


default search action
28th CCS 2021: Virtual Event, Korea
- Yongdae Kim, Jong Kim, Giovanni Vigna, Elaine Shi:

CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021. ACM 2021, ISBN 978-1-4503-8454-4
Keynote Talks
- Cynthia Dwork:

Pseudo-Randomness and the Crystal Ball. 1-2 - Dawn Song:

Towards Building a Responsible Data Economy. 3 - Taesoo Kim:

Are we done yet? Our Journey to Fight against Memory-safety Bugs. 4
Session 1A: Cybercrime
- Ming Xu, Chuanwang Wang, Jitao Yu, Junjie Zhang, Kai Zhang, Weili Han:

Chunk-Level Password Guessing: Towards Modeling Refined Password Composition Representations. 5-20 - Stijn Pletinckx

, Kevin Borgolte, Tobias Fiebig
:
Out of Sight, Out of Mind: Detecting Orphaned Web Pages at Internet-Scale. 21-35 - Brian Kondracki, Babak Amin Azad, Oleksii Starov, Nick Nikiforakis

:
Catching Transparent Phish: Analyzing and Detecting MITM Phishing Toolkits. 36-50 - Yihe Zhang

, Xu Yuan, Jin Li, Jiadong Lou, Li Chen, Nian-Feng Tzeng:
Reverse Attack: Black-box Attacks on Collaborative Recommendation. 51-68 - Qingying Hao, Licheng Luo, Steve T. K. Jan, Gang Wang:

It's Not What It Looks Like: Manipulating Perceptual Hashing based Applications. 69-85
Session 1B: Attacks and Robustness
- Baolin Zheng, Peipei Jiang

, Qian Wang
, Qi Li, Chao Shen, Cong Wang, Yunjie Ge, Qingyang Teng, Shenyi Zhang
:
Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information. 86-107 - Jiaming Mu, Binghui Wang, Qi Li, Kun Sun, Mingwei Xu, Zhuotao Liu

:
A Hard Label Black-box Adversarial Attack Against Graph Neural Networks. 108-125 - Alireza Bahramali, Milad Nasr, Amir Houmansadr, Dennis Goeckel, Don Towsley

:
Robust Adversarial Attacks Against DNN-Based Wireless Communication Systems. 126-140 - Yue Zhao, Hong Zhu, Kai Chen, Shengzhi Zhang

:
AI-Lancet: Locating Error-inducing Neurons to Optimize Neural Networks. 141-158
Session 1C: Zero Knowledge I
- Jiaheng Zhang, Tianyi Liu

, Weijie Wang, Yinuo Zhang, Dawn Song, Xiang Xie
, Yupeng Zhang:
Doubly Efficient Interactive Proofs for General Arithmetic Circuits with Linear Prover Time. 159-177 - Nicholas Franzese, Jonathan Katz, Steve Lu, Rafail Ostrovsky

, Xiao Wang
, Chenkai Weng
:
Constant-Overhead Zero-Knowledge for RAM Programs. 178-191 - Carsten Baum

, Lennart Braun, Alexander Munch-Hansen, Benoît Razet, Peter Scholl:
Appenzeller to Brie: Efficient Zero-Knowledge Proofs for Mixed-Mode Arithmetic and Z2k. 192-211 - Yuval Ishai, Hang Su, David J. Wu:

Shorter and Faster Post-Quantum Designated-Verifier zkSNARKs from Lattices. 212-234
Session 1D: Authentication and Click Fraud
- Emily Wenger

, Max Bronckers, Christian Cianfarani, Jenna Cryan, Angela Sha, Haitao Zheng, Ben Y. Zhao:
"Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World. 235-251 - Sena Sahin, Frank Li:

Don't Forget the Stuffing! Revisiting the Security Impact of Typo-Tolerant Password Authentication. 252-270 - Tong Zhu

, Yan Meng, Haotian Hu, Xiaokuan Zhang, Minhui Xue, Haojin Zhu:
Dissecting Click Fraud Autonomy in the Wild. 271-286 - Suibin Sun, Le Yu, Xiaokuan Zhang, Minhui Xue, Ren Zhou, Haojin Zhu, Shuang Hao, Xiaodong Lin:

Understanding and Detecting Mobile Ad Fraud Through the Lens of Invalid Traffic. 287-303 - Sunwoo Lee

, Wonsuk Choi, Dong Hoon Lee:
Usable User Authentication on a Smartwatch using Vibration. 304-319
Session 2A: Fuzzing and Bug Finding
- Carter Yagemann

, Simon P. Chung, Brendan Saltaformaggio, Wenke Lee:
Automated Bug Hunting With Data-Driven Symbolic Root Cause Analysis. 320-336 - Xiaotao Feng, Ruoxi Sun

, Xiaogang Zhu
, Minhui Xue, Sheng Wen, Dongxi Liu, Surya Nepal, Yang Xiang
:
Snipuzz: Black-box Fuzzing of IoT Firmware via Message Snippet Inference. 337-350 - Stefan Nagy

, Anh Nguyen-Tuong, Jason D. Hiser, Jack W. Davidson, Matthew Hicks:
Same Coverage, Less Bloat: Accelerating Binary-only Fuzzing with Coverage-preserving Coverage-guided Tracing. 351-365 - Xinyang Ge, Ben Niu, Robert Brotzman, Yaohui Chen, HyungSeok Han, Patrice Godefroid, Weidong Cui:

HyperFuzzer: An Efficient Hybrid Fuzzer for Virtual CPUs. 366-378 - Insu Yun, Woosun Song, Seunggi Min

, Taesoo Kim:
HardsHeap: A Universal and Extensible Framework for Evaluating Secure Allocators. 379-392
Session 2B: Formal Analysis and Verification
- Yuxin Wang

, Zeyu Ding
, Yingtai Xiao
, Daniel Kifer
, Danfeng Zhang
:
DPGen: Automated Program Synthesis for Differential Privacy. 393-411 - Riccardo Focardi, Flaminia L. Luccio:

A Formally Verified Configuration for Hardware Security Modules in the Cloud. 412-428 - Klaus von Gleissenthall, Rami Gökhan Kici, Deian Stefan, Ranjit Jhala:

