default search action
28th CCS 2021: Virtual Event, Korea
- Yongdae Kim, Jong Kim, Giovanni Vigna, Elaine Shi:
CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021. ACM 2021, ISBN 978-1-4503-8454-4
Keynote Talks
- Cynthia Dwork:
Pseudo-Randomness and the Crystal Ball. 1-2 - Dawn Song:
Towards Building a Responsible Data Economy. 3 - Taesoo Kim:
Are we done yet? Our Journey to Fight against Memory-safety Bugs. 4
Session 1A: Cybercrime
- Ming Xu, Chuanwang Wang, Jitao Yu, Junjie Zhang, Kai Zhang, Weili Han:
Chunk-Level Password Guessing: Towards Modeling Refined Password Composition Representations. 5-20 - Stijn Pletinckx, Kevin Borgolte, Tobias Fiebig:
Out of Sight, Out of Mind: Detecting Orphaned Web Pages at Internet-Scale. 21-35 - Brian Kondracki, Babak Amin Azad, Oleksii Starov, Nick Nikiforakis:
Catching Transparent Phish: Analyzing and Detecting MITM Phishing Toolkits. 36-50 - Yihe Zhang, Xu Yuan, Jin Li, Jiadong Lou, Li Chen, Nian-Feng Tzeng:
Reverse Attack: Black-box Attacks on Collaborative Recommendation. 51-68 - Qingying Hao, Licheng Luo, Steve T. K. Jan, Gang Wang:
It's Not What It Looks Like: Manipulating Perceptual Hashing based Applications. 69-85
Session 1B: Attacks and Robustness
- Baolin Zheng, Peipei Jiang, Qian Wang, Qi Li, Chao Shen, Cong Wang, Yunjie Ge, Qingyang Teng, Shenyi Zhang:
Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information. 86-107 - Jiaming Mu, Binghui Wang, Qi Li, Kun Sun, Mingwei Xu, Zhuotao Liu:
A Hard Label Black-box Adversarial Attack Against Graph Neural Networks. 108-125 - Alireza Bahramali, Milad Nasr, Amir Houmansadr, Dennis Goeckel, Don Towsley:
Robust Adversarial Attacks Against DNN-Based Wireless Communication Systems. 126-140 - Yue Zhao, Hong Zhu, Kai Chen, Shengzhi Zhang:
AI-Lancet: Locating Error-inducing Neurons to Optimize Neural Networks. 141-158
Session 1C: Zero Knowledge I
- Jiaheng Zhang, Tianyi Liu, Weijie Wang, Yinuo Zhang, Dawn Song, Xiang Xie, Yupeng Zhang:
Doubly Efficient Interactive Proofs for General Arithmetic Circuits with Linear Prover Time. 159-177 - Nicholas Franzese, Jonathan Katz, Steve Lu, Rafail Ostrovsky, Xiao Wang, Chenkai Weng:
Constant-Overhead Zero-Knowledge for RAM Programs. 178-191 - Carsten Baum, Lennart Braun, Alexander Munch-Hansen, Benoît Razet, Peter Scholl:
Appenzeller to Brie: Efficient Zero-Knowledge Proofs for Mixed-Mode Arithmetic and Z2k. 192-211 - Yuval Ishai, Hang Su, David J. Wu:
Shorter and Faster Post-Quantum Designated-Verifier zkSNARKs from Lattices. 212-234
Session 1D: Authentication and Click Fraud
- Emily Wenger, Max Bronckers, Christian Cianfarani, Jenna Cryan, Angela Sha, Haitao Zheng, Ben Y. Zhao:
"Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World. 235-251 - Sena Sahin, Frank Li:
Don't Forget the Stuffing! Revisiting the Security Impact of Typo-Tolerant Password Authentication. 252-270 - Tong Zhu, Yan Meng, Haotian Hu, Xiaokuan Zhang, Minhui Xue, Haojin Zhu:
Dissecting Click Fraud Autonomy in the Wild. 271-286 - Suibin Sun, Le Yu, Xiaokuan Zhang, Minhui Xue, Ren Zhou, Haojin Zhu, Shuang Hao, Xiaodong Lin:
