No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis
A. Alsadi; K. Sameshima; J. Bleier; K. Yoshioka; M. Lindorfer; M. van Eeten; C. Ganan
Port Contention Goes Portable: Port Contention Side Channels in Web Browsers
T. Rokicki; C. Maurice; M. Botvinnik; Y. Oren
Duplicates also Matter! Towards Secure Deletion on Flash-based Storage Media by Removing Duplicates
N. Chen; B. Chen
SoK: Password-Authenticated Key Exchange -- Theory, Practice, Standardization and Real-World Lessons
F. Hao; P. van Oorschot
GraphTrack: A Graph-based Cross-Device Tracking Framework
B. Wang; T. Zhou; S. Li; Y. Cao; N. Gong
Veksel: Simple, Efficient, Anonymous Payments with Large Anonymity Sets from Well-Studied Assumptions
M. Campanelli; M. Hall-Andersen
Artificial Intelligence Meets Kinesthetic Intelligence: Mouse-based User Authentication based on Hybrid Human-Machine Learning
S. Fu; D. Qin; G. Amariucai; D. Qiao; Y. Guan; A. Smiley
The 5G Key-Establishment Stack: In-Depth Formal Verification
R. Miller; I. Boureanu; S. Wesemeyer; C. Newton
PacJam: Securing Dependencies Continuously via Package-Oriented Debloating
P. Pashakhanloo; A. Machiry; H. Choi; A. Canino; K. Heo (KAIST); I. Lee; M. Naik
Eliminating Sandwich Attacks with the Help of Game Theory
L. Heimbach; R. Wattenhofer
On the Security of the FLARM Collision Warning System
B. Wang; G. Tresoldi; M. Strohmeier; V. Lenders
BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy
D. Antonioli; N. Tippenhauer; K. Rasmussen; M. Payer
Exploring Unfairness on Proof of Authority: Order Manipulation Attacks and Remedies
Q. WANG; R. Li; Q. Wang; S. CHEN; Y. Xiang
EVOLIoT: A Self-Supervised Contrastive Learning Framework for Detecting and Characterizing Evolving IoT Malware Variants
M. Dib; S. Torabi; E. Bou-Harb; N. Bouguila; C. Assi
Speedster: An Efficient Multi-party State Channel via Enclaves
J. Liao; F. Zhang; W. Sun; W. Shi
Generating Content-Preserving and Semantics-Flipping Adversarial Text
W. Pei; C. Yue
ReFuzz — Structure Aware Fuzzing of the Resilient File System (ReFS)
T. Groß T. Schleier; T. Müller
Hierarchical Identity-based Puncturable Encryption from Lattices with Application to Forward Security
P. Dutta; M. Jiang; D. Duong; W. Susilo; K. Fukushima; S. Kiyomoto
AuxChannel: Enabling Efficient Bi-Directional Channel for Scriptless Blockchains
Z. Sui; J. Liu; J. Yu; M. Au; J. Liu
Common Evaluation Pitfalls in Touch-Based Authentication Systems
M. Georgiev; S. Eberz; H. Turner; G. Lovisotto; I. Martinovic
EnclaveTree: Privacy-preserving Data Stream Training and Inference Using TEE
Q. Wang; S. Cui; L. Zhou; G. Russello; O. Wu; Y. Zhu
SoK: The Evolution of Trusted UI on Mobile
D. Bove
Tight Leakage-Resilient Identity-based Encryption under Multi-challenge Setting
C. CAI; X. Qin; T. Yuen; S. Yiu
Machine Learning-based Online Social Network Privacy Preservation
T. Gao; F. Li
Ruling the Rules: Quantifying the Evolution of Rulesets, Alerts and Incidents in Network Intrusion Detection
M. Vermeer; M. van Eeten; C. Gañán
Markov Chain Monte Carlo-Based Machine Unlearning: Unlearning What Needs to be Forgotten
Q. Nguyen; R. Oikawa; D. Divakaran; M. Chan; K. Low
VWAnalyzer: A Systematic Security Analysis Framework for the Voice over WiFi Protocol
H. Lee; I. Karim; N. Li; E. Bertino
Adversarial Level Agreements for Two-Party Protocols
M. George; S. Kamara
SteinerLog: Prize Collecting the Audit Logs for Threat Hunting on Enterprise Network
B. Bhattarai; H. Huang
Wolf at the Door: Preventing Install-Time Attacks in npm with Latch
E. Wyss; A. Wittman; D. Davidson; L. De Carli
Iterative Oblivious Pseudo-Random Functions and Applications
E. Blass; F. Kerschbaum; T. Mayberry
ASAP: Algorithm Substitution Attacks on Cryptographic Protocols
S. Berndt; J. Wichelmann; C. Pott; T. Traving; T. Eisenbarth
SoK: Exploring Current and Future Research Directions on XS-Leaks through an Extended Formal Model
T. Van Goethem; G. Franken; I. Sanchez-Rola; D. Dworken; W. Joosen
ShadowAuth: Backward-Compatible Automatic CAN Authentication for Legacy ECUs
S. Kim; G. Yeo; T. Kim; J. Rhee; Y. Jeon; A. Bianchi; D. Xu; D. Tian
Lures for Money: A First Look into Youtube Videos Promoting Money-Making Apps
N. Nasir; F. Iqbal; Mahnoor; M. Shahjahan; M. Javed
PeriScope: Comprehensive Vulnerability Analysis of Mobile App-defined Bluetooth Peripherals
Q. Zhao; C. Zuo; J. Blasco; Z. Lin
Understanding and Detecting Remote Infection on Linux-based IoT Devices
H. Li; Q. Huang; F. Ding; H. Hu; L. Cheng; G. Gu; Z. Zhao
Aggregating and thresholdizing hash-based signatures using STARKs
I. Khaburzaniya; K. Chalkias; K. Lewi; H. Malvai
Hunter: HE-Friendly Structured Pruning for Efficient Privacy-Preserving Deep Learning
Y. Cai; Q. Zhang; R. Ning; C. Xin; H. Wu
Stegozoa: Enhancing WebRTC Covert Channels with Video Steganography for Internet Censorship Circumvention
G. Figueira; D. Barradas; N. Santos
Easy-to-Implement Two-Server based Anonymous Communication with Simulation Security
A. Bowers; J. Du; D. Lin; W. Jiang
FLARE: Defending Federated Learning against Model Poisoning Attacks via Latent Space Representations
N. Wang; Y. Xiao; Y. Chen; Y. Hu; W. Lou; Y. Hou
SUPERVOICE: Text-Independent Speaker Verification Using Ultrasound Energy in Human Speech
H. Guo; Q. Yan; N. Ivanov; Y. Zhu; L. Xiao; E. Hunter
WearRF-CLA: Continuous Location Authentication with Wrist Wearables and UHF RFID
A. Li; J. Li; D. Han; Y. Zhang; T. Li; Y. Zhang
Memory and Round-Efficient MPC Primitives in the Pre-Processing Model from Unit Vectorization
N. Attrapadung; H. Morita; K. Ohara; J. Schuldt; K. Tozawa
SoK: Design Tools for Side-Channel-Aware Implementations
I. Buhan; L. Batina; Y. Yarom; P. Schaumont
Wireless Manipulation of Serial Communication
G. Dayanikli; A. Mohammed; R. Gerdes; M. Mina
RecIPE: Revisiting the Evaluation of Memory Error Defenses
Y. Jiang; R. Yap; Z. Liang; H. Rosier
SoK: A Survey Of Indirect Network-level Covert Channels
T. Schmidbauer; S. Wendzel
Scalable Private Decision Tree Evaluation with Sublinear Communication
J. Bai; X. Song; S. Cui; E. Chang; G. Russello