default search action
41st SP 2020: San Francisco, CA, USA
- 2020 IEEE Symposium on Security and Privacy, SP 2020, San Francisco, CA, USA, May 18-21, 2020. IEEE 2020
- Marco Guarnieri, Boris Köpf, José F. Morales, Jan Reineke, Andrés Sánchez:
Spectector: Principled Detection of Speculative Information Flows. 1-19 - Michael Kurth, Ben Gras, Dennis Andriesse, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi:
: Practical Cache Attacks from the Network. 20-38 - Esmaeil Mohammadian Koruyeh, Shirin Haji Amin Shirazi, Khaled N. Khasawneh, Chengyu Song, Nael B. Abu-Ghazaleh:
SpecCFI: Mitigating Spectre Attacks using CFI Informed Speculation. 39-53 - Jo Van Bulck, Daniel Moghimi, Michael Schwarz, Moritz Lipp, Marina Minkin, Daniel Genkin, Yuval Yarom, Berk Sunar, Daniel Gruss, Frank Piessens:
LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection. 54-72 - Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar R. Weippl:
HydRand: Efficient Continuous Distributed Randomness. 73-89 - Haifeng Yu, Ivica Nikolic, Ruomu Hou, Prateek Saxena:
OHIE: Blockchain Scaling Made Simple. 90-105 - Ittai Abraham, Dahlia Malkhi, Kartik Nayak, Ling Ren, Maofan Yin:
Sync HotStuff: Simple and Practical Synchronous State Machine Replication. 106-118 - Jonathan Lee, Kirill Nikitin, Srinath T. V. Setty:
Replicated state machines without replicated execution. 119-134 - Arian Akhavan Niaki, Shinyoung Cho, Zachary Weinberg, Nguyen Phong Hoang, Abbas Razaghpanah, Nicolas Christin, Phillipa Gill:
ICLab: A Global, Longitudinal Internet Censorship Measurement Platform. 135-151 - Tao Wang:
High Precision Open-World Website Fingerprinting. 152-167 - Christiane Kuhn, Martin Beck, Thorsten Strufe:
Breaking and (Partially) Fixing Provably Secure Onion Routing. 168-185 - Chau Tran, Kaylea Champion, Andrea Forte, Benjamin Mako Hill, Rachel Greenstadt:
Are anonymity-seekers just like everybody else? An analysis of contributions to Wikipedia from Tor. 186-202 - Youqian Zhang, Kasper Rasmussen:
Detection of Electromagnetic Interference Attacks on Sensor Systems. 203-216 - Zhengxiong Li, Fenglong Ma, Aditya Singh Rathore, Zhuolin Yang, Baicheng Chen, Lu Su, Wenyao Xu:
WaveSpy: Remote and Through-wall Screen Attack via mmWave Sensing. 217-232 - Chen Yan, Hocheol Shin, Connor Bolton, Wenyuan Xu, Yongdae Kim, Kevin Fu:
SoK: A Minimalist Approach to Formalizing Analog Sensor Security. 233-248 - Eunyong Cheon, Yonghwan Shin, Jun Ho Huh, Hyoungshick Kim, Ian Oakley:
Gesture Authentication for Smartphones: Evaluation of Gesture Password Selection Policies. 249-267 - Sanam Ghorbani Lyastani, Michael Schilling, Michaela Neumayr, Michael Backes, Sven Bugiel:
Is FIDO2 the Kingslayer of User Authentication? A Comparative Usability Study of FIDO2 Passwordless Authentication. 268-285 - Philipp Markert, Daniel V. Bailey, Maximilian Golla, Markus Dürmuth, Adam J. Aviv:
This PIN Can Be Easily Guessed: Analyzing the Security of Smartphone Unlock PINs. 286-303 - Nan Wu, Farhad Farokhi, David B. Smith, Mohamed Ali Kâafar:
The Value of Collaboration in Convex Machine Learning with Differential Privacy. 304-317 - Rakibul Hasan, David J. Crandall, Mario Fritz, Apu Kapadia:
Automatically Detecting Bystanders in Photos to Reduce Privacy Risks. 318-335 - Nishant Kumar, Mayank Rathee, Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma:
CrypTFlow: Secure TensorFlow Inference. 336-353 - Michael Carl Tschantz, Shayak Sen, Anupam Datta:
SoK: Differential Privacy as a Causal Property. 354-371 - Sebastian Angel, Sampath Kannan, Zachary B. Ratliff:
Private resource allocators and their applications. 372-391 - Aiping Xiong, Tianhao Wang, Ninghui Li, Somesh Jha:
Towards Effective Differential Privacy Communication for Users' Data Sharing Decision and Comprehension. 392-410 - Elisabet Lobo Vesga, Alejandro Russo, Marco Gaboardi:
A Programming Framework for Differential Privacy with Accuracy Concentration Bounds. 411-428 - Philipp Morgner, Christoph Mai, Nicole Koschate-Fischer, Felix C. Freiling, Zinaida Benenson:
Security Update Labels: Establishing Economic Incentives for Security Patching of IoT Consumer Products. 429-446 - Pardis Emami Naeini, Yuvraj Agarwal, Lorrie Faith Cranor, Hanan Hibshi:
Ask the Experts: What Should Be on an IoT Privacy and Security Label? 447-464 - Yan Jia, Luyi Xing, Yuhang Mao, Dongfang Zhao, XiaoFeng Wang, Shangru Zhao, Yuqing Zhang:
Burglars' IoT Paradise: Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds. 465-481 - Sunil Manandhar, Kevin Moran, Kaushal Kafle, Ruhao Tang, Denys Poshyvanyk, Adwait Nadkarni:
Towards a Natural Perspective of Smart Homes for Practical Security and Safety Analyses. 482-499 - Patrick Leu, Mridula Singh, Marc Roeschlin, Kenneth G. Paterson, Srdjan Capkun:
Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement. 500-516 - Mathy Vanhoef, Eyal Ronen:
Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd. 517-533 - Marco Cominelli, Francesco Gringoli, Paul Patras, Margus Lind, Guevara Noubir:
Even Black Cats Cannot Stay Hidden in the Dark: Full-band De-anonymization of Bluetooth Classic Devices. 534-548 - Daniele Antonioli, Nils Ole Tippenhauer, Kasper Rasmussen:
BIAS: Bluetooth Impersonation AttackS. 549-562 - Sergej Proskurin, Marius Momeu, Seyedhamed Ghavamnia, Vasileios P. Kemerlis, Michalis Polychronakis:
xMP: Selective Memory Protection for Kernel and User Space. 563-577 - Sam Ainsworth, Timothy M. Jones:
MarkUs: Drop-in use-after-free prevention for low-level languages. 578-591 - Zhe Wang, Chenggang Wu, Mengyao Xie, Yinqian Zhang, Kangjie Lu, Xiaofeng Zhang, Yuanming Lai, Yan Kang, Min Yang:
SEIMI: Efficient and Secure SMAP-Enabled Intra-process Memory Isolation. 592-607 - Nathaniel Wesley Filardo, Brett F. Gutstein, Jonathan Woodruff, Sam Ainsworth, Lucian Paul-Trifu, Brooks Davis, Hongyan Xia, Edward Tomasz Napierala, Alexander Richardson, John Baldwin, David Chisnall, Jessica Clarke, Khilan Gudka, Alexandre Joannou, A. Theodore Markettos, Alfredo Mazzinghi, Robert M. Norton, Michael Roe, Peter Sewell, Stacey D. Son, Timothy M. Jones, Simon W. Moore, Peter G. Neumann, Robert N. M. Watson:
Cornucopia: Temporal Safety for CHERI Heaps. 608-625 - Kevin A. Roundy, Paula Barmaimon Mendelberg, Nicola Dell, Damon McCoy, Daniel Nissani, Thomas Ristenpart, Acar Tamersoy:
The Many Kinds of Creepware Used for Interpersonal Attacks. 626-643 - Thomas Haines, Sarah Jamie Lewis, Olivier Pereira, Vanessa Teague:
How not to prove your election outcome. 644-660 - Laura Edelson, Tobias Lauinger, Damon McCoy:
A Security Analysis of the Facebook Ad Library. 661-678 - Matthew Bernhard, Allison McDonald, Henry Meng, Jensen Hwa, Nakul Bajaj, Kevin Chang, J. Alex Halderman:
Can Voters Detect Malicious Manipulation of Ballot Marking Devices? 679-694 - Andrew Kwong, Daniel Genkin, Daniel Gruss, Yuval Yarom:
RAMBleed: Reading Bits in Memory Without Accessing Them. 695-711 - Lucian Cojocar, Jeremie S. Kim, Minesh Patel, Lillian Tsai, Stefan Saroiu, Alec Wolman, Onur Mutlu:
Are We Susceptible to Rowhammer? An End-to-End Methodology for Cloud Providers. 712-728 - Zhenkai Zhang, Zihao Zhan, Daniel Balasubramanian, Bo Li, Péter Völgyesi, Xenofon D. Koutsoukos:
Leveraging EM Side-Channel Information to Detect Rowhammer Attacks. 729-746 - Pietro Frigo, Emanuele Vannacci, Hasan Hassan, Victor van der Veen, Onur Mutlu, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi:
TRRespass: Exploiting the Many Sides of Target Row Refresh. 747-762 - Umar Iqbal, Peter Snyder, Shitong Zhu, Benjamin Livshits, Zhiyun Qian, Zubair Shafiq:
AdGraph: A Graph-Based Approach to Ad and Tracker Blocking. 763-776 - Clemens Deußer, Steffen Passmann, Thorsten Strufe:
Browsing Unicity: On the Limits of Anonymizing Web Tracking Data. 777-790 - Célestin Matte, Nataliia Bielova, Cristiana Santos:
Do Cookie Banners Respect my Choice? : Measuring Legal Compliance of Banners from IAB Europe's Transparency and Consent Framework. 791-809 - Brian Kondracki, Assel Aliyeva, Manuel Egele, Jason Polakis, Nick Nikiforakis:
Meddling Middlemen: Empirical Analysis of the Risks of Data-Saving Mobile Browsers. 810-824 - Chun Guo, Jonathan Katz, Xiao Wang, Yu Yu:
Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers. 825-841 - Elaine Shi:
Path Oblivious Heap: Optimal and Practical Oblivious Priority Queue. 842-858 - Jiaheng Zhang, Tiancheng Xie, Yupeng Zhang, Dawn Song:
Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof. 859-876 - Alin Tomescu, Robert Chen, Yiming Zheng, Ittai Abraham, Benny Pinkas, Guy Golan-Gueta, Srinivas Devadas:
Towards Scalable Threshold Cryptosystems. 877-893 - Muoi Tran, Inho Choi, Gi Jun Moon, Anh V. Vu, Min Suk Kang:
A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network. 894-909 - Philip Daian, Steven Goldfeder, Tyler Kell, Yunqi Li, Xueyuan Zhao, Iddo Bentov, Lorenz Breidenbach, Ari Juels:
Flash Boys 2.0: Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability. 910-927 - Benedikt Bünz, Lucianna Kiffer, Loi Luu, Mahdi Zamani:
FlyClient: Super-Light Clients for Cryptocurrencies. 928-946 - Sean Bowe, Alessandro Chiesa, Matthew Green, Ian Miers, Pratyush Mishra, Howard Wu:
ZEXE: Enabling Decentralized Private Computation. 947-964 - José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Benjamin Grégoire, Adrien Koutsos, Vincent Laporte, Tiago Oliveira, Pierre-Yves Strub:
The Last Mile: High-Assurance and High-Speed Cryptographic Implementations. 965-982 - Jonathan Protzenko, Bryan Parno, Aymeric Fromherz, Chris Hawblitzel, Marina Polubelova, Karthikeyan Bhargavan, Benjamin Beurdouche, Joonwon Choi, Antoine Delignat-Lavaud, Cédric Fournet, Natalia Kulatova, Tahina Ramananandro, Aseem Rastogi, Nikhil Swamy, Christoph M. Wintersteiger, Santiago Zanella Béguelin:
EverCrypt: A Fast, Verified, Cross-Platform Cryptographic Provider. 983-1002 - Kyndylan Nienhuis, Alexandre Joannou, Thomas Bauereiss, Anthony C. J. Fox, Michael Roe, Brian Campbell, Matthew Naylor, Robert M. Norton, Simon W. Moore, Peter G. Neumann, Ian Stark, Robert N. M. Watson, Peter Sewell:
Rigorous engineering for hardware security: Formal modelling and proof in the CHERI design and implementation process. 1003-1020 - Lesly-Ann Daniel, Sébastien Bardin, Tamara Rezk:
Binsec/Rel: Efficient Relational Symbolic Execution for Constant-Time at Binary-Level. 1021-1038 - Julien Gamba, Mohammed Rashed, Abbas Razaghpanah, Juan Tapiador, Narseo Vallina-Rodriguez:
An Analysis of Pre-installed Android Software. 1039-1055 - Luke Deshotels, Costin Carabas, Jordan Beichler, Razvan Deaconescu, William Enck:
Kobold: Evaluating Decentralized Access Control for Remote NSXPC Methods on iOS. 1056-1070 - Yuyu He, Lei Zhang, Zhemin Yang, Yinzhi Cao, Keke Lian, Shuai Li, Wei Yang, Zhibo Zhang, Min Yang, Yuan Zhang, Haixin Duan:
TextExerciser: Feedback-driven Text Input Exercising for Android Applications. 1071-1087 - Ivan Pustogarov, Qian Wu, David Lie:
Ex-vivo dynamic analysis framework for Android device drivers. 1088-1105 - Qingchuan Zhao, Chaoshun Zuo, Brendan Dolan-Gavitt, Giancarlo Pellegrino, Zhiqiang Lin:
Automatic Uncovering of Hidden Behaviors From Input Validation in Mobile Apps. 1106-1120 - Wei You, Zhuo Zhang, Yonghwi Kwon, Yousra Aafer, Fei Peng, Yu Shi, Carson Harmon, Xiangyu Zhang:
PMP: Cost-effective Forced Execution with Probabilistic Memory Pre-planning. 1121-1138 - Md Nahid Hossain, Sanaz Sheikhi, R. Sekar:
Combating Dependence Explosion in Forensic Analysis Using Alternative Tag Propagation Semantics. 1139-1155 - Ranjita Pai Kasturi, Yiting Sun, Ruian Duan, Omar Alrawi, Ehsan Asdar, Victor Zhu, Yonghwi Kwon, Brendan Saltaformaggio:
TARDIS: Rolling Back The Clock On CMS-Targeting Cyber Attacks. 1156-1171 - Wajih Ul Hassan, Adam Bates, Daniel Marino:
Tactical Provenance Analysis for Endpoint Detection and Response Systems. 1172-1189 - Steve T. K. Jan, Qingying Hao, Tianrui Hu, Jiameng Pu, Sonal Oswal, Gang Wang, Bimal Viswanath:
Throwing Darts in the Dark? Detecting Bots with Limited Data using Neural Data Augmentation. 1190-1206 - Tegan Brennan, Nicolás Rosner, Tevfik Bultan:
JIT Leaks: Inducing Timing Side Channels through Just-In-Time Compilation. 1207-1222 - Evgenios M. Kornaropoulos, Charalampos Papamanthou, Roberto Tamassia:
The State of the Uniform: Attacks on Encrypted Databases Beyond the Uniform Query Distribution. 1223-1240 - Shaanan Cohney, Andrew Kwong, Shahar Paz, Daniel Genkin, Nadia Heninger, Eyal Ronen, Yuval Yarom:
Pseudorandom Black Swans: Cache Attacks on CTR_DRBG. 1241-1258 - Jonathan Berger, Amit Klein, Benny Pinkas:
Flaw Label: Exploiting IPv6 Flow Label. 1259-1276 - Jianbo Chen, Michael I. Jordan, Martin J. Wainwright:
HopSkipJumpAttack: A Query-Efficient Decision-Based Attack. 1277-1294 - Roei Schuster, Tal Schuster, Yoav Meri, Vitaly Shmatikov:
Humpty Dumpty: Controlling Word Meanings via Corpus Poisoning. 1295-1313 - Xudong Pan, Mi Zhang, Shouling Ji, Min Yang:
Privacy Risks of General-Purpose Language Models. 1314-1331 - Fabio Pierazzi, Feargus Pendlebury, Jacopo Cortellazzi, Lorenzo Cavallaro:
Intriguing Properties of Adversarial ML Attacks in the Problem Space. 1332-1349 - Mary Jean Amon, Rakibul Hasan, Kurt Hugenberg, Bennett I. Bertenthal, Apu Kapadia:
Influencing Photo Sharing Decisions on Social Media: A Case of Paradoxical Findings. 1350-1366 - Savino Dambra, Leyla Bilge, Davide Balzarotti:
SoK: Cyber Insurance - Technical Challenges and a System Security Roadmap. 1367-1383 - James Pavur, Daniel Moser, Martin Strohmeier, Vincent Lenders, Ivan Martinovic:
A Tale of Sea and Sky On the Security of Maritime VSAT Communications. 1384-1400 - Daniel Frassinelli, Sohyeon Park, Stefan Nürnberger:
I Know Where You Parked Last Summer : Automated Reverse Engineering and Privacy Analysis of Modern Cars. 1401-1415 - David Cerdeira, Nuno Santos, Pedro Fonseca, Sandro Pinto:
SoK: Understanding the Prevailing Security Vulnerabilities in TrustZone-assisted TEE Systems. 1416-1432 - Zhichuang Sun, Bo Feng, Long Lu, Somesh Jha:
OAT: Attesting Operation Integrity of Embedded Devices. 1433-1449 - Jianping Zhu, Rui Hou, XiaoFeng Wang, Wenhao Wang, Jiangfeng Cao, Boyan Zhao, Zhongpu Wang, Yuhui Zhang, Jiameng Ying, Lixin Zhang, Dan Meng:
Enabling Rack-scale Confidential Computing using Heterogeneous Trusted Execution Environment. 1450-1465 - Kit Murdock, David F. Oswald, Flavio D. Garcia, Jo Van Bulck, Daniel Gruss, Frank Piessens:
Plundervolt: Software-based Fault Injection Attacks against Intel SGX. 1466-1482 - Luca Wilke, Jan Wichelmann, Mathias Morbitzer, Thomas Eisenbarth:
SEVurity: No Security Without Integrity : Breaking Integrity-Free Memory Encryption with Minimal Assumptions. 1483-1496 - Sushant Dinesh, Nathan Burow, Dongyan Xu, Mathias Payer:
RetroWrite: Statically Instrumenting COTS Binaries for Fuzzing and Sanitization. 1497-1511 - Feng Xiao, Jinquan Zhang, Jianwei Huang, Guofei Gu, Dinghao Wu, Peng Liu:
Unexpected Data Dependency Creation and Chaining: A New Attack to SDN. 1512-1526 - Dongdong She, Yizheng Chen, Abhishek Shah, Baishakhi Ray, Suman Jana:
Neutaint: Efficient Dynamic Taint Analysis with Neural Networks. 1527-1543 - Nilo Redini, Aravind Machiry, Ruoyu Wang, Chad Spensky, Andrea Continella, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna:
Karonte: Detecting Insecure Multi-binary Interactions in Embedded Firmware. 1544-1561 - Aravind Machiry, Nilo Redini, Eric Camellini, Christopher Kruegel, Giovanni Vigna:
SPIDER: Enabling Fast Patch Propagation In Related Software Repositories. 1562-1579 - Yaohui Chen, Peng Li, Jun Xu, Shengjian Guo, Rundong Zhou, Yulong Zhang, Tao Wei, Long Lu:
SAVIOR: Towards Bug-Driven Hybrid Testing. 1580-1596 - Cornelius Aschermann, Sergej Schumilo, Ali Abbasi, Thorsten Holz:
Ijon: Exploring Deep State Spaces via Fuzzing. 1597-1612 - Heqing Huang, Peisen Yao, Rongxin Wu, Qingkai Shi, Charles Zhang:
Pangolin: Incremental Hybrid Fuzzing with Polyhedral Path Abstraction. 1613-1627 - Soyeon Park, Wen Xu, Insu Yun, Daehee Jang, Taesoo Kim:
Fuzzing JavaScript Engines with Aspect-preserving Mutation. 1629-1642 - Meng Xu, Sanidhya Kashyap, Hanqing Zhao, Taesoo Kim:
Krace: Data Race Fuzzing for Kernel File Systems. 1643-1660 - Anton Permenev, Dimitar K. Dimitrov, Petar Tsankov, Dana Drachsler-Cohen, Martin T. Vechev:
VerX: Safety Verification of Smart Contracts. 1661-1677 - Sunbeom So, Myungho Lee, Jisu Park, Heejo Lee, Hakjoo Oh:
VERISMART: A Highly Precise Safety Verifier for Ethereum Smart Contracts. 1678-1694 - Jiao Jiao, Shuanglong Kan, Shang-Wei Lin, David Sanán, Yang Liu, Jun Sun:
Semantic Understanding of Smart Contracts: Executable Operational Semantics of Solidity. 1695-1712 - Rui Zhang, Cynthia Sturton:
Transys: Leveraging Common Security Properties Across Hardware Designs. 1713-1727 - Ilias Giechaskiel, Kasper Bonne Rasmussen, Jakub Szefer:
C3APSULe: Cross-FPGA Covert-Channel Attacks through Power Supply Unit Leakage. 1728-1741 - Timothy Trippel, Kang G. Shin, Kevin B. Bush, Matthew Hicks:
ICAS: an Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans. 1742-1759
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.