Understanding and Detecting Mobile Ad Fraud Through the Lens of Invalid Traffic. 287-303 - Sunwoo Lee, Wonsuk Choi, Dong Hoon Lee:
Usable User Authentication on a Smartwatch using Vibration. 304-319
Session 2A: Fuzzing and Bug Finding
- Carter Yagemann, Simon P. Chung, Brendan Saltaformaggio, Wenke Lee:
Automated Bug Hunting With Data-Driven Symbolic Root Cause Analysis. 320-336 - Xiaotao Feng, Ruoxi Sun, Xiaogang Zhu, Minhui Xue, Sheng Wen, Dongxi Liu, Surya Nepal, Yang Xiang:
Snipuzz: Black-box Fuzzing of IoT Firmware via Message Snippet Inference. 337-350 - Stefan Nagy, Anh Nguyen-Tuong, Jason D. Hiser, Jack W. Davidson, Matthew Hicks:
Same Coverage, Less Bloat: Accelerating Binary-only Fuzzing with Coverage-preserving Coverage-guided Tracing. 351-365 - Xinyang Ge, Ben Niu, Robert Brotzman, Yaohui Chen, HyungSeok Han, Patrice Godefroid, Weidong Cui:
HyperFuzzer: An Efficient Hybrid Fuzzer for Virtual CPUs. 366-378 - Insu Yun, Woosun Song, Seunggi Min, Taesoo Kim:
HardsHeap: A Universal and Extensible Framework for Evaluating Secure Allocators. 379-392
Session 2B: Formal Analysis and Verification
- Yuxin Wang, Zeyu Ding, Yingtai Xiao, Daniel Kifer, Danfeng Zhang:
DPGen: Automated Program Synthesis for Differential Privacy. 393-411 - Riccardo Focardi, Flaminia L. Luccio:
A Formally Verified Configuration for Hardware Security Modules in the Cloud. 412-428 - Klaus von Gleissenthall, Rami Gökhan Kici, Deian Stefan, Ranjit Jhala:
Solver-Aided Constant-Time Hardware Verification. 429-444 - Marco Patrignani, Marco Guarnieri:
Exorcising Spectres with Secure Compilers. 445-461 - Gilles Barthe, Benjamin Grégoire, Vincent Laporte, Swarn Priya:
Structured Leakage and Applications to Cryptographic Constant-Time and Cost. 462-476
Session 2C: Defenses for ML Robustness
- Yizheng Chen, Shiqi Wang, Yue Qin, Xiaojing Liao, Suman Jana, David A. Wagner:
Learning Security Classifiers with Verified Global Robustness Properties. 477-494 - Ryan Sheatsley, Blaine Hoak, Eric Pauley, Yohan Beugin, Michael J. Weisman, Patrick D. McDaniel:
On the Robustness of Domain Constraints. 495-515 - Tianyu Du, Shouling Ji, Lujia Shen, Yao Zhang, Jinfeng Li, Jie Shi, Chengfang Fang, Jianwei Yin, Raheem Beyah, Ting Wang:
Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks. 516-534 - Linyi Li, Maurice Weber, Xiaojun Xu, Luka Rimanic, Bhavya Kailkhura, Tao Xie, Ce Zhang, Bo Li:
TSS: Transformation-Specific Smoothing for Robustness Certification. 535-557
Session 2D: Secure Multiparty Computation
- Haiyang Xue, Man Ho Au, Xiang Xie, Tsz Hon Yuen, Handong Cui:
Efficient Online-friendly Two-Party ECDSA Signature. 558-573 - David Heath, Vladimir Kolesnikov:
One Hot Garbling. 574-593 - Cyprien Delpech de Saint Guilhem, Eleftheria Makri, Dragos Rotaru, Titouan Tanguy:
The Return of Eratosthenes: Secure Generation of RSA Moduli using Distributed Sieving. 594-609 - Toshinori Araki, Jun Furukawa, Kazuma Ohara, Benny Pinkas, Hanan Rosemarin, Hikaru Tsuchida:
