


Остановите войну!
for scientists:


default search action
26th CCS 2019: London, UK
- Lorenzo Cavallaro, Johannes Kinder, XiaoFeng Wang, Jonathan Katz:
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, London, UK, November 11-15, 2019. ACM 2019, ISBN 978-1-4503-6747-9
Session 1A: Attack I
- Vladislav Mladenov, Christian Mainka
, Karsten Meyer zu Selhausen, Martin Grothe, Jörg Schwenk:
1 Trillion Dollar Refund: How To Spoof PDF Signatures. 1-14 - Jens Müller, Fabian Ising, Vladislav Mladenov, Christian Mainka
, Sebastian Schinzel, Jörg Schwenk:
Practical Decryption exFiltration: Breaking PDF Encryption. 15-29
Session 1B: Cryptographic Primitives
- Russell W. F. Lai
, Viktoria Ronge, Tim Ruffing, Dominique Schröder
, Sri Aravinda Krishnan Thyagarajan
, Jiafan Wang:
Omniring: Scaling Private Payments Without Trusted Setup. 31-48 - Georg Fuchsbauer:
WI Is Not Enough: Zero-Knowledge Contingent (Service) Payments Revisited. 49-62
Session 1C: Cloud Security I
- José Bacelar Almeida
, Manuel Barbosa
, Gilles Barthe, Matthew Campagna, Ernie Cohen, Benjamin Grégoire, Vitor Pereira
, Bernardo Portela
, Pierre-Yves Strub, Serdar Tasiran:
A Machine-Checked Proof of Security for AWS Key Management Service. 63-78 - Sarvar Patel, Giuseppe Persiano, Kevin Yeo, Moti Yung:
Mitigating Leakage in Secure Cloud-Hosted Data Structures: Volume-Hiding for Multi-Maps via Hashing. 79-93
Session 1D: Forensics
- Carlos Cotrini, Luca Corinzia, Thilo Weghorn, David A. Basin:
The Next 700 Policy Miners: A Universal Method for Building Policy Miners. 95-112 - Chengcheng Xiang
, Yudong Wu, Bingyu Shen
, Mingyao Shen, Haochen Huang, Tianyin Xu, Yuanyuan Zhou, Cindy Moore, Xinxin Jin, Tianwei Sheng:
Towards Continuous Access Control Validation and Forensics. 113-129
Session 1E: Privacy I
- Hooman Mohajeri Moghaddam, Gunes Acar, Ben Burgess, Arunesh Mathur, Danny Yuxing Huang, Nick Feamster, Edward W. Felten, Prateek Mittal, Arvind Narayanan:
Watching You Watch: The Tracking Ecosystem of Over-the-Top TV Streaming Devices. 131-147 - Ben Weinshel, Miranda Wei, Mainack Mondal, Euirim Choi, Shawn Shan, Claire Dolin, Michelle L. Mazurek, Blase Ur:
Oh, the Places You've Been! User Reactions to Longitudinal Transparency About Third-Party Web Tracking and Inferencing. 149-166
Session 2A: Side Channels I
- Daniel Gruss, Erik Kraft
, Trishita Tiwari, Michael Schwarz, Ari Trachtenberg, Jason Hennessey, Alex Ionescu, Anders Fogh:
Page Cache Attacks. 167-180 - Keegan Ryan
:
Hardware-Backed Heist: Extracting ECDSA Keys from Qualcomm's TrustZone. 181-194 - Pengfei Qiu, Dongsheng Wang, Yongqiang Lyu, Gang Qu:
VoltJockey: Breaching TrustZone by Software-Controlled Voltage Manipulation over Multi-core Frequencies. 195-209 - Yue Cao, Zhongjie Wang, Zhiyun Qian, Chengyu Song
, Srikanth V. Krishnamurthy
, Paul L. Yu:
Principled Unearthing of TCP Side Channel Vulnerabilities. 211-224
Session 2B: ML Security I
- Ziqi Yang, Jiyi Zhang, Ee-Chien Chang
, Zhenkai Liang:
Neural Network Inversion in Adversarial Setting via Background Knowledge Alignment. 225-240 - Liwei Song, Reza Shokri
, Prateek Mittal:
Privacy Risks of Securing Machine Learning Models against Adversarial Examples. 241-257 - Jinyuan Jia, Ahmed Salem, Michael Backes, Yang Zhang, Neil Zhenqiang Gong:
MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples. 259-274 - Kenneth T. Co, Luis Muñoz-González
, Sixte de Maupeou, Emil C. Lupu:
Procedural Noise Adversarial Examples for Black-Box Attacks on Deep Convolutional Networks. 275-289
Session 2C: Secure Computing I
- Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Rindal, Peter Scholl:
Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation. 291-308 - Daniel Masny, Peter Rindal:
Endemic Oblivious Transfer. 309-326 - Carmit Hazay
, Yuval Ishai, Antonio Marcedone, Muthuramakrishnan Venkitasubramaniam:
LevioSA: Lightweight Secure Arithmetic Computation. 327-344 - Hao Chen, Ilaria Chillotti
, Ling Ren
:
Onion Ring ORAM: Efficient Constant Bandwidth Oblivious RAM from (Leveled) TFHE. 345-360
Session 2D: Encryption (Searchable, Updatable, Homomorphic, etc.)
