Confusing and Detecting ML Adversarial Attacks with Injected Attractors
J. Zhang; E. Chang; H. Lee
 
TargetFuzz: Using DARTs to Guide Directed Greybox Fuzzers
S. Canakci; N. Matyunin; K. Graffi; A. Joshi; M. Egele
 
Model Extraction Attacks on Graph Neural Networks: Taxonomy and Realisation
B. Wu; X. Yang; S. Pan; X. YUAN
 
Proximity Searchable Encryption for the Iris Biometric
S. Ahmad; C. Cachet; L. Demarest; B. Fuller; A. Hamlin
 
Mixed Certificate Chains for the Transition to Post-Quantum Authentication in TLS 1.3
S. Paul; Y. Kuzovkova; N. Lahr; R. Niederhagen
 
SMS OTP Security (SOS): Hardening SMS-Based Two Factor Authentication
C. Peeters; C. Patton; I. Sherman; D. Olszewski; T. Shrimpton; P. Traynor
 
Hopper: Per-Device Nano Segmentation for the Industrial IoT
P. De Vaere; A. Tulimiero; A. Perrig
 
Evaluating Blockchain Protocols with Abusive Modeling
V. SHARMA; P. SZALACHOWSKI; J. ZHOU
 
VERICONDOR: End-to-End Verifiable Condorcet Voting without Tallying Authorities
L. Harrison; S. Bag; H. Luo; F. Hao
 
Symbolic synthesis of indifferentiability attacks
I. Rakotonirina; M. Ambrona; A. Aguirre; G. Barthe
 
Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation
Z. Liu; Y. Tseng; R. Tso; M. Mambo; Y. Chen
 
Efficient Oblivious Permutation via the Waksman Network
W. Holland; O. Ohrimenko; A. Wirth
 
Missed Opportunities: Measuring the Untapped TLS Support in the Industrial Internet of Things
M. Dahlmanns; J. Lohmöller; J. Pennekamp; J. Bodenhausen; K. Wehrle; M. Henze
 
Towards a Utopia of Dataset Sharing: A Case Study on Machine Learning-based Malware Detection Algorithms
P. Chuang; C. Hsu; Y. Chu; S. Huang; C. Huang
 
The Convergence of Source Code and Binary Vulnerability Discovery -- A Case Study
A. Mantovani; L. Compagna; Y. Shoshitaishvili; D. Balzarotti
 
Driving execution of target paths in Android applications with (a) CAR
M. Wong; D. Lie
 
Alexa versus Alexa: Controlling Smart Speakers by Self-Issuing Voice Commands
S. Esposito; D. Sgandurra; G. Bella
 
Mirror Mirror on the Wall: Wireless Environment Reconfiguration Attacks Based on Fast Software-Controlled Surfaces
P. Staat; H. Elders-Boll; M. Heinrichs; C. Zenger; C. Paar
 
MAB-Malware: A Reinforcement Learning Framework for Blackbox Generation of Adversarial Malware
W. Song; X. Li; S. Afroz; D. Garg; D. Kuznetsov; H. Yin
 
On Measuring Vulnerable JavaScript Functions in the Wild
M. Kluban; M. Mannan; A. Youssef
 
Secure-Computation-Friendly Private Set Intersection from Oblivious Compact Graph Evaluation
J. Ma; S. Chow
 
Understanding Disparate Effects of Membership Inference Attacks and Their Countermeasures
D. Zhong; H. SUN; J. Xu; N. Gong; H. Wang
 
Multi-Key Homomorphic MACs with Efficient Verification for Quadratic Arithmetic Circuits
S. Feng; S. Xu; L. Zhang
 
Signal Injection Attacks against CCD Image Sensors
S. Köhler; R. Baker; I. Martinovic
 
Membership Feature Disentanglement Network
H. Ha; J. Jang; Y. Jeong; S. Yoon
 
Byzantine-Robust Private Information Retrieval with Low Communication and Efficient Decoding
L. Zhang; H. Wang
 
            
            
Privacy-Preserving Deep Sequential Model with Matrix Homomorphic Encryption
J. Jang; A. Kim; B. Na; Y. Lee; D. Yhee; B. Lee; J. Cheon; S. Yoon
 
PSImple: Practical Multiparty Maliciously-Secure Private Set Intersection
A. Efraim; O. Nissenbaum; E. Omri; A. Paskin-Cherniavsky
 
Hearing Check Failed: Using Laser Vibrometry to Analyze the Potential for Hard Disk Drives to Eavesdrop Speech Vibrations
P. Walker; N. Saxena; S Anand; T. Halevi; S. Saini
 
DPaSE: Distributed Password-Authenticated Symmetric-Key Encryption, or How to Get Many Keys from One Password
P. Das; J. Hesse; A. Lehmann
 