Secure Graph Analysis at Scale. 610-629 - Nuttapong Attrapadung, Goichiro Hanaoka, Takahiro Matsuda, Hiraku Morita, Kazuma Ohara, Jacob C. N. Schuldt, Tadanori Teruya, Kazunari Tozawa:
Oblivious Linear Group Actions and Applications. 630-650
Session 3A: Side Channel
- Alexander S. La Cour, Khurram K. Afridi, G. Edward Suh:
Wireless Charging Power Side-Channel Attacks. 651-665 - Chien-Ying Chen, Debopam Sanyal, Sibin Mohan:
Indistinguishability Prevents Scheduler Side Channels in Real-Time Systems. 666-684 - Madura A. Shelton, Lukasz Chmielewski, Niels Samwel, Markus Wagner, Lejla Batina, Yuval Yarom:
Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code. 685-699 - Wenqiang Jin, Srinivasan Murali, Huadi Zhu, Ming Li:
Periscope: A Keystroke Inference Attack Using Human Coupled Electromagnetic Emanations. 700-714 - Pietro Borrello, Daniele Cono D'Elia, Leonardo Querzoni, Cristiano Giuffrida:
Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization. 715-733
Session 3B: Operating Systems
- Muhui Jiang, Lin Ma, Yajin Zhou, Qiang Liu, Cen Zhang, Zhi Wang, Xiapu Luo, Lei Wu, Kui Ren:
ECMO: Peripheral Transplantation to Rehost Embedded Linux Kernels. 734-748 - Weiteng Chen, Yu Wang, Zheng Zhang, Zhiyun Qian:
SyzGen: Automated Generation of Syscall Specification of Closed-Source macOS Drivers. 749-763 - Nanzi Yang, Wenbo Shen, Jinku Li, Yutian Yang, Kangjie Lu, Jietao Xiao, Tianyu Zhou, Chenggang Qin, Wang Yu, Jianfeng Ma, Kui Ren:
Demons in the Shared Kernel: Abstract Resource Attacks Against OS-level Virtualization. 764-778 - Jinhua Cui, Jason Zhijingcheng Yu, Shweta Shinde, Prateek Saxena, Zhiping Cai:
SmashEx: Smashing SGX Enclaves Using Exceptions. 779-793 - Lirong Fu, Shouling Ji, Kangjie Lu, Peiyu Liu, Xuhong Zhang, Yuxuan Duan, Zihui Zhang, Wenzhi Chen, Yanjun Wu:
CPscan: Detecting Bugs Caused by Code Pruning in IoT Kernels. 794-810 - Hang Zhang, Weiteng Chen, Yu Hao, Guoren Li, Yizhuo Zhai, Xiaochen Zou, Zhiyun Qian:
Statically Discovering High-Order Taint Style Vulnerabilities in OS Kernels. 811-824
Session 3C: Inference Attacks
- Mohammad Malekzadeh, Anastasia Borovykh, Deniz Gündüz:
Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs. 825-844 - Xinlei He, Yang Zhang:
Quantifying and Mitigating Privacy Risks of Contrastive Learning. 845-863 - Minxing Zhang, Zhaochun Ren, Zihan Wang, Pengjie Ren, Zhumin Chen, Pengfei Hu, Yang Zhang:
Membership Inference Attacks Against Recommender Systems. 864-879 - Zheng Li, Yang Zhang:
Membership Leakage in Label-Only Exposures. 880-895 - Min Chen, Zhikun Zhang, Tianhao Wang, Michael Backes, Mathias Humbert, Yang Zhang:
When Machine Unlearning Jeopardizes Privacy. 896-911
Session 3D: DoS
- Yuanjie Li, Hewu Li, Zhizheng Lv, Xingkun Yao, Qianru Li, Jianping Wu:
Deterrence of Intelligent DDoS via Multi-Hop Traffic Divergence. 923-939 - Harm Griffioen, Kris Oosthoek, Paul van der Knaap, Christian Doerr:
Scan, Test, Execute: Adversarial Tactics in Amplification DDoS Attacks. 940-954 - Junjie Xiong, Mingkui Wei, Zhuo Lu, Yao Liu:
