default search action
25th CCS 2018: Toronto, ON, Canada
- David Lie, Mohammad Mannan, Michael Backes, XiaoFeng Wang:
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, Toronto, ON, Canada, October 15-19, 2018. ACM 2018, ISBN 978-1-4503-5693-0
Keynote
- Helen Nissenbaum:
Achieving Meaningful Privacy in Digital Systems. 1-2
Session 1A: SDN 1
- Haopei Wang, Guangliang Yang, Phakpoom Chinprutthiwong, Lei Xu, Yangyong Zhang, Guofei Gu:
Towards Fine-grained Network Security Forensics and Diagnosis in the SDN Era. 3-16 - Hongda Li, Hongxin Hu, Guofei Gu, Gail-Joon Ahn, Fuqiang Zhang:
vNIDS: Towards Elastic Security with Safe and Efficient Virtualization of Network Intrusion Detection Systems. 17-34
Session 1B: Privacy
- Payman Mohassel, Peter Rindal:
ABY3: A Mixed Protocol Framework for Machine Learning. 35-52 - Véronique Cortier, Joseph Lallemand:
Voting: You Can't Have Privacy without Individual Verifiability. 53-66
Session 1C: Smart Contracts
- Petar Tsankov, Andrei Marian Dan, Dana Drachsler-Cohen, Arthur Gervais, Florian Bünzli, Martin T. Vechev:
Securify: Practical Security Analysis of Smart Contracts. 67-82 - Massimo Bartoletti, Roberto Zunino:
BitML: A Calculus for Bitcoin Smart Contracts. 83-100
Session 1D: ML for Deanonymization
- Mohammed Abuhamad, Tamer AbuHmed, Aziz Mohaisen, DaeHun Nyang:
Large-Scale and Language-Oblivious Code Authorship Identification. 101-114 - Nestor Hernandez, Mizanur Rahman, Ruben Recabarren, Bogdan Carbunar:
Fraud De-Anonymization for Fun and Profit. 115-130
Session 2A: Side Channels
- Young-joo Shin, Hyung Chan Kim, Dokeun Kwon, Ji-Hoon Jeong, Junbeom Hur:
Unveiling Hardware-based Data Prefetcher, a Hidden Source of Information Leakage. 131-145 - Mohammad A. Islam, Shaolei Ren:
Ohm's Law in Data Centers: A Voltage Side Channel for Timing Power Attacks. 146-162 - Giovanni Camurati, Sebastian Poeplau, Marius Muench, Tom Hayes, Aurélien Francillon:
Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers. 163-177 - Jo Van Bulck, Frank Piessens, Raoul Strackx:
Nemesis: Studying Microarchitectural Timing Leaks in Rudimentary CPU Interrupt Logic. 178-195
Session 2B: Differential Privacy 1
- Mehmet Emre Gursoy, Ling Liu, Stacey Truex, Lei Yu, Wenqi Wei:
Utility-Aware Synthesis of Differentially Private and Attack-Resilient Location Traces. 196-211 - Zhikun Zhang, Tianhao Wang, Ninghui Li, Shibo He, Jiming Chen:
CALM: Consistent Adaptive Local Marginal for Marginal Release under Local Differential Privacy. 212-229 - Thee Chanyaswad, Alex Dytso, H. Vincent Poor, Prateek Mittal:
MVG Mechanism: Differential Privacy under Matrix-Valued Query. 230-246 - Sebastian Meiser, Esfandiar Mohammadi:
Tight on Budget?: Tight Bounds for r-Fold Approximate Differential Privacy. 247-264
Session 2C: Crypto Attacks
- Shaanan N. Cohney, Matthew D. Green, Nadia Heninger:
Practical State Recovery Attacks against Legacy RNG Implementations. 265-280 - Martin R. Albrecht, Jake Massimo, Kenneth G. Paterson, Juraj Somorovsky:
Prime and Prejudice: Primality Testing Under Adversarial Conditions. 281-298 - Mathy Vanhoef, Frank Piessens:
Release the Kraken: New KRACKs in the 802.11 Standard. 299-314 - Paul Grubbs, Marie-Sarah Lacharité, Brice Minaud, Kenneth G. Paterson:
Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries. 315-331
Session 2D: ML 1
- Guixin Ye, Zhanyong Tang, Dingyi Fang, Zhanxing Zhu, Yansong Feng, Pengfei Xu, Xiaojiang Chen, Zheng Wang:
Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach. 332-348 - Yujie Ji, Xinyang Zhang, Shouling Ji, Xiapu Luo, Ting Wang:
Model-Reuse Attacks on Deep Learning Systems. 349-363 - Wenbo Guo, Dongliang Mu, Jun Xu, Purui Su, Gang Wang, Xinyu Xing:
