Martin Albrecht, Loenzo Grassi, Leo Perrin, Sebastian Ramacher, Christian Rechberger, Dragos Rotaru, Arnab Roy and Markus Schofnegger. |
Feistel Structures for MPC, and More |
Saed Alrabaee, El Mouatez Karbab, Lingyu Wang and Mourad Debbabi. |
BinEye: Towards Efficient Binary Authorship Characterization Using Deep Learning |
Emma Arfelt, David Basin and Søren Debois. |
Monitoring the GDPR |
Gildas Avoine, Sébastien Canard and Loïc Ferreira. |
IoT-friendly AKE: Forward Secrecy and Session Resumption Meet Symmetric-key Cryptography |
Gilles Barthe, Sonia Belaïd, Gaëtan Cassiers, Pierre-Alain Fouque, Benjamin Grégoire and François-Xavier Standaert. |
Automated Verification of Higher-Order Masking in Presence of Physical Defaults |
Alex Belkin, Nethanel Gelernter and Israel Cidon. |
The Risks of WebGL: Analysis, Evaluation and Detection |
Jacqueline Brendel, Marc Fischlin and Felix Günther. |
Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids |
Sergiu Bursuc and Steve Kremer. |
Contingent payments on a public ledger: models and reductions for automated verification |
Maxime Buser, Joseph K. Liu, Ron Steinfeld, Amin Sakzad and Shi-Feng Sun. |
A Dynamic & Revocable Group Merkle Signature |
Matteo Cagnazzo, Norbert Pohlmann and Thorsten Holz. |
GDPiRated – Stealing Personal Information On- and Offline |
Stefano Calzavara, Alvise Rabitti, Alessio Ragazzo and Michele Bugliesi. |
Testing for Integrity Flaws in Web Sessions |
Darion Cassel, Yan Huang and Limin Jia. |
Uncovering Information Flow Policy Violations in C Programs |
Stefanos Chaliasos, George Metaxopoulos, George Argyros and Dimitris Mitropoulos. |
Mime Artist: Bypassing Whitelisting for the Web with JavaScript Mimicry Attacks
|
Shan Chen, Samuel Jero, Matthew Jagielski, Alexandra Boldyreva and Cristina Nita-Rotaru. |
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) vs. QUIC |
Lingguang Lei, Yuewu Wang, Dawei Chu, Yanchu Li, Jiwu Jing and Kun Sun |
OCRAM-assisted Sensitive Data Protection on ARM-based Platform |
Max Curran, Xiao Liang, Himanshu Gupta, Omkant Pandey and Samir Das. |
ProCSA: Protecting Privacy in Crowdsourced Spectrum Allocation |
Hung Dang, Ee-Chien Chang and Dat Le Tien. |
Towards a Marketplace for Secure Outsourced Computations |
Nicolai Davidssoon, Andre Pawlowski and Thorsten Holz. |
Towards Automated Application-Specific Software Stacks |
Alexandre Debant, Stephanie Delaune and Cyrille Wiedling. |
Symbolic analysis of terrorist fraud resistance |
Keita Emura, Shuichi Katsumata and Yohei Watanabe. |
Identity-Based Encryption with Security against the KGC: A Formal Model and Its Instantiation from Lattices |
Nils Fleischhacker, Giulio Malavolta and Dominique Schroeder. |
Arithmetic Garbling from Bilinear Maps |
Behrad Garmany, Martin Stoffel, Robert Gawlik and Thorsten Holz. |
Static Detection of Uninitialized Stack Variables in Binary Code |
Ilias Giechaskiel, Youqian Zhang and Kasper Rasmussen. |
A Framework for Evaluating Security in the Presence of Signal Injection Attacks |
Sébastien Gondron and Sebastian A. Mödersheim. |
Formalizing and Proving Privacy Properties of Voting Protocols using Alpha-Beta Privacy |
Juan Guarnizo and Pawel Szalachowski. |
Practical Data Feed Service for Smart Contracts |
Hui Guo, Zhenfeng Zhang, Jing Xu and Mingyuan Xia. |
Generic Traceable Proxy Re-Encryption and Accountable Extension in Consensus Network |
Jaybie de Guzman, Kanchana Thilakarathna and Aruna Seneviratne. |
A First Look into Privacy Leakage in 3D Mixed Reality Data |
Vincent Haupert and Stephan Gabert. |
Where to Look for What You See Is What You Sign? User Confusion in Transaction Security |
Ross Horne, Sjouke Mauw, Zach Smith and Ihor Filimonov. |
Breaking Unlinkability of the ICAO 9303 Standard for e-Passports using Bisimilarity |
Hugo Jonker, Benjamin Krumnow and Gabry Vlot. |
Fingerprint surface-based detection of web bot detectors |
Yusuke Kawamoto and Takao Murakami. |
Local Obfuscation Mechanisms for Hiding Probability Distributions |
Shabnam Kasra Kermanshahi, Joseph Liu, Ron Steinfeld and Surya Nepal. |
Generic Multi-keyword Ranked Search on Encrypted Cloud Data |
Florian Kerschbaum and Anselme Tueno. |
An Efficiently Searchable Encrypted Data Structure for Range Queries |
Duc Le, Mahimna Kelkar and Aniket Kate. |