Warmonger: Inflicting Denial-of-Service via Serverless Functions in the Cloud. 955-969 - Daniel Wagner, Daniel Kopp, Matthias Wichtlhuber, Christoph Dietzel, Oliver Hohlfeld, Georgios Smaragdakis, Anja Feldmann:
United We Stand: Collaborative Detection and Mitigation of Amplification DDoS Attacks at Scale. 970-987
Session 4A: Modeling Blockchains and Distributed Ledgers
- Muhammad Saad, Afsah Anwar, Srivatsan Ravi, David Mohaisen:
Revisiting Nakamoto Consensus in Asynchronous Networks: A Comprehensive Analysis of Bitcoin Safety and ChainQuality. 988-1005 - Andrew Lewis-Pye, Tim Roughgarden:
How Does Blockchain Security Dictate Blockchain Implementation? 1006-1019 - Poulami Das, Andreas Erwig, Sebastian Faust, Julian Loss, Siavash Riahi:
The Exact Security of BIP32 Wallets. 1020-1042 - Mike Graf, Daniel Rausch, Viktoria Ronge, Christoph Egger, Ralf Küsters, Dominique Schröder:
A Security Framework for Distributed Ledgers. 1043-1064
Session 4B: Wireless, Mobile, and IoT
- Michalis Diamantaris, Serafeim Moustakas, Lichao Sun, Sotiris Ioannidis, Jason Polakis:
This Sneaky Piggy Went to the Android Ad Market: Misusing Mobile Sensors for Stealthy Data Exfiltration. 1065-1081 - Syed Rafiul Hussain, Imtiaz Karim, Abdullah Al Ishtiaq, Omar Chowdhury, Elisa Bertino:
Noncompliance as Deviant Behavior: An Automated Black-box Noncompliance Checker for 4G LTE Cellular Devices. 1082-1099 - Man Hong Hue, Joyanta Debnath, Kin Man Leung, Li Li, Mohsen Minaei, M. Hammad Mazhar, Kailiang Xian, Md. Endadul Hoque, Omar Chowdhury, Sze Yiu Chau:
All your Credentials are Belong to Us: On Insecure WPA2-Enterprise Configurations. 1100-1117 - Xiaofeng Shi, Shouqian Shi, Minmei Wang, Jonne Kaunisto, Chen Qian:
On-device IoT Certificate Revocation Checking with Small Memory and Low Latency. 1118-1134
Session 4C: Private Set Intersection
- Kelong Cong, Radames Cruz Moreno, Mariana Botelho da Gama, Wei Dai, Ilia Iliashenko, Kim Laine, Michael Rosenberg:
Labeled PSI from Homomorphic Encryption with Reduced Computation and Communication. 1135-1150 - Ofri Nevo, Ni Trieu, Avishay Yanai:
Simple, Fast Malicious Multiparty Private Set Intersection. 1151-1165 - Mike Rosulek, Ni Trieu:
Compact and Malicious Private Set Intersection for Small Sets. 1166-1181 - Nishanth Chandran, Nishka Dasgupta, Divya Gupta, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar, Akash Shah:
Efficient Linear Multiparty PSI and Extensions to Circuit/Quorum PSI. 1182-1204
Session 4D: Differential Privacy
- Benjamin Weggenmann, Florian Kerschbaum:
Differential Privacy for Directional Data. 1205-1222 - Martin Aumüller, Christian Janos Lebeda, Rasmus Pagh:
Differentially Private Sparse Vectors with Low Error, Optimal Space, and Fast Access. 1223-1236 - Tianhao Wang, Joann Qiongna Chen, Zhikun Zhang, Dong Su, Yueqiang Cheng, Zhou Li, Ninghui Li, Somesh Jha:
Continuous Release of Data Streams under both Centralized and Local Differential Privacy. 1237-1253 - Franziska Boenisch, Reinhard Munz, Marcel Tiepelt, Simon Hanisch, Christiane Kuhn, Paul Francis:
Side-Channel Attacks on Query-Based Data Anonymization. 1254-1265 - Linkang Du, Zhikun Zhang, Shaojie Bai, Changchang Liu, Shouling Ji, Peng Cheng, Jiming Chen:
AHEAD: Adaptive Hierarchical Decomposition for Range Query under Local Differential Privacy. 1266-1288
Session 5A: Control System Security
- Yan Jia, Bin Yuan, Luyi Xing, Dongfang Zhao, Yifan Zhang, XiaoFeng Wang, Yijing Liu, Kaimin Zheng, Peyton Crnjak, Yuqing Zhang, Deqing Zou, Hai Jin:
Who's In Control? On Security Risks of Disjointed IoT Device Management Channels. 1289-1305 - Dianqi Han, Ang Li, Jiawei Li, Yan Zhang, Tao Li, Yanchao Zhang:
DroneKey: A Drone-Aided Group-Key Generation Scheme for Large-Scale IoT Networks. 1306-1319 - Abel Zambrano, Alejandro Palacio Betancur, Luis Burbano, Andres Felipe Niño, Luis Felipe Giraldo, Mariantonieta Gutierrez Soto, Jairo Giraldo, Alvaro A. Cárdenas:
You Make Me Tremble: A First Look at Attacks Against Structural Control Systems. 1320-1337 - Tohid Shekari, Celine Irvene, Alvaro A. Cárdenas, Raheem Beyah:
MaMIoT: Manipulation of Energy Market Leveraging High Wattage IoT Botnets. 1338-1356 - Fritz Alder, Jo Van Bulck, Frank Piessens, Jan Tobias Mühlberg:
Aion: Enabling Open Systems through Strong Availability Guarantees for Enclaves. 1357-1372
Session 5B: PKI and Access Control
- Yiming Zhang, Baojun Liu, Chaoyi Lu, Zhou Li, Haixin Duan, Jiachen Li, Zaifeng Zhang:
Rusted Anchors: A National Client-Side View of Hidden Root CAs in the Web PKI Ecosystem. 1373-1387 - Joyanta Debnath, Sze Yiu Chau, Omar Chowdhury:
On Re-engineering the X.509 PKI with Executable Specification for Better Implementation Guarantees. 1388-1404 - Sean Dougherty, Reza Tourani, Gaurav Panwar, Roopa Vishwanathan, Satyajayant Misra, Srikathyayani Srikanteswara:
APECS: A Distributed Access Control Framework for Pervasive Edge Computing Services. 1405-1420 - Tianxiang Dai, Haya Schulmann, Michael Waidner:
Let's Downgrade Let's Encrypt. 1421-1440
Session 5C: Messaging and Privacy
- Keitaro Hashimoto, Shuichi Katsumata, Eamonn W. Postlethwaite, Thomas Prest, Bas Westerbaan:
A Concrete Treatment of Efficient Continuous Group Key Agreement via Multi-Recipient PKEs. 1441-1462 - Joël Alwen, Sandro Coretti, Yevgeniy Dodis, Yiannis Tselekounis:
Modular Design of Secure Group Messaging Protocols and the Security of MLS. 1463-1483 - Charlotte Peale, Saba Eskandarian, Dan Boneh:
Secure Complaint-Enabled Source-Tracking for Encrypted Messaging. 1484-1506 - Gabrielle Beck, Julia Len, Ian Miers, Matthew Green:
Fuzzy Message Detection. 1507-1528 - Gabriel Kaptchuk, Tushar M. Jois, Matthew Green, Aviel D. Rubin:
Meteor: Cryptographically Secure Steganography for Realistic Distributions. 1529-1548 - Jean Paul Degabriele:
Hiding the Lengths of Encrypted Messages via Gaussian Padding. 1549-1565
Session 5D: Misc: Android and Vulnerabilities
- Fenghao Xu, Siyu Shen, Wenrui Diao, Zhou Li, Yi Chen, Rui Li, Kehuan Zhang:
Android on PC: On the Security of End-user Android Emulators. 1566-1580 - Xiaobo Xiang, Ren Zhang, Hanxiang Wen, Xiaorui Gong, Baoxu Liu:
Ghost in the Binder: Binder Transaction Redirection Attacks in Android System Services. 1581-1597 - Zeinab El-Rewini, Yousra Aafer:
Dissecting Residual APIs in Custom Android ROMs. 1598-1611 - Mohannad Ismail, Jinwoo Yom, Christopher Jelesnianski, Yeongjin Jang, Changwoo Min:
VIP: Safeguard Value Invariant Property for Thwarting Critical Memory Corruption Attacks. 1612-1626 - Dinghao Liu, Qiushi Wu, Shouling Ji, Kangjie Lu, Zhenguang Liu, Jianhai Chen, Qinming He:
Detecting Missed Security Operations Through Differential Checking of Object-based Similar Paths. 1627-1644
Session 6A: Consensus and Attacks
- Kai Li, Yibo Wang, Yuzhe Tang:
DETER: Denial of Ethereum Txpool sERvices. 1645-1667 - Muhammad Saad, Songqing Chen, David Mohaisen:
SyncAttack: Double-spending in Bitcoin Without Mining Power. 1668-1685 - Atsuki Momose, Ling Ren:
Multi-Threshold Byzantine Fault Tolerance. 1686-1699 - Xuechao Wang, Viswa Virinchi Muppirala, Lei Yang, Sreeram Kannan, Pramod Viswanath:
Securing Parallel-chain Protocols under Variable Mining Power. 1700-1721 - Peiyao Sheng, Gerui Wang, Kartik Nayak, Sreeram Kannan, Pramod Viswanath:
BFT Protocol Forensics. 1722-1743
Session 6B: Web Vulnerabilities
- Nikos Vasilakis, Achilles Benetopoulos, Shivam Handa, Alizee Schoen, Jiasi Shen, Martin C. Rinard:
Supply-Chain Vulnerability Elimination via Active Learning and Regeneration. 1755-1770 - Lukas Knittel, Christian Mainka, Marcus Niemietz, Dominik Trevor Noß, Jörg Schwenk:
XSinator.com: From a Formal Model to the Automatic Evaluation of Cross-Site Leaks in Web Browsers. 1771-1788 - Aurore Fass, Dolière Francis Somé, Michael Backes, Ben Stock:
DoubleX: Statically Detecting Vulnerable Data Flows in Browser Extensions at Scale. 1789-1804 - Bahruz Jabiyev, Steven Sprecher, Kaan Onarlioglu, Engin Kirda:
T-Reqs: HTTP Request Smuggling with Differential Fuzzing. 1805-1820 - Nikos Vasilakis, Cristian-Alexandru Staicu, Grigoris Ntousakis, Konstantinos Kallas, Ben Karel, André DeHon, Michael Pradel:
Preventing Dynamic Library Compromise on Node.js via RWX-Based Privilege Reduction. 1821-1838 - Meng Wang, Chijung Jung, Ali Ahad, Yonghwi Kwon:
Spinner: Automated Dynamic Command Subsystem Perturbation. 1839-1860
Session 6C: Audio Systems and Autonomous Driving
- Yanjiao Chen, Yijie Bai, Richard Mitev, Kaibo Wang, Ahmad-Reza Sadeghi, Wenyuan Xu:
FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants. 1861-1883 - Zhuohang Li, Cong Shi, Tianfang Zhang, Yi Xie, Jian Liu, Bo Yuan, Yingying Chen:
Robust Detection of Machine-induced Audio Attacks in Intelligent Audio Systems with Microphone Array. 1884-1899 - Ben Nassi, Yaron Pirutin, Tomer Cohen Galor, Yuval Elovici, Boris Zadov:
Glowworm Attack: Optical TEMPEST Sound Recovery via a Device's Power Indicator LED. 1900-1914 - Xiaoyu Ji, Juchuan Zhang, Shui Jiang, Jishen Li, Wenyuan Xu:
CapSpeaker: Injecting Voices to Microphones via Capacitors. 1915-1929 - Wei Wang, Yao Yao, Xin Liu, Xiang Li, Pei Hao, Ting Zhu:
