default search action
CCSW 2020: Virtual Event, USA
- Yinqian Zhang, Radu Sion:
CCSW'20, Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop, Virtual Event, USA, November 9, 2020. ACM 2020, ISBN 978-1-4503-8084-3 - Ranya Aloufi, Hamed Haddadi, David Boyle:
Privacy-preserving Voice Analysis via Disentangled Representations. 1-14 - Benjamin Zi Hao Zhao, Mohamed Ali Kâafar, Nicolas Kourtellis:
Not one but many Tradeoffs: Privacy Vs. Utility in Differentially Private Machine Learning. 15-26 - Chaoyun Zhang, Xavier Costa-Pérez, Paul Patras:
Tiki-Taka: Attacking and Defending Deep Learning-based Intrusion Detection Systems. 27-39 - Yuntao Liu, Ankur Srivastava:
GANRED: GAN-based Reverse Engineering of DNNs via Cache Side-Channel. 41-52 - Sushrut Shringarputale, Patrick D. McDaniel, Kevin R. B. Butler, Thomas La Porta:
Co-residency Attacks on Containers are Real. 53-66 - Martin Johns, Alexandra Dirksen:
Towards Enabling Secure Web-Based Cloud Services using Client-Side Encryption. 67-76 - Yujun Qin, Samuel Gonzalez, Kevin Angstadt, Xiaowei Wang, Stephanie Forrest, Reetuparna Das, Kevin Leach, Westley Weimer:
MARTINI: Memory Access Traces to Detect Attacks. 77-90 - William Findlay, Anil Somayaji, David Barrera:
bpfbox: Simple Precise Process Confinement with eBPF. 91-103 - Charlotte Bonte, Ilia Iliashenko:
Homomorphic String Search with Constant Multiplicative Depth. 105-117 - Lukas Alber, Stefan More, Sebastian Ramacher:
Short-Lived Forward-Secure Delegation for TLS. 119-132 - Luis Vargas, Patrick Emami, Patrick Traynor:
On the Detection of Disinformation Campaign Activity with Network Analysis. 133-146 - Ralf Ramsauer, Lukas Bulwahn, Daniel Lohmann, Wolfgang Mauerer:
The Sound of Silence: Mining Security Vulnerabilities from Secret Integration Channels in Open-Source Projects. 147-157 - Nadim Kobeissi, Georgio Nicolas, Mukesh Tiwari:
Verifpal: Cryptographic Protocol Analysis for the Real World. 159 - Bogdan Pavel Deac, Adrian Colesa:
Following the Pebble Trail: Extending Return-Oriented Programming to RISC-V. 161 - Wei Yuan:
Non-Interactive Cryptographic Access Control for Secure Outsourced Storage. 163 - Naufal Suryanto, Hyoeun Kang, Yongsu Kim, Youngyeo Yun, Harashta Tatimma Larasati, Howon Kim:
ABSTRACT: Together We Can Fool Them: A Distributed Black-Box Adversarial Attack Based on Multi-Group Particle Swarm Optimization. 165 - Giovanni Di Crescenzo, Brian A. Coan, Lisa Bahler, Kurt Rohloff, Yuriy Polyakov, David Bruce Cousins:
Securing Classifiers Against Both White-Box and Black-Box Attacks using Encrypted-Input Obfuscation. 167
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.