LEMNA: Explaining Deep Learning based Security Applications. 364-379 - Kihong Heo, Woosuk Lee, Pardis Pashakhanloo, Mayur Naik:
Effective Program Debloating via Reinforcement Learning. 380-394
Session 3A: Binary Analysis
- Binlin Cheng, Jiang Ming, Jianming Fu, Guojun Peng, Ting Chen, Xiaosong Zhang, Jean-Yves Marion:
Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking with Orders-of-Magnitude Performance Boost. 395-411 - Juanru Li, Zhiqiang Lin, Juan Caballero, Yuanyuan Zhang, Dawu Gu:
K-Hunt: Pinpointing Insecure Cryptographic Keys from Execution Traces. 412-425 - Edward J. Schwartz, Cory F. Cohen, Michael Duggan, Jeffrey Gennari, Jeffrey S. Havrilla, Charles Hines:
Using Logic Programming to Recover C++ Classes and Methods from Compiled Executables. 426-441 - Dongpeng Xu, Jiang Ming, Yu Fu, Dinghao Wu:
VMHunt: A Verifiable Approach to Partially-Virtualized Binary Code Simplification. 442-458
Session 3B: Differential Privacy 2
- Meisam Mohammady, Lingyu Wang, Yuan Hong, Habib Louafi, Makan Pourzandi, Mourad Debbabi:
Preserving Both Privacy and Utility in Network Trace Anonymization. 459-474 - Zeyu Ding, Yuxin Wang, Guanhong Wang, Danfeng Zhang, Daniel Kifer:
Detecting Violations of Differential Privacy. 475-489 - Sahar Mazloom, S. Dov Gordon:
Secure Computation with Differentially Private Access Patterns. 490-507 - Benjamin Bichsel, Timon Gehr, Dana Drachsler-Cohen, Petar Tsankov, Martin T. Vechev:
DP-Finder: Finding Differential Privacy Violations by Sampling and Optimization. 508-524
Session 3C: Crypto: ZKPs and Lattices
- Jonathan Katz, Vladimir Kolesnikov, Xiao Wang:
Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum Signatures. 525-537 - Gilles Barthe, Xiong Fan, Joshua Gancher, Benjamin Grégoire, Charlie Jacomme, Elaine Shi:
Symbolic Proofs for Lattice-Based Cryptography. 538-555 - Rosario Gennaro, Michele Minelli, Anca Nitulescu, Michele Orrù:
Lattice-Based zk-SNARKs from Square Span Programs. 556-573 - Rafaël del Pino, Vadim Lyubashevsky, Gregor Seiler:
Lattice-Based Group Signatures and Zero-Knowledge Proofs of Automorphism Stability. 574-591
Session 3D: ML 2
- Yun Shen, Enrico Mariconti, Pierre-Antoine Vervier, Gianluca Stringhini:
Tiresias: Predicting Security Events Through Deep Learning. 592-605 - Wei Song, Heng Yin, Chang Liu, Dawn Song:
DeepMem: Learning Graph Neural Network Models for Fast and Robust Memory Forensic Analysis. 606-618 - Karan Ganju, Qi Wang, Wei Yang, Carl A. Gunter, Nikita Borisov:
Property Inference Attacks on Fully Connected Neural Networks using Permutation Invariant Representations. 619-633 - Milad Nasr, Reza Shokri, Amir Houmansadr:
Machine Learning with Membership Privacy using Adversarial Regularization. 634-646
Keynote
- Shai Halevi:
Advanced Cryptography: Promise and Challenges. 647
Session 4A: SDN 2
- Benjamin E. Ujcich, Samuel Jero, Anne Edmundson, Qi Wang, Richard Skowyra, James Landry, Adam Bates, William H. Sanders, Cristina Nita-Rotaru, Hamed Okhravi:
Cross-App Poisoning in Software-Defined Networking. 648-663 - Vaibhav Hemant Dixit, Adam Doupé, Yan Shoshitaishvili, Ziming Zhao, Gail-Joon Ahn:
AIM-SDN: Attacking Information Mismanagement in SDN-datastores. 664-676
Session 4B: Secure Computation 1
- Megha Byali, Arun Joseph, Arpita Patra, Divya Ravi:
Fast Secure Computation for Small Population over the Internet. 677-694 - Assi Barak, Martin Hirt, Lior Koskas, Yehuda Lindell:
An End-to-End System for Large Scale P2P MPC-as-a-Service and Low-Bandwidth MPC for Weak Participants. 695-712
Session 4C: Blockchain 1
- Itay Tsabary, Ittay Eyal:
The Gap Game. 713-728 - Lucianna Kiffer, Rajmohan Rajaraman, Abhi Shelat:
A Better Method to Analyze Blockchain Consistency. 729-744
