Confusing and Detecting ML Adversarial Attacks with Injected Attractors
J. Zhang; E. Chang; H. Lee
TargetFuzz: Using DARTs to Guide Directed Greybox Fuzzers
S. Canakci; N. Matyunin; K. Graffi; A. Joshi; M. Egele
Model Extraction Attacks on Graph Neural Networks: Taxonomy and Realisation
B. Wu; X. Yang; S. Pan; X. YUAN
Proximity Searchable Encryption for the Iris Biometric
S. Ahmad; C. Cachet; L. Demarest; B. Fuller; A. Hamlin
Mixed Certificate Chains for the Transition to Post-Quantum Authentication in TLS 1.3
S. Paul; Y. Kuzovkova; N. Lahr; R. Niederhagen
SMS OTP Security (SOS): Hardening SMS-Based Two Factor Authentication
C. Peeters; C. Patton; I. Sherman; D. Olszewski; T. Shrimpton; P. Traynor
Hopper: Per-Device Nano Segmentation for the Industrial IoT
P. De Vaere; A. Tulimiero; A. Perrig
Evaluating Blockchain Protocols with Abusive Modeling
V. SHARMA; P. SZALACHOWSKI; J. ZHOU
VERICONDOR: End-to-End Verifiable Condorcet Voting without Tallying Authorities
L. Harrison; S. Bag; H. Luo; F. Hao
Symbolic synthesis of indifferentiability attacks
I. Rakotonirina; M. Ambrona; A. Aguirre; G. Barthe
Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation
Z. Liu; Y. Tseng; R. Tso; M. Mambo; Y. Chen
Efficient Oblivious Permutation via the Waksman Network
W. Holland; O. Ohrimenko; A. Wirth
Missed Opportunities: Measuring the Untapped TLS Support in the Industrial Internet of Things
M. Dahlmanns; J. Lohmöller; J. Pennekamp; J. Bodenhausen; K. Wehrle; M. Henze
Towards a Utopia of Dataset Sharing: A Case Study on Machine Learning-based Malware Detection Algorithms
P. Chuang; C. Hsu; Y. Chu; S. Huang; C. Huang
The Convergence of Source Code and Binary Vulnerability Discovery -- A Case Study
A. Mantovani; L. Compagna; Y. Shoshitaishvili; D. Balzarotti
Driving execution of target paths in Android applications with (a) CAR
M. Wong; D. Lie
Alexa versus Alexa: Controlling Smart Speakers by Self-Issuing Voice Commands
S. Esposito; D. Sgandurra; G. Bella
Mirror Mirror on the Wall: Wireless Environment Reconfiguration Attacks Based on Fast Software-Controlled Surfaces
P. Staat; H. Elders-Boll; M. Heinrichs; C. Zenger; C. Paar
MAB-Malware: A Reinforcement Learning Framework for Blackbox Generation of Adversarial Malware
W. Song; X. Li; S. Afroz; D. Garg; D. Kuznetsov; H. Yin
On Measuring Vulnerable JavaScript Functions in the Wild
M. Kluban; M. Mannan; A. Youssef
Secure-Computation-Friendly Private Set Intersection from Oblivious Compact Graph Evaluation
J. Ma; S. Chow
Understanding Disparate Effects of Membership Inference Attacks and Their Countermeasures
D. Zhong; H. SUN; J. Xu; N. Gong; H. Wang
Multi-Key Homomorphic MACs with Efficient Verification for Quadratic Arithmetic Circuits
S. Feng; S. Xu; L. Zhang
Signal Injection Attacks against CCD Image Sensors
S. Köhler; R. Baker; I. Martinovic
Membership Feature Disentanglement Network
H. Ha; J. Jang; Y. Jeong; S. Yoon
Byzantine-Robust Private Information Retrieval with Low Communication and Efficient Decoding
L. Zhang; H. Wang
Privacy-Preserving Deep Sequential Model with Matrix Homomorphic Encryption
J. Jang; A. Kim; B. Na; Y. Lee; D. Yhee; B. Lee; J. Cheon; S. Yoon
PSImple: Practical Multiparty Maliciously-Secure Private Set Intersection
A. Efraim; O. Nissenbaum; E. Omri; A. Paskin-Cherniavsky
Hearing Check Failed: Using Laser Vibrometry to Analyze the Potential for Hard Disk Drives to Eavesdrop Speech Vibrations
P. Walker; N. Saxena; S Anand; T. Halevi; S. Saini
DPaSE: Distributed Password-Authenticated Symmetric-Key Encryption, or How to Get Many Keys from One Password
P. Das; J. Hesse; A. Lehmann
TRAP: The Bait of Rational Players to Solve Byzantine Consensus