- Zichen Gui, Oliver Johnson
, Bogdan Warinschi:
Encrypted Databases: New Volume Attacks against Range Queries. 361-378 - Stanislaw Jarecki, Hugo Krawczyk, Jason K. Resch:
Updatable Oblivious Key Management for Storage Systems. 379-393 - Hao Chen, Wei Dai, Miran Kim
, Yongsoo Song:
Efficient Multi-Key Homomorphic Encryption with Packed Ciphertexts with Application to Oblivious Neural Network Inference. 395-412 - Nirvan Tyagi, Ian Miers, Thomas Ristenpart:
Traceback for End-to-End Encrypted Messaging. 413-430
Session 2E: Internet Security
- Henry Birge-Lee, Liang Wang, Jennifer Rexford
, Prateek Mittal:
SICO: Surgical Interception Attacks by Manipulating BGP Communities. 431-448 - Hugo L. J. Bijmans, Tim M. Booij, Christian Doerr:
Just the Tip of the Iceberg: Internet-Scale Exploitation of Routers for Cryptojacking. 449-464 - Matthew J. Luckie
, Robert Beverly, Ryan Koga, Ken Keys, Joshua A. Kroll, kc claffy:
Network Hygiene, Incentives, and Regulation: Deployment of Source Address Validation in the Internet. 465-480 - Sazzadur Rahaman, Gang Wang, Danfeng Daphne Yao
:
Security Certification in Payment Card Industry: Testbeds, Measurements, and Recommendations. 481-498
Session 3A: Fuzzing: Methods and Applications
- Peng Chen, Jianzhong Liu, Hao Chen
:
Matryoshka: Fuzzing Deeply Nested Branches. 499-513 - Mingi Cho, Seoyoung Kim, Taekyoung Kwon:
Intriguer: Field-Level Constraint Solving for Hybrid Fuzzing. 515-530 - Jingxuan He
, Mislav Balunovic, Nodar Ambroladze, Petar Tsankov, Martin T. Vechev:
Learning to Fuzz from Symbolic Execution with Application to Smart Contracts. 531-548
Session 3B: Blockchain I
- Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao
, Bihan Wen
, Yih-Chun Hu:
HyperService: Interoperability and Programmability Across Heterogeneous Blockchains. 549-566 - Muhammed F. Esgin, Raymond K. Zhao
, Ron Steinfeld, Joseph K. Liu, Dongxi Liu:
MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol. 567-584 - Vivek Kumar Bagaria, Sreeram Kannan, David Tse, Giulia Fanti, Pramod Viswanath:
Prism: Deconstructing the Blockchain to Approach Physical Limits. 585-602
Session 3C: Secure Computing II
- Jeffrey Champion, Abhi Shelat, Jonathan R. Ullman:
Securely Sampling Biased Coins with Applications to Differential Privacy. 603-614 - Ryan Wails
, Aaron Johnson, Daniel Starin, Arkady Yerukhimovich, S. Dov Gordon:
Stormy: Statistics in Tor by Measuring Securely. 615-632 - Ruiyu Zhu, Changchang Ding, Yan Huang:
Efficient Publicly Verifiable 2PC over a Blockchain with Applications to Financially-Secure Computations. 633-650
Session 3D: Formal Analysis I
- Poulami Das, Sebastian Faust, Julian Loss:
A Formal Treatment of Deterministic Wallets. 651-668 - Syed Rafiul Hussain, Mitziu Echeverria, Imtiaz Karim, Omar Chowdhury, Elisa Bertino:
5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol. 669-684 - Thomas Haines, Rajeev Goré, Mukesh Tiwari
:
Verified Verifiers for Verifying Elections. 685-702
Session 3E: Privacy II
- Haipei Sun, Xiaokui Xiao
, Issa Khalil, Yin Yang, Zhan Qin, Wendy Hui Wang, Ting Yu:
Analyzing Subgraph Statistics from Extended Local Views with Decentralized Differential Privacy. 703-717 - Hafiz Salman Asif, Periklis A. Papakonstantinou, Jaideep Vaidya:
How to Accurately and Privately Identify Anomalies. 719-736 - Simon Couch
, Zeki Kazan, Kaiyan Shi
, Andrew Bray, Adam Groce:
Differentially Private Nonparametric Hypothesis Testing. 737-751
Session 4A: Side Channels II
- Michael Schwarz, Moritz Lipp, Daniel Moghimi, Jo Van Bulck
, Julian Stecklina, Thomas Prescher, Daniel Gruss:
ZombieLoad: Cross-Privilege-Boundary Data Sampling. 753-768 - Claudio Canella, Daniel Genkin, Lukas Giner, Daniel Gruss, Moritz Lipp, Marina Minkin, Daniel Moghimi, Frank Piessens, Michael Schwarz, Berk Sunar, Jo Van Bulck
, Yuval Yarom
:
Fallout: Leaking Data on Meltdown-resistant CPUs. 769-784 - Atri Bhattacharyya, Alexandra Sandulescu, Matthias Neugschwandtner, Alessandro Sorniotti, Babak Falsafi, Mathias Payer, Anil Kurmus:
SMoTherSpectre: Exploiting Speculative Execution through Port Contention. 785-800
Session 4B: Blockchain II
- Christoph Egger
, Pedro Moreno-Sanchez
, Matteo Maffei:
Atomic Multi-Channel Updates with Constant Collateral in Bitcoin-Compatible Payment-Channel Networks. 801-815 - Gleb Naumenko, Gregory Maxwell, Pieter Wuille
, Alexandra Fedorova, Ivan Beschastnikh:
Erlay: Efficient Transaction Relay for Bitcoin. 817-831 - Shang Gao
, Zecheng Li, Zhe Peng
, Bin Xiao
:
Power Adjusting and Bribery Racing: Novel Mining Attacks in the Bitcoin System. 833-850
Session 4C: Secure Computing III
- Karim Eldefrawy, Vitor Pereira
:
A High-Assurance Evaluator for Machine-Checked Secure Multiparty Computation. 851-868 - Elette Boyle, Niv Gilboa, Yuval Ishai, Ariel Nof:
Practical Fully Secure Three-Party Computation via Sublinear Distributed Zero-Knowledge Proofs. 869-886 - Donghang Lu, Thomas Yurek, Samarth Kulshreshtha, Rahul Govind, Aniket Kate, Andrew Miller:
HoneyBadgerMPC and AsynchroMix: Practical Asynchronous MPC and its Application to Anonymous Communication. 887-903
Session 4D: Formal Analysis II
- Vincent Cheval, Steve Kremer, Itsaka Rakotonirina:
Exploiting Symmetries When Proving Equivalence Properties for Security Protocols. 905-922 - Susan Hohenberger, Satyanarayana Vusirikala:
Are These Pairing Elements Correct?: Automated Verification and Applications. 923-939 - Sjouke Mauw, Zach Smith, Jorge Toro-Pozo
, Rolando Trujillo-Rasua:
Post-Collusion Security and Distance Bounding. 941-958
Session 4E: Privacy III
- Theo Bertram, Elie Bursztein, Stephanie Caro, Hubert Chao, Rutledge Chin Feman, Peter Fleischer, Albin Gustafsson, Jess Hemerly, Chris Hibbert, Luca Invernizzi, Lanah Kammourieh Donnelly, Jason Ketover, Jay Laefer, Paul Nicholas, Yuan Niu, Harjinder Obhi, David Price, Andrew Strait, Kurt Thomas, Al Verney:
Five Years of the Right to be Forgotten. 959-972 - Christine Utz
, Martin Degeling
, Sascha Fahl, Florian Schaub, Thorsten Holz:
(Un)informed Consent: Studying GDPR Consent Notices in the Field. 973-990 - Mainack Mondal, Günce Su Yilmaz, Noah Hirsch, Mohammad Taha Khan, Michael Tang, Christopher Tran
, Chris Kanich, Blase Ur, Elena Zheleva:
Moving Beyond Set-It-And-Forget-It Privacy Settings on Social Media. 991-1008
Session 5A: Software Security
- Masoud Ghaffarinia, Kevin W. Hamlen:
Binary Control-Flow Trimming. 1009-1022 - Shen Liu
, Dongrui Zeng, Yongzhe Huang, Frank Capobianco, Stephen McCamant, Trent Jaeger, Gang Tan
:
Program-mandering: Quantitative Privilege Separation. 1023-1040
Session 5B: Protocols
- Dahlia Malkhi, Kartik Nayak, Ling Ren
:
Flexible Byzantine Fault Tolerance. 1041-1053 - Phillipp Schoppmann
, Adrià Gascón, Leonie Reichert, Mariana Raykova:
Distributed Vector-OLE: Improved Constructions and Implementation. 1055-1072
Session 5C: Cloud Security II
- Xing Gao, Zhongshu Gu, Zhengfa Li, Hani Jamjoom, Cong Wang:
Houdini's Escape: Breaking the Resource Rein of Linux Control Groups. 1073-1086 - Robert Buhren, Christian Werling, Jean-Pierre Seifert:
Insecure Until Proven Updated: Analyzing AMD SEV's Remote Attestation. 1087-1099
Session 5D: SDN Security
- Eduard Marin
, Nicola Bucciol, Mauro Conti
:
An In-depth Look Into SDN Topology Discovery Mechanisms: Novel Attacks and Practical Countermeasures. 1101-1114 - Christian Skalka, John Ring, David Darais, Minseok Kwon, Sahil Gupta, Kyle Diller, Steffen Smolka, Nate Foster:
Proof-Carrying Network Code. 1115-1129
Session 5E: Fingerprinting
- Payap Sirinam, Nate Mathews, Mohammad Saidur Rahman, Matthew Wright
:
Triplet Fingerprinting: More Practical and Portable Website Fingerprinting with N-shot Learning. 1131-1148 - Yushi Cheng, Xiaoyu Ji, Juchuan Zhang, Wenyuan Xu, Yi-Chao Chen:
DeMiCPU: Device Fingerprinting with Magnetic Signals Radiated by CPU. 1149-1170
Session 6A: Biometrics Security
- Rahul Chatterjee, M. Sadegh Riazi, Tanmoy Chowdhury, Emanuela Marasco, Farinaz Koushanfar
, Ari Juels:
Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms. 1171-1186 - Simon Eberz, Giulio Lovisotto, Kasper Bonne Rasmussen, Vincent Lenders
, Ivan Martinovic:
28 Blinks Later: Tackling Practical Challenges of Eye Movement Biometrics. 1187-1199 - Jingjie Li, Kassem Fawaz
, Younghyun Kim
:
Velody: Nonlinear Vibration Challenge-Response for Resilient User Authentication. 1201-1213 - Chen Yan, Yan Long, Xiaoyu Ji, Wenyuan Xu:
The Catcher in the Field: A Fieldprint based Spoofing Detection for Text-Independent Speaker Verification. 1215-1229
Session 6B: ML Security II
- Nitin Agrawal
, Ali Shahin Shamsabadi, Matt J. Kusner, Adrià Gascón:
QUOTIENT: Two-Party Secure Neural Network Training and Prediction. 1231-1247 - Teodora Baluta
, Shiqi Shen, Shweta Shinde
, Kuldeep S. Meel, Prateek Saxena:
Quantitative Verification of Neural Networks and Its Security Applications. 1249-1264 - Yingqi Liu, Wen-Chuan Lee, Guanhong Tao, Shiqing Ma, Yousra Aafer, Xiangyu Zhang:
ABS: Scanning Neural Networks for Back-doors by Artificial Brain Stimulation. 1265-1282 - Min Du, Zhi Chen, Chang Liu, Rajvardhan Oak, Dawn Song:
Lifelong Anomaly Detection Through Unlearning. 1283-1297
Session 6C: Secure Computing VI
- Alin Tomescu, Vivek Bhupatiraju, Dimitrios Papadopoulos, Charalampos Papamanthou, Nikos Triandopoulos, Srinivas Devadas:
Transparency Logs via Append-Only Authenticated Dictionaries. 1299-1316 - David Clayton, Christopher Patton, Thomas Shrimpton:
Probabilistic Data Structures in Adversarial Environments. 1317-1334 - Phillipp Schoppmann
, Adrià Gascón, Mariana Raykova, Benny Pinkas:
Make Some ROOM for the Zeros: Data Sparsity in Secure Distributed Machine Learning. 1335-1350 - Ethan Cecchetti
, Ben Fisch, Ian Miers, Ari Juels:
PIEs: Public Incompressible Encodings for Decentralized Storage. 1351-1367
Session 6E: Passwords and Accounts
- Moni Naor, Benny Pinkas, Eyal Ronen:
How to (not) Share a Password: Privacy Preserving Protocols for Finding Heavy Hitters with Adversarial Behavior. 1369-1386 - Lucy Li, Bijeeta Pal, Junade Ali
, Nick Sullivan, Rahul Chatterjee, Thomas Ristenpart:
Protocols for Checking Compromised Credentials. 1387-1403 - Sven Hammann, Sasa Radomirovic
, Ralf Sasse, David A. Basin:
User Account Access Graphs. 1405-1422 - Dong Yuan, Yuanli Miao, Neil Zhenqiang Gong, Zheng Yang, Qi Li, Dawn Song, Qian Wang
, Xiao Liang:
Detecting Fake Accounts in Online Social Networks at the Time of Registrations. 1423-1438
Session 7A: Internet of Things
- Qi Wang, Pubali Datta, Wei Yang, Si Liu, Adam Bates, Carl A. Gunter:
Charting the Attack Surface of Trigger-Action IoT Platforms. 1439-1453 - Simon Birnbach
, Simon Eberz, Ivan Martinovic:
Peeves: Physical Event Verification in Smart Homes. 1455-1467 - Chaoshun Zuo, Haohuang Wen, Zhiqiang Lin, Yinqian Zhang:
Automatic Fingerprinting of Vulnerable BLE IoT Devices with Static UUIDs from Mobile Apps. 1469-1483
Session 7B: Blockchain III
- Dominik Harz, Lewis Gudgeon, Arthur Gervais, William J. Knottenbelt:
Balance: Dynamic Adjustment of Cryptocurrency Deposits. 1485-1502 - Ting Chen, Yufei Zhang, Zihao Li
, Xiapu Luo, Ting Wang, Rong Cao, Xiuzhuo Xiao, Xiaosong Zhang:
TokenScope: Automatically Detecting Inconsistent Behaviors of Cryptocurrency Tokens in Ethereum. 1503-1520 - Iddo Bentov, Yan Ji
, Fan Zhang, Lorenz Breidenbach, Philip Daian, Ari Juels:
Tesseract: Real-Time Cryptocurrency Exchange Using Trusted Hardware. 1521-1538
Session 7C: Secure Computing V
- Muhammad Ishaq, Ana L. Milanova, Vassilis Zikas:
Efficient MPC via Program Analysis: A Framework for Efficient Optimal Mixing. 1539-1556 - Jun Furukawa, Yehuda Lindell
:
Two-Thirds Honest-Majority MPC for Malicious Adversaries at Almost the Cost of Semi-Honest. 1557-1571 - Megha Byali, Carmit Hazay
, Arpita Patra, Swati Singla:
Fast Actively Secure Five-Party Computation with Security Beyond Abort. 1573-1590
Session 7D: Formal Analysis III
- Yu-Fu Fu
, Jiaxiang Liu
, Xiaomu Shi, Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang:
Signed Cryptographic Program Verification with Typed CryptoLine. 1591-1606 - José Bacelar Almeida
, Cécile Baritel-Ruet, Manuel Barbosa
, Gilles Barthe, François Dupressoir
, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira
, Alley Stoughton, Pierre-Yves Strub:
Machine-Checked Proofs for Cryptographic Standards: Indifferentiability of Sponge and Secure High-Assurance Implementations of SHA-3. 1607-1622 - Armaiti Ardeshiricham, Yoshiki Takashima, Sicun Gao, Ryan Kastner
:
VeriSketch: Synthesizing Secure Hardware Designs with Timing-Sensitive Information Flow Properties. 1623-1638
Session 7E: Privacy-Preserving Techniques
- Melissa Chase, Apoorvaa Deshpande, Esha Ghosh, Harjasleen Malvai:
SEEMless: Secure End-to-End Encrypted Messaging with less</> Trust. 1639-1656 - Jianting Ning, Geong Sen Poh, Jia-Ch'ng Loh
, Jason Chia, Ee-Chien Chang
:
PrivDPI: Privacy-Preserving Encrypted Traffic Inspection with Reusable Obfuscated Rules. 1657-1670 - Johannes Blömer, Jan Bobolz, Denis Diemert, Fabian Eidens
:
Updatable Anonymous Credentials and Applications to Incentive Systems. 1671-1685
Keynote
- N. Asokan:
Hardware-assisted Trusted Execution Environments: Look Back, Look Ahead. 1687
Session 8A: Attack II
- Sean Heelan, Tom Melham, Daniel Kroening
:
Gollum: Modular and Greybox Exploit Generation for Heap Overflows in Interpreters. 1689-1706 - Yueqi Chen, Xinyu Xing:
SLAKE: Facilitating Slab Manipulation for Exploiting Vulnerabilities in the Linux Kernel. 1707-1722
Session 8B: TEE I
- Shijun Zhao, Qianying Zhang, Yu Qin, Wei Feng, Dengguo Feng:
SecTEE: A Software-based Approach to Secure Enclave Architecture Using TEE. 1723-1740 - Jo Van Bulck
, David F. Oswald
, Eduard Marin
, Abdulla Aldoseri, Flavio D. Garcia, Frank Piessens:
A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes. 1741-1758
Session 8C: Blockchain VI
- Samuel Steffen, Benjamin Bichsel, Mario Gersbach, Noa Melchior, Petar Tsankov, Martin T. Vechev:
zkay: Specifying and Enforcing Data Privacy in Smart Contracts. 1759-1776 - Fucheng Liu, Yu Wen, Dongxue Zhang, Xihe Jiang, Xinyu Xing, Dan Meng:
Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise. 1777-1794 - Alex Biryukov
, Daniel Feher, Giuseppe Vitto:
Privacy Aspects and Subliminal Channels in Zcash. 1795-1811 - Sadegh M. Milajerdi, Birhanu Eshete
, Rigel Gjomemo, V. N. Venkatakrishnan:
POIROT: Aligning Attack Behavior with Kernel Audit Records for Cyber Threat Hunting. 1813-1830 - Zhenyuan Li
, Qi Alfred Chen, Chunlin Xiong, Yan Chen, Tiantian Zhu, Hai Yang:
Effective and Light-Weight Deobfuscation and Semantic-Aware Attack Detection for PowerShell Scripts. 1831-1847 - Abbas Naderi-Afooshteh, Yonghwi Kwon, Anh Nguyen-Tuong, Ali Razmjoo-Qalaei, Mohammad-Reza Zamiri-Gourabi, Jack W. Davidson:
MalMax: Multi-Aspect Execution for Automated Dynamic Web Server Malware Analysis. 1849-1866
Session 8D: Language Security
- Kangjie Lu, Hong Hu:
Where Does It Go?: Refining Indirect-Call Targets with Multi-Layer Type Analysis. 1867-1881 - Mengchen Cao, Xiantong Hou, Tao Wang, Hunter Qu, Yajin Zhou, Xiaolong Bai, Fuwei Wang:
Different is Good: Detecting the Use of Uninitialized Variables through Differential Replay. 1883-1897
Session 8E: Web Security
- Aurore Fass, Michael Backes, Ben Stock
:
HideNoSeek: Camouflaging Malicious JavaScript in Benign ASTs. 1899-1913 - Hoai Viet Nguyen, Luigi Lo Iacono, Hannes Federrath:
Your Cache Has Fallen: Cache-Poisoned Denial-of-Service Attack. 1915-1936
Session 9A: User Study
- Sunyoung Seiler-Hwang, Patricia Arias Cabarcos
, Andrés Marín
, Florina Almenáres, Daniel Díaz Sánchez
, Christian Becker:
"I don't see why I would ever want to use it": Analyzing the Usability of Popular Smartphone Password Managers. 1937-1953 - Faris Bugra Kokulu, Ananta Soneji, Tiffany Bao, Yan Shoshitaishvili, Ziming Zhao, Adam Doupé, Gail-Joon Ahn
:
Matched and Mismatched SOCs: A Qualitative Study on Security Operations Center Issues. 1955-1970