Solver-Aided Constant-Time Hardware Verification. 429-444 - Marco Patrignani

, Marco Guarnieri
:
Exorcising Spectres with Secure Compilers. 445-461 - Gilles Barthe, Benjamin Grégoire, Vincent Laporte, Swarn Priya

:
Structured Leakage and Applications to Cryptographic Constant-Time and Cost. 462-476
Session 2C: Defenses for ML Robustness
- Yizheng Chen, Shiqi Wang, Yue Qin, Xiaojing Liao, Suman Jana, David A. Wagner:

Learning Security Classifiers with Verified Global Robustness Properties. 477-494 - Ryan Sheatsley, Blaine Hoak

, Eric Pauley, Yohan Beugin
, Michael J. Weisman, Patrick D. McDaniel:
On the Robustness of Domain Constraints. 495-515 - Tianyu Du, Shouling Ji, Lujia Shen, Yao Zhang, Jinfeng Li, Jie Shi, Chengfang Fang, Jianwei Yin, Raheem Beyah, Ting Wang:

Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks. 516-534 - Linyi Li, Maurice Weber, Xiaojun Xu, Luka Rimanic, Bhavya Kailkhura

, Tao Xie, Ce Zhang, Bo Li:
TSS: Transformation-Specific Smoothing for Robustness Certification. 535-557
Session 2D: Secure Multiparty Computation
- Haiyang Xue

, Man Ho Au, Xiang Xie
, Tsz Hon Yuen
, Handong Cui
:
Efficient Online-friendly Two-Party ECDSA Signature. 558-573 - David Heath, Vladimir Kolesnikov:

One Hot Garbling. 574-593 - Cyprien Delpech de Saint Guilhem

, Eleftheria Makri, Dragos Rotaru, Titouan Tanguy:
The Return of Eratosthenes: Secure Generation of RSA Moduli using Distributed Sieving. 594-609 - Toshinori Araki, Jun Furukawa

, Kazuma Ohara, Benny Pinkas, Hanan Rosemarin, Hikaru Tsuchida
:
Secure Graph Analysis at Scale. 610-629 - Nuttapong Attrapadung, Goichiro Hanaoka, Takahiro Matsuda, Hiraku Morita

, Kazuma Ohara, Jacob C. N. Schuldt, Tadanori Teruya, Kazunari Tozawa:
Oblivious Linear Group Actions and Applications. 630-650
Session 3A: Side Channel
- Alexander S. La Cour

, Khurram K. Afridi, G. Edward Suh:
Wireless Charging Power Side-Channel Attacks. 651-665 - Chien-Ying Chen, Debopam Sanyal

, Sibin Mohan
:
Indistinguishability Prevents Scheduler Side Channels in Real-Time Systems. 666-684 - Madura A. Shelton, Lukasz Chmielewski, Niels Samwel

, Markus Wagner, Lejla Batina, Yuval Yarom:
Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code. 685-699 - Wenqiang Jin, Srinivasan Murali, Huadi Zhu, Ming Li

:
Periscope: A Keystroke Inference Attack Using Human Coupled Electromagnetic Emanations. 700-714 - Pietro Borrello

, Daniele Cono D'Elia, Leonardo Querzoni
, Cristiano Giuffrida
:
Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization. 715-733
Session 3B: Operating Systems
- Muhui Jiang, Lin Ma, Yajin Zhou, Qiang Liu

, Cen Zhang, Zhi Wang, Xiapu Luo, Lei Wu, Kui Ren:
ECMO: Peripheral Transplantation to Rehost Embedded Linux Kernels. 734-748 - Weiteng Chen, Yu Wang, Zheng Zhang, Zhiyun Qian:

SyzGen: Automated Generation of Syscall Specification of Closed-Source macOS Drivers. 749-763 - Nanzi Yang

, Wenbo Shen, Jinku Li, Yutian Yang, Kangjie Lu, Jietao Xiao, Tianyu Zhou, Chenggang Qin, Wang Yu, Jianfeng Ma, Kui Ren:
Demons in the Shared Kernel: Abstract Resource Attacks Against OS-level Virtualization. 764-778 - Jinhua Cui, Jason Zhijingcheng Yu

, Shweta Shinde
, Prateek Saxena, Zhiping Cai:
SmashEx: Smashing SGX Enclaves Using Exceptions. 779-793 - Lirong Fu, Shouling Ji, Kangjie Lu, Peiyu Liu, Xuhong Zhang, Yuxuan Duan, Zihui Zhang, Wenzhi Chen, Yanjun Wu:

CPscan: Detecting Bugs Caused by Code Pruning in IoT Kernels. 794-810 - Hang Zhang, Weiteng Chen, Yu Hao

, Guoren Li, Yizhuo Zhai
, Xiaochen Zou, Zhiyun Qian:
Statically Discovering High-Order Taint Style Vulnerabilities in OS Kernels. 811-824
Session 3C: Inference Attacks
- Mohammad Malekzadeh, Anastasia Borovykh, Deniz Gündüz:

Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs. 825-844 - Xinlei He, Yang Zhang

:
Quantifying and Mitigating Privacy Risks of Contrastive Learning. 845-863 - Minxing Zhang, Zhaochun Ren

, Zihan Wang
, Pengjie Ren, Zhumin Chen, Pengfei Hu
, Yang Zhang
:
Membership Inference Attacks Against Recommender Systems. 864-879 - Zheng Li, Yang Zhang

:
Membership Leakage in Label-Only Exposures. 880-895 - Min Chen

, Zhikun Zhang, Tianhao Wang, Michael Backes, Mathias Humbert, Yang Zhang
:
When Machine Unlearning Jeopardizes Privacy. 896-911
Session 3D: DoS
- Yuanjie Li, Hewu Li, Zhizheng Lv, Xingkun Yao, Qianru Li, Jianping Wu:

Deterrence of Intelligent DDoS via Multi-Hop Traffic Divergence. 923-939 - Harm Griffioen, Kris Oosthoek, Paul van der Knaap, Christian Doerr:

Scan, Test, Execute: Adversarial Tactics in Amplification DDoS Attacks. 940-954 - Junjie Xiong

, Mingkui Wei, Zhuo Lu, Yao Liu:
Warmonger: Inflicting Denial-of-Service via Serverless Functions in the Cloud. 955-969 - Daniel Wagner

, Daniel Kopp, Matthias Wichtlhuber, Christoph Dietzel, Oliver Hohlfeld, Georgios Smaragdakis
, Anja Feldmann
:
United We Stand: Collaborative Detection and Mitigation of Amplification DDoS Attacks at Scale. 970-987
Session 4A: Modeling Blockchains and Distributed Ledgers
- Muhammad Saad, Afsah Anwar, Srivatsan Ravi

, David Mohaisen
:
Revisiting Nakamoto Consensus in Asynchronous Networks: A Comprehensive Analysis of Bitcoin Safety and ChainQuality. 988-1005 - Andrew Lewis-Pye, Tim Roughgarden:

How Does Blockchain Security Dictate Blockchain Implementation? 1006-1019 - Poulami Das, Andreas Erwig, Sebastian Faust, Julian Loss, Siavash Riahi:

The Exact Security of BIP32 Wallets. 1020-1042 - Mike Graf

, Daniel Rausch, Viktoria Ronge, Christoph Egger
, Ralf Küsters, Dominique Schröder
:
A Security Framework for Distributed Ledgers. 1043-1064
Session 4B: Wireless, Mobile, and IoT
- Michalis Diamantaris, Serafeim Moustakas, Lichao Sun

, Sotiris Ioannidis, Jason Polakis:
This Sneaky Piggy Went to the Android Ad Market: Misusing Mobile Sensors for Stealthy Data Exfiltration. 1065-1081 - Syed Rafiul Hussain, Imtiaz Karim

, Abdullah Al Ishtiaq
, Omar Chowdhury, Elisa Bertino:
Noncompliance as Deviant Behavior: An Automated Black-box Noncompliance Checker for 4G LTE Cellular Devices. 1082-1099 - Man Hong Hue, Joyanta Debnath, Kin Man Leung, Li Li

, Mohsen Minaei, M. Hammad Mazhar
, Kailiang Xian, Md. Endadul Hoque
, Omar Chowdhury, Sze Yiu Chau
:
All your Credentials are Belong to Us: On Insecure WPA2-Enterprise Configurations. 1100-1117 - Xiaofeng Shi, Shouqian Shi, Minmei Wang, Jonne Kaunisto, Chen Qian:

On-device IoT Certificate Revocation Checking with Small Memory and Low Latency. 1118-1134
Session 4C: Private Set Intersection
- Kelong Cong

, Radames Cruz Moreno, Mariana Botelho da Gama
, Wei Dai
, Ilia Iliashenko, Kim Laine, Michael Rosenberg
:
Labeled PSI from Homomorphic Encryption with Reduced Computation and Communication. 1135-1150 - Ofri Nevo, Ni Trieu, Avishay Yanai:

Simple, Fast Malicious Multiparty Private Set Intersection. 1151-1165 - Mike Rosulek, Ni Trieu:

Compact and Malicious Private Set Intersection for Small Sets. 1166-1181 - Nishanth Chandran, Nishka Dasgupta, Divya Gupta, Sai Lakshmi Bhavana Obbattu

, Sruthi Sekar, Akash Shah:
Efficient Linear Multiparty PSI and Extensions to Circuit/Quorum PSI. 1182-1204
Session 4D: Differential Privacy
- Benjamin Weggenmann, Florian Kerschbaum:

Differential Privacy for Directional Data. 1205-1222 - Martin Aumüller, Christian Janos Lebeda, Rasmus Pagh

:
Differentially Private Sparse Vectors with Low Error, Optimal Space, and Fast Access. 1223-1236 - Tianhao Wang, Joann Qiongna Chen, Zhikun Zhang, Dong Su, Yueqiang Cheng, Zhou Li, Ninghui Li, Somesh Jha:

Continuous Release of Data Streams under both Centralized and Local Differential Privacy. 1237-1253 - Franziska Boenisch, Reinhard Munz, Marcel Tiepelt

, Simon Hanisch
, Christiane Kuhn, Paul Francis:
Side-Channel Attacks on Query-Based Data Anonymization. 1254-1265 - Linkang Du, Zhikun Zhang, Shaojie Bai, Changchang Liu, Shouling Ji, Peng Cheng, Jiming Chen:

AHEAD: Adaptive Hierarchical Decomposition for Range Query under Local Differential Privacy. 1266-1288
Session 5A: Control System Security
- Yan Jia, Bin Yuan, Luyi Xing, Dongfang Zhao, Yifan Zhang, XiaoFeng Wang, Yijing Liu, Kaimin Zheng, Peyton Crnjak, Yuqing Zhang, Deqing Zou, Hai Jin:

Who's In Control? On Security Risks of Disjointed IoT Device Management Channels. 1289-1305 - Dianqi Han, Ang Li, Jiawei Li, Yan Zhang, Tao Li, Yanchao Zhang:

DroneKey: A Drone-Aided Group-Key Generation Scheme for Large-Scale IoT Networks. 1306-1319 - Abel Zambrano, Alejandro Palacio Betancur, Luis Burbano, Andres Felipe Niño, Luis Felipe Giraldo

, Mariantonieta Gutierrez Soto
, Jairo Giraldo, Alvaro A. Cárdenas
:
You Make Me Tremble: A First Look at Attacks Against Structural Control Systems. 1320-1337 - Tohid Shekari, Celine Irvene, Alvaro A. Cárdenas

, Raheem Beyah:
MaMIoT: Manipulation of Energy Market Leveraging High Wattage IoT Botnets. 1338-1356 - Fritz Alder

, Jo Van Bulck
, Frank Piessens, Jan Tobias Mühlberg
:
Aion: Enabling Open Systems through Strong Availability Guarantees for Enclaves. 1357-1372
Session 5B: PKI and Access Control
- Yiming Zhang, Baojun Liu, Chaoyi Lu