TRAP: The Bait of Rational Players to Solve Byzantine Consensus
A. Ranchal-Pedrosa; V. Gramoli
 
InfoCensor: An Information-Theoretic Framework against Sensitive Attribute Inference and Demographic Disparity
T. Zheng; B. Li
 
Gatekeeper: A Gateway-based Broadcast Authentication Protocol for the In-Vehicle Ethernet
S. Hu; Q. Zhang; A. Weimerskirch; Z. Mao
 
Server-Side Browsers: Exploring the Web's Hidden Attack Surface
M. Musch; R. Kirchner; M. Boll; M. Johns
 
EPID with Efficient Proof of Non-Revocation
O. Sanders
 
No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis
A. Alsadi; K. Sameshima; J. Bleier; K. Yoshioka; M. Lindorfer; M. van Eeten; C. Ganan
 
Port Contention Goes Portable: Port Contention Side Channels in Web Browsers
T. Rokicki; C. Maurice; M. Botvinnik; Y. Oren
 
Duplicates also Matter! Towards Secure Deletion on Flash-based Storage Media by Removing Duplicates
N. Chen; B. Chen
 
SoK: Password-Authenticated Key Exchange -- Theory, Practice, Standardization and Real-World Lessons
F. Hao; P. van Oorschot
 
GraphTrack: A Graph-based Cross-Device Tracking Framework
B. Wang; T. Zhou; S. Li; Y. Cao; N. Gong
 
Veksel: Simple, Efficient, Anonymous Payments with Large Anonymity Sets from Well-Studied Assumptions
M. Campanelli; M. Hall-Andersen
 
Artificial Intelligence Meets Kinesthetic Intelligence: Mouse-based User Authentication based on Hybrid Human-Machine Learning
S. Fu; D. Qin; G. Amariucai; D. Qiao; Y. Guan; A. Smiley
 
The 5G Key-Establishment Stack: In-Depth Formal Verification
R. Miller; I. Boureanu; S. Wesemeyer; C. Newton
 
PacJam: Securing Dependencies Continuously via Package-Oriented Debloating
P. Pashakhanloo; A. Machiry; H. Choi; A. Canino; K. Heo (KAIST); I. Lee; M. Naik
 
Eliminating Sandwich Attacks with the Help of Game Theory
L. Heimbach; R. Wattenhofer
 
On the Security of the FLARM Collision Warning System
B. Wang; G. Tresoldi; M. Strohmeier; V. Lenders
 
BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy
D. Antonioli; N. Tippenhauer; K. Rasmussen; M. Payer
 
Exploring Unfairness on Proof of Authority: Order Manipulation Attacks and Remedies
Q. WANG; R. Li; Q. Wang; S. CHEN; Y. Xiang
 
EVOLIoT: A Self-Supervised Contrastive Learning Framework for Detecting and Characterizing Evolving IoT Malware Variants
M. Dib; S. Torabi; E. Bou-Harb; N. Bouguila; C. Assi
 
Speedster: An Efficient Multi-party State Channel via Enclaves
J. Liao; F. Zhang; W. Sun; W. Shi
 
Generating Content-Preserving and Semantics-Flipping Adversarial Text
W. Pei; C. Yue
 
ReFuzz — Structure Aware Fuzzing of the Resilient File System (ReFS)
T. Groß T. Schleier; T. Müller
 
Hierarchical Identity-based Puncturable Encryption from Lattices with Application to Forward Security
P. Dutta; M. Jiang; D. Duong; W. Susilo; K. Fukushima; S. Kiyomoto
 
AuxChannel: Enabling Efficient Bi-Directional Channel for Scriptless Blockchains
Z. Sui; J. Liu; J. Yu; M. Au; J. Liu
 
Common Evaluation Pitfalls in Touch-Based Authentication Systems
M. Georgiev; S. Eberz; H. Turner; G. Lovisotto; I. Martinovic
 
EnclaveTree: Privacy-preserving Data Stream Training and Inference Using TEE
Q. Wang; S. Cui; L. Zhou; G. Russello; O. Wu; Y. Zhu
 
SoK: The Evolution of Trusted UI on Mobile
D. Bove
 
Tight Leakage-Resilient Identity-based Encryption under Multi-challenge Setting
C. CAI; X. Qin; T. Yuen; S. Yiu
 
Machine Learning-based Online Social Network Privacy Preservation
T. Gao; F. Li
 
Ruling the Rules: Quantifying the Evolution of Rulesets, Alerts and Incidents in Network Intrusion Detection
M. Vermeer; M. van Eeten; C. Gañán
 
Markov Chain Monte Carlo-Based Machine Unlearning: Unlearning What Needs to be Forgotten
Q. Nguyen; R. Oikawa; D. Divakaran; M. Chan; K. Low
 
