default search action
30th USENIX Security Symposium 2021
- Michael D. Bailey, Rachel Greenstadt:
30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021. USENIX Association 2021, ISBN 978-1-939133-24-3
Usability: Authentication
- Cheng Guo, Brianne Campbell, Apu Kapadia, Michael K. Reiter, Kelly Caine:
Effect of Mood, Location, Trust, and Presence of Others on Video-Based Social Authentication. 1-18 - Mary Theofanos, Yee-Yin Choong, Olivia Murphy:
'Passwords Keep Me Safe' - Understanding What Children Think about Passwords. 19-35 - Katharina Pfeffer, Alexandra Mai, Adrian Dabrowski, Matthias Gusenbauer, Philipp Schindler, Edgar R. Weippl, Michael Franz, Katharina Krombholz:
On the Usability of Authenticity Checks for Hardware Security Tokens. 37-54 - Patricia Arias Cabarcos, Thilo Habrich, Karen Becker, Christian Becker, Thorsten Strufe:
Inexpensive Brainwave Authentication: New Techniques and Insights on User Acceptance. 55-72 - Hirak Ray, Flynn Wolf, Ravi Kuber, Adam J. Aviv:
Why Older Adults (Don't) Use Password Managers. 73-90 - Leona Lassak, Annika Hildebrandt, Maximilian Golla, Blase Ur:
"It's Stored, Hopefully, on an Encrypted Server": Mitigating Users' Misconceptions About FIDO2 Biometric WebAuthn. 91-108 - Maximilian Golla, Grant Ho, Marika Lohmus, Monica Pulluri, Elissa M. Redmiles:
Driving 2FA Adoption at Scale: Optimizing Two-Factor Authentication Notification Design Patterns. 109-126
Cryptography: Attacks
- Simon Oya, Florian Kerschbaum:
Hiding the Access Pattern is Not Enough: Exploiting Search Pattern Leakage in Searchable Encryption. 127-142 - Marc Damie, Florian Hahn, Andreas Peter:
A Highly Accurate Query-Recovery Attack against Searchable Encryption using Non-Indexed Documents. 143-160 - Mathy Vanhoef:
Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation. 161-178 - David A. Basin, Ralf Sasse, Jorge Toro-Pozo:
Card Brand Mixup Attack: Bypassing the PIN in non-Visa Cards by Using Them for Visa Transactions. 179-194 - Julia Len, Paul Grubbs, Thomas Ristenpart:
Partitioning Oracle Attacks. 195-212 - Robert Merget, Marcus Brinkmann, Nimrod Aviram, Juraj Somorovsky, Johannes Mittmann, Jörg Schwenk:
Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E). 213-230 - Thomas Roche, Victor Lomné, Camille Mutschler, Laurent Imbert:
A Side Journey To Titan. 231-248
Embedded Security & SW Sec
- Taegyu Kim, Vireshwar Kumar, Junghwan Rhee, Jizhou Chen, Kyungtae Kim, Chung Hwan Kim, Dongyan Xu, Dave (Jing) Tian:
PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-Metal Embedded Applications. 249-266 - Nils Albartus, Clemens Nasenberg, Florian Stolz, Marc Fyrbiak, Christof Paar, Russell Tessier:
On the Design and Misuse of Microcoded (Embedded) Processors - A Cautionary Note. 267-284 - Arslan Khan, Hyungsub Kim, Byoungyoung Lee, Dongyan Xu, Antonio Bianchi, Dave (Jing) Tian:
M2MON: Building an MMIO-based Security Reference Monitor for Unmanned Vehicles. 285-302 - Libo Chen, Yanhao Wang, Quanpu Cai, Yunfan Zhan, Hong Hu, Jiaqi Linghu, Qinsheng Hou, Chao Zhang, Haixin Duan, Zhi Xue:
Sharing More and Checking Less: Leveraging Common Input Keywords to Detect Bugs in Embedded Systems. 303-319 - Evan Johnson, Maxwell Bland, Yifei Zhu, Joshua Mason, Stephen Checkoway, Stefan Savage, Kirill Levchenko:
Jetset: Targeted Firmware Rehosting for Embedded Systems. 321-338 - Jianliang Wu, Ruoyu Wu, Daniele Antonioli, Mathias Payer, Nils Ole Tippenhauer, Dongyan Xu, Dave (Jing) Tian, Antonio Bianchi:
LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks. 339-356 - Hans Liljestrand, Thomas Nyman, Lachlan J. Gunn, Jan-Erik Ekberg, N. Asokan:
PACStack: an Authenticated Call Stack. 357-374
Usable Security and Privacy: User Perspectives
- Allison McDonald, Catherine Barwulor, Michelle L. Mazurek, Florian Schaub, Elissa M. Redmiles:
"It's stressful having all these phones": Investigating Sex Workers' Safety Goals, Risks, and Practices Online. 375-392 - Peter Mayer, Yixin Zou, Florian Schaub, Adam J. Aviv:
"Now I'm a bit angry: " Individuals' Awareness, Perception, and Responses to Data Breaches that Affected Them. 393-410 - Julie M. Haney, Yasemin Acar, Susanne Furman:
"It's the Company, the Government, You and I": User Perceptions of Responsibility for Smart Home Privacy and Security. 411-428 - Yixin Zou, Allison McDonald, Julia Narakornpichit, Nicola Dell, Thomas Ristenpart, Kevin A. Roundy, Florian Schaub, Acar Tamersoy:
The Role of Computer Security Customer Support in Helping Survivors of Intimate Partner Violence. 429-446 - Omer Akgul, Wei Bai, Shruti Das, Michelle L. Mazurek:
Evaluating In-Workflow Messages for Improving Mental Models of End-to-End Encryption. 447-464 - Rishabh Khandelwal, Thomas Linden, Hamza Harkous, Kassem Fawaz:
PriSEC: A Privacy Settings Enforcement Controller. 465-482 - Florian M. Farke, David G. Balash, Maximilian Golla, Markus Dürmuth, Adam J. Aviv:
Are Privacy Dashboards Good for End Users? Evaluating User Perceptions and Reactions to Google's My Activity. 483-500
Cryptographic Proof Systems, Analysis, and Applications
- Chenkai Weng, Kang Yang, Xiang Xie, Jonathan Katz, Xiao Wang:
Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications to Machine Learning. 501-518 - Lorenzo Grassi, Dmitry Khovratovich, Christian Rechberger, Arnab Roy, Markus Schofnegger:
Poseidon: A New Hash Function for Zero-Knowledge Proof Systems. 519-535 - Gaspard Anthoine, Jean-Guillaume Dumas, Mélanie de Jonghe, Aude Maignan, Clément Pernet, Michael Hanling, Daniel S. Roche:
Dynamic proofs of retrievability with low server storage. 537-554 - Carlo Meijer, Veelasha Moonsamy, Jos Wetzels:
Where's Crypto?: Automated Identification and Classification of Proprietary Cryptographic Primitives in Binary Code. 555-572 - Mohit Kumar Jangid, Guoxing Chen, Yinqian Zhang, Zhiqiang Lin:
Towards Formal Verification of State Continuity for Enclave Programs. 573-590 - Sarah Scheffler, Mayank Varia:
Protecting Cryptography Against Compelled Self-Incrimination. 591-608 - Fatemah Alharbi, Arwa Alrawais, Abdulrahman Bin Rabiah, Silas Richelson, Nael B. Abu-Ghazaleh:
CSProp: Ciphertext and Signature Propagation Low-Overhead Public-Key Cryptosystem for IoT Environments. 609-626
Hardware Side Channel Attacks
- Thilo Krachenfels, Tuba Kiyan, Shahin Tajik, Jean-Pierre Seifert:
Automatic Extraction of Secrets from the Transistor Jungle using Laser-Assisted Side-Channel Attacks. 627-644 - Riccardo Paccagnella, Licheng Luo, Christopher W. Fletcher:
Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical. 645-662 - Ivan Puddu, Moritz Schneider, Miro Haller, Srdjan Capkun:
Frontal Attack: Leaking Control-Flow in SGX via the CPU Frontend. 663-680 - Patrick Cronin, Xing Gao, Chengmo Yang, Haining Wang:
Charger-Surfing: Exploiting a Power Line Side-Channel for Smartphone Information Leakage. 681-698 - Zitai Chen, Georgios Vasilakis, Kit Murdock, Edward Dean, David F. Oswald, Flavio D. Garcia:
VoltPillager: Hardware-based fault injection attacks against Intel SGX Enclaves using the SVID voltage scaling interface. 699-716 - Mengyuan Li, Yinqian Zhang, Huibo Wang, Kang Li, Yueqiang Cheng:
CIPHERLEAKS: Breaking Constant-time Cryptography on AMD SEV via the Ciphertext Side Channel. 717-732 - Paizhuo Chen, Lei Li, Zhice Yang:
Cross-VM and Cross-Processor Covert Channels Exploiting Processor Idle Power Management. 733-750
Permissions and Passwords
- Bingyu Shen, Lili Wei, Chengcheng Xiang, Yudong Wu, Mingyao Shen, Yuanyuan Zhou, Xinxin Jin:
Can Systems Explain Permissions Better? Understanding Users' Misperceptions under Smartphone Runtime Permission Model. 751-768 - Igor Bilogrevic, Balazs Engedy, Judson L. Porter III, Nina Taft, Kamila Hasanbega, Andrew Paseltiner, Hwi Kyoung Lee, Edward Jung, Meggyn Watkins, P. J. McLachlan, Jason James:
"Shhh...be quiet!" Reducing the Unwanted Interruptions of Notification Permission Prompts on Chrome. 769-784 - Yusra Elbitar, Michael Schilling, Trung Tin Nguyen, Michael Backes, Sven Bugiel:
Explanation Beats Context: The Effect of Timing & Rationales on Users' Runtime Permission Decisions. 785-802 - Weicheng Cao, Chunqiu Xia, Sai Teja Peddinti, David Lie, Nina Taft, Lisa M. Austin:
A Large Scale Study of User Behavior, Expectations and Engagement with Android Permissions. 803-820 - Dario Pasquini, Marco Cianfriglia, Giuseppe Ateniese, Massimo Bernaschi:
Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries. 821-838 - Ke Coby Wang, Michael K. Reiter:
Using Amnesia to Detect Credential Database Breaches. 839-855 - Haibo Cheng, Wenting Li, Ping Wang, Chao-Hsien Chu, Kaitai Liang:
Incrementally Updateable Honey Password Vaults. 857-874
Private Computation and Differential Privacy
- Dmitry Kogan, Henry Corrigan-Gibbs:
Private Blocklist Lookups with Checklist. 875-892 - Anunay Kulshrestha, Jonathan R. Mayer:
Identifying Harmful Media in End-to-End Encrypted Communication: Efficient Private Membership Computation. 893-910 - Erkam Uzun, Simon P. Chung, Vladimir Kolesnikov, Alexandra Boldyreva, Wenke Lee:
Fuzzy Labeled Private Set Intersection with Applications to Private Real-Time Biometric Search. 911-928 - Zhikun Zhang, Tianhao Wang, Ninghui Li, Jean Honorio, Michael Backes, Shibo He, Jiming Chen, Yang Zhang:
PrivSyn: Differentially Private Data Synthesis. 929-946 - Xiaoyu Cao, Jinyuan Jia, Neil Zhenqiang Gong:
Data Poisoning Attacks to Local Differential Privacy Protocols. 947-964 - Changhui Hu, Jin Li, Zheli Liu, Xiaojie Guo, Yu Wei, Xuan Guang, Grigorios Loukides, Changyu Dong:
How to Make Private Distributed Cardinality Estimation Practical, and Get Differential Privacy for Free. 965-982 - Jacob Imola, Takao Murakami, Kamalika Chaudhuri:
Locally Differentially Private Analysis of Graph Statistics. 983-1000
Hardware Security
- Finn de Ridder, Pietro Frigo, Emanuele Vannacci, Herbert Bos, Cristiano Giuffrida, Kaveh Razavi:
SMASH: Synchronized Many-sided Rowhammer Attacks from JavaScript. 1001-1018 - Aria Shahverdi, Mahammad Shirinov, Dana Dachman-Soled:
Database Reconstruction from Noisy Volumes: A Cache Side-Channel Attack on SQLite. 1019-1035 - Reza Mirzazade Farkhani, Mansour Ahmadi, Long Lu:
PTAuth: Temporal Memory Safety via Robust Points-to Authentication. 1037-1054 - Zhaokun Han, Muhammad Yasin, Jeyavijayan (JV) Rajendran:
Does logic locking work with EDA tools? 1055-1072 - Raad Bahmani, Ferdinand Brasser, Ghada Dessouky, Patrick Jauernig, Matthias Klimmek, Ahmad-Reza Sadeghi, Emmanuel Stapf:
CURE: A Security Architecture with CUstomizable and Resilient Enclaves. 1073-1090 - Zhe Tao, Aseem Rastogi, Naman Gupta, Kapil Vaswani, Aditya V. Thakur:
DICE*: A Formally Verified Implementation of DICE Measured Boot. 1091-1107 - Chen Chen, Anrin Chakraborti, Radu Sion:
PEARL: Plausibly Deniable Flash Translation Layer using WOM coding. 1109-1126
Usable Security and Privacy: Institutional Perspectives
- Kimberly Ferguson-Walter, Maxine Major, Chelsea K. Johnson, Daniel H. Muhleman:
Examining the Efficacy of Decoy-based and Psychological Cyber Deception. 1127-1144 - Mohammad Taha Khan, Christopher Tran, Shubham Singh, Dimitri Vasilkov, Chris Kanich, Blase Ur, Elena Zheleva:
Helping Users Automatically Find and Manage Sensitive, Expendable Files in Cloud Storage. 1145-1162 - Ben Kaiser, Jerry Wei, Eli Lucherini, Kevin Lee, J. Nathan Matias, Jonathan R. Mayer:
Adapting Security Warnings to Counter Online Disinformation. 1163-1180 - Sunny Consolvo, Patrick Gage Kelley, Tara Matthews, Kurt Thomas, Lee Dunn, Elie Bursztein:
"Why wouldn't someone think of democracy as a target?": Security practices & challenges of people involved with U.S. political campaigns. 1181-1198 - Flynn Wolf, Adam J. Aviv, Ravi Kuber:
Security Obstacles and Motivations for Small Businesses from a CISO's Perspective. 1199-1216 - Noel Warford, Collins W. Munyendo, Ashna Mediratta, Adam J. Aviv, Michelle L. Mazurek:
Strategies and Perceived Risks of Sending Sensitive Documents. 1217-1234 - Nicolas Huaman, Bennet von Skarczinski, Christian Stransky, Dominik Wermke, Yasemin Acar, Arne Dreißigacker, Sascha Fahl:
A Large-Scale Interview Study on Information Security in and Attacks against Small and Medium-sized Enterprises. 1235-1252
Cryptocurrencies and Smart Contracts
- Muoi Tran, Akshaye Shenoi, Min Suk Kang:
On the Routing-Aware Peering against Network-Eclipse Attacks in Bitcoin. 1253-1270 - Ningyu He, Ruiyi Zhang, Haoyu Wang, Lei Wu, Xiapu Luo, Yao Guo, Ting Yu, Xuxian Jiang:
EOSAFE: Security Analysis of EOSIO Smart Contracts. 1271-1288 - Michael Rodler, Wenting Li, Ghassan O. Karame, Lucas Davi:
EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts. 1289-1306 - Liya Su, Xinyue Shen, Xiangyu Du, Xiaojing Liao, XiaoFeng Wang, Luyi Xing, Baoxu Liu:
Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications. 1307-1324 - Daniel Perez, Benjamin Livshits:
Smart Contract Vulnerabilities: Vulnerable Does Not Imply Exploited. 1325-1341 - Christof Ferreira Torres, Ramiro Camino, Radu State:
Frontrunner Jones and the Raiders of the Dark Forest: An Empirical Study of Frontrunning on the Ethereum Blockchain. 1343-1359 - Sunbeom So, Seongjoon Hong, Hakjoo Oh:
SmarTest: Effectively Hunting Vulnerable Transaction Sequences in Smart Contracts through Language Model-Guided Symbolic Execution. 1361-1378
Hardware Side Channel Defenses
- Gururaj Saileshwar, Moinuddin K. Qureshi:
MIRAGE: Mitigating Conflict-Based Cache Attacks with a Practical Fully-Associative Design. 1379-1396 - Kevin Loughlin, Ian Neal, Jiacheng Ma, Elisa Tsai, Ofir Weisse, Satish Narayanasamy, Baris Kasikci:
DOLMA: Securing Speculation with the Principle of Transient Non-Observability. 1397-1414 - Daniel Weber, Ahmad Ibrahim, Hamed Nemati, Michael Schwarz, Christian Rossow:
Osiris: Automated Discovery of Microarchitectural Side Channels. 1415-1432 - Shravan Narayan, Craig Disselkoen, Daniel Moghimi, Sunjay Cauligi, Evan Johnson, Zhao Gang, Anjo Vahldiek-Oberwagner, Ravi Sahita, Hovav Shacham, Dean M. Tullsen, Deian Stefan:
Swivel: Hardening WebAssembly against Spectre. 1433-1450 - Hany Ragab, Enrico Barberis, Herbert Bos, Cristiano Giuffrida:
Rage Against the Machine Clear: A Systematic Analysis of Machine Clears and Their Implications for Transient Execution Attacks. 1451-1468 - Barbara Gigerl, Vedad Hadzic, Robert Primas, Stefan Mangard, Roderick Bloem:
Coco: Co-Design and Co-Verification of Masked Software Implementations on CPUs. 1469-1468
Machine Learning: Backdoor and Poisoning
- Giorgio Severi, Jim Meyer, Scott E. Coull, Alina Oprea:
Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers. 1487-1504 - Eugene Bagdasaryan, Vitaly Shmatikov:
Blind Backdoors in Deep Learning Models. 1505-1521 - Zhaohan Xi, Ren Pang, Shouling Ji, Ting Wang:
Graph Backdoor. 1523-1540 - Di Tang, XiaoFeng Wang, Haixu Tang, Kehuan Zhang:
Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor Contamination Detection. 1541-1558 - Roei Schuster, Congzheng Song, Eran Tromer, Vitaly Shmatikov:
You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion. 1559-1575 - Nicholas Carlini:
Poisoning the Unlabeled Dataset of Semi-Supervised Learning. 1577-1592 - Jose Rodrigo Sanchez Vicarte, Gang Wang, Christopher W. Fletcher:
Double-Cross Attacks: Subverting Active Learning Systems. 1593-1610
Program Analysis
- Gabriel Ryan, Abhishek Shah, Dongdong She, Koustubha Bhat, Suman Jana:
Fine Grained Dataflow Tracking with Proximal Gradients. 1611-1628 - Jia-Ju Bai, Tuo Li, Kangjie Lu, Shi-Min Hu:
Static Detection of Unsafe DMA Accesses in Device Drivers. 1629-1645 - Yan Wang, Chao Zhang, Zixuan Zhao, Bolun Zhang, Xiaorui Gong, Wei Zou:
MAZE: Towards Automated Heap Feng Shui. 1647-1664 - Sanchuan Chen, Zhiqiang Lin, Yinqian Zhang:
SelectiveTaint: Efficient Data Flow Tracking With Static Binary Rewriting. 1665-1682 - Stefan Nagy, Anh Nguyen-Tuong, Jason D. Hiser, Jack W. Davidson, Matthew Hicks:
Breaking Through Binaries: Compiler-quality Instrumentation for Better Binary-only Fuzzing. 1683-1700 - Binbin Liu, Junfu Shen, Jiang Ming, Qilong Zheng, Jing Li, Dongpeng Xu:
MBA-Blast: Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation. 1701-1718 - Kaixiang Chen, Chao Zhang, Tingting Yin, Xingman Chen, Lei Zhao:
VScape: Assessing and Escaping Virtual Call Protections. 1719-1736
Privacy Enhancing Technologies
- Paul Schmitt, Barath Raghavan:
Pretty Good Phone Privacy. 1737-1754 - Michael A. Specter, Sunoo Park, Matthew Green:
KeyForge: Non-Attributable Email from Forward-Forgeable Signatures. 1755-1773 - Saba Eskandarian, Henry Corrigan-Gibbs, Matei Zaharia, Dan Boneh:
Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic Privacy. 1775-1792 - Jingjie Li, Amrita Roy Chowdhury, Kassem Fawaz, Younghyun Kim:
Kalεido: Real-Time Privacy Control for Eye-Tracking Systems. 1793-1810 - Asra Ali, Tancrède Lepoint, Sarvar Patel, Mariana Raykova, Phillipp Schoppmann, Karn Seth, Kevin Yeo:
Communication-Computation Trade-offs in PIR. 1811-1828 - Akash Deep Singh, Luis Garcia, Joseph Noor, Mani B. Srivastava:
I Always Feel Like Somebody's Sensing Me! A Framework to Detect, Identify, and Localize Clandestine Wireless Sensors. 1829-1846 - Cas Cremers, Britta Hale, Konrad Kohbrok:
The Complexities of Healing in Secure Group Messaging: Why Cross-Group Effects Matter. 1847-1864
Machine Learning: Adversarial Examples and Model Extraction
- Giulio Lovisotto, Henry Turner, Ivo Sluganovic, Martin Strohmeier, Ivan Martinovic:
SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations. 1865-1882 - Xian Wu, Wenbo Guo, Hua Wei, Xinyu Xing:
Adversarial Policy Training against Deep Reinforcement Learning. 1883-1900 - Yingzhe He, Guozhu Meng, Kai Chen, Xingbo Hu, Jinwen He:
DRMI: A Dataset Reduction Technology based on Mutual Information for Black-box Attacks. 1901-1918 - Adnan Siraj Rakin, Yukui Luo, Xiaolin Xu, Deliang Fan:
Deep-Dup: An Adversarial Weight Duplication Attack Framework to Crush Deep Neural Network in Multi-Tenant FPGA. 1919-1936 - Hengrui Jia, Christopher A. Choquette-Choo, Varun Chandrasekaran, Nicolas Papernot:
Entangled Watermarks as a Defense against Model Extraction. 1937-1954 - Zhichuang Sun, Ruimin Sun, Long Lu, Alan Mislove:
Mind Your Weight(s): A Large-scale Study on Insufficient Machine Learning Model Protection in Mobile Apps. 1955-1972 - Yuankun Zhu, Yueqiang Cheng, Husheng Zhou, Yantao Lu:
Hermes Attack: Steal DNN Models with Lossless Inference Accuracy. 1973-1988
Automated Security Analysis of Source Code and Binaries
- Carter Yagemann, Matthew Pruett, Simon P. Chung, Kennon Bittick, Brendan Saltaformaggio, Wenke Lee:
ARCUS: Symbolic Root Cause Analysis of Exploits in Production Systems. 1989-2006 - Wei Zhou, Le Guan, Peng Liu, Yuqing Zhang:
Automatic Firmware Emulation through Invalidity-guided Knowledge Inference. 2007-2024 - Mansour Ahmadi, Reza Mirzazade Farkhani, Ryan Williams, Long Lu:
Finding Bugs Using Your Own Code: Detecting Functionally-similar yet Inconsistent Code. 2025-2040 - Qiushi Wu, Aditya Pakki, Navid Emamdoost, Stephen McCamant, Kangjie Lu:
Understanding and Detecting Disordered Error Handling with Precise Function Pairing. 2041-2058 - HyungSeok Han, Andrew Wesie, Brian Pak:
Precise and Scalable Detection of Use-after-Compacting-Garbage-Collection Bugs. 2059-2074 - Xing Zhang, Jiongyi Chen, Chao Feng, Ruilin Li, Yunfei Su, Bin Zhang, Jing Lei, Chaojing Tang:
Reducing Test Cases with Attention Mechanism of Neural Networks. 2075-2092 - Xiaoqin Fu, Haipeng Cai:
FlowDist: Multi-Staged Refinement-Based Dynamic Information Flow Analysis for Distributed Software Systems. 2093-2110
Secure Multiparty Computation
- Sylvain Chatel, Apostolos Pyrgelis, Juan Ramón Troncoso-Pastoriza, Jean-Pierre Hubaux:
Privacy and Integrity Preserving Computations with CRISP. 2111-2128 - Rishabh Poddar, Sukrit Kalra, Avishay Yanai, Ryan Deng, Raluca Ada Popa, Joseph M. Hellerstein:
Senate: A Maliciously-Secure MPC Platform for Collaborative Analytics. 2129-2146 - Lucien K. L. Ng, Sherman S. M. Chow:
GForce: GPU-Friendly Oblivious and Rapid Neural Network Inference. 2147-2164 - Arpita Patra, Thomas Schneider, Ajith Suresh, Hossein Yalame:
ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation. 2165-2182 - Anders P. K. Dalskov, Daniel Escudero, Marcel Keller:
Fantastic Four: Honest-Majority Four-Party Secure Computation With Malicious Security. 2183-2200