I Can See the Light: Attacks on Autonomous Vehicles Using Invisible Lights. 1930-1944 - Yi Zhu, Chenglin Miao, Tianhang Zheng, Foad Hajiaghajani, Lu Su, Chunming Qiao:
Can We Use Arbitrary Objects to Attack LiDAR Perception in Autonomous Driving? 1945-1960
Session 6D: Authentication and Privacy
- Daniel Masny, Gaven J. Watson:
A PKI-based Framework for Establishing Efficient MPC Channels. 1961-1980 - Jean Paul Degabriele, Jérôme Govinden, Felix Günther, Kenneth G. Paterson:
The Security of ChaCha20-Poly1305 in the Multi-User Setting. 1981-2003 - Lucjan Hanzlik, Daniel Slamanig:
With a Little Help from My Friends: Constructing Practical Anonymous Credentials. 2004-2023 - Matthew Weidner, Martin Kleppmann, Daniel Hugenroth, Alastair R. Beresford:
Key Agreement for Decentralized Secure Group Messaging with Strong Security Guarantees. 2024-2045 - Shuichi Katsumata, Takahiro Matsuda, Wataru Nakamura, Kazuma Ohara, Kenta Takahashi:
Revisiting Fuzzy Signatures: Towards a More Risk-Free Cryptographic Authentication System based on Biometrics. 2046-2065 - Luca De Feo, Bertram Poettering, Alessandro Sorniotti:
On the (In)Security of ElGamal in OpenPGP. 2066-2080
Session 7A: Privacy Attacks and Defenses for ML
- Hongbin Liu, Jinyuan Jia, Wenjie Qu, Neil Zhenqiang Gong:
EncoderMI: Membership Inference against Pre-trained Encoders in Contrastive Learning. 2081-2095 - Aoting Hu, Renjie Xie, Zhigang Lu, Aiqun Hu, Minhui Xue:
TableGAN-MCA: Evaluating Membership Collisions of GAN-Synthesized Tabular Data Releasing. 2096-2112 - Dario Pasquini, Giuseppe Ateniese, Massimo Bernaschi:
Unleashing the Tiger: Inference Attacks on Split Learning. 2113-2129 - Sina Sajadmanesh, Daniel Gatica-Perez:
Locally Private Graph Neural Networks. 2130-2145 - Boxin Wang, Fan Wu, Yunhui Long, Luka Rimanic, Ce Zhang, Bo Li:
DataLens: Scalable Privacy Preserving Training via Gradient Compression and Aggregation. 2146-2168
Session 7B: Fuzzing
- Xiaogang Zhu, Marcel Böhme:
Regression Greybox Fuzzing. 2169-2182 - Zhuohua Li, Jincheng Wang, Mingshen Sun, John C. S. Lui:
MirChecker: Detecting Bugs in Rust Programs via Static Analysis. 2183-2196 - Gaoning Pan, Xingwei Lin, Xuhong Zhang, Yongkang Jia, Shouling Ji, Chunming Wu, Xinlei Ying, Jiashui Wang, Yanjun Wu:
V-Shuttle: Scalable and Semantics-Aware Hypervisor Virtual Device Fuzzing. 2197-2213 - Ren Ding, Yonghae Kim, Fan Sang, Wen Xu, Gururaj Saileshwar, Taesoo Kim:
Hardware Support to Improve Fuzzing Performance and Precision. 2214-2228 - Xiaoyu He, Xiaofei Xie, Yuekang Li, Jianwen Sun, Feng Li, Wei Zou, Yang Liu, Lei Yu, Jianhua Zhou, Wenchang Shi, Wei Huo:
SoFi: Reflection-Augmented Fuzzing for JavaScript Engines. 2229-2242
Session 7C: Database and Privacy
- Evangelia Anna Markatou, Francesca Falzon, Roberto Tamassia, William Schor:
Reconstructing with Less: Leakage Abuse Attacks in Two Dimensions. 2243-2261 - Dmytro Bogatov, Georgios Kellaris, George Kollios, Kobbi Nissim, Adam O'Neill:
εpsolute: Efficiently Querying Databases While Providing Differential Privacy. 2262-2276 - Seung Geol Choi, Dana Dachman-Soled, S. Dov Gordon, Linsheng Liu, Arkady Yerukhimovich:
Compressed Oblivious Encoding for Homomorphically Encrypted Search. 2277-2291 - Muhammad Haris Mughees, Hao Chen, Ling Ren:
OnionPIR: Response Efficient Single-Server PIR. 2292-2306
Session 7D: Privacy for Distributed Data and Federated Learning
- Jianting Ning, Xinyi Huang, Geong Sen Poh, Jiaming Yuan, Yingjiu Li, Jian Weng, Robert H. Deng:
LEAP: Leakage-Abuse Attack on Efficiently Deployable, Efficiently Searchable Encryption with Partially Known Dataset. 2307-2320 - Antonious M. Girgis, Deepesh Data, Suhas N. Diggavi, Ananda Theertha Suresh, Peter Kairouz:
On the Rényi Differential Privacy of the Shuffle Model. 2321-2341 - Aashish Kolluri, Teodora Baluta, Prateek Saxena:
Private Hierarchical Clustering in Federated Networks. 2342-2360 - Jonas Böhler, Florian Kerschbaum:
Secure Multi-party Computation of Differentially Private Heavy Hitters. 2361-2377
Session 8: Poster & Demo Session
- Abdulrahman Alabduljabbar, Ahmed Abusnaina, Ülkü Meteriz-Yildiran, David Mohaisen:
Automated Privacy Policy Annotation with Information Highlighting Made Practical Using Deep Representations. 2378-2380 - Ben Nassi, Yaron Pirutin, Raz Swissa, Adi Shamir, Yuval Elovici, Boris Zadov:
POSTER: Recovering Songs from a Hanging Light Bulb. 2381-2383 - Grégoire Menguy, Sébastien Bardin, Richard Bonichon, Cauim de Souza Lima:
Search-Based Local Black-Box Deobfuscation: Understand, Improve and Mitigate (Poster). 2384-2386 - Hailong Hu, Jun Pang:
Membership Inference Attacks against GANs by Leveraging Over-representation Regions. 2387-2389 - Zi Wang, Yili Ren, Yingying Chen, Jie Yang:
Earable Authentication via Acoustic Toothprint. 2390-2392 - Gianluca Scopelliti, Sepideh Pouyanrad, Job Noorman, Fritz Alder, Frank Piessens, Jan Tobias Mühlberg:
POSTER: An Open-Source Framework for Developing Heterogeneous Distributed Enclave Applications. 2393-2395 - Brian Tung, Zhiyuan Yu, Ning Zhang:
Towards Automated Computational Auditing of mHealth Security and Privacy Regulations. 2396-2398 - Lihi Dery, Tamir Tassa, Avishay Yanai, Arthur Zamarin:
DEMO: A Secure Voting System for Score Based Elections. 2399-2401 - Naureen Hoque, Hanif Rahbari:
POSTER: A Tough Nut to Crack: Attempting to Break Modulation Obfuscation. 2402-2404 - Brandon Falk, Yan Meng, Yuxia Zhan, Haojin Zhu:
POSTER: ReAvatar: Virtual Reality De-anonymization Attack Through Correlating Movement Signatures. 2405-2407 - Daniel Günther, Thomas Schneider, Felix Wiegand:
Revisiting Hybrid Private Information Retrieval. 2408-2410 - Asya Mitseva, Jan Pennekamp, Johannes Lohmöller, Torsten Ziemann, Carl Hoerchner, Klaus Wehrle, Andriy Panchenko:
POSTER: How Dangerous is My Click? Boosting Website Fingerprinting By Considering Sequences of Webpages. 2411-2413 - Skyler Johnson, Katherine Ferro, L. Jean Camp, Hilda Hadan:
Human and Organizational Factors in Public Key Certificate Authority Failures. 2414-2416 - