 - Viet Tung Hoang, Stefano Tessaro, Aishwarya Thiruvengadam:

The Multi-user Security of GCM, Revisited: Tight Bounds for Nonce Randomization. 1429-1440
Session 7D: Binary Defenses 1
- Hojoon Lee, Chihyun Song, Brent ByungHoon Kang:

Lord of the x86 Rings: A Portable User Mode Privilege Separation Architecture on x86. 1441-1454 - Zhihao Yao

, Saeed Mirzamohammadi, Ardalan Amiri Sani, Mathias Payer:
Milkomeda: Safeguarding the Mobile GPU Interface Using WebGL Security Checks. 1455-1469 - Hong Hu

, Chenxiong Qian, Carter Yagemann
, Simon Pak Ho Chung, William R. Harris, Taesoo Kim, Wenke Lee:
Enforcing Unique Code Target Property for Control-Flow Integrity. 1470-1486
Session 8A: Web Security 1
- Mahmood Sharif

, Jumpei Urakawa, Nicolas Christin
, Ayumu Kubota, Akira Yamada
:
Predicting Impending Exposure to Malicious Content from User Behavior. 1487-1501 - Iskander Sánchez-Rola, Igor Santos, Davide Balzarotti:

Clock Around the Clock: Time-Based Device Fingerprinting. 1502-1514 - Anupam Das, Gunes Acar, Nikita Borisov

, Amogh Pradeep
:
The Web's Sixth Sense: A Study of Scripts Accessing Smartphone Sensors. 1515-1532
Session 8B: Usable Passwords
- Zeinab Joudaki, Julie Thorpe

, Miguel Vargas Martin:
Reinforcing System-Assigned Passphrases Through Implicit Learning. 1533-1548 - Maximilian Golla, Miranda Wei

, Juliette Hainline, Lydia Filipe, Markus Dürmuth
, Elissa M. Redmiles, Blase Ur:
"What was that site doing with my Facebook password?": Designing Password-Reuse Notifications. 1549-1566 - Maximilian Golla, Markus Dürmuth

:
On the Accuracy of Password Strength Meters. 1567-1582
Session 8C: Information Flow
- Andrew Ferraiuolo, Mark Zhao

, Andrew C. Myers, G. Edward Suh
:
HyperFlow: A Processor Architecture for Nonmalleable, Timing-Safe Information Flow Security. 1583-1600 - Thomas F. J.-M. Pasquier

, Xueyuan Han, Thomas Moyer, Adam Bates
, Olivier Hermant, David M. Eyers
, Jean Bacon, Margo I. Seltzer:
Runtime Analysis of Whole-System Provenance. 1601-1616 - Thomas Schmitz, Maximilian Algehed, Cormac Flanagan, Alejandro Russo

:
Faceted Secure Multi Execution. 1617-1634
Session 8D: Binary Defenses 2
- Daiping Liu, Mingwei Zhang, Haining Wang:

A Robust and Efficient Defense against Use-after-Free Exploits via Concurrent Pointer Sweeping. 1635-1648 - Benjamin Kollenda, Philipp Koppe, Marc Fyrbiak, Christian Kison, Christof Paar, Thorsten Holz

:
An Exploratory Analysis of Microcode as a Building Block for System Defenses. 1649-1666 - Jingxuan He

, Pesho Ivanov
, Petar Tsankov, Veselin Raychev, Martin T. Vechev:
Debin: Predicting Debug Information in Stripped Binaries. 1667-1680
Session 9A: Web Security 2
- Quan Chen, Alexandros Kapravelos:

Mystique: Uncovering Information Leakage from Browser Extensions. 1687-1700 - Geng Hong, Zhemin Yang, Sen Yang, Lei Zhang

, Yuhong Nan, Zhibo Zhang, Min Yang, Yuan Zhang, Zhiyun Qian
, Hai-Xin Duan:
How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World. 1701-1713 - Radhesh Krishnan Konoth, Emanuele Vineti, Veelasha Moonsamy, Martina Lindorfer, Christopher Kruegel, Herbert Bos

, Giovanni Vigna:
MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense. 1714-1730 - Jiyeon Lee, Hayeon Kim, Junghwan Park, Insik Shin, Sooel Son

:
Pride and Prejudice in Progressive Web Apps: Abusing Native App-like Features in Web Applications. 1731-1746
Session 9B: Mobile Security 2
- Song Fang, Ian D. Markwood, Yao Liu, Shangqing Zhao, Zhuo Lu, Haojin Zhu

:
No Training Hurdles: Fast Training-Agnostic Attacks to Infer Your Typing. 1747-1760 - Stefan Savage:

Lawful Device Access without Mass Surveillance Risk: A Technical Design Discussion. 1761-1774 - Man Zhou

, Qian Wang
, Jingxiao Yang, Qi Li, Feng Xiao, Zhibo Wang, Xiaofeng Chen:
PatternListener: Cracking Android Pattern Lock Using Acoustic Signals. 1775-1787 - Simone Aonzo

, Alessio Merlo, Giulio Tavella, Yanick Fratantonio:
Phishing Attacks on Modern Android. 1788-1801
Session 9C: Crypto 2
- Katriel Cohn-Gordon, Cas Cremers, Luke Garratt, Jon Millican, Kevin Milner:

On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees. 1802-1819 - Jeremiah Blocki

, Ling Ren
, Samson Zhou:
Bandwidth-Hard Functions: Reductions and Lower Bounds. 1820-1836 - Yehuda Lindell

, Ariel Nof:
Fast Secure Multiparty ECDSA with Practical Distributed Key Generation and Applications to Cryptocurrency Custody. 1837-1854 - Rouzbeh Behnia, Muslum Ozgur Ozmen, Attila A. Yavuz

, Mike Rosulek:
TACHYON: Fast Signatures from Compact Knapsack. 1855-1867
Session 9D: Vulnerability Detection
- Kyriakos K. Ispoglou, Bader AlBassam, Trent Jaeger, Mathias Payer:

Block Oriented Programming: Automating Data-Only Attacks. 1868-1882 - Xiaokui Shu, Frederico Araujo, Douglas Lee Schales, Marc Ph. Stoecklin, Jiyong Jang, Heqing Huang, Josyula R. Rao:

Threat Intelligence Computing. 1883-1898 - Wenwen Wang, Kangjie Lu, Pen-Chung Yew

:
Check It Again: Detecting Lacking-Recheck Bugs in OS Kernels. 1899-1913 - Yan Wang, Chao Zhang, Xiaobo Xiang, Zixuan Zhao, Wenjie Li, Xiaorui Gong, Bingchang Liu

, Kaixiang Chen, Wei Zou:
Revery: From Proof-of-Concept to Exploitable. 1914-1927
Session 10A: TOR
- Payap Sirinam, Mohsen Imani, Marc Juarez

, Matthew Wright
:
Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning. 1928-1943 - Rob Jansen, Matthew Traudt, Nicholas Hopper:

Privacy-Preserving Dynamic Learning of Tor Network Traffic. 1944-1961 - Milad Nasr, Alireza Bahramali, Amir Houmansadr:

DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning. 1962-1976 - Shuai Li, Huajun Guo, Nicholas Hopper:

Measuring Information Leakage in Website Fingerprinting Attacks and Defenses. 1977-1992
Session 10B: Protocols
- Shashank Agrawal, Payman Mohassel, Pratyay Mukherjee, Peter Rindal:

DiSE: Distributed Symmetric-key Encryption. 1993-2010 - Luis Vargas, Gyan Hazarika, Rachel Culpepper, Kevin R. B. Butler

, Thomas Shrimpton, Doug Szajda, Patrick Traynor:
Mitigating Risk while Complying with Data Retention Laws. 2011-2027 - Sisi Duan, Michael K. Reiter, Haibin Zhang:

BEAT: Asynchronous BFT Made Practical. 2028-2041 - Shashank Agrawal, Peihan Miao, Payman Mohassel, Pratyay Mukherjee:

PASTA: PASsword-based Threshold Authentication. 2042-2059
Session 10C: Key Exchanges
- Markus Brandt, Tianxiang Dai

, Amit Klein
, Haya Schulmann, Michael Waidner
:
Domain Validation++ For MitM-Resilient PKI. 2060-2076 - Sergiu Costea, Marios O. Choudary, Doru Gucea, Björn Tackmann, Costin Raiciu:

Secure Opportunistic Multipath Key Exchange. 2077-2094
Session 10D: Fuzzing, Exploitation, and Side Channels
- Hongxu Chen, Yinxing Xue, Yuekang Li

, Bihuan Chen, Xiaofei Xie
, Xiuheng Wu, Yang Liu
:
Hawkeye: Towards a Desired Directed Grey-box Fuzzer. 2095-2108 - Giorgi Maisuradze, Christian Rossow:

ret2spec: Speculative Execution Using Return Stack Buffers. 2109-2122 - George Klees, Andrew Ruef, Benji Cooper, Shiyi Wei, Michael Hicks:

Evaluating Fuzz Testing. 2123-2138 - Hoda Naghibijouybari

, Ajaya Neupane, Zhiyun Qian
, Nael B. Abu-Ghazaleh
:
Rendered Insecure: GPU Side Channel Attacks are Practical. 2139-2153
Tutorials
- Battista Biggio

, Fabio Roli
:
Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning. 2154-2156 - Fattaneh Bayatbabolghani, Marina Blanton

:
Secure Multi-Party Computation. 2157-2159 - Roger A. Hallman

, Kim Laine, Wei Dai, Nicolas Gama, Alex J. Malozemoff, Yuriy Polyakov
, Sergiu Carpov
:
Building Applications with Homomorphic Encryption. 2160-2162 - Quanyan Zhu, Stefan Rass

:
Game Theory Meets Network Security: A Tutorial. 2163-2165
Workshop Summaries
- Sadia Afroz, Battista Biggio

, Yuval Elovici, David Freeman
, Asaf Shabtai:
11th International Workshop on Artificial Intelligence and Security (AISec 2018). 2166-2167 - Chip-Hong Chang

, Jorge Guajardo, Daniel E. Holcomb, Francesco Regazzoni
, Ulrich Rührmair:
ASHES 2018- Workshop on Attacks and Solutions in Hardware Security. 2168-2170 - Awais Rashid, Nils Ole Tippenhauer:

CPS-SPC 2018: Fourth Workshop on Cyber-Physical Systems Security and PrivaCy. 2171-2172 - Roger A. Hallman

, Shujun Li, Victor Chang
:
2nd International Workshop on Multimedia Privacy and Security. 2173-2174 - Massimiliano Albanese

, Dijiang Huang
:
MTD 2018: 5th ACM Workshop on Moving Target Defense (MTD). 2175-2176 - Dan Meng:

SecArch'18: 1st Workshop of Security-Oriented Designs of Computer Architectures and Processors. 2177 - Mário S. Alvim

, Stéphanie Delaune:
PLAS 2018 - ACM SIGSAC Workshop on Programming Languages and Analysis for Security. 2178-2179 - Baris Kasikci, Mark Silberstein:

SysTEX'18: 2018 Workshop on System Software for Trusted Execution. 2180 - Aaron Johnson, Ryan Henry:

17th Workshop on Privacy in the Electronic Society (WPES 2018). 2181-2182 - Michael Brenner, Kurt Rohloff

:
WAHC'18: 6th Workshop on Encrypted Computing and Applied Homomorphic Cryptography. 2183-2184 - Yan Shoshitaishvili, Mayur Naik:

FEAST'18 - 2018 Workshop on Forming an Ecosystem around Software Transformation. 2185-2186
Panel
- Kevin R. B. Butler, Robert K. Cunningham, Paul C. van Oorschot, Reihaneh Safavi-Naini, Ashraf Matrawy, Jeremy Clark:

A Discussion on Security Education in Academia. 2187-2188
Demonstrations
- Aleksandr Pilgun

, Olga Gadyatskaya, Stanislav Dashevskyi, Yury Zhauniarovich, Artsiom Kushniarou:
An Effective Android Code Coverage Tool. 2189-2191 - David M. Sommer, Sebastian Meiser, Esfandiar Mohammadi:

PrivacyBuDe: Privacy Buckets Demo Tight Differential Privacy Guarantees made Simple. 2192-2194
Poster Presentations
- Said Al-Riyami, Frans Coenen

, Alexei Lisitsa:
A Re-evaluation of Intrusion Detection Accuracy: Alternative Evaluation Strategy. 2195-2197 - Toshinori Araki, Assi Barak, Jun Furukawa

, Marcel Keller, Kazuma Ohara
, Hikaru Tsuchida
:
How to Choose Suitable Secure Multiparty Computation Using Generalized SPDZ. 2198-2200 - Arnab Bag, Sikhar Patranabis, L. Tribhuvan, Debdeep Mukhopadhyay:

Hardware Acceleration of Searchable Encryption. 2201-2203 - Jakub Breier, Xiaolu Hou

, Dirmanto Jap, Lei Ma, Shivam Bhasin, Yang Liu:
Practical Fault Attack on Deep Neural Networks. 2204-2206 - Darion Cassel, Yan Huang, Limin Jia

:
FlowNotation: An Annotation System for Statically Enforcing Information Flow Policies in C. 2207-2209 - Xia Cheng, Mo Sha

:
Cracking the TSCH Channel Hopping in IEEE 802.15.4e. 2210-2212 - Tianxiang Dai

, Haya Schulmann, Michael Waidner:
Off-Path Attacks Against PKI. 2213-2215 - Stanislav Dashevskyi, Olga Gadyatskaya, Aleksandr Pilgun

, Yury Zhauniarovich:
The Influence of Code Coverage Metrics on Automated Testing Efficiency in Android. 2216-2218 - Wooyoung Go, Daewoo Lee:

Toward Trustworthy Deep Learning in Security. 2219-2221 - Ryo Iijima, Shota Minami, Yunao Zhou, Tatsuya Takehisa, Takeshi Takahashi, Yasuhiro Oikawa, Tatsuya Mori:

Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams. 2222-2224 - Mohsen Imani, Mohammad Saidur Rahman, Matthew Wright

:
Adversarial Traces for Website Fingerprinting Defense. 2225-2227 - Yujie Ji, Ting Wang:

Towards Understanding the Dynamics of Adversarial Attacks. 2228-2230 - Katarzyna Kapusta, Gérard Memmi:

Circular AON: A Very Fast Scheme to Protect Encrypted Data Against Key Exposure. 2231-2233 - Jan Kasiak, Bogdan Carbunar, Jake Christensen, Maria Lyukova, Sumeet Bajaj, Mike Boruta, Radu Sion

, Viorel Popescu, Alex Sorodoc, Gabriel Stan:
CipherLocker: Encrypted File Sharing with Ranked Search https: //cipherlocker.com. 2234-2236 - Yeeun Ku, Leo Hyun Park, Sooyeon Shin, Taekyoung Kwon:

A Guided Approach to Behavioral Authentication. 2237-2239 - Yun Lu, Konstantinos Mitropoulos, Rafail Ostrovsky

, Avraham Weinstock, Vassilis Zikas:
Cryptographically Secure Detection of Injection Attacks. 2240-2242 - Zachary Matthews, Natalija Vlajic:

Can Browser Add-Ons Protect Your Children from Online Tracking? 2243-2245 - François Menet, Paul Berthier, Michel Gagnon, José M. Fernandez:

Spartan Networks: Self-Feature-Squeezing Networks for Increased Robustness in Adversarial Settings. 2246-2248 - Seung Ho Na, Kwanwoo Kim, Seungwon Shin:

Knowledge Seeking on The Shadow Brokers. 2249-2251 - Daniela Napoli, Sonia Chiasson:

Assessing Non-Visual SSL Certificates with Desktop and Mobile Screen Readers. 2252-2254 - Talha Ongun, Alina Oprea, Cristina Nita-Rotaru, Mihai Christodorescu, Negin Salajegheh:

The House That Knows You: User Authentication Based on IoT Data. 2255-2257 - Joon-Young Paik, Joong-Hyun Choi, Rize Jin, Jianming Wang, Eun-Sun Cho:

A Storage-level Detection Mechanism against Crypto-Ransomware. 2258-2260 - Balázs Pejó

, Qiang Tang
, Gergely Biczók
:
The Price of Privacy in Collaborative Learning. 2261-2263 - Feargus Pendlebury, Fabio Pierazzi, Roberto Jordaney, Johannes Kinder, Lorenzo Cavallaro

:
Enabling Fair ML Evaluations for Security. 2264-2266 - Rachel Petrik, Berat Arik, Jared M. Smith:

Towards Architecture and OS-Independent Malware Detection via Memory Forensics. 2267-2269 - Elissa M. Redmiles, John P. Dickerson, Krishna P. Gummadi

, Michelle L. Mazurek:
Equitable Security: Optimizing Distribution of Nudges and Resources. 2270-2272 - Amrita Roy Chowdhury, Parameswaran Ramanathan:

Public Order Preserving Cipher Generation Scheme for Distributed Computing. 2273-2275 - Gili Rusak, Abdullah Al-Dujaili, Una-May O'Reilly:

AST-Based Deep Learning for Detecting Malicious PowerShell. 2276-2278 - John M. San Miguel, Megan E. M. Kline, Roger A. Hallman

, Scott M. Slayback, Alexis Rogers, Stefanie S. F. Chang:
Aggregated Machine Learning on Indicators of Compromise in Android Devices. 2279-2281 - Michael Schliep, Nicholas Hopper:

End-to-End Secure Mobile Group Messaging with Conversation Integrity and Minimal Metadata Leakage. 2282-2284 - Vikash Sehwag, Chawin Sitawarin

, Arjun Nitin Bhagoji
, Arsalan Mosenia, Mung Chiang, Prateek Mittal:
Not All Pixels are Born Equal: An Analysis of Evasion Attacks under Locality Constraints. 2285-2287 - Setareh Sharifian, Reihaneh Safavi-Naini, Fuchun Lin:

Post-quantum Security using Channel Noise. 2288-2290 - Sagar Sharma, Keke Chen:

Image Disguising for Privacy-preserving Deep Learning. 2291-2293 - Sagar Sharma, Keke Chen:

Privacy-Preserving Boosting with Random Linear Classifiers. 2294-2296 - Zhuojia Shen

, Jie Zhou, Divya Ojha, John Criswell:
Restricting Control Flow During Speculative Execution. 2297-2299 - Kris Shrishak, Haya Schulmann, Michael Waidner:

Removing the Bottleneck for Practical 2PC. 2300-2302 - Trishita Tiwari, Ari Trachtenberg:

Cashing in on the File-System Cache. 2303-2305 - Jun Wang, Afonso Arriaga

, Qiang Tang
, Peter Y. A. Ryan:
Facilitating Privacy-preserving Recommendation-as-a-Service with Machine Learning. 2306-2308 - Zhiqiang Wang, Pingchuan Ma

, Yaping Chi, Jianyi Zhang:
Medical Devices are at Risk: Information Security on Diagnostic Imaging System. 2309-2311 - Guowen Xu

, Hongwei Li, Rongxing Lu:
Practical and Privacy-Aware Truth Discovery in Mobile Crowd Sensing Systems. 2312-2314 - Hongfa Xue, Yurong Chen, Guru Venkataramani, Tian Lan, Guang Jin, Jason H. Li:

MORPH: Enhancing System Security through Interactive Customization of Application and Communication Protocol Features. 2315-2317 - Junghwan Yoon, Yezee Seo, Jaedong Jang, Mingi Cho, JinGoog Kim, HyeonSook Kim, Taekyoung Kwon:

A Bitstream Reverse Engineering Tool for FPGA Hardware Trojan Detection. 2318-2320 - Jianjun Zheng, Akbar Siami Namin:

A Markov Decision Process to Determine Optimal Policies in Moving Target. 2321-2323 - Yimin Zhu, Simon S. Woo:

Adversarial Product Review Generation with Word Replacements. 2324-2326

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














