default search action
26th CCS 2019: London, UK
- Lorenzo Cavallaro, Johannes Kinder, XiaoFeng Wang, Jonathan Katz:
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, London, UK, November 11-15, 2019. ACM 2019, ISBN 978-1-4503-6747-9
Session 1A: Attack I
- Vladislav Mladenov, Christian Mainka, Karsten Meyer zu Selhausen, Martin Grothe, Jörg Schwenk:
1 Trillion Dollar Refund: How To Spoof PDF Signatures. 1-14 - Jens Müller, Fabian Ising, Vladislav Mladenov, Christian Mainka, Sebastian Schinzel, Jörg Schwenk:
Practical Decryption exFiltration: Breaking PDF Encryption. 15-29
Session 1B: Cryptographic Primitives
- Russell W. F. Lai, Viktoria Ronge, Tim Ruffing, Dominique Schröder, Sri Aravinda Krishnan Thyagarajan, Jiafan Wang:
Omniring: Scaling Private Payments Without Trusted Setup. 31-48 - Georg Fuchsbauer:
WI Is Not Enough: Zero-Knowledge Contingent (Service) Payments Revisited. 49-62
Session 1C: Cloud Security I
- José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Matthew Campagna, Ernie Cohen, Benjamin Grégoire, Vitor Pereira, Bernardo Portela, Pierre-Yves Strub, Serdar Tasiran:
A Machine-Checked Proof of Security for AWS Key Management Service. 63-78 - Sarvar Patel, Giuseppe Persiano, Kevin Yeo, Moti Yung:
Mitigating Leakage in Secure Cloud-Hosted Data Structures: Volume-Hiding for Multi-Maps via Hashing. 79-93
Session 1D: Forensics
- Carlos Cotrini, Luca Corinzia, Thilo Weghorn, David A. Basin:
The Next 700 Policy Miners: A Universal Method for Building Policy Miners. 95-112 - Chengcheng Xiang, Yudong Wu, Bingyu Shen, Mingyao Shen, Haochen Huang, Tianyin Xu, Yuanyuan Zhou, Cindy Moore, Xinxin Jin, Tianwei Sheng:
Towards Continuous Access Control Validation and Forensics. 113-129
Session 1E: Privacy I
- Hooman Mohajeri Moghaddam, Gunes Acar, Ben Burgess, Arunesh Mathur, Danny Yuxing Huang, Nick Feamster, Edward W. Felten, Prateek Mittal, Arvind Narayanan:
Watching You Watch: The Tracking Ecosystem of Over-the-Top TV Streaming Devices. 131-147 - Ben Weinshel, Miranda Wei, Mainack Mondal, Euirim Choi, Shawn Shan, Claire Dolin, Michelle L. Mazurek, Blase Ur:
Oh, the Places You've Been! User Reactions to Longitudinal Transparency About Third-Party Web Tracking and Inferencing. 149-166
Session 2A: Side Channels I
- Daniel Gruss, Erik Kraft, Trishita Tiwari, Michael Schwarz, Ari Trachtenberg, Jason Hennessey, Alex Ionescu, Anders Fogh:
Page Cache Attacks. 167-180 - Keegan Ryan:
Hardware-Backed Heist: Extracting ECDSA Keys from Qualcomm's TrustZone. 181-194 - Pengfei Qiu, Dongsheng Wang, Yongqiang Lyu, Gang Qu:
VoltJockey: Breaching TrustZone by Software-Controlled Voltage Manipulation over Multi-core Frequencies. 195-209 - Yue Cao, Zhongjie Wang, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy, Paul L. Yu:
Principled Unearthing of TCP Side Channel Vulnerabilities. 211-224
Session 2B: ML Security I
- Ziqi Yang, Jiyi Zhang, Ee-Chien Chang, Zhenkai Liang:
Neural Network Inversion in Adversarial Setting via Background Knowledge Alignment. 225-240 - Liwei Song, Reza Shokri, Prateek Mittal:
Privacy Risks of Securing Machine Learning Models against Adversarial Examples. 241-257 - Jinyuan Jia, Ahmed Salem, Michael Backes, Yang Zhang, Neil Zhenqiang Gong:
MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples. 259-274 - Kenneth T. Co, Luis Muñoz-González, Sixte de Maupeou, Emil C. Lupu:
Procedural Noise Adversarial Examples for Black-Box Attacks on Deep Convolutional Networks. 275-289
Session 2C: Secure Computing I
- Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Rindal, Peter Scholl:
Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation. 291-308 - Daniel Masny, Peter Rindal:
Endemic Oblivious Transfer. 309-326 - Carmit Hazay, Yuval Ishai, Antonio Marcedone, Muthuramakrishnan Venkitasubramaniam:
LevioSA: Lightweight Secure Arithmetic Computation. 327-344 - Hao Chen, Ilaria Chillotti, Ling Ren:
Onion Ring ORAM: Efficient Constant Bandwidth Oblivious RAM from (Leveled) TFHE. 345-360
Session 2D: Encryption (Searchable, Updatable, Homomorphic, etc.)