Session 4D: Encrypted Search & Computation 1
- Shangqi Lai, Sikhar Patranabis, Amin Sakzad, Joseph K. Liu, Debdeep Mukhopadhyay, Ron Steinfeld, Shifeng Sun, Dongxi Liu, Cong Zuo:
Result Pattern Hiding Searchable Encryption for Conjunctive Queries. 745-762 - Shifeng Sun, Xingliang Yuan, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Viet Vo, Surya Nepal:
Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption. 763-780
Session 5A: Cyberphysical Systems
- Marcel Kneib, Christopher Huth:
Scission: Signal Characteristic-Based Sender Identification and Intrusion Detection in Automotive Networks. 787-800 - Hongjun Choi, Wen-Chuan Lee, Yousra Aafer, Fan Fei, Zhan Tu, Xiangyu Zhang, Dongyan Xu, Xinyan Deng:
Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach. 801-816 - Wissam Aoudi, Mikel Iturbe, Magnus Almgren:
Truth Will Out: Departure-Based Process-Level Detection of Stealthy Attacks on Control Systems. 817-831 - Wenbo Ding, Hongxin Hu:
On the Safety of IoT Device Physical Interaction Control. 832-846
Session 5B: Secure Computation 2
- Niklas Büscher, Daniel Demmler, Stefan Katzenbeisser, David Kretzmer, Thomas Schneider:
HyCC: Compilation of Hybrid Protocols for Practical Secure Computation. 847-861 - Ruiyu Zhu, Darion Cassel, Amr Sabry, Yan Huang:
NANOPI: Extreme-Scale Actively-Secure Multi-Party Computation. 862-879 - Toshinori Araki, Assi Barak, Jun Furukawa, Marcel Keller, Yehuda Lindell, Kazuma Ohara, Hikaru Tsuchida:
Generalizing the SPDZ Compiler For Other Protocols. 880-895 - Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai:
Compressing Vector OLE. 896-912
Session 5C: Blockchain 2
- Christian Badertscher, Peter Gazi, Aggelos Kiayias, Alexander Russell, Vassilis Zikas:
Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability. 913-930 - Mahdi Zamani, Mahnush Movahedi, Mariana Raykova:
RapidChain: Scaling Blockchain via Full Sharding. 931-948 - Stefan Dziembowski, Sebastian Faust, Kristina Hostáková:
General State Channel Networks. 949-966 - Stefan Dziembowski, Lisa Eckey, Sebastian Faust:
FairSwap: How To Fairly Exchange Digital Goods. 967-984
Session 5D: Encrypted Search & Computation 2
- Adi Akavia, Dan Feldman, Hayim Shaul:
Secure Search on Encrypted Data via Multi-Ring Sketch. 985-1001 - Sarvar Patel, Giuseppe Persiano, Kevin Yeo:
Private Stateful Information Retrieval. 1002-1019 - Eric Crockett, Chris Peikert, Chad Sharp:
ALCHEMY: A Language and Compiler for Homomorphic Encryption Made easY. 1020-1037 - Javad Ghareh Chamani, Dimitrios Papadopoulos, Charalampos Papamanthou, Rasool Jalili:
New Constructions for Forward and Backward Private Symmetric Searchable Encryption. 1038-1055
Session 6A: IoT Security
- Roei Schuster, Vitaly Shmatikov, Eran Tromer:
Situational Access Control in the Internet of Things. 1056-1073 - Wei Zhang, Yan Meng, Yugeng Liu, Xiaokuan Zhang, Yinqian Zhang, Haojin Zhu:
HoMonit: Monitoring Smart Home Apps from Encrypted Traffic. 1074-1088 - Hyunwoo Yu, Jaemin Lim, Kiyeon Kim, Suk-Bok Lee:
Pinto: Enabling Video Privacy for Commodity IoT Cameras. 1089-1101 - Iulia Bastys, Musard Balliu, Andrei Sabelfeld:
If This Then What?: Controlling Flows in IoT Apps. 1102-1119
Session 6B: Mobile Security 1
- Andrea Possemato, Andrea Lanzi, Simon Pak Ho Chung, Wenke Lee, Yanick Fratantonio:
ClickShield: Are You Hiding Something? Towards Eradicating Clickjacking on Android. 1120-1136 - Fengguo Wei, Xingwei Lin, Xinming Ou, Ting Chen, Xiaosong Zhang:
JN-SAF: Precise and Efficient NDK/JNI-aware Inter-language Static Analysis Framework for Security Vetting of Android Applications with Native Code. 1137-1150 - Yousra Aafer, Guanhong Tao, Jianjun Huang, Xiangyu Zhang, Ninghui Li:
Precise Android API Protection Mapping Derivation and Reasoning. 1151-1164 - Lei Zhang, Zhemin Yang, Yuyu He, Zhenyu Zhang, Zhiyun Qian, Geng Hong, Yuan Zhang, Min Yang:
Invetter: Locating Insecure Input Validations in Android Services. 1165-1178
Session 6C: Crypto 1
- Rosario Gennaro, Steven Goldfeder:
Fast Multiparty Threshold ECDSA with Fast Trustless Setup. 1179-1194 - Tibor Jager, Saqib A. Kakvi, Alexander May:
On the Security of the PKCS#1 v1.5 Signature Scheme. 1195-1208 - Xiaoqian Jiang, Miran Kim, Kristin E. Lauter, Yongsoo Song:
Secure Outsourced Matrix Computation and Application to Neural Networks. 1209-1222 - Hao Chen, Zhicong Huang, Kim Laine, Peter Rindal:
Labeled PSI from Fully Homomorphic Encryption with Malicious Security. 1223-1237
Session 6D: Usable Security
- Elissa M. Redmiles, Ziyun Zhu, Sean Kross, Dhruv Kuchhal, Tudor Dumitras, Michelle L. Mazurek:
Asking for a Friend: Evaluating Response Biases in Security User Studies. 1238-1255 - Mauro Cherubini, Alexandre Meylan, Bertil Chapuis, Mathias Humbert, Igor Bilogrevic, Kévin Huguenin:
Towards Usable Checksums: Automating the Integrity Verification of Web Downloads for the Masses. 1256-1271 - Constanze Dietrich, Katharina Krombholz, Kevin Borgolte, Tobias Fiebig:
Investigating System Operators' Perspective on Security Misconfigurations. 1272-1289 - Kevin Gallagher, Sameer Patil, Brendan Dolan-Gavitt, Damon McCoy, Nasir D. Memon:
Peeling the Onion's User Experience Layer: Examining Naturalistic Use of the Tor Browser. 1290-1305
Session 7A: Forensics
- Zhengxiong Li, Aditya Singh Rathore, Chen Song, Sheng Wei, Yanzhi Wang, Wenyao Xu:
PrinTracker: Fingerprinting 3D Printers using Commodity Scanners. 1306-1323 - Yutao Tang, Ding Li, Zhichun Li, Mu Zhang, Kangkook Jee, Xusheng Xiao, Zhenyu Wu, Junghwan Rhee, Fengyuan Xu, Qun Li:
NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis. 1324-1337 - Chris Chao-Chun Cheng, Chen Shi, Neil Zhenqiang Gong, Yong Guan:
EviHunter: Identifying Digital Evidence in the Permanent Storage of Android Devices via Static Analysis. 1338-1350
Session 7B: Formal Methods and Language Security
- Carmine Abate, Arthur Azevedo de Amorim, Roberto Blanco, Ana Nora Evans, Guglielmo Fachini, Catalin Hritcu, Théo Laurent, Benjamin C. Pierce, Marco Stronati, Andrew Tolmach:
When Good Components Go Bad: Formally Secure Compilation Despite Dynamic Compromise. 1351-1368 - Marc Andrysco, Andres Nötzli, Fraser Brown, Ranjit Jhala, Deian Stefan:
Towards Verified, Constant-time Floating Point Operations. 1369-1382 - David A. Basin, Jannik Dreier, Lucca Hirschi, Sasa Radomirovic, Ralf Sasse, Vincent Stettler:
A Formal Analysis of 5G Authentication. 1383-1396
Session 7C: TLS
- Eyal Ronen, Kenneth G. Paterson, Adi Shamir:
Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure. 1397-1414 - Christopher Patton, Thomas Shrimpton:
Partially Specified Channels: The TLS 1.3 Record Layer without Elision. 1415-1428 - Viet Tung Hoang, Stefano Tessaro, Aishwarya Thiruvengadam:
The Multi-user Security of GCM, Revisited: Tight Bounds for Nonce Randomization. 1429-1440
Session 7D: Binary Defenses 1
- Hojoon Lee, Chihyun Song, Brent ByungHoon Kang:
Lord of the x86 Rings: A Portable User Mode Privilege Separation Architecture on x86. 1441-1454 - Zhihao Yao, Saeed Mirzamohammadi, Ardalan Amiri Sani, Mathias Payer:
Milkomeda: Safeguarding the Mobile GPU Interface Using WebGL Security Checks. 1455-1469 - Hong Hu, Chenxiong Qian, Carter Yagemann, Simon Pak Ho Chung, William R. Harris, Taesoo Kim, Wenke Lee:
Enforcing Unique Code Target Property for Control-Flow Integrity. 1470-1486
Session 8A: Web Security 1