VWAnalyzer: A Systematic Security Analysis Framework for the Voice over WiFi Protocol
H. Lee; I. Karim; N. Li; E. Bertino
 
Adversarial Level Agreements for Two-Party Protocols
M. George; S. Kamara
 
SteinerLog: Prize Collecting the Audit Logs for Threat Hunting on Enterprise Network
B. Bhattarai; H. Huang
 
Wolf at the Door: Preventing Install-Time Attacks in npm with Latch
E. Wyss; A. Wittman; D. Davidson; L. De Carli
 
Iterative Oblivious Pseudo-Random Functions and Applications
E. Blass; F. Kerschbaum; T. Mayberry
 
ASAP: Algorithm Substitution Attacks on Cryptographic Protocols
S. Berndt; J. Wichelmann; C. Pott; T. Traving; T. Eisenbarth
 
SoK: Exploring Current and Future Research Directions on XS-Leaks through an Extended Formal Model
T. Van Goethem; G. Franken; I. Sanchez-Rola; D. Dworken; W. Joosen
 
ShadowAuth: Backward-Compatible Automatic CAN Authentication for Legacy ECUs
S. Kim; G. Yeo; T. Kim; J. Rhee; Y. Jeon; A. Bianchi; D. Xu; D. Tian
 
Lures for Money: A First Look into Youtube Videos Promoting Money-Making Apps
N. Nasir; F. Iqbal; Mahnoor; M. Shahjahan; M. Javed
 
PeriScope: Comprehensive Vulnerability Analysis of Mobile App-defined Bluetooth Peripherals
Q. Zhao; C. Zuo; J. Blasco; Z. Lin
 
Understanding and Detecting Remote Infection on Linux-based IoT Devices
H. Li; Q. Huang; F. Ding; H. Hu; L. Cheng; G. Gu; Z. Zhao
 
Aggregating and thresholdizing hash-based signatures using STARKs
I. Khaburzaniya; K. Chalkias; K. Lewi; H. Malvai
 
Hunter: HE-Friendly Structured Pruning for Efficient Privacy-Preserving Deep Learning
Y. Cai; Q. Zhang; R. Ning; C. Xin; H. Wu
 
Stegozoa: Enhancing WebRTC Covert Channels with Video Steganography for Internet Censorship Circumvention
G. Figueira; D. Barradas; N. Santos
 
Easy-to-Implement Two-Server based Anonymous Communication with Simulation Security
A. Bowers; J. Du; D. Lin; W. Jiang
 
FLARE: Defending Federated Learning against Model Poisoning Attacks via Latent Space Representations
N. Wang; Y. Xiao; Y. Chen; Y. Hu; W. Lou; Y. Hou
 
SUPERVOICE: Text-Independent Speaker Verification Using Ultrasound Energy in Human Speech
H. Guo; Q. Yan; N. Ivanov; Y. Zhu; L. Xiao; E. Hunter
 
WearRF-CLA: Continuous Location Authentication with Wrist Wearables and UHF RFID
A. Li; J. Li; D. Han; Y. Zhang; T. Li; Y. Zhang
 
Memory and Round-Efficient MPC Primitives in the Pre-Processing Model from Unit Vectorization
N. Attrapadung; H. Morita; K. Ohara; J. Schuldt; K. Tozawa
 
SoK: Design Tools for Side-Channel-Aware Implementations
I. Buhan; L. Batina; Y. Yarom; P. Schaumont
 
Wireless Manipulation of Serial Communication
G. Dayanikli; A. Mohammed; R. Gerdes; M. Mina
 
RecIPE: Revisiting the Evaluation of Memory Error Defenses
Y. Jiang; R. Yap; Z. Liang; H. Rosier
 
SoK: A Survey Of Indirect Network-level Covert Channels
T. Schmidbauer; S. Wendzel
 
Scalable Private Decision Tree Evaluation with Sublinear Communication
J. Bai; X. Song; S. Cui; E. Chang; G. Russello
 
            
            
            
POSTER: Depth, Breadth, and Complexity: Ways to Attack and Defend Deep Learning Models
Firuz Juraev, Eldor Abdukhamidov, Mohammed Abuhamad and Tamer Abuhmed
 
POSTER: Privacy Guarantees of BLE Contact Tracing for COVID-19 and Beyond: A Case Study on COVIDWISE
Salman Ahmed, Ya Xiao, Taejoong Chung, Carol Fung, Moti Yung and Danfeng Yao
 
POSTER: A Systematic Study of Bulletin Board and Its Application
Misni Suwito, Bayu Tama, Bagus Santoso, Sabyasach Dutta, Haowen Tan, Ueshige Yoshifumi and Kouichi Sakurai
 
POSTER: TTP-Aided Secure Computation using Secret Sharing With Only One Computing Server
Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal and Masaki Inamura
 