- Zichen Gui, Oliver Johnson, Bogdan Warinschi:
Encrypted Databases: New Volume Attacks against Range Queries. 361-378 - Stanislaw Jarecki, Hugo Krawczyk, Jason K. Resch:
Updatable Oblivious Key Management for Storage Systems. 379-393 - Hao Chen, Wei Dai, Miran Kim, Yongsoo Song:
Efficient Multi-Key Homomorphic Encryption with Packed Ciphertexts with Application to Oblivious Neural Network Inference. 395-412 - Nirvan Tyagi, Ian Miers, Thomas Ristenpart:
Traceback for End-to-End Encrypted Messaging. 413-430
Session 2E: Internet Security
- Henry Birge-Lee, Liang Wang, Jennifer Rexford, Prateek Mittal:
SICO: Surgical Interception Attacks by Manipulating BGP Communities. 431-448 - Hugo L. J. Bijmans, Tim M. Booij, Christian Doerr:
Just the Tip of the Iceberg: Internet-Scale Exploitation of Routers for Cryptojacking. 449-464 - Matthew J. Luckie, Robert Beverly, Ryan Koga, Ken Keys, Joshua A. Kroll, kc claffy:
Network Hygiene, Incentives, and Regulation: Deployment of Source Address Validation in the Internet. 465-480 - Sazzadur Rahaman, Gang Wang, Danfeng Daphne Yao:
Security Certification in Payment Card Industry: Testbeds, Measurements, and Recommendations. 481-498
Session 3A: Fuzzing: Methods and Applications
- Peng Chen, Jianzhong Liu, Hao Chen:
Matryoshka: Fuzzing Deeply Nested Branches. 499-513 - Mingi Cho, Seoyoung Kim, Taekyoung Kwon:
Intriguer: Field-Level Constraint Solving for Hybrid Fuzzing. 515-530 - Jingxuan He, Mislav Balunovic, Nodar Ambroladze, Petar Tsankov, Martin T. Vechev:
Learning to Fuzz from Symbolic Execution with Application to Smart Contracts. 531-548
Session 3B: Blockchain I
- Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, Yih-Chun Hu:
HyperService: Interoperability and Programmability Across Heterogeneous Blockchains. 549-566 - Muhammed F. Esgin, Raymond K. Zhao, Ron Steinfeld, Joseph K. Liu, Dongxi Liu:
MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol. 567-584 - Vivek Kumar Bagaria, Sreeram Kannan, David Tse, Giulia Fanti, Pramod Viswanath:
Prism: Deconstructing the Blockchain to Approach Physical Limits. 585-602
Session 3C: Secure Computing II
- Jeffrey Champion, Abhi Shelat, Jonathan R. Ullman:
Securely Sampling Biased Coins with Applications to Differential Privacy. 603-614 - Ryan Wails, Aaron Johnson, Daniel Starin, Arkady Yerukhimovich, S. Dov Gordon:
Stormy: Statistics in Tor by Measuring Securely. 615-632 - Ruiyu Zhu, Changchang Ding, Yan Huang:
Efficient Publicly Verifiable 2PC over a Blockchain with Applications to Financially-Secure Computations. 633-650
Session 3D: Formal Analysis I
- Poulami Das, Sebastian Faust, Julian Loss:
A Formal Treatment of Deterministic Wallets. 651-668 - Syed Rafiul Hussain, Mitziu Echeverria, Imtiaz Karim, Omar Chowdhury, Elisa Bertino:
5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol. 669-684 - Thomas Haines, Rajeev Goré, Mukesh Tiwari:
Verified Verifiers for Verifying Elections. 685-702
Session 3E: Privacy II
- Haipei Sun, Xiaokui Xiao, Issa Khalil, Yin Yang, Zhan Qin, Wendy Hui Wang, Ting Yu:
Analyzing Subgraph Statistics from Extended Local Views with Decentralized Differential Privacy. 703-717 - Hafiz Salman Asif, Periklis A. Papakonstantinou, Jaideep Vaidya:
How to Accurately and Privately Identify Anomalies. 719-736 - Simon Couch, Zeki Kazan, Kaiyan Shi, Andrew Bray, Adam Groce:
Differentially Private Nonparametric Hypothesis Testing. 737-751
Session 4A: Side Channels II
- Michael Schwarz, Moritz Lipp, Daniel Moghimi, Jo Van Bulck, Julian Stecklina, Thomas Prescher, Daniel Gruss:
ZombieLoad: Cross-Privilege-Boundary Data Sampling. 753-768 - Claudio Canella, Daniel Genkin, Lukas Giner, Daniel Gruss, Moritz Lipp, Marina Minkin, Daniel Moghimi, Frank Piessens, Michael Schwarz, Berk Sunar, Jo Van Bulck, Yuval Yarom:
Fallout: Leaking Data on Meltdown-resistant CPUs. 769-784 - Atri Bhattacharyya, Alexandra Sandulescu, Matthias Neugschwandtner, Alessandro Sorniotti, Babak Falsafi, Mathias Payer, Anil Kurmus:
SMoTherSpectre: Exploiting Speculative Execution through Port Contention. 785-800
Session 4B: Blockchain II
- Christoph Egger, Pedro Moreno-Sanchez, Matteo Maffei:
Atomic Multi-Channel Updates with Constant Collateral in Bitcoin-Compatible Payment-Channel Networks. 801-815 - Gleb Naumenko, Gregory Maxwell, Pieter Wuille, Alexandra Fedorova, Ivan Beschastnikh:
Erlay: Efficient Transaction Relay for Bitcoin. 817-831 - Shang Gao, Zecheng Li, Zhe Peng, Bin Xiao:
Power Adjusting and Bribery Racing: Novel Mining Attacks in the Bitcoin System. 833-850
Session 4C: Secure Computing III
- Karim Eldefrawy, Vitor Pereira:
A High-Assurance Evaluator for Machine-Checked Secure Multiparty Computation. 851-868 - Elette Boyle, Niv Gilboa, Yuval Ishai, Ariel Nof:
Practical Fully Secure Three-Party Computation via Sublinear Distributed Zero-Knowledge Proofs. 869-886 - Donghang Lu, Thomas Yurek, Samarth Kulshreshtha, Rahul Govind, Aniket Kate, Andrew Miller:
HoneyBadgerMPC and AsynchroMix: Practical Asynchronous MPC and its Application to Anonymous Communication. 887-903
Session 4D: Formal Analysis II
- Vincent Cheval, Steve Kremer, Itsaka Rakotonirina:
Exploiting Symmetries When Proving Equivalence Properties for Security Protocols. 905-922 - Susan Hohenberger, Satyanarayana Vusirikala:
Are These Pairing Elements Correct?: Automated Verification and Applications. 923-939 - Sjouke Mauw, Zach Smith, Jorge Toro-Pozo, Rolando Trujillo-Rasua:
Post-Collusion Security and Distance Bounding. 941-958
Session 4E: Privacy III
- Theo Bertram, Elie Bursztein, Stephanie Caro, Hubert Chao, Rutledge Chin Feman, Peter Fleischer, Albin Gustafsson, Jess Hemerly, Chris Hibbert, Luca Invernizzi, Lanah Kammourieh Donnelly, Jason Ketover, Jay Laefer, Paul Nicholas, Yuan Niu, Harjinder Obhi, David Price, Andrew Strait, Kurt Thomas, Al Verney:
Five Years of the Right to be Forgotten. 959-972 - Christine Utz, Martin Degeling, Sascha Fahl, Florian Schaub, Thorsten Holz:
(Un)informed Consent: Studying GDPR Consent Notices in the Field. 973-990 - Mainack Mondal, Günce Su Yilmaz, Noah Hirsch, Mohammad Taha Khan, Michael Tang, Christopher Tran, Chris Kanich, Blase Ur, Elena Zheleva:
Moving Beyond Set-It-And-Forget-It Privacy Settings on Social Media. 991-1008
Session 5A: Software Security
- Masoud Ghaffarinia, Kevin W. Hamlen:
Binary Control-Flow Trimming. 1009-1022 - Shen Liu, Dongrui Zeng, Yongzhe Huang, Frank Capobianco, Stephen McCamant, Trent Jaeger, Gang Tan:
Program-mandering: Quantitative Privilege Separation. 1023-1040
Session 5B: Protocols
- Dahlia Malkhi, Kartik Nayak, Ling Ren:
Flexible Byzantine Fault Tolerance. 1041-1053 - Phillipp Schoppmann, Adrià Gascón, Leonie Reichert, Mariana Raykova:
Distributed Vector-OLE: Improved Constructions and Implementation. 1055-1072
Session 5C: Cloud Security II
- Xing Gao, Zhongshu Gu, Zhengfa Li, Hani Jamjoom, Cong Wang:
Houdini's Escape: Breaking the Resource Rein of Linux Control Groups. 1073-1086 - Robert Buhren, Christian Werling, Jean-Pierre Seifert:
Insecure Until Proven Updated: Analyzing AMD SEV's Remote Attestation. 1087-1099
Session 5D: SDN Security
- Eduard Marin, Nicola Bucciol, Mauro Conti:
An In-depth Look Into SDN Topology Discovery Mechanisms: Novel Attacks and Practical Countermeasures. 1101-1114 - Christian Skalka, John H. Ring, David Darais, Minseok Kwon, Sahil Gupta, Kyle Diller, Steffen Smolka, Nate Foster:
Proof-Carrying Network Code. 1115-1129
Session 5E: Fingerprinting
- Payap Sirinam, Nate Mathews, Mohammad Saidur Rahman, Matthew Wright:
Triplet Fingerprinting: More Practical and Portable Website Fingerprinting with N-shot Learning. 1131-1148 - Yushi Cheng, Xiaoyu Ji, Juchuan Zhang, Wenyuan Xu, Yi-Chao Chen:
DeMiCPU: Device Fingerprinting with Magnetic Signals Radiated by CPU. 1149-1170
Session 6A: Biometrics Security
- Rahul Chatterjee, M. Sadegh Riazi, Tanmoy Chowdhury, Emanuela Marasco, Farinaz Koushanfar, Ari Juels:
Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms. 1171-1186 - Simon Eberz, Giulio Lovisotto, Kasper Bonne Rasmussen, Vincent Lenders, Ivan Martinovic:
28 Blinks Later: Tackling Practical Challenges of Eye Movement Biometrics. 1187-1199 - Jingjie Li, Kassem Fawaz, Younghyun Kim:
Velody: Nonlinear Vibration Challenge-Response for Resilient User Authentication. 1201-1213 - Chen Yan, Yan Long, Xiaoyu Ji, Wenyuan Xu:
The Catcher in the Field: A Fieldprint based Spoofing Detection for Text-Independent Speaker Verification. 1215-1229
Session 6B: ML Security II
- Nitin Agrawal, Ali Shahin Shamsabadi, Matt J. Kusner, Adrià Gascón:
QUOTIENT: Two-Party Secure Neural Network Training and Prediction. 1231-1247 - Teodora Baluta, Shiqi Shen, Shweta Shinde, Kuldeep S. Meel, Prateek Saxena:
Quantitative Verification of Neural Networks and Its Security Applications. 1249-1264 - Yingqi Liu, Wen-Chuan Lee, Guanhong Tao, Shiqing Ma, Yousra Aafer, Xiangyu Zhang:
ABS: Scanning Neural Networks for Back-doors by Artificial Brain Stimulation. 1265-1282 - Min Du, Zhi Chen, Chang Liu, Rajvardhan Oak, Dawn Song:
Lifelong Anomaly Detection Through Unlearning. 1283-1297
Session 6C: Secure Computing VI
- Alin Tomescu, Vivek Bhupatiraju, Dimitrios Papadopoulos, Charalampos Papamanthou, Nikos Triandopoulos, Srinivas Devadas:
Transparency Logs via Append-Only Authenticated Dictionaries. 1299-1316 - David Clayton, Christopher Patton, Thomas Shrimpton:
Probabilistic Data Structures in Adversarial Environments. 1317-1334 - Phillipp Schoppmann, Adrià Gascón, Mariana Raykova, Benny Pinkas:
Make Some ROOM for the Zeros: Data Sparsity in Secure Distributed Machine Learning. 1335-1350 - Ethan Cecchetti, Ben Fisch, Ian Miers, Ari Juels:
PIEs: Public Incompressible Encodings for Decentralized Storage. 1351-1367
Session 6E: Passwords and Accounts
- Moni Naor, Benny Pinkas, Eyal Ronen:
How to (not) Share a Password: Privacy Preserving Protocols for Finding Heavy Hitters with Adversarial Behavior. 1369-1386 - Lucy Li, Bijeeta Pal, Junade Ali, Nick Sullivan, Rahul Chatterjee, Thomas Ristenpart:
Protocols for Checking Compromised Credentials. 1387-1403 - Sven Hammann, Sasa Radomirovic, Ralf Sasse, David A. Basin:
User Account Access Graphs. 1405-1422 - Dong Yuan, Yuanli Miao, Neil Zhenqiang Gong, Zheng Yang, Qi Li, Dawn Song, Qian Wang, Xiao Liang:
Detecting Fake Accounts in Online Social Networks at the Time of Registrations. 1423-1438
Session 7A: Internet of Things
- Qi Wang, Pubali Datta, Wei Yang, Si Liu, Adam Bates, Carl A. Gunter:
Charting the Attack Surface of Trigger-Action IoT Platforms. 1439-1453 - Simon Birnbach, Simon Eberz, Ivan Martinovic:
Peeves: Physical Event Verification in Smart Homes. 1455-1467 - Chaoshun Zuo, Haohuang Wen, Zhiqiang Lin, Yinqian Zhang:
Automatic Fingerprinting of Vulnerable BLE IoT Devices with Static UUIDs from Mobile Apps. 1469-1483
Session 7B: Blockchain III
- Dominik Harz, Lewis Gudgeon, Arthur Gervais, William J. Knottenbelt:
Balance: Dynamic Adjustment of Cryptocurrency Deposits. 1485-1502 - Ting Chen, Yufei Zhang, Zihao Li, Xiapu Luo, Ting Wang, Rong Cao, Xiuzhuo Xiao, Xiaosong Zhang:
TokenScope: Automatically Detecting Inconsistent Behaviors of Cryptocurrency Tokens in Ethereum. 1503-1520 - Iddo Bentov, Yan Ji, Fan Zhang, Lorenz Breidenbach, Philip Daian, Ari Juels:
Tesseract: Real-Time Cryptocurrency Exchange Using Trusted Hardware. 1521-1538
Session 7C: Secure Computing V
- Muhammad Ishaq, Ana L. Milanova, Vassilis Zikas:
Efficient MPC via Program Analysis: A Framework for Efficient Optimal Mixing. 1539-1556 - Jun Furukawa, Yehuda Lindell:
Two-Thirds Honest-Majority MPC for Malicious Adversaries at Almost the Cost of Semi-Honest. 1557-1571 - Megha Byali, Carmit Hazay, Arpita Patra, Swati Singla:
Fast Actively Secure Five-Party Computation with Security Beyond Abort. 1573-1590
Session 7D: Formal Analysis III
- Yu-Fu Fu, Jiaxiang Liu, Xiaomu Shi, Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang:
Signed Cryptographic Program Verification with Typed CryptoLine. 1591-1606 - José Bacelar Almeida, Cécile Baritel-Ruet, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Alley Stoughton, Pierre-Yves Strub:
Machine-Checked Proofs for Cryptographic Standards: Indifferentiability of Sponge and Secure High-Assurance Implementations of SHA-3. 1607-1622 - Armaiti Ardeshiricham, Yoshiki Takashima, Sicun Gao, Ryan Kastner:
VeriSketch: Synthesizing Secure Hardware Designs with Timing-Sensitive Information Flow Properties. 1623-1638
Session 7E: Privacy-Preserving Techniques
- Melissa Chase, Apoorvaa Deshpande, Esha Ghosh, Harjasleen Malvai:
SEEMless: Secure End-to-End Encrypted Messaging with less</> Trust. 1639-1656 - Jianting Ning, Geong Sen Poh, Jia-Ch'ng Loh, Jason Chia, Ee-Chien Chang:
PrivDPI: Privacy-Preserving Encrypted Traffic Inspection with Reusable Obfuscated Rules. 1657-1670 - Johannes Blömer, Jan Bobolz, Denis Diemert, Fabian Eidens:
Updatable Anonymous Credentials and Applications to Incentive Systems. 1671-1685
Keynote
- N. Asokan:
Hardware-assisted Trusted Execution Environments: Look Back, Look Ahead. 1687
Session 8A: Attack II
- Sean Heelan, Tom Melham, Daniel Kroening:
Gollum: Modular and Greybox Exploit Generation for Heap Overflows in Interpreters. 1689-1706 - Yueqi Chen, Xinyu Xing:
SLAKE: Facilitating Slab Manipulation for Exploiting Vulnerabilities in the Linux Kernel. 1707-1722
Session 8B: TEE I
- Shijun Zhao, Qianying Zhang, Yu Qin, Wei Feng, Dengguo Feng:
SecTEE: A Software-based Approach to Secure Enclave Architecture Using TEE. 1723-1740 - Jo Van Bulck, David F. Oswald, Eduard Marin, Abdulla Aldoseri, Flavio D. Garcia, Frank Piessens:
A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes. 1741-1758
Session 8C: Blockchain VI
- Samuel Steffen, Benjamin Bichsel, Mario Gersbach, Noa Melchior, Petar Tsankov, Martin T. Vechev:
zkay: Specifying and Enforcing Data Privacy in Smart Contracts. 1759-1776 - Fucheng Liu, Yu Wen, Dongxue Zhang, Xihe Jiang, Xinyu Xing, Dan Meng:
Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise. 1777-1794 - Alex Biryukov, Daniel Feher, Giuseppe Vitto:
Privacy Aspects and Subliminal Channels in Zcash. 1795-1811 - Sadegh M. Milajerdi, Birhanu Eshete, Rigel Gjomemo, V. N. Venkatakrishnan:
POIROT: Aligning Attack Behavior with Kernel Audit Records for Cyber Threat Hunting. 1813-1830 - Zhenyuan Li, Qi Alfred Chen, Chunlin Xiong, Yan Chen, Tiantian Zhu, Hai Yang:
Effective and Light-Weight Deobfuscation and Semantic-Aware Attack Detection for PowerShell Scripts. 1831-1847 - Abbas Naderi-Afooshteh, Yonghwi Kwon, Anh Nguyen-Tuong, Ali Razmjoo-Qalaei, Mohammad-Reza Zamiri-Gourabi, Jack W. Davidson:
MalMax: Multi-Aspect Execution for Automated Dynamic Web Server Malware Analysis. 1849-1866
Session 8D: Language Security
- Kangjie Lu, Hong Hu:
Where Does It Go?: Refining Indirect-Call Targets with Multi-Layer Type Analysis. 1867-1881 - Mengchen Cao, Xiantong Hou, Tao Wang, Hunter Qu, Yajin Zhou, Xiaolong Bai, Fuwei Wang:
Different is Good: Detecting the Use of Uninitialized Variables through Differential Replay. 1883-1897
Session 8E: Web Security
- Aurore Fass, Michael Backes, Ben Stock:
HideNoSeek: Camouflaging Malicious JavaScript in Benign ASTs. 1899-1913 - Hoai Viet Nguyen, Luigi Lo Iacono, Hannes Federrath:
Your Cache Has Fallen: Cache-Poisoned Denial-of-Service Attack. 1915-1936
Session 9A: User Study
- Sunyoung Seiler-Hwang, Patricia Arias Cabarcos, Andrés Marín, Florina Almenáres, Daniel Díaz Sánchez, Christian Becker:
"I don't see why I would ever want to use it": Analyzing the Usability of Popular Smartphone Password Managers. 1937-1953 - Faris Bugra Kokulu, Ananta Soneji, Tiffany Bao, Yan Shoshitaishvili, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
Matched and Mismatched SOCs: A Qualitative Study on Security Operations Center Issues. 1955-1970 - Christian Tiefenau, Emanuel von Zezschwitz, Maximilian Häring, Katharina Krombholz, Matthew Smith:
A Usability Evaluation of Let's Encrypt and Certbot: Usable Security Done Right. 1971-1988
Session 9B: ML Security III
- Yue Zhao, Hong Zhu, Ruigang Liang, Qintao Shen, Shengzhi Zhang, Kai Chen:
Seeing isn't Believing: Towards More Robust Adversarial Attack Against Real World Object Detectors. 1989-2004 - Florian Tramèr, Pascal Dupré, Gili Rusak, Giancarlo Pellegrino, Dan Boneh:
AdVersarial: Perceptual Ad Blocking meets Adversarial Machine Learning. 2005-2021 - Binghui Wang, Neil Zhenqiang Gong:
Attacking Graph-based Classification via Manipulating the Graph Structure. 2023-2040 - Yuanshun Yao, Huiying Li, Haitao Zheng, Ben Y. Zhao:
Latent Backdoor Attacks on Deep Neural Networks. 2041-2055
Session 9C: Zero-Knowledge Proofs
- Russell W. F. Lai, Giulio Malavolta, Viktoria Ronge:
Succinct Arguments for Bilinear Group Arithmetic: Practical Structure-Preserving Cryptography. 2057-2074 - Matteo Campanelli, Dario Fiore, Anaïs Querol:
LegoSNARK: Modular Design and Composition of Succinct Zero-Knowledge Proofs. 2075-2092 - Max Hoffmann, Michael Klooß, Andy Rupp:
Efficient Zero-Knowledge Arguments in the Discrete Log Setting, Revisited. 2093-2110 - Mary Maller, Sean Bowe, Markulf Kohlweiss, Sarah Meiklejohn:
Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updatable Structured Reference Strings. 2111-2128
Session 9D: Signatures
- Daniel J. Bernstein, Andreas Hülsing, Stefan Kölbl, Ruben Niederhagen, Joost Rijneveld, Peter Schwabe:
The SPHINCS+ Signature Framework. 2129-2146 - Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Mélissa Rossi, Mehdi Tibouchi:
GALACTICS: Gaussian Sampling for Lattice-Based Constant- Time Implementation of Cryptographic Signatures, Revisited. 2147-2164 - Dennis Jackson, Cas Cremers, Katriel Cohn-Gordon, Ralf Sasse:
Seems Legit: Automated Analysis of Subtle Attacks on Protocols that Use Signatures. 2165-2180 - Michael Backes, Lucjan Hanzlik, Jonas Schneider-Bensch:
Membership Privacy for Fully Dynamic Group Signatures. 2181-2198
Session 9E: Web Censorship and Auditing
- Kevin Bock, George Hughey, Xiao Qiang, Dave Levin:
Geneva: Evolving Censorship Evasion Strategies. 2199-2214 - Sergey Frolov, Jack Wampler, Sze Chuen Tan, J. Alex Halderman, Nikita Borisov, Eric Wustrow:
Conjure: Summoning Proxies from Unused Address Space. 2215-2229 - Angelique Faye Loe, Elizabeth Anne Quaglia:
You Shall Not Join: A Measurement Study of Cryptocurrency Peer-to-Peer Bootstrapping Techniques. 2231-2247 - Gaurav Panwar, Roopa Vishwanathan, Satyajayant Misra, Austin Bos:
SAMPL: Scalable Auditability of Monitoring Processes using Public Ledgers. 2249-2266
Session 10A: Cyberphysical Security
- Yulong Cao, Chaowei Xiao, Benjamin Cyr, Yimeng Zhou, Won Park, Sara Rampazzi, Qi Alfred Chen, Kevin Fu, Z. Morley Mao:
Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving. 2267-2281 - Mert D. Pesé, Troy Stacer, C. Andrés Campos, Eric Newberry, Dongyao Chen, Kang G. Shin:
LibreCAN: Automated CAN Message Translator. 2283-2300 - Yazhou Tu, Sara Rampazzi, Bin Hao, Angel Rodriguez, Kevin Fu, Xiali Hei:
Trick or Heat?: Manipulating Critical Temperature-Based Control Systems Using Rectification Attacks. 2301-2315
Session 10B: TEE II
- Guoxing Chen, Yinqian Zhang, Ten-Hwang Lai:
OPERA: Open Remote Attestation for Intel's Secure Enclaves. 2317-2331 - Huibo Wang, Pei Wang, Yu Ding, Mingshen Sun, Yiming Jing, Ran Duan, Long Li, Yulong Zhang, Tao Wei, Zhiqiang Lin:
Towards Memory Safe Enclave Programming with Rust-SGX. 2333-2350 - Huayi Duan, Cong Wang, Xingliang Yuan, Yajin Zhou, Qian Wang, Kui Ren:
LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed. 2351-2367
Session 10C: Secret Sharing
- Sai Krishna Deepak Maram, Fan Zhang, Lun Wang, Andrew Low, Yupeng Zhang, Ari Juels, Dawn Song:
CHURP: Dynamic-Committee Proactive Secret Sharing. 2369-2386 - Soumya Basu, Alin Tomescu, Ittai Abraham, Dahlia Malkhi, Michael K. Reiter, Emin Gün Sirer:
Efficient Verifiable Secret Sharing with Share Recovery in BFT Protocols. 2387-2402 - Phi Hung Le, Samuel Ranellucci, S. Dov Gordon:
Two-party Private Set Intersection with an Untrusted Third Party. 2403-2420
Session 10D: Mobile Security
- Shengqu Xi, Shao Yang, Xusheng Xiao, Yuan Yao, Yayuan Xiong, Fengyuan Xu, Haoyu Wang, Peng Gao, Zhuotao Liu, Feng Xu, Jian Lu:
DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps. 2421-2436 - Mizanur Rahman, Nestor Hernandez, Ruben Recabarren, Syed Ishtiaque Ahmed, Bogdan Carbunar:
The Art and Craft of Fraudulent App Promotion in Google Play. 2437-2454 - Sazzadur Rahaman, Ya Xiao, Sharmin Afrose, Fahad Shaon, Ke Tian, Miles Frantz, Murat Kantarcioglu, Danfeng (Daphne) Yao:
CryptoGuard: High Precision Detection of Cryptographic Vulnerabilities in Massive-sized Java Projects. 2455-2472
Session 10E: Certificates
- Josh Aas, Richard Barnes, Benton Case, Zakir Durumeric, Peter Eckersley, Alan Flores-López, J. Alex Halderman, Jacob Hoffman-Andrews, James Kasten, Eric Rescorla, Seth D. Schoen, Brad Warren:
Let's Encrypt: An Automated Certificate Authority to Encrypt the Entire Web. 2473-2487 - Richard Roberts, Yaelle Goldschlag, Rachel Walter, Taejoong Chung, Alan Mislove, Dave Levin:
You Are Who You Appear to Be: A Longitudinal Study of Domain Impersonation in TLS Certificates. 2489-2504 - Bingyu Li, Jingqiang Lin, Fengjun Li, Qiongxiao Wang, Qi Li, Jiwu Jing, Congli Wang:
Certificate Transparency in the Wild: Exploring the Reliability of Monitors. 2505-2520
Posters
- Hyun Kwon, Hyunsoo Yoon, Ki-Woong Park:
POSTER: Detecting Audio Adversarial Example through Audio Modification. 2521-2523 - Bo Yu, Pengfei Wang, Tai Yue, Yong Tang:
Poster: Fuzzing IoT Firmware via Multi-stage Message Generation. 2525-2527 - John Mikulskis, Johannes K. Becker, Stefan Gvozdenovic, David Starobinski:
Snout: An Extensible IoT Pen-Testing Tool. 2529-2531 - Wladimir De la Cadena, Asya Mitseva, Jan Pennekamp, Jens Hiller, Fabian Lanze, Thomas Engel, Klaus Wehrle, Andriy Panchenko:
POSTER: Traffic Splitting to Counter Website Fingerprinting. 2533-2535 - Harshal Tupsamudre, Sukanya Vaddepalli, Vijayanand Banahatti, Sachin Lodha:
Force vs. Nudge: Comparing Users' Pattern Choices on SysPal and TinPal. 2537-2539 - Daniel Günther, Ágnes Kiss, Lukas Scheidel, Thomas Schneider:
Poster: Framework for Semi-Private Function Evaluation with Application to Secure Insurance Rate Calculation. 2541-2543 - Sazzadur Rahaman, Ya Xiao, Sharmin Afrose, Ke Tian, Miles Frantz, Na Meng, Barton P. Miller, Fahad Shaon, Murat Kantarcioglu, Danfeng (Daphne) Yao:
Poster: Deployment-quality and Accessible Solutions for Cryptography Code Development. 2545-2547 - Zhiqiang Wang, Quanqi Li, Yazhe Wang, Biao Liu, Jianyi Zhang, Qixu Liu:
Medical Protocol Security: DICOM Vulnerability Mining Based on Fuzzing Technology. 2549-2551 - Daehwa Rayer Lee, Yunhee Jang, Hyoungshick Kim:
Poster: A Proof-of-Stake (PoS) Blockchain Protocol using Fair and Dynamic Sharding Management. 2553-2555 - Heejun Jang, Beomjin Jin, Sangwon Hyun, Hyoungshick Kim:
Kerberoid: A Practical Android App Decompilation System with Multiple Decompilers. 2557-2559 - Sana Awan, Fengjun Li, Bo Luo, Mei Liu:
Poster: A Reliable and Accountable Privacy-Preserving Federated Learning Framework using the Blockchain. 2561-2563 - Raphael Labaca Castro, Battista Biggio, Gabi Dreo Rodosek:
Poster: Attacking Malware Classifiers by Crafting Gradient-Attacks that Preserve Functionality. 2565-2567 - Dhiman Chakraborty, Sven Bugiel:
simFIDO: FIDO2 User Authentication with simTPM. 2569-2571 - Manish Shukla, Kumar Vidhani, Gangadhara Reddy Sirigireddy, Vijayanand Banahatti, Sachin Lodha:
pFilter: Retrofitting Legacy Applications for Data Privacy. 2573-2575 - Karen Becker, Patricia Arias Cabarcos, Thilo Habrich, Christian Becker:
Poster: Towards a Framework for Assessing Vulnerabilities of Brainwave Authentication Systems. 2577-2579 - Stephan Kleber, Frank Kargl:
Poster: Network Message Field Type Recognition. 2581-2583 - Luca Arnaboldi, Roberto Metere:
Poster: Towards a Data Centric Approach for the Design and Verification of Cryptographic Protocols. 2585-2587 - Christof Ferreira Torres, Mathis Baden, Robert Norvill, Hugo Jonker:
ÆGIS: Smart Shielding of Smart Contracts. 2589-2591 - Joon Kuy Han, Hyoungshick Kim, Simon S. Woo:
Nickel to Lego: Using Foolgle</> to Create Adversarial Examples to Fool Google Cloud Speech-to-Text API. 2593-2595 - Rajvardhan Oak, Chaitanya Rahalkar, Dhaval Gujar:
Poster: Using Generative Adversarial Networks for Secure Pseudorandom Number Generation. 2597-2599 - Michael Hanling, Gaspard Anthoine, Jean-Guillaume Dumas, Aude Maignan, Clément Pernet, Daniel S. Roche:
Poster: Proofs of Retrievability with Low Server Storage. 2601-2603 - Rakesh M. Verma, Victor Zeng, Houtan Faridi:
Data Quality for Security Challenges: Case Studies of Phishing, Malware and Intrusion Detection Datasets. 2605-2607 - Mingxue Zhang, Wei Meng, Yi Wang:
Poster: Finding JavaScript Name Conflicts on the Web. 2609-2611 - Saniat Javid Sohrawardi, Akash Chintha, Bao Thai, Sovantharith Seng, Andrea Hickerson, Raymond W. Ptucha, Matthew Wright:
Poster: Towards Robust Open-World Detection of Deepfakes. 2613-2615 - Sovantharith Seng, Huzeyfe Kocabas, Mahdi Nasrullah Al-Ameen, Matthew Wright:
Poster: Understanding User's Decision to Interact with Potential Phishing Posts on Facebook using a Vignette Study. 2617-2619 - Rajvardhan Oak:
Poster: Adversarial Examples for Hate Speech Classifiers. 2621-2623 - Nate Mathews, Mohammad Saidur Rahman, Matthew Wright:
Poster: Evaluating Security Metrics for Website Fingerprinting. 2625-2627 - Mohammad Saidur Rahman, Nate Mathews, Matthew Wright:
Poster: Video Fingerprinting in Tor. 2629-2631 - Atsuko Natatsuka, Ryo Iijima, Takuya Watanabe, Mitsuaki Akiyama, Tetsuya Sakai, Tatsuya Mori:
Poster: A First Look at the Privacy Risks of Voice Assistant Apps. 2633-2635 - Juhwan Kim, Joobeom Yun:
Poster: Directed Hybrid Fuzzing on Binary Code. 2637-2639 - Giuseppe Siracusano, Martino Trevisan, Roberto Gonzalez, Roberto Bifulco:
Poster: On the Application of NLP to Discover Relationships between Malicious Network Entities. 2641-2643 - Priyanka Dodia, Yury Zhauniarovich:
Poster: SDN-based System to Filter Out DRDoS Amplification Traffic in ISP Networks. 2645-2647 - Alistair Stewart:
Poster: GRANDPA Finality Gadget. 2649-2651 - Fan Mo, Ali Shahin Shamsabadi, Kleomenis Katevas, Andrea Cavallaro, Hamed Haddadi:
Poster: Towards Characterizing and Limiting Information Exposure in DNN Layers. 2653-2655 - Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek:
Poster: Recovering the Input of Neural Networks via Single Shot Side-channel Attacks. 2657-2659 - Leon Böck, Shankar Karuppayah, Kory Fong, Max Mühlhäuser, Emmanouil Vasilomanolakis:
Poster: Challenges of Accurately Measuring Churn in P2P Botnets. 2661-2663 - Suyeol Lee, Junsik Seo, Jaehyun Nam, Seungwon Shin:
Poster: TCLP: Enforcing Least Privileges to Prevent Containers from Kernel Vulnerabilities. 2665-2667 - Aftab Alam, Katharina Krombholz, Sven Bugiel:
Poster: Let History not Repeat Itself (this Time) - Tackling WebAuthn Developer Issues Early On. 2669-2671 - Stjepan Picek, Dirmanto Jap, Shivam Bhasin:
Poster: When Adversary Becomes the Guardian - Towards Side-channel Security With Adversarial Attacks. 2673-2675 - Nikolaos Alexopoulos, Rolf Egert, Tim Grube, Max Mühlhäuser:
Poster: Towards Automated Quantitative Analysis and Forecasting of Vulnerability Discoveries in Debian GNU/Linux. 2677-2679 - Leo Hyun Park, Sangjin Oh, Jaeuk Kim, Soochang Chung, Taekyoung Kwon:
Poster: Effective Layers in Coverage Metrics for Deep Neural Networks. 2681-2683 - Weikang Bian, Wei Meng, Yi Wang:
Poster: Detecting WebAssembly-based Cryptocurrency Mining. 2685-2687 - Seoyoung Kim, Seyeon Jeong, Mingi Cho, Soochang Chung, Taekyoung Kwon:
Poster: Evaluating Code Coverage for System Call Fuzzers. 2689-2691
Workshop Summaries
- Radu Sion, Charalampos Papamanthou:
CCSW'19 Workshop Summary: 2019 Cloud Computing Security Workshop. 2693-2694 - Nils Ole Tippenhauer, Avishai Wool:
CPS-SPC 2019: Fifth Workshop on Cyber-Physical Systems Security and PrivaCy. 2695-2696 - Zhuo Lu:
MTD 2019: The 6th ACM Workshop on Moving Target Defense. 2697-2698 - Maryam Mehrnezhad, Thyla van der Merwe, Feng Hao:
SSR'19: The 5th Conference on Security Standardisation Research. 2699-2700 - Begül Bilgin, Svetla Nikova, Vincent Rijmen:
TIS'19: Theory of Implementation Security Workshop 2019. 2701-2702 - Michael Brenner, Tancrède Lepoint, Kurt Rohloff:
WAHC'19: 7th Workshop on Encrypted Computing & Applied Homomorphic Cryptograph. 2703-2704 - Josep Domingo-Ferrer:
18th Workshop on Privacy in the Electronic Society (WPES 2019). 2705-2706 - Sadia Afroz, Battista Biggio, Nicholas Carlini, Yuval Elovici, Asaf Shabtai:
AISec'19: 12th ACM Workshop on Artificial Intelligence and Security. 2707-2708 - Chip-Hong Chang, Daniel E. Holcomb, Francesco Regazzoni, Ulrich Rührmair, Patrick Schaumont:
ASHES 2019: 3rd Workshop on Attacks and Solutions in Hardware Security. 2709-2710 - Thanassis Giannetsos, Daniele Sgandurra:
1st Workshop on Cyber-Security Arms Race (CYSARM 2019). 2711-2712 - Peng Liu, Yuqing Zhang:
IoT S&P 2019: 2nd Workshop on the Internet of Things Security and Privacy. 2713-2714 - Piotr Mardziel, Niki Vazou:
PLAS 2019: ACM SIGSAC Workshop on Programming Languages and Analysis for Security. 2715 - Borja Balle, Adrià Gascón, Olya Ohrimenko, Mariana Raykova, Phillipp Schoppmann, Carmela Troncoso:
PPML '19: Privacy Preserving Machine Learning. 2717-2718 - Paolo Falcarin, Michael Zunke:
3rd International Workshop on Software Protection (SPRO 2019). 2719-2720
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.