Flexible Signatures: Making Authentication Suitable for Real-Time Environments |
Xiaoning Liu and Xun Yi. |
Privacy-Preserving Collaborative Medical Time Series Analysis based on Dynamic Time Warping |
Zhen Liu, Khoa Nguyen, Guomin Yang, Huaxiong Wang and Duncan S. Wong. |
A Lattice-based Linkable Ring Signature Supporting Stealth Addresses |
Kangjie Lu, Aditya Pakki and Qiushi Wu. |
Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs |
Siqi Ma, Elisa Bertino, Robert Deng, Juanru Li, Diet Ostry, Surya Nepal and Sanjay Jha. |
Finding Flaws from Password Authentication Code in Android Apps |
Suryadipta Majumdar, Azadeh Tabiban, Meisam Mohammady, Alaa Oqaily, Yosr Jarraya, Makan Pourzandi, Lingyu Wang and Mourad Debbabi. |
Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement |
Weizhi Meng, Wenjuan Li, Lijun Jiang, Kim-Kwang Raymond Choo and Chunhua Su. |
Practical Bayesian Poisoning Attacks on Challenge-based Collaborative Intrusion Detection Networks |
Loïc Miller and Cristel Pelsser. |
A Taxonomy of Attacks using BGP Blackholing |
Kazuhiko Minematsu and Norifumi Kamiya. |
Symmetric-key Corruption Detection : When XOR-MACs Meet Combinatorial Group Testing |
Duncan Mitchell and Johannes Kinder. |
A Formal Model for Checking Cryptographic API Usage in JavaScript |
Chris Novakovic and David Parker. |
Automated Formal Analysis of Side-Channel Attacks on Probabilistic Systems |
Momen Oqaily, Yosr Jarraya, Lingyu Wang, Mengyuan Zhang, Makan Pourzandi and Mourad Debbabi. |
iCAT: An Interactive Customizable Anonymization Tool |
Henrique G. Pereira and Philip W. L. Fong. |
SEPD: An Access Control Model for Resource Sharing in an IoT Environment |
Tran Viet Xuan Phuong, Willy Susilo, Guomin Yang, Jongkil Kim and Dongxi Liu. |
Puncturable Proxy Re-Encryption supporting to Group Messaging Service |
Yue Qin, Chi Cheng and Jintai Ding. |
A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope |
Erwin Quiring, Matthias Kirchner and Konrad Rieck. |
On the Security and Applicability of Fragile Camera Fingerprints |
Juan E. Rubio, Mark Manulis, Cristina Alcaraz and Javier Lopez. |
Enhancing Security and Dependability of Industrial Networks with Opinion Dynamics |
Michael Schwarz, Martin Schwarzl, Moritz Lipp, Jon Masters and Daniel Gruss. |
NetSpectre: Read Arbitrary Memory over Network |
Sagar Sharma and Keke Chen. |
Confidential Boosting with Random Linear Classifiers for Outsourced User-generated Data |
Philip Sperl and Konstantin Böttinger. |
Side-Channel Aware Fuzzing |
Miha Stopar, Tilen Marc, Jan Hartman, Manca Bizjak and Jolanda Modic. |
Privacy-Enhanced Machine Learning with Functional Encryption |
Junichi Tomida, Atsushi Fujioka, Akira Nagai and Koutarou Suzuki. |
Strongly Secure Identity-Based Key Exchange with Single Pairing Operation |
Henry Turner, Giulio Lovisotto and Ivan Martinovic. |
Attacking speaker recognition systems with phoneme morphing |
Bryan Ward, Richard Skowyra, Chad Spensky, Jason Martin and Hamed Okhravi. |
The Leakage-Resilience Dilemma |
Jianghong Wei, Xiaofeng Chen, Xuexian Hu and Jianfeng Ma. |
Forward-Secure Puncturable Identity-Based Encryption for Securing Cloud Emails |
Konrad Weiss and Julian Schuette. |
Annotary: A Concolic Execution System for Developing Secure Smart Contracts |
Yao Yao, Wei Zhou, Yan Jia, Lipeng Zhu, Yuqing Zhang and Peng Liu. |
Identifying Privilege Separation Vulnerabilities in IoT Firmware with Symbolic Execution |
Xun Yi, Kwok-Yan Lam, Elisa Bertino and Fang-Yu Rao. |
Location Privacy-Preserving Mobile Crowd Sensing with Anonymous Reputation |
Zhongjun Zhang, Jianfeng Wang, Yunling Wang, Yaping Su and Xiaofeng Chen. |
Towards Efficient Verifiable Forward Secure Searchable Symmetric Encryption |
Yifeng Zheng, Huayi Duan and Cong Wang. |
Towards Secure and Efficient Outsourcing of Machine Learning Classification |
Huadi Zheng, Qingqing Ye and Haibo Hu. |
BDPL: A Boundary Differential Private Layer against Machine Learning Model Extraction Attacks |
Lei Zhou, Jidong Xiao, Leach Kevin, Westley Weimer, Fengwei Zhang and Guojun Wang. |
Nighthawk: Transparent System Introspection from Ring -3 |
Yevhen Zolotavkin and Veronika Kuchta. |
Incentives for Harvesting Attack in Proof of Work mining pools |
Cong Zuo, Shi-Feng Sun, Joseph K. Liu, Jun Shao and Josef Pieprzyk. |
Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy |
|
|