A. Ranchal-Pedrosa; V. Gramoli
InfoCensor: An Information-Theoretic Framework against Sensitive Attribute Inference and Demographic Disparity
T. Zheng; B. Li
Gatekeeper: A Gateway-based Broadcast Authentication Protocol for the In-Vehicle Ethernet
S. Hu; Q. Zhang; A. Weimerskirch; Z. Mao
Server-Side Browsers: Exploring the Web's Hidden Attack Surface
M. Musch; R. Kirchner; M. Boll; M. Johns
EPID with Efficient Proof of Non-Revocation
O. Sanders
No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis
A. Alsadi; K. Sameshima; J. Bleier; K. Yoshioka; M. Lindorfer; M. van Eeten; C. Ganan
Port Contention Goes Portable: Port Contention Side Channels in Web Browsers
T. Rokicki; C. Maurice; M. Botvinnik; Y. Oren
Duplicates also Matter! Towards Secure Deletion on Flash-based Storage Media by Removing Duplicates
N. Chen; B. Chen
SoK: Password-Authenticated Key Exchange -- Theory, Practice, Standardization and Real-World Lessons
F. Hao; P. van Oorschot
GraphTrack: A Graph-based Cross-Device Tracking Framework
B. Wang; T. Zhou; S. Li; Y. Cao; N. Gong
Veksel: Simple, Efficient, Anonymous Payments with Large Anonymity Sets from Well-Studied Assumptions
M. Campanelli; M. Hall-Andersen
Artificial Intelligence Meets Kinesthetic Intelligence: Mouse-based User Authentication based on Hybrid Human-Machine Learning
S. Fu; D. Qin; G. Amariucai; D. Qiao; Y. Guan; A. Smiley
The 5G Key-Establishment Stack: In-Depth Formal Verification
R. Miller; I. Boureanu; S. Wesemeyer; C. Newton
PacJam: Securing Dependencies Continuously via Package-Oriented Debloating
P. Pashakhanloo; A. Machiry; H. Choi; A. Canino; K. Heo (KAIST); I. Lee; M. Naik
Eliminating Sandwich Attacks with the Help of Game Theory
L. Heimbach; R. Wattenhofer
On the Security of the FLARM Collision Warning System
B. Wang; G. Tresoldi; M. Strohmeier; V. Lenders
BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy
D. Antonioli; N. Tippenhauer; K. Rasmussen; M. Payer
Exploring Unfairness on Proof of Authority: Order Manipulation Attacks and Remedies
Q. WANG; R. Li; Q. Wang; S. CHEN; Y. Xiang
EVOLIoT: A Self-Supervised Contrastive Learning Framework for Detecting and Characterizing Evolving IoT Malware Variants
M. Dib; S. Torabi; E. Bou-Harb; N. Bouguila; C. Assi
Speedster: An Efficient Multi-party State Channel via Enclaves
J. Liao; F. Zhang; W. Sun; W. Shi
Generating Content-Preserving and Semantics-Flipping Adversarial Text
W. Pei; C. Yue
ReFuzz — Structure Aware Fuzzing of the Resilient File System (ReFS)
T. Groß T. Schleier; T. Müller
Hierarchical Identity-based Puncturable Encryption from Lattices with Application to Forward Security
P. Dutta; M. Jiang; D. Duong; W. Susilo; K. Fukushima; S. Kiyomoto
AuxChannel: Enabling Efficient Bi-Directional Channel for Scriptless Blockchains
Z. Sui; J. Liu; J. Yu; M. Au; J. Liu
Common Evaluation Pitfalls in Touch-Based Authentication Systems
M. Georgiev; S. Eberz; H. Turner; G. Lovisotto; I. Martinovic
EnclaveTree: Privacy-preserving Data Stream Training and Inference Using TEE
Q. Wang; S. Cui; L. Zhou; G. Russello; O. Wu; Y. Zhu
SoK: The Evolution of Trusted UI on Mobile
D. Bove
Tight Leakage-Resilient Identity-based Encryption under Multi-challenge Setting
C. CAI; X. Qin; T. Yuen; S. Yiu
Machine Learning-based Online Social Network Privacy Preservation
T. Gao; F. Li
Ruling the Rules: Quantifying the Evolution of Rulesets, Alerts and Incidents in Network Intrusion Detection
M. Vermeer; M. van Eeten; C. Gañán
Markov Chain Monte Carlo-Based Machine Unlearning: Unlearning What Needs to be Forgotten
Q. Nguyen; R. Oikawa; D. Divakaran; M. Chan; K. Low