, Zhou Li, Haixin Duan, Jiachen Li, Zaifeng Zhang:
Rusted Anchors: A National Client-Side View of Hidden Root CAs in the Web PKI Ecosystem. 1373-1387 - Joyanta Debnath, Sze Yiu Chau

, Omar Chowdhury:
On Re-engineering the X.509 PKI with Executable Specification for Better Implementation Guarantees. 1388-1404 - Sean Dougherty, Reza Tourani, Gaurav Panwar, Roopa Vishwanathan, Satyajayant Misra, Srikathyayani Srikanteswara:

APECS: A Distributed Access Control Framework for Pervasive Edge Computing Services. 1405-1420 - Tianxiang Dai

, Haya Schulmann, Michael Waidner:
Let's Downgrade Let's Encrypt. 1421-1440
Session 5C: Messaging and Privacy
- Keitaro Hashimoto

, Shuichi Katsumata, Eamonn W. Postlethwaite
, Thomas Prest, Bas Westerbaan:
A Concrete Treatment of Efficient Continuous Group Key Agreement via Multi-Recipient PKEs. 1441-1462 - Joël Alwen, Sandro Coretti, Yevgeniy Dodis, Yiannis Tselekounis:

Modular Design of Secure Group Messaging Protocols and the Security of MLS. 1463-1483 - Charlotte Peale, Saba Eskandarian, Dan Boneh:

Secure Complaint-Enabled Source-Tracking for Encrypted Messaging. 1484-1506 - Gabrielle Beck, Julia Len, Ian Miers, Matthew Green:

Fuzzy Message Detection. 1507-1528 - Gabriel Kaptchuk, Tushar M. Jois, Matthew Green, Aviel D. Rubin:

Meteor: Cryptographically Secure Steganography for Realistic Distributions. 1529-1548 - Jean Paul Degabriele:

Hiding the Lengths of Encrypted Messages via Gaussian Padding. 1549-1565
Session 5D: Misc: Android and Vulnerabilities
- Fenghao Xu, Siyu Shen, Wenrui Diao

, Zhou Li, Yi Chen, Rui Li, Kehuan Zhang:
Android on PC: On the Security of End-user Android Emulators. 1566-1580 - Xiaobo Xiang, Ren Zhang

, Hanxiang Wen, Xiaorui Gong, Baoxu Liu:
Ghost in the Binder: Binder Transaction Redirection Attacks in Android System Services. 1581-1597 - Zeinab El-Rewini, Yousra Aafer:

Dissecting Residual APIs in Custom Android ROMs. 1598-1611 - Mohannad Ismail, Jinwoo Yom, Christopher Jelesnianski, Yeongjin Jang, Changwoo Min:

VIP: Safeguard Value Invariant Property for Thwarting Critical Memory Corruption Attacks. 1612-1626 - Dinghao Liu, Qiushi Wu, Shouling Ji, Kangjie Lu, Zhenguang Liu, Jianhai Chen, Qinming He:

Detecting Missed Security Operations Through Differential Checking of Object-based Similar Paths. 1627-1644
Session 6A: Consensus and Attacks
- Kai Li

, Yibo Wang
, Yuzhe Tang:
DETER: Denial of Ethereum Txpool sERvices. 1645-1667 - Muhammad Saad, Songqing Chen, David Mohaisen

:
SyncAttack: Double-spending in Bitcoin Without Mining Power. 1668-1685 - Atsuki Momose, Ling Ren:

Multi-Threshold Byzantine Fault Tolerance. 1686-1699 - Xuechao Wang

, Viswa Virinchi Muppirala, Lei Yang, Sreeram Kannan, Pramod Viswanath:
Securing Parallel-chain Protocols under Variable Mining Power. 1700-1721 - Peiyao Sheng, Gerui Wang

, Kartik Nayak, Sreeram Kannan, Pramod Viswanath:
BFT Protocol Forensics. 1722-1743
Session 6B: Web Vulnerabilities
- Nikos Vasilakis

, Achilles Benetopoulos, Shivam Handa, Alizee Schoen, Jiasi Shen
, Martin C. Rinard:
Supply-Chain Vulnerability Elimination via Active Learning and Regeneration. 1755-1770 - Lukas Knittel

, Christian Mainka
, Marcus Niemietz, Dominik Trevor Noß, Jörg Schwenk:
XSinator.com: From a Formal Model to the Automatic Evaluation of Cross-Site Leaks in Web Browsers. 1771-1788 - Aurore Fass, Dolière Francis Somé

, Michael Backes, Ben Stock
:
DoubleX: Statically Detecting Vulnerable Data Flows in Browser Extensions at Scale. 1789-1804 - Bahruz Jabiyev, Steven Sprecher, Kaan Onarlioglu, Engin Kirda:

T-Reqs: HTTP Request Smuggling with Differential Fuzzing. 1805-1820 - Nikos Vasilakis

, Cristian-Alexandru Staicu, Grigoris Ntousakis
, Konstantinos Kallas, Ben Karel, André DeHon, Michael Pradel:
Preventing Dynamic Library Compromise on Node.js via RWX-Based Privilege Reduction. 1821-1838 - Meng Wang, Chijung Jung, Ali Ahad, Yonghwi Kwon:

Spinner: Automated Dynamic Command Subsystem Perturbation. 1839-1860
Session 6C: Audio Systems and Autonomous Driving
- Yanjiao Chen, Yijie Bai

, Richard Mitev, Kaibo Wang
, Ahmad-Reza Sadeghi, Wenyuan Xu:
FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants. 1861-1883 - Zhuohang Li, Cong Shi, Tianfang Zhang, Yi Xie, Jian Liu, Bo Yuan, Yingying Chen:

Robust Detection of Machine-induced Audio Attacks in Intelligent Audio Systems with Microphone Array. 1884-1899 - Ben Nassi, Yaron Pirutin, Tomer Cohen Galor, Yuval Elovici, Boris Zadov:

Glowworm Attack: Optical TEMPEST Sound Recovery via a Device's Power Indicator LED. 1900-1914 - Xiaoyu Ji, Juchuan Zhang, Shui Jiang

, Jishen Li, Wenyuan Xu:
CapSpeaker: Injecting Voices to Microphones via Capacitors. 1915-1929 - Wei Wang

, Yao Yao, Xin Liu, Xiang Li, Pei Hao, Ting Zhu:
I Can See the Light: Attacks on Autonomous Vehicles Using Invisible Lights. 1930-1944 - Yi Zhu

, Chenglin Miao, Tianhang Zheng
, Foad Hajiaghajani, Lu Su, Chunming Qiao:
Can We Use Arbitrary Objects to Attack LiDAR Perception in Autonomous Driving? 1945-1960
Session 6D: Authentication and Privacy
- Daniel Masny, Gaven J. Watson:

A PKI-based Framework for Establishing Efficient MPC Channels. 1961-1980 - Jean Paul Degabriele, Jérôme Govinden

, Felix Günther, Kenneth G. Paterson:
The Security of ChaCha20-Poly1305 in the Multi-User Setting. 1981-2003 - Lucjan Hanzlik, Daniel Slamanig

:
With a Little Help from My Friends: Constructing Practical Anonymous Credentials. 2004-2023 - Matthew Weidner, Martin Kleppmann

, Daniel Hugenroth, Alastair R. Beresford:
Key Agreement for Decentralized Secure Group Messaging with Strong Security Guarantees. 2024-2045 - Shuichi Katsumata, Takahiro Matsuda, Wataru Nakamura, Kazuma Ohara, Kenta Takahashi:

Revisiting Fuzzy Signatures: Towards a More Risk-Free Cryptographic Authentication System based on Biometrics. 2046-2065 - Luca De Feo, Bertram Poettering, Alessandro Sorniotti:

On the (In)Security of ElGamal in OpenPGP. 2066-2080
Session 7A: Privacy Attacks and Defenses for ML
- Hongbin Liu, Jinyuan Jia, Wenjie Qu, Neil Zhenqiang Gong:

EncoderMI: Membership Inference against Pre-trained Encoders in Contrastive Learning. 2081-2095 - Aoting Hu

, Renjie Xie, Zhigang Lu, Aiqun Hu, Minhui Xue
:
TableGAN-MCA: Evaluating Membership Collisions of GAN-Synthesized Tabular Data Releasing. 2096-2112 - Dario Pasquini, Giuseppe Ateniese

, Massimo Bernaschi:
Unleashing the Tiger: Inference Attacks on Split Learning. 2113-2129 - Sina Sajadmanesh, Daniel Gatica-Perez

:
Locally Private Graph Neural Networks. 2130-2145 - Boxin Wang, Fan Wu, Yunhui Long, Luka Rimanic, Ce Zhang, Bo Li:

DataLens: Scalable Privacy Preserving Training via Gradient Compression and Aggregation. 2146-2168
Session 7B: Fuzzing
- Xiaogang Zhu

, Marcel Böhme:
Regression Greybox Fuzzing. 2169-2182 - Zhuohua Li

, Jincheng Wang, Mingshen Sun, John C. S. Lui:
MirChecker: Detecting Bugs in Rust Programs via Static Analysis. 2183-2196 - Gaoning Pan, Xingwei Lin, Xuhong Zhang, Yongkang Jia, Shouling Ji, Chunming Wu, Xinlei Ying, Jiashui Wang, Yanjun Wu:

V-Shuttle: Scalable and Semantics-Aware Hypervisor Virtual Device Fuzzing. 2197-2213 - Ren Ding, Yonghae Kim, Fan Sang, Wen Xu, Gururaj Saileshwar, Taesoo Kim:

Hardware Support to Improve Fuzzing Performance and Precision. 2214-2228 - Xiaoyu He, Xiaofei Xie

, Yuekang Li
, Jianwen Sun, Feng Li, Wei Zou, Yang Liu
, Lei Yu, Jianhua Zhou, Wenchang Shi, Wei Huo:
SoFi: Reflection-Augmented Fuzzing for JavaScript Engines. 2229-2242
Session 7C: Database and Privacy
- Evangelia Anna Markatou

, Francesca Falzon
, Roberto Tamassia
, William Schor:
Reconstructing with Less: Leakage Abuse Attacks in Two Dimensions. 2243-2261 - Dmytro Bogatov, Georgios Kellaris, George Kollios

, Kobbi Nissim
, Adam O'Neill:
εpsolute: Efficiently Querying Databases While Providing Differential Privacy. 2262-2276 - Seung Geol Choi, Dana Dachman-Soled, S. Dov Gordon, Linsheng Liu, Arkady Yerukhimovich:

Compressed Oblivious Encoding for Homomorphically Encrypted Search. 2277-2291 - Muhammad Haris Mughees, Hao Chen, Ling Ren:

OnionPIR: Response Efficient Single-Server PIR. 2292-2306
Session 7D: Privacy for Distributed Data and Federated Learning
- Jianting Ning, Xinyi Huang, Geong Sen Poh, Jiaming Yuan

, Yingjiu Li, Jian Weng
, Robert H. Deng
:
LEAP: Leakage-Abuse Attack on Efficiently Deployable, Efficiently Searchable Encryption with Partially Known Dataset. 2307-2320 - Antonious M. Girgis

, Deepesh Data, Suhas N. Diggavi, Ananda Theertha Suresh, Peter Kairouz:
On the Rényi Differential Privacy of the Shuffle Model. 2321-2341 - Aashish Kolluri, Teodora Baluta

, Prateek Saxena:
Private Hierarchical Clustering in Federated Networks. 2342-2360 - Jonas Böhler, Florian Kerschbaum:

Secure Multi-party Computation of Differentially Private Heavy Hitters. 2361-2377
Session 8: Poster & Demo Session
- Abdulrahman Alabduljabbar

, Ahmed Abusnaina, Ülkü Meteriz-Yildiran, David Mohaisen
:
Automated Privacy Policy Annotation with Information Highlighting Made Practical Using Deep Representations. 2378-2380 - Ben Nassi, Yaron Pirutin, Raz Swissa, Adi Shamir, Yuval Elovici, Boris Zadov:

POSTER: Recovering Songs from a Hanging Light Bulb. 2381-2383 - Grégoire Menguy, Sébastien Bardin

, Richard Bonichon, Cauim de Souza Lima:
Search-Based Local Black-Box Deobfuscation: Understand, Improve and Mitigate (Poster). 2384-2386 - Hailong Hu

, Jun Pang:
Membership Inference Attacks against GANs by Leveraging Over-representation Regions. 2387-2389 - Zi Wang, Yili Ren

, Yingying Chen, Jie Yang:
Earable Authentication via Acoustic Toothprint. 2390-2392 - Gianluca Scopelliti

, Sepideh Pouyanrad, Job Noorman, Fritz Alder, Frank Piessens, Jan Tobias Mühlberg
:
POSTER: An Open-Source Framework for Developing Heterogeneous Distributed Enclave Applications. 2393-2395 - Brian Tung, Zhiyuan Yu

, Ning Zhang:
Towards Automated Computational Auditing of mHealth Security and Privacy Regulations. 2396-2398 - Lihi Dery, Tamir Tassa, Avishay Yanai, Arthur Zamarin

:
DEMO: A Secure Voting System for Score Based Elections. 2399-2401 - Naureen Hoque

, Hanif Rahbari
:
POSTER: A Tough Nut to Crack: Attempting to Break Modulation Obfuscation. 2402-2404 - Brandon Falk, Yan Meng, Yuxia Zhan

, Haojin Zhu:
POSTER: ReAvatar: Virtual Reality De-anonymization Attack Through Correlating Movement Signatures. 2405-2407 - Daniel Günther

, Thomas Schneider
, Felix Wiegand:
Revisiting Hybrid Private Information Retrieval. 2408-2410 - Asya Mitseva, Jan Pennekamp

, Johannes Lohmöller
, Torsten Ziemann, Carl Hoerchner, Klaus Wehrle, Andriy Panchenko:
POSTER: How Dangerous is My Click? Boosting Website Fingerprinting By Considering Sequences of Webpages. 2411-2413 - Skyler Johnson, Katherine Ferro, L. Jean Camp, Hilda Hadan

:
Human and Organizational Factors in Public Key Certificate Authority Failures. 2414-2416 - Hsin Yi Chen, Siddharth Prakash Rao:

On Adoptability and Use Case Exploration of Threat Modeling for Mobile Communication Systems. 2417-2419 - Azqa Nadeem

, Sicco Verwer, Stephen Moskal, Shanchieh Jay Yang:
Enabling Visual Analytics via Alert-driven Attack Graphs. 2420-2422 - Elias Heftrig, Jean-Pierre Seifert, Haya Schulmann, Michael Waidner, Nils Wisiol:

Predictive Cipher-Suite Negotiation for Boosting Deployment of New Ciphers. 2423-2425 - Ao Li, Jinwen Wang, Ning Zhang:

Chronos: Timing Interference as a New Attack Vector on Autonomous Cyber-physical Systems. 2426-2428 - Grigoris Ntousakis

, Sotiris Ioannidis, Nikos Vasilakis:
Demo: Detecting Third-Party Library Problems with Combined Program Analysis. 2429-2431 - Daniel Kopp, Eric Strehle, Oliver Hohlfeld:

CyberBunker 2.0 - A Domain and Traffic Perspective on a Bulletproof Hoster. 2432-2434 - Christian Ryan, Sharmishtha Dutta, Youngja Park, Nidhi Rastogi:

An Ontology-driven Knowledge Graph for Android Malware. 2435-2437 - Md. Monowar Anjum, Noman Mohammed, Xiaoqian Jiang:

De-identification of Unstructured Clinical Texts from Sequence to Sequence Perspective. 2438-2440 - Eujeanne Kim, Sung-Jun Park, Seokwoo Choi, Dong-Kyu Chae, Sang-Wook Kim:

MANIAC: A Man-Machine Collaborative System for Classifying Malware Author Groups. 2441-2443 - Markus Brandt, Haya Schulmann, Michael Waidner

:
Evaluating Resilience of Domains in PKI. 2444-2446 - Vinuri Bandara

, Thisura Rathnayake, Nipuna Weerasekara
, Charitha Elvitigala, Kenneth Thilakarathna, Primal Wijesekera, Kasun De Zoysa
, Chamath Keppitiyagama:
Demo: Large Scale Analysis on Vulnerability Remediation in Open-source JavaScript Projects. 2447-2449 - Muhammad Nouman Nafees, Neetesh Saxena

, Pete Burnap:
Optimized Predictive Control for AGC Cyber Resiliency. 2450-2452 - Masanori Misono, Takahiro Shinagawa

:
POSTER: OS Independent Fuzz Testing of I/O Boundary. 2453-2455
Session 10A: Crypto, Symbols and Obfuscation
- Florian Sieck

, Sebastian Berndt, Jan Wichelmann
, Thomas Eisenbarth
:
Util: : Lookup: Exploiting Key Decoding in Cryptographic Libraries. 2456-2473 - Moosa Yahyazadeh, Sze Yiu Chau

, Li Li
, Man Hong Hue, Joyanta Debnath, Sheung Chiu Ip, Chun Ngai Li, Md. Endadul Hoque
, Omar Chowdhury:
Morpheus: Bringing The (PKCS) One To Meet the Oracle. 2474-2496 - Daniel De Almeida Braga

, Pierre-Alain Fouque
, Mohamed Sabt:
PARASITE: PAssword Recovery Attack against Srp Implementations in ThE wild. 2497-2512 - Grégoire Menguy

, Sébastien Bardin
, Richard Bonichon, Cauim de Souza Lima:
Search-Based Local Black-Box Deobfuscation: Understand, Improve and Mitigate. 2513-2525 - Jingxuan He

, Gishor Sivanrupan, Petar Tsankov, Martin T. Vechev:
Learning to Explore Paths for Symbolic Execution. 2526-2540
Session 10B: Crypto and Protocol Security
- Manuel Barbosa

, Gilles Barthe, Benjamin Grégoire, Adrien Koutsos, Pierre-Yves Strub:
Mechanized Proofs of Adversarial Complexity and Application to Universal Composability. 2541-2563 - Manuel Barbosa

, Gilles Barthe, Xiong Fan, Benjamin Grégoire, Shih-Han Hung, Jonathan Katz, Pierre-Yves Strub, Xiaodi Wu, Li Zhou:
EasyPQC: Verifying Post-Quantum Cryptography. 2564-2586 - José Bacelar Almeida

, Manuel Barbosa
, Manuel L. Correia, Karim Eldefrawy, Stéphane Graham-Lengrand, Hugo Pacheco
, Vitor Pereira
:
Machine-checked ZKP for NP relations: Formally Verified Security Proofs and Implementations of MPC-in-the-Head. 2587-2600 - Karthikeyan Bhargavan, Abhishek Bichhawat, Quoc Huy Do, Pedram Hosseyni, Ralf Küsters, Guido Schmitz

, Tim Würtele
:
An In-Depth Symbolic Security Analysis of the ACME Standard. 2601-2617 - Mei Wang, Kun He, Jing Chen, Zengpeng Li, Wei Zhao, Ruiying Du:

Biometrics-Authenticated Key Exchange for Secure Messaging. 2618-2631 - David A. Basin

, Jannik Dreier, Sofia Giampietro
, Sasa Radomirovic
:
Verifying Table-Based Elections. 2632-2652
Session 10C: Foundations
- Sri Aravinda Krishnan Thyagarajan

, Guilhem Castagnos, Fabien Laguillaumie, Giulio Malavolta
:
Efficient CCA Timed Commitments in Class Groups. 2663-2684 - Nitin Agrawal

, James Bell, Adrià Gascón, Matt J. Kusner:
MPC-Friendly Commitments for Publicly Verifiable Covert Security. 2685-2704 - Sourav Das, Zhuolun Xiang, Ling Ren

:
Asynchronous Data Dissemination and its Applications. 2705-2721 - Julien Duman, Kathrin Hövelmanns

, Eike Kiltz
, Vadim Lyubashevsky, Gregor Seiler:
Faster Lattice-Based KEMs via a Generic Fujisaki-Okamoto Transform Using Prefix Hashing. 2722-2737 - Susan Hohenberger, Satyanarayana Vusirikala:

PPE Circuits for Rational Polynomials. 2738-2757 - Mihai Christodorescu, Sivanarayana Gaddam, Pratyay Mukherjee, Rohit Sinha:

Amortized Threshold Symmetric-key Encryption. 2758-2779
Session 10D: Applied Privacy
- Jian Gong, Xinyu Zhang, Ju Ren, Yaoxue Zhang:

The Invisible Shadow: How Security Cameras Leak Private Activities. 2780-2793 - Tao Wang:

The One-Page Setting: A Higher Standard for Evaluating Website Fingerprinting Defenses. 2794-2806 - Nazir Saleheen, Md. Azim Ullah, Supriyo Chakraborty, Deniz S. Ones, Mani B. Srivastava, Santosh Kumar:

WristPrint: Characterizing User Re-identification Risks from Wrist-worn Accelerometry Data. 2807-2823 - Duc Bui, Yuan Yao, Kang G. Shin, Jong-Min Choi, Junbum Shin

:
Consistency Analysis of Data-Usage Purposes in Mobile Apps. 2824-2843 - Michael Smith, Peter Snyder, Benjamin Livshits, Deian Stefan:

SugarCoat: Programmatically Generating Privacy-Preserving, Web-Compatible Resource Replacements for Content Blocking. 2844-2857
Session 11A: Attestation and Firmware Security
- Wenna Song, Jiang Ming, Lin Jiang, Yi Xiang, Xuanchen Pan, Jianming Fu, Guojun Peng:

Towards Transparent and Stealthy Android OS Sandboxing via Customizable Container-Based Virtualization. 2858-2874 - Robert Buhren, Hans Niklas Jacob

, Thilo Krachenfels
, Jean-Pierre Seifert:
One Glitch to Rule Them All: Fault Injection Attacks Against AMD's Secure Encrypted Virtualization. 2875-2889 - Sebastian Surminski, Christian Niesler, Ferdinand Brasser, Lucas Davi, Ahmad-Reza Sadeghi:

RealSWATT: Remote Software-based Attestation for Embedded Devices under Realtime Constraints. 2890-2905 - Antoon Purnal, Furkan Turan

, Ingrid Verbauwhede
:
Prime+Scope: Overcoming the Observer Effect for High-Precision Cache Contention Attacks. 2906-2920 - Ivan De Oliveira Nunes, Sashidhar Jakkamsetti, Norrathep Rattanavipanon

, Gene Tsudik:
On the TOCTOU Problem in Remote Attestation. 2921-2936 - Mengyuan Li, Yinqian Zhang, Zhiqiang Lin:

CrossLine: Breaking "Security-by-Crash" based Memory Isolation in AMD SEV. 2937-2950
Session 11B: Zero Knowledge II
- Zhiyong Fang, David Darais, Joseph P. Near, Yupeng Zhang:

Zero Knowledge Static Program Analysis. 2951-2967 - Tianyi Liu

, Xiang Xie
, Yupeng Zhang:
zkCNN: Zero Knowledge Proofs for Convolutional Neural Network Predictions and Accuracy. 2968-2985 - Kang Yang, Pratik Sarkar, Chenkai Weng

, Xiao Wang
:
QuickSilver: Efficient and Affordable Zero-Knowledge Proofs for Circuits and Polynomials over Any Field. 2986-3001 - Yun Li, Cun Ye, Yuguang Hu, Ivring Morpheus, Yu Guo, Chao Zhang, Yupeng Zhang, Zhipeng Sun, Yiwen Lu, Haodi Wang

:
ZKCPlus: Optimized Fair-exchange Protocol Supporting Practical and Flexible Data Exchange. 3002-3021 - Cyprien Delpech de Saint Guilhem

, Emmanuela Orsini
, Titouan Tanguy:
Limbo: Efficient Zero-knowledge MPCitH-based Arguments. 3022-3036
Session 11C: Software Development and Analysis
- Rachel Cummings, Gabriel Kaptchuk, Elissa M. Redmiles:

"I need a better description": An Investigation Into User Expectations For Differential Privacy. 3037-3052 - Miuyin Yong Wong, Matthew Landen, Manos Antonakakis, Douglas M. Blough, Elissa M. Redmiles, Mustaque Ahamad:

An Inside Look into the Practice of Malware Analysis. 3053-3069 - Felix Fischer, Yannick Stachelscheid, Jens Grossklags:

The Effect of Google Search on Software Security: Unobtrusive Security Interventions via Content Re-ranking. 3070-3084 - Sebastian Roth

, Lea Gröber, Michael Backes, Katharina Krombholz, Ben Stock
:
12 Angry Developers - A Qualitative Study on Developers' Struggles with CSP. 3085-3103
Session 11D: Data Poisoning and Backdoor Attacks in ML
- Matthew Jagielski, Giorgio Severi, Niklas Pousette Harger, Alina Oprea:

Subpopulation Data Poisoning Attacks. 3104-3122 - Shaofeng Li, Hui Liu, Tian Dong, Benjamin Zi Hao Zhao, Minhui Xue

, Haojin Zhu, Jialiang Lu:
Hidden Backdoors in Human-Centric Language Models. 3123-3140 - Lujia Shen, Shouling Ji, Xuhong Zhang, Jinfeng Li, Jing Chen, Jie Shi, Chengfang Fang, Jianwei Yin, Ting Wang:

Backdoor Pre-trained Models Can Transfer to All. 3141-3158 - Chaoxiang He

, Bin Benjamin Zhu, Xiaojing Ma, Hai Jin, Shengshan Hu:
Feature-Indistinguishable Attack to Circumvent Trapdoor-Enabled Defense. 3159-3176 - Chong Xiang

, Prateek Mittal:
DetectorGuard: Provably Securing Object Detectors against Localized Patch Hiding Attacks. 3177-3196
Session 12A: Applications and Privacy of ML
- Dongqi Han

, Zhiliang Wang, Wenqi Chen, Ying Zhong, Su Wang
, Han Zhang, Jiahai Yang, Xingang Shi, Xia Yin:
DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications. 3197-3217 - Kaifa Zhao, Hao Zhou, Yulin Zhu

, Xian Zhan, Kai Zhou, Jianfeng Li, Le Yu, Wei Yuan
, Xiapu Luo:
Structural Attack against Graph Based Android Malware Detection. 3218-3235 - Xuezixiang Li, Yu Qu

, Heng Yin
:
PalmTree: Learning an Assembly Language Model for Instruction Embedding. 3236-3251 - Benjamin Coleman, Anshumali Shrivastava:

A One-Pass Distributed and Private Sketch for Kernel Sums with Applications to Machine Learning at Scale. 3252-3265 - Siam Umar Hussain, Mojan Javaheripi, Mohammad Samragh, Farinaz Koushanfar

:
COINN: Crypto/ML Codesign for Oblivious Inference via Neural Networks. 3266-3281
Session 12B: Analyzing Crashes and Incidents
- Xin Tan, Yuan Zhang, Chenyuan Mi, Jiajun Cao, Kun Sun, Yifan Lin, Min Yang:

Locating the Security Patches for Disclosed OSS Vulnerabilities with Vulnerability-Commit Correlation Ranking. 3282-3299 - Jiarun Dai, Yuan Zhang, Hailong Xu, Haiming Lyu, Zicheng Wu, Xinyu Xing, Min Yang:

Facilitating Vulnerability Assessment through PoC Migration. 3300-3317 - Zhiyuan Jiang, Xiyue Jiang, Ahmad Hazimeh, Chaojing Tang, Chao Zhang, Mathias Payer:

Igor: Crash Deduplication Through Root-Cause Clustering. 3318-3336 - Carter Yagemann

, Mohammad A. Noureddine, Wajih Ul Hassan, Simon P. Chung, Adam Bates
, Wenke Lee:
Validating the Integrity of Audit Logs Against Execution Repartitioning Attacks. 3337-3351 - Jonathan Fuller

, Ranjita Pai Kasturi, Amit Kumar Sikder, Haichuan Xu, Berat Arik, Vivek Verma, Ehsan Asdar, Brendan Saltaformaggio:
C3PO: Large-Scale Study Of Covert Monitoring of C&C Servers via Over-Permissioned Protocol Infiltration. 3352-3365
Session 12C: Traffic Analysis and Side Channels
- Jordan Holland, Paul Schmitt, Nick Feamster, Prateek Mittal:

New Directions in Automated Traffic Analysis. 3366-3383 - Zhongjie Wang, Shitong Zhu, Keyu Man, Pengxiong Zhu, Yu Hao

, Zhiyun Qian, Srikanth V. Krishnamurthy
, Tom La Porta, Michael J. De Lucia:
Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison. 3384-3399 - Keyu Man, Xin'an Zhou

, Zhiyun Qian:
DNS Cache Poisoning Attack: Resurrections with Side Channels. 3400-3414 - Andrew Beams, Sampath Kannan, Sebastian Angel:

Packet Scheduling with Optional Client Privacy. 3415-3430 - Chuanpu Fu

, Qi Li, Meng Shen, Ke Xu:
Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis. 3431-3446
Session 12D: Decentralized Cryptographic Protocols
- Sri Aravinda Krishnan Thyagarajan

, Tiantian Gong, Adithya Bhat, Aniket Kate, Dominique Schröder
:
OpenSquare: Decentralized Repeated Modular Squaring Service. 3447-3464 - Yan Ji

, Konstantinos Chalkias:
Generalized Proof of Liabilities. 3465-3486 - Aggelos Kiayias, Nikos Leonardos, Dionysis Zindros:

Mining in Logarithmic Space. 3487-3501 - Adithya Bhat, Nibesh Shrestha, Zhongtang Luo

, Aniket Kate, Kartik Nayak:
RandPiper - Reconfiguration-Friendly Random Beacons with Quadratic Communication. 3502-3524

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