POSTER: Towards Polyvalent Adversarial Attacks on URL classification engines
Fabien Charmet, Tomohiro Morikawa, Harry Chandra Tanuwidjaja and Takeshi Takahashi
 
POSTER: Black-box and Target-specific Attack Against Interpretable Deep Learning Systems
Eldor Abdukhamidov, Firuz Juraev, Mohammed Abuhamad and Tamer Abuhmed
 
POSTER: Base64 Malleability in Practice
Konstantinos Chalkias and Panagiotis Chatzigiannis
 
POSTER: Decentralized Federated Learning for Internet of Things Anomaly Detection
Zhuotao Lian and Chunhua Su
 
POSTER: Autonomous Network Defence using Reinforcement Learning
Myles Foley, Chris Hicks, Kate Highnam and Vasilios Mavroudis
 
POSTER: IoT System Trustworthiness Assurance
Razvan Beuran, Sian En Ooi, Abbie Barbir and Yasuo Tan
 
POSTER: Vulnerability Detection via Multimodal Learning: Datasets and Analysis
Xin Zhou and Rakesh Verma
 
POSTER: RBMon: Real Time System Behavior Monitoring Tool
Nitesh Kumar, Anand Handa and Sandeep K. Shukla
 
POSTER: Developing Secured Android Applications by Mitigating Code Vulnerabilities with Machine Learning
Janaka Senanayake, Harsha Kalutarage, Mhd Omar Al Kadri, Andrei Petrovski and Luca Piras
 
POSTER: The Personalities of Social Media Posts and Photos
Anne Wagner, Anna Bakas, Daisy Reyes, Shelia Kennison and Eric Chan-Tin
 
POSTER: Email Summarisation to Assist Users in Phishing Identification
Amir Kashapov, Tingmin Wu, Sharif Abuadbba and Carsten Rudolph
 
POSTER: Enabling Attribute-Based Access Control in Linux Kernel
H.O Sai Varshith, Shamik Sural, Jaideep Vaidya and Vijay Atluri
 
POSTER: Leveraging Spectral Representations of Control Flow Graphs for Efficient Analysis of Windows Malware
Qirui Sun, Eldor Abdukhamidov, Tamer Abuhmed and Mohammed Abuhamad
 
POSTER: Decentralized and Collaborative Tracing for Group Signatures
Maharage Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng and Kouichi Sakurai
 
            
            
Vulnerable Smart Contract Detection by means of Model Checking
Giuseppe Crincoli, Giacomo Iadarola, Piera Elena La Rocca: IIT-CNR, Fabio Martinelli, Francesco Mercaldo and Antonella Santone
 
Towards an Evaluation Metric for Carbon-Emitting Energy Provenance of Bitcoin Transactions
Tony Mullen, Peter Finn and Jonathan Kochmer
 
T-Tracer: A Blockchain-Aided Symbol Mapping Watermarking Scheme for Traitor Tracing in Non-Repudiation Data Delivery
Liang Wang, Jun Li, Lina Zuo, Yu Wen, Haibo Liu and Wenyuan Liu
 
Economics Analysis of Loot Box Market in Blockchain Games
Yu Jiang, Sizheng Fan, Wei Cai, Jongho Seol, Hye-Young Kim and Nohpill Park
 
DeDa: A DeFi-enabled Data Sharing and Trading System
Minfeng Qi, Zhiyu Xu, Ziyuan Wang, Shiping Chen, Yang Xiang
 
Economic Analysis of Decentralized Exchange Market with Transaction Fee Mining
Hongbo Zhang, Sizheng Fan, Zhixuan Fang and Wei Cai
 
Blockchain-based Remote Human’s Health and Activities Monitoring
Meiquan Wang, Huiru Zhang, Haoyang Wu, Guangshun Li and Keke Gai
 
Competitive Decentralized Randomness Beacon Protocols
Mayank Raikwar
 
ScaleSFL: A Sharding Solution for Blockchain-Based Federated Learning
Evan Madill, Ben Nguyen and Sara Rouhani
 
Blockchain-based Reputation Evaluation Using Game Theory in Social Networking
Wenjie Guo
 
Mitigating Frontrunning Attacks in Ethereum
Maddipati Varun, Balaji Palanisamy and Shamik Sural
 
GasSaver: A Tool for Solidity Smart Contract Optimization
Quang-Thang Nguyen, Bao Son Do, Thi Tam Nguyen and Ba-Lam Do
 
Achieving Secure and Efficient P2P Data Trading based on Blockchain for Internet of Things
Ningyu An, Xiao Liang, Xiaokun Zheng, Shuai Yuan, Xiaodong Wang and Zhitao Guan
 
Real Estate Tokenisation via Non Fungible Tokens
Will Serrano (withdrawn)
 
Design of public voluntary carbon market mechanism based on crosschain and token economics
Dongsheng Hou, Yukun Hao and Yu Du