VWAnalyzer: A Systematic Security Analysis Framework for the Voice over WiFi Protocol
H. Lee; I. Karim; N. Li; E. Bertino
Adversarial Level Agreements for Two-Party Protocols
M. George; S. Kamara
SteinerLog: Prize Collecting the Audit Logs for Threat Hunting on Enterprise Network
B. Bhattarai; H. Huang
Wolf at the Door: Preventing Install-Time Attacks in npm with Latch
E. Wyss; A. Wittman; D. Davidson; L. De Carli
Iterative Oblivious Pseudo-Random Functions and Applications
E. Blass; F. Kerschbaum; T. Mayberry
ASAP: Algorithm Substitution Attacks on Cryptographic Protocols
S. Berndt; J. Wichelmann; C. Pott; T. Traving; T. Eisenbarth
SoK: Exploring Current and Future Research Directions on XS-Leaks through an Extended Formal Model
T. Van Goethem; G. Franken; I. Sanchez-Rola; D. Dworken; W. Joosen
ShadowAuth: Backward-Compatible Automatic CAN Authentication for Legacy ECUs
S. Kim; G. Yeo; T. Kim; J. Rhee; Y. Jeon; A. Bianchi; D. Xu; D. Tian
Lures for Money: A First Look into Youtube Videos Promoting Money-Making Apps
N. Nasir; F. Iqbal; Mahnoor; M. Shahjahan; M. Javed
PeriScope: Comprehensive Vulnerability Analysis of Mobile App-defined Bluetooth Peripherals
Q. Zhao; C. Zuo; J. Blasco; Z. Lin
Understanding and Detecting Remote Infection on Linux-based IoT Devices
H. Li; Q. Huang; F. Ding; H. Hu; L. Cheng; G. Gu; Z. Zhao
Aggregating and thresholdizing hash-based signatures using STARKs
I. Khaburzaniya; K. Chalkias; K. Lewi; H. Malvai
Hunter: HE-Friendly Structured Pruning for Efficient Privacy-Preserving Deep Learning
Y. Cai; Q. Zhang; R. Ning; C. Xin; H. Wu
Stegozoa: Enhancing WebRTC Covert Channels with Video Steganography for Internet Censorship Circumvention
G. Figueira; D. Barradas; N. Santos
Easy-to-Implement Two-Server based Anonymous Communication with Simulation Security
A. Bowers; J. Du; D. Lin; W. Jiang
FLARE: Defending Federated Learning against Model Poisoning Attacks via Latent Space Representations
N. Wang; Y. Xiao; Y. Chen; Y. Hu; W. Lou; Y. Hou
SUPERVOICE: Text-Independent Speaker Verification Using Ultrasound Energy in Human Speech
H. Guo; Q. Yan; N. Ivanov; Y. Zhu; L. Xiao; E. Hunter
WearRF-CLA: Continuous Location Authentication with Wrist Wearables and UHF RFID
A. Li; J. Li; D. Han; Y. Zhang; T. Li; Y. Zhang
Memory and Round-Efficient MPC Primitives in the Pre-Processing Model from Unit Vectorization
N. Attrapadung; H. Morita; K. Ohara; J. Schuldt; K. Tozawa
SoK: Design Tools for Side-Channel-Aware Implementations
I. Buhan; L. Batina; Y. Yarom; P. Schaumont
Wireless Manipulation of Serial Communication
G. Dayanikli; A. Mohammed; R. Gerdes; M. Mina
RecIPE: Revisiting the Evaluation of Memory Error Defenses
Y. Jiang; R. Yap; Z. Liang; H. Rosier
SoK: A Survey Of Indirect Network-level Covert Channels
T. Schmidbauer; S. Wendzel
Scalable Private Decision Tree Evaluation with Sublinear Communication
J. Bai; X. Song; S. Cui; E. Chang; G. Russello
POSTER: Depth, Breadth, and Complexity: Ways to Attack and Defend Deep Learning Models
Firuz Juraev, Eldor Abdukhamidov, Mohammed Abuhamad and Tamer Abuhmed
POSTER: Privacy Guarantees of BLE Contact Tracing for COVID-19 and Beyond: A Case Study on COVIDWISE
Salman Ahmed, Ya Xiao, Taejoong Chung, Carol Fung, Moti Yung and Danfeng Yao
POSTER: A Systematic Study of Bulletin Board and Its Application
Misni Suwito, Bayu Tama, Bagus Santoso, Sabyasach Dutta, Haowen Tan, Ueshige Yoshifumi and Kouichi Sakurai
POSTER: TTP-Aided Secure Computation using Secret Sharing With Only One Computing Server
Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal and Masaki Inamura
POSTER: Towards Polyvalent Adversarial Attacks on URL classification engines
Fabien Charmet, Tomohiro Morikawa, Harry Chandra Tanuwidjaja and Takeshi Takahashi
POSTER: Black-box and Target-specific Attack Against Interpretable Deep Learning Systems
Eldor Abdukhamidov, Firuz Juraev, Mohammed Abuhamad and Tamer Abuhmed
POSTER: Base64 Malleability in Practice
Konstantinos Chalkias and Panagiotis Chatzigiannis
POSTER: Decentralized Federated Learning for Internet of Things Anomaly Detection
Zhuotao Lian and Chunhua Su
POSTER: Autonomous Network Defence using Reinforcement Learning
Myles Foley, Chris Hicks, Kate Highnam and Vasilios Mavroudis
POSTER: IoT System Trustworthiness Assurance
Razvan Beuran, Sian En Ooi, Abbie Barbir and Yasuo Tan
POSTER: Vulnerability Detection via Multimodal Learning: Datasets and Analysis
Xin Zhou and Rakesh Verma
POSTER: RBMon: Real Time System Behavior Monitoring Tool
Nitesh Kumar, Anand Handa and Sandeep K. Shukla
POSTER: Developing Secured Android Applications by Mitigating Code Vulnerabilities with Machine Learning
Janaka Senanayake, Harsha Kalutarage, Mhd Omar Al Kadri, Andrei Petrovski and Luca Piras
POSTER: The Personalities of Social Media Posts and Photos
Anne Wagner, Anna Bakas, Daisy Reyes, Shelia Kennison and Eric Chan-Tin
POSTER: Email Summarisation to Assist Users in Phishing Identification
Amir Kashapov, Tingmin Wu, Sharif Abuadbba and Carsten Rudolph
POSTER: Enabling Attribute-Based Access Control in Linux Kernel
H.O Sai Varshith, Shamik Sural, Jaideep Vaidya and Vijay Atluri
POSTER: Leveraging Spectral Representations of Control Flow Graphs for Efficient Analysis of Windows Malware
Qirui Sun, Eldor Abdukhamidov, Tamer Abuhmed and Mohammed Abuhamad
POSTER: Decentralized and Collaborative Tracing for Group Signatures
Maharage Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng and Kouichi Sakurai
Vulnerable Smart Contract Detection by means of Model Checking
Giuseppe Crincoli, Giacomo Iadarola, Piera Elena La Rocca: IIT-CNR, Fabio Martinelli, Francesco Mercaldo and Antonella Santone
Towards an Evaluation Metric for Carbon-Emitting Energy Provenance of Bitcoin Transactions
Tony Mullen, Peter Finn and Jonathan Kochmer
T-Tracer: A Blockchain-Aided Symbol Mapping Watermarking Scheme for Traitor Tracing in Non-Repudiation Data Delivery
Liang Wang, Jun Li, Lina Zuo, Yu Wen, Haibo Liu and Wenyuan Liu
Economics Analysis of Loot Box Market in Blockchain Games
Yu Jiang, Sizheng Fan, Wei Cai, Jongho Seol, Hye-Young Kim and Nohpill Park
DeDa: A DeFi-enabled Data Sharing and Trading System
Minfeng Qi, Zhiyu Xu, Ziyuan Wang, Shiping Chen, Yang Xiang
Economic Analysis of Decentralized Exchange Market with Transaction Fee Mining
Hongbo Zhang, Sizheng Fan, Zhixuan Fang and Wei Cai
Blockchain-based Remote Human’s Health and Activities Monitoring
Meiquan Wang, Huiru Zhang, Haoyang Wu, Guangshun Li and Keke Gai
Competitive Decentralized Randomness Beacon Protocols
Mayank Raikwar
ScaleSFL: A Sharding Solution for Blockchain-Based Federated Learning
Evan Madill, Ben Nguyen and Sara Rouhani
Blockchain-based Reputation Evaluation Using Game Theory in Social Networking
Wenjie Guo
Mitigating Frontrunning Attacks in Ethereum
Maddipati Varun, Balaji Palanisamy and Shamik Sural
GasSaver: A Tool for Solidity Smart Contract Optimization
Quang-Thang Nguyen, Bao Son Do, Thi Tam Nguyen and Ba-Lam Do
Achieving Secure and Efficient P2P Data Trading based on Blockchain for Internet of Things
Ningyu An, Xiao Liang, Xiaokun Zheng, Shuai Yuan, Xiaodong Wang and Zhitao Guan
Real Estate Tokenisation via Non Fungible Tokens
Will Serrano (withdrawn)
Design of public voluntary carbon market mechanism based on crosschain and token economics
Dongsheng Hou, Yukun Hao and Yu Du