default search action
39th SP 2018: San Francisco, CA, USA
- 2018 IEEE Symposium on Security and Privacy, SP 2018, Proceedings, 21-23 May 2018, San Francisco, California, USA. IEEE Computer Society 2018, ISBN 978-1-5386-4353-2
Machine Learning
- Timon Gehr, Matthew Mirman, Dana Drachsler-Cohen, Petar Tsankov, Swarat Chaudhuri, Martin T. Vechev:
AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation. 3-18 - Matthew Jagielski, Alina Oprea, Battista Biggio, Chang Liu, Cristina Nita-Rotaru, Bo Li:
Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning. 19-35 - Binghui Wang, Neil Zhenqiang Gong:
Stealing Hyperparameters in Machine Learning. 36-52 - Huichen Li, Xiaojun Xu, Chang Liu, Teng Ren, Kun Wu, Xuezhi Cao, Weinan Zhang, Yong Yu, Dawn Song:
A Machine Learning Approach to Prevent Malicious Calls over Telephony Networks. 53-69 - Amin Kharraz, William K. Robertson, Engin Kirda:
Surveylance: Automatically Detecting Online Survey Scams. 70-86
Privacy
- Giridhari Venkatadri, Athanasios Andreou, Yabing Liu, Alan Mislove, Krishna P. Gummadi, Patrick Loiseau, Oana Goga:
Privacy Risks with Facebook's PII-Based Targeting: Auditing a Data Broker's Advertising Interface. 89-107 - Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, Aniket Kate:
Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency - Choose Two. 108-126 - Tianhao Wang, Ninghui Li, Somesh Jha:
Locally Differentially Private Frequent Itemset Mining. 127-143 - Yimin Chen, Tao Li, Rui Zhang, Yanchao Zhang, Terri Hedgpeth:
EyeTell: Video-Assisted Touchscreen Keystroke Inference from Eye Movements. 144-160 - Emanuele Cozzi, Mariano Graziano, Yanick Fratantonio, Davide Balzarotti:
Understanding Linux Malware. 161-175
Side Channels
- Guoxing Chen, Wenhao Wang, Tianyu Chen, Sanchuan Chen, Yinqian Zhang, XiaoFeng Wang, Ten-Hwang Lai, Dongdai Lin:
Racing in Hyperspace: Closing Hyper-Threading Side Channels on SGX with Contrived Data Races. 178-194 - Pietro Frigo, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi:
Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPU. 195-210 - John V. Monaco:
SoK: Keylogging Side Channels. 211-228 - Mark Zhao, G. Edward Suh:
FPGA-Based Remote Power Side-Channel Attacks. 229-244 - Daniel Gruss, Moritz Lipp, Michael Schwarz, Daniel Genkin, Jonas Juffinger, Sioli O'Connell, Wolfgang Schoechl, Yuval Yarom:
Another Flip in the Wall of Rowhammer Defenses. 245-261
Computing on Hidden Data
- Christian Priebe, Kapil Vaswani, Manuel Costa:
EnclaveDB: A Secure Database Using SGX. 264-278 - Pratyush Mishra, Rishabh Poddar, Jerry Chen, Alessandro Chiesa, Raluca Ada Popa:
Oblix: An Efficient Oblivious Search Index. 279-296 - Marie-Sarah Lacharité, Brice Minaud, Kenneth G. Paterson:
Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage. 297-314 - Benedikt Bünz, Jonathan Bootle, Dan Boneh, Andrew Poelstra, Pieter Wuille, Gregory Maxwell:
Bulletproofs: Short Proofs for Confidential Transactions and More. 315-334 - Fabio Massacci, Chan Nam Ngo, Jing Nie, Daniele Venturi, Julian Williams:
FuturesMEX: Secure, Distributed Futures Market Exchange. 335-353 - David Bruce Cousins, Giovanni Di Crescenzo, Kamil Doruk Gür, Kevin King, Yuriy Polyakov, Kurt Rohloff, Gerard W. Ryan, Erkay Savas:
Implementing Conjunction Obfuscation Under Entropic Ring LWE. 354-371
Understanding Users
- Daniel Votipka, Rock Stevens, Elissa M. Redmiles, Jeremy Hu, Michelle L. Mazurek:
Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes. 374-391 - Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner:
Towards Security and Privacy for Multi-user Augmented Reality: Foundations with End Users. 392-408 - Lucy Simko, Ada Lerner, Samia Ibtasam, Franziska Roesner, Tadayoshi Kohno:
Computer Security and Privacy for Refugees in the United States. 409-423 - Stevens Le Blond, Alejandro Cuevas, Juan Ramón Troncoso-Pastoriza, Philipp Jovanovic, Bryan Ford, Jean-Pierre Hubaux:
On Enforcing the Digital Immunity of a Large Humanitarian Organization. 424-440 - Rahul Chatterjee, Periwinkle Doerfler, Hadas Orgad, Sam Havron, Jackeline Palmer, Diana Freed, Karen Levy, Nicola Dell, Damon McCoy, Thomas Ristenpart:
The Spyware Used in Intimate Partner Violence. 441-458
Programming Languages
- Hyungjoon Koo, Yaohui Chen, Long Lu, Vasileios P. Kemerlis, Michalis Polychronakis:
Compiler-Assisted Code Randomization. 461-477 - Nick Roessler, André DeHon:
Protecting the Stack with Metadata Policies and Tagged Hardware. 478-495 - Minh Ngo, Frank Piessens, Tamara Rezk:
Impossibility of Precise and Sound Termination-Sensitive Security Enforcements. 496-513 - Ziqiao Zhou, Zhiyun Qian, Michael K. Reiter, Yinqian Zhang:
Static Evaluation of Noninterference Using Approximate Model Counting. 514-528 - Vincent Cheval, Steve Kremer, Itsaka Rakotonirina:
DEEPSEC: Deciding Equivalence Properties in Security Protocols Theory and Practice. 529-546
Networked Systems
- Sjouke Mauw, Zach Smith, Jorge Toro-Pozo, Rolando Trujillo-Rasua:
Distance-Bounding Protocols: Verification without Time and Location. 549-566 - Christian Peeters, Hadi Abdullah, Nolen Scaife, Jasmine D. Bowers, Patrick Traynor, Bradley Reaves, Kevin R. B. Butler:
Sonar: Detecting SS7 Redirection Attacks with Audio-Based Distance Bounding. 567-582 - Eleftherios Kokoris-Kogias, Philipp Jovanovic, Linus Gasser, Nicolas Gailly, Ewa Syta, Bryan Ford:
OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding. 583-598 - Jared M. Smith, Max Schuchard:
Routing Around Congestion: Defeating DDoS Attacks and Adverse Network Conditions via Reactive BGP Routing. 599-617 - Danny Yuxing Huang, Maxwell Matthaios Aliapoulios, Vector Guo Li, Luca Invernizzi, Elie Bursztein, Kylie McRoberts, Jonathan Levin, Kirill Levchenko, Alex C. Snoeren, Damon McCoy:
Tracking Ransomware End-to-end. 618-631
Program Analysis
- Marten Oltrogge, Erik Derr, Christian Stransky, Yasemin Acar, Sascha Fahl, Christian Rossow, Giancarlo Pellegrino, Sven Bugiel, Michael Backes:
The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators. 634-647 - Yuqi Chen, Christopher M. Poskitt, Jun Sun:
Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System. 648-660 - Meng Xu, Chenxiong Qian, Kangjie Lu, Michael Backes, Taesoo Kim:
Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels. 661-678 - Shuitao Gan, Chao Zhang, Xiaojun Qin, Xuwen Tu, Kang Li, Zhongyu Pei, Zuoning Chen:
CollAFL: Path Sensitive Fuzzing. 679-696 - Hui Peng, Yan Shoshitaishvili, Mathias Payer:
T-Fuzz: Fuzzing by Program Transformation. 697-710 - Peng Chen, Hao Chen:
Angora: Efficient Fuzzing by Principled Search. 711-725
Web
- Antoine Vastel, Pierre Laperdrix, Walter Rudametkin, Romain Rouvoy:
FP-STALKER: Tracking Browser Fingerprint Evolutions. 728-741 - Guangliang Yang, Jeff Huang, Guofei Gu, Abner Mendoza:
Study and Mitigation of Origin Stripping Vulnerabilities in Hybrid-postMessage Enabled Mobile Applications. 742-755 - Abner Mendoza, Guofei Gu:
Mobile Application Web API Reconnaissance: Web-to-Mobile Inconsistencies & Vulnerabilities. 756-769 - Kevin Borgolte, Shuang Hao, Tobias Fiebig, Giovanni Vigna:
Enumerating Active IPv6 Hosts for Large-Scale Security Scans via DNSSEC-Signed Reverse Zones. 770-784 - Deepak Kumar, Zhengping Wang, Matthew Hyder, Joseph Dickinson, Gabrielle Beck, David Adrian, Joshua Mason, Zakir Durumeric, J. Alex Halderman, Michael D. Bailey:
Tracking Certificate Misissuance in the Wild. 785-798 - Karthikeyan Bhargavan, Ioana Boureanu, Antoine Delignat-Lavaud, Pierre-Alain Fouque, Cristina Onete:
A Formal Treatment of Accountable Proxying Over TLS. 799-816
Authentication
- Nirnimesh Ghose, Loukas Lazos, Ming Li:
Secure Device Bootstrapping Without Secrets Resistant to Signal Manipulation Attacks. 819-835 - Jun Han, Albert Jin Chung, Manal Kumar Sinha, Madhumitha Harishankar, Shijia Pan, Hae Young Noh, Pei Zhang, Patrick Tague:
Do You Feel What I Hear? Enabling Autonomous IoT Device Pairing Using Different Sensor Types. 836-852 - Jeremiah Blocki, Benjamin Harsha, Samson Zhou:
On the Economics of Offline Password Cracking. 853-871 - Joshua Reynolds, Trevor Smith, Ken Reese, Luke Dickinson, Scott Ruoti, Kent E. Seamons:
A Tale of Two Studies: The Best and Worst of YubiKey Usability. 872-888 - Simon Eberz, Giulio Lovisotto, Andrea Patane, Marta Kwiatkowska, Vincent Lenders, Ivan Martinovic:
When Your Fitness Tracker Betrays You: Quantifying the Predictability of Biometric Features Across Contexts. 889-905
Cryptography
- Yupeng Zhang, Daniel Genkin, Jonathan Katz, Dimitrios Papadopoulos, Charalampos Papamanthou:
vRAM: Faster Verifiable RAM with Program-Independent Preprocessing. 908-925 - Riad S. Wahby, Ioanna Tzialla, Abhi Shelat, Justin Thaler, Michael Walfish:
Doubly-Efficient zkSNARKs Without Trusted Setup. 926-943 - Ahmed E. Kosba, Charalampos Papamanthou, Elaine Shi:
xJsnark: A Framework for Efficient Verifiable Computation. 944-961 - Sebastian Angel, Hao Chen, Kim Laine, Srinath T. V. Setty:
PIR with Compressed Queries and Amortized Query Processing. 962-979 - Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat:
Secure Two-party Threshold ECDSA from ECDSA Assumptions. 980-997
Devices
- S. Abhishek Anand, Nitesh Saxena:
Speechless: Analyzing the Threat to Speech Privacy from Smartphone Motion Sensors. 1000-1017 - Kai Jansen, Matthias Schäfer, Daniel Moser, Vincent Lenders, Christina Pöpper, Jens B. Schmitt:
Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks. 1018-1031 - Jing (Dave) Tian, Nolen Scaife, Deepak Kumar, Michael D. Bailey, Adam Bates, Kevin R. B. Butler:
SoK: "Plug & Pray" Today - Understanding USB Insecurity in Versions 1 Through C. 1032-1047 - Connor Bolton, Sara Rampazzi, Chaohao Li, Andrew Kwong, Wenyuan Xu, Kevin Fu:
Blue Note: How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems. 1048-1062 - Nolen Scaife, Christian Peeters, Camilo Velez, Hanqing Zhao, Patrick Traynor, David Arnold:
The Cards Aren't Alright: Detecting Counterfeit Gift Cards Using Encoding Jitter. 1063-1076
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.