- Mahmood Sharif, Jumpei Urakawa, Nicolas Christin, Ayumu Kubota, Akira Yamada:
Predicting Impending Exposure to Malicious Content from User Behavior. 1487-1501 - Iskander Sánchez-Rola, Igor Santos, Davide Balzarotti:
Clock Around the Clock: Time-Based Device Fingerprinting. 1502-1514 - Anupam Das, Gunes Acar, Nikita Borisov, Amogh Pradeep:
The Web's Sixth Sense: A Study of Scripts Accessing Smartphone Sensors. 1515-1532
Session 8B: Usable Passwords
- Zeinab Joudaki, Julie Thorpe, Miguel Vargas Martin:
Reinforcing System-Assigned Passphrases Through Implicit Learning. 1533-1548 - Maximilian Golla, Miranda Wei, Juliette Hainline, Lydia Filipe, Markus Dürmuth, Elissa M. Redmiles, Blase Ur:
"What was that site doing with my Facebook password?": Designing Password-Reuse Notifications. 1549-1566 - Maximilian Golla, Markus Dürmuth:
On the Accuracy of Password Strength Meters. 1567-1582
Session 8C: Information Flow
- Andrew Ferraiuolo, Mark Zhao, Andrew C. Myers, G. Edward Suh:
HyperFlow: A Processor Architecture for Nonmalleable, Timing-Safe Information Flow Security. 1583-1600 - Thomas F. J.-M. Pasquier, Xueyuan Han, Thomas Moyer, Adam Bates, Olivier Hermant, David M. Eyers, Jean Bacon, Margo I. Seltzer:
Runtime Analysis of Whole-System Provenance. 1601-1616 - Thomas Schmitz, Maximilian Algehed, Cormac Flanagan, Alejandro Russo:
Faceted Secure Multi Execution. 1617-1634
Session 8D: Binary Defenses 2
- Daiping Liu, Mingwei Zhang, Haining Wang:
A Robust and Efficient Defense against Use-after-Free Exploits via Concurrent Pointer Sweeping. 1635-1648 - Benjamin Kollenda, Philipp Koppe, Marc Fyrbiak, Christian Kison, Christof Paar, Thorsten Holz:
An Exploratory Analysis of Microcode as a Building Block for System Defenses. 1649-1666 - Jingxuan He, Pesho Ivanov, Petar Tsankov, Veselin Raychev, Martin T. Vechev:
Debin: Predicting Debug Information in Stripped Binaries. 1667-1680
Session 9A: Web Security 2
- Quan Chen, Alexandros Kapravelos:
Mystique: Uncovering Information Leakage from Browser Extensions. 1687-1700 - Geng Hong, Zhemin Yang, Sen Yang, Lei Zhang, Yuhong Nan, Zhibo Zhang, Min Yang, Yuan Zhang, Zhiyun Qian, Hai-Xin Duan:
How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World. 1701-1713 - Radhesh Krishnan Konoth, Emanuele Vineti, Veelasha Moonsamy, Martina Lindorfer, Christopher Kruegel, Herbert Bos, Giovanni Vigna:
MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense. 1714-1730 - Jiyeon Lee, Hayeon Kim, Junghwan Park, Insik Shin, Sooel Son:
Pride and Prejudice in Progressive Web Apps: Abusing Native App-like Features in Web Applications. 1731-1746
Session 9B: Mobile Security 2
- Song Fang, Ian D. Markwood, Yao Liu, Shangqing Zhao, Zhuo Lu, Haojin Zhu:
No Training Hurdles: Fast Training-Agnostic Attacks to Infer Your Typing. 1747-1760 - Stefan Savage:
Lawful Device Access without Mass Surveillance Risk: A Technical Design Discussion. 1761-1774 - Man Zhou, Qian Wang, Jingxiao Yang, Qi Li, Feng Xiao, Zhibo Wang, Xiaofeng Chen:
PatternListener: Cracking Android Pattern Lock Using Acoustic Signals. 1775-1787 - Simone Aonzo, Alessio Merlo, Giulio Tavella, Yanick Fratantonio:
Phishing Attacks on Modern Android. 1788-1801
Session 9C: Crypto 2
- Katriel Cohn-Gordon, Cas Cremers, Luke Garratt, Jon Millican, Kevin Milner:
On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees. 1802-1819 - Jeremiah Blocki, Ling Ren, Samson Zhou:
Bandwidth-Hard Functions: Reductions and Lower Bounds. 1820-1836 - Yehuda Lindell, Ariel Nof:
Fast Secure Multiparty ECDSA with Practical Distributed Key Generation and Applications to Cryptocurrency Custody. 1837-1854 - Rouzbeh Behnia, Muslum Ozgur Ozmen, Attila A. Yavuz, Mike Rosulek:
TACHYON: Fast Signatures from Compact Knapsack. 1855-1867
Session 9D: Vulnerability Detection
- Kyriakos K. Ispoglou, Bader AlBassam, Trent Jaeger, Mathias Payer:
Block Oriented Programming: Automating Data-Only Attacks. 1868-1882 - Xiaokui Shu, Frederico Araujo, Douglas Lee Schales, Marc Ph. Stoecklin, Jiyong Jang, Heqing Huang, Josyula R. Rao:
Threat Intelligence Computing. 1883-1898 - Wenwen Wang, Kangjie Lu, Pen-Chung Yew:
Check It Again: Detecting Lacking-Recheck Bugs in OS Kernels. 1899-1913 - Yan Wang, Chao Zhang, Xiaobo Xiang, Zixuan Zhao, Wenjie Li, Xiaorui Gong, Bingchang Liu, Kaixiang Chen, Wei Zou:
Revery: From Proof-of-Concept to Exploitable. 1914-1927
Session 10A: TOR
- Payap Sirinam, Mohsen Imani, Marc Juarez, Matthew Wright:
Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning. 1928-1943 - Rob Jansen, Matthew Traudt, Nicholas Hopper:
Privacy-Preserving Dynamic Learning of Tor Network Traffic. 1944-1961 - Milad Nasr, Alireza Bahramali, Amir Houmansadr:
DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning. 1962-1976 - Shuai Li, Huajun Guo, Nicholas Hopper:
Measuring Information Leakage in Website Fingerprinting Attacks and Defenses. 1977-1992
Session 10B: Protocols
- Shashank Agrawal, Payman Mohassel, Pratyay Mukherjee, Peter Rindal:
DiSE: Distributed Symmetric-key Encryption. 1993-2010 - Luis Vargas, Gyan Hazarika, Rachel Culpepper, Kevin R. B. Butler, Thomas Shrimpton, Doug Szajda, Patrick Traynor:
Mitigating Risk while Complying with Data Retention Laws. 2011-2027 - Sisi Duan, Michael K. Reiter, Haibin Zhang:
BEAT: Asynchronous BFT Made Practical. 2028-2041 - Shashank Agrawal, Peihan Miao, Payman Mohassel, Pratyay Mukherjee:
PASTA: PASsword-based Threshold Authentication. 2042-2059
Session 10C: Key Exchanges
- Markus Brandt, Tianxiang Dai, Amit Klein, Haya Schulmann, Michael Waidner:
Domain Validation++ For MitM-Resilient PKI. 2060-2076 - Sergiu Costea, Marios O. Choudary, Doru Gucea, Björn Tackmann, Costin Raiciu:
Secure Opportunistic Multipath Key Exchange. 2077-2094
Session 10D: Fuzzing, Exploitation, and Side Channels
- Hongxu Chen, Yinxing Xue, Yuekang Li, Bihuan Chen, Xiaofei Xie, Xiuheng Wu, Yang Liu:
Hawkeye: Towards a Desired Directed Grey-box Fuzzer. 2095-2108 - Giorgi Maisuradze, Christian Rossow:
ret2spec: Speculative Execution Using Return Stack Buffers. 2109-2122 - George Klees, Andrew Ruef, Benji Cooper, Shiyi Wei, Michael Hicks:
Evaluating Fuzz Testing. 2123-2138 - Hoda Naghibijouybari, Ajaya Neupane, Zhiyun Qian, Nael B. Abu-Ghazaleh:
Rendered Insecure: GPU Side Channel Attacks are Practical. 2139-2153
Tutorials
- Battista Biggio, Fabio Roli:
Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning. 2154-2156 - Fattaneh Bayatbabolghani, Marina Blanton:
Secure Multi-Party Computation. 2157-2159 - Roger A. Hallman, Kim Laine, Wei Dai, Nicolas Gama, Alex J. Malozemoff, Yuriy Polyakov, Sergiu Carpov:
Building Applications with Homomorphic Encryption. 2160-2162 - Quanyan Zhu, Stefan Rass:
Game Theory Meets Network Security: A Tutorial. 2163-2165
Workshop Summaries
- Sadia Afroz, Battista Biggio, Yuval Elovici, David Freeman, Asaf Shabtai:
11th International Workshop on Artificial Intelligence and Security (AISec 2018). 2166-2167 - Chip-Hong Chang, Jorge Guajardo, Daniel E. Holcomb, Francesco Regazzoni, Ulrich Rührmair:
ASHES 2018- Workshop on Attacks and Solutions in Hardware Security. 2168-2170 - Awais Rashid, Nils Ole Tippenhauer:
CPS-SPC 2018: Fourth Workshop on Cyber-Physical Systems Security and PrivaCy. 2171-2172 - Roger A. Hallman, Shujun Li, Victor Chang:
2nd International Workshop on Multimedia Privacy and Security. 2173-2174 - Massimiliano Albanese, Dijiang Huang:
MTD 2018: 5th ACM Workshop on Moving Target Defense (MTD). 2175-2176 - Dan Meng:
SecArch'18: 1st Workshop of Security-Oriented Designs of Computer Architectures and Processors. 2177 - Mário S. Alvim, Stéphanie Delaune:
PLAS 2018 - ACM SIGSAC Workshop on Programming Languages and Analysis for Security. 2178-2179 - Baris Kasikci, Mark Silberstein:
SysTEX'18: 2018 Workshop on System Software for Trusted Execution. 2180 - Aaron Johnson, Ryan Henry:
17th Workshop on Privacy in the Electronic Society (WPES 2018). 2181-2182 - Michael Brenner, Kurt Rohloff:
WAHC'18: 6th Workshop on Encrypted Computing and Applied Homomorphic Cryptography. 2183-2184 - Yan Shoshitaishvili, Mayur Naik:
FEAST'18 - 2018 Workshop on Forming an Ecosystem around Software Transformation. 2185-2186
Panel
- Kevin R. B. Butler, Robert K. Cunningham, Paul C. van Oorschot, Reihaneh Safavi-Naini, Ashraf Matrawy, Jeremy Clark:
A Discussion on Security Education in Academia. 2187-2188
Demonstrations
- Aleksandr Pilgun, Olga Gadyatskaya, Stanislav Dashevskyi, Yury Zhauniarovich, Artsiom Kushniarou:
An Effective Android Code Coverage Tool. 2189-2191 - David M. Sommer, Sebastian Meiser, Esfandiar Mohammadi:
PrivacyBuDe: Privacy Buckets Demo Tight Differential Privacy Guarantees made Simple. 2192-2194
Poster Presentations
- Said Al-Riyami, Frans Coenen, Alexei Lisitsa:
A Re-evaluation of Intrusion Detection Accuracy: Alternative Evaluation Strategy. 2195-2197 - Toshinori Araki, Assi Barak, Jun Furukawa, Marcel Keller, Kazuma Ohara, Hikaru Tsuchida:
How to Choose Suitable Secure Multiparty Computation Using Generalized SPDZ. 2198-2200 - Arnab Bag, Sikhar Patranabis, L. Tribhuvan, Debdeep Mukhopadhyay:
Hardware Acceleration of Searchable Encryption. 2201-2203 - Jakub Breier, Xiaolu Hou, Dirmanto Jap, Lei Ma, Shivam Bhasin, Yang Liu:
Practical Fault Attack on Deep Neural Networks. 2204-2206 - Darion Cassel, Yan Huang, Limin Jia:
FlowNotation: An Annotation System for Statically Enforcing Information Flow Policies in C. 2207-2209 - Xia Cheng, Mo Sha:
Cracking the TSCH Channel Hopping in IEEE 802.15.4e. 2210-2212 - Tianxiang Dai, Haya Schulmann, Michael Waidner:
Off-Path Attacks Against PKI. 2213-2215 - Stanislav Dashevskyi, Olga Gadyatskaya, Aleksandr Pilgun, Yury Zhauniarovich:
The Influence of Code Coverage Metrics on Automated Testing Efficiency in Android. 2216-2218 - Wooyoung Go, Daewoo Lee:
Toward Trustworthy Deep Learning in Security. 2219-2221 - Ryo Iijima, Shota Minami, Yunao Zhou, Tatsuya Takehisa, Takeshi Takahashi, Yasuhiro Oikawa, Tatsuya Mori:
Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams. 2222-2224 - Mohsen Imani, Mohammad Saidur Rahman, Matthew Wright:
Adversarial Traces for Website Fingerprinting Defense. 2225-2227 - Yujie Ji, Ting Wang:
Towards Understanding the Dynamics of Adversarial Attacks. 2228-2230 - Katarzyna Kapusta, Gérard Memmi:
Circular AON: A Very Fast Scheme to Protect Encrypted Data Against Key Exposure. 2231-2233 - Jan Kasiak, Bogdan Carbunar, Jake Christensen, Maria Lyukova, Sumeet Bajaj, Mike Boruta, Radu Sion, Viorel Popescu, Alex Sorodoc, Gabriel Stan:
CipherLocker: Encrypted File Sharing with Ranked Search https: //cipherlocker.com. 2234-2236 - Yeeun Ku, Leo Hyun Park, Sooyeon Shin, Taekyoung Kwon:
A Guided Approach to Behavioral Authentication. 2237-2239 - Yun Lu, Konstantinos Mitropoulos, Rafail Ostrovsky, Avraham Weinstock, Vassilis Zikas:
Cryptographically Secure Detection of Injection Attacks. 2240-2242 - Zachary Matthews, Natalija Vlajic:
Can Browser Add-Ons Protect Your Children from Online Tracking? 2243-2245 - François Menet, Paul Berthier, Michel Gagnon, José M. Fernandez:
Spartan Networks: Self-Feature-Squeezing Networks for Increased Robustness in Adversarial Settings. 2246-2248 - Seung Ho Na, Kwanwoo Kim, Seungwon Shin:
Knowledge Seeking on The Shadow Brokers. 2249-2251 - Daniela Napoli, Sonia Chiasson:
Assessing Non-Visual SSL Certificates with Desktop and Mobile Screen Readers. 2252-2254 - Talha Ongun, Alina Oprea, Cristina Nita-Rotaru, Mihai Christodorescu, Negin Salajegheh:
The House That Knows You: User Authentication Based on IoT Data. 2255-2257 - Joon-Young Paik, Joong-Hyun Choi, Rize Jin, Jianming Wang, Eun-Sun Cho:
A Storage-level Detection Mechanism against Crypto-Ransomware. 2258-2260 - Balázs Pejó, Qiang Tang, Gergely Biczók:
The Price of Privacy in Collaborative Learning. 2261-2263 - Feargus Pendlebury, Fabio Pierazzi, Roberto Jordaney, Johannes Kinder, Lorenzo Cavallaro:
Enabling Fair ML Evaluations for Security. 2264-2266 - Rachel Petrik, Berat Arik, Jared M. Smith:
Towards Architecture and OS-Independent Malware Detection via Memory Forensics. 2267-2269 - Elissa M. Redmiles, John P. Dickerson, Krishna P. Gummadi, Michelle L. Mazurek:
Equitable Security: Optimizing Distribution of Nudges and Resources. 2270-2272 - Amrita Roy Chowdhury, Parameswaran Ramanathan:
Public Order Preserving Cipher Generation Scheme for Distributed Computing. 2273-2275 - Gili Rusak, Abdullah Al-Dujaili, Una-May O'Reilly:
AST-Based Deep Learning for Detecting Malicious PowerShell. 2276-2278 - John M. San Miguel, Megan E. M. Kline, Roger A. Hallman, Scott M. Slayback, Alexis Rogers, Stefanie S. F. Chang:
Aggregated Machine Learning on Indicators of Compromise in Android Devices. 2279-2281 - Michael Schliep, Nicholas Hopper:
End-to-End Secure Mobile Group Messaging with Conversation Integrity and Minimal Metadata Leakage. 2282-2284 - Vikash Sehwag, Chawin Sitawarin, Arjun Nitin Bhagoji, Arsalan Mosenia, Mung Chiang, Prateek Mittal:
Not All Pixels are Born Equal: An Analysis of Evasion Attacks under Locality Constraints. 2285-2287 - Setareh Sharifian, Reihaneh Safavi-Naini, Fuchun Lin:
Post-quantum Security using Channel Noise. 2288-2290 - Sagar Sharma, Keke Chen:
Image Disguising for Privacy-preserving Deep Learning. 2291-2293 - Sagar Sharma, Keke Chen:
Privacy-Preserving Boosting with Random Linear Classifiers. 2294-2296 - Zhuojia Shen, Jie Zhou, Divya Ojha, John Criswell:
Restricting Control Flow During Speculative Execution. 2297-2299 - Kris Shrishak, Haya Schulmann, Michael Waidner:
Removing the Bottleneck for Practical 2PC. 2300-2302 - Trishita Tiwari, Ari Trachtenberg:
Cashing in on the File-System Cache. 2303-2305 - Jun Wang, Afonso Arriaga, Qiang Tang, Peter Y. A. Ryan:
Facilitating Privacy-preserving Recommendation-as-a-Service with Machine Learning. 2306-2308 - Zhiqiang Wang, Pingchuan Ma, Yaping Chi, Jianyi Zhang:
Medical Devices are at Risk: Information Security on Diagnostic Imaging System. 2309-2311 - Guowen Xu, Hongwei Li, Rongxing Lu:
Practical and Privacy-Aware Truth Discovery in Mobile Crowd Sensing Systems. 2312-2314 - Hongfa Xue, Yurong Chen, Guru Venkataramani, Tian Lan, Guang Jin, Jason H. Li:
MORPH: Enhancing System Security through Interactive Customization of Application and Communication Protocol Features. 2315-2317 - Junghwan Yoon, Yezee Seo, Jaedong Jang, Mingi Cho, JinGoog Kim, HyeonSook Kim, Taekyoung Kwon:
A Bitstream Reverse Engineering Tool for FPGA Hardware Trojan Detection. 2318-2320 - Jianjun Zheng, Akbar Siami Namin:
A Markov Decision Process to Determine Optimal Policies in Moving Target. 2321-2323 - Yimin Zhu, Simon S. Woo:
Adversarial Product Review Generation with Word Replacements. 2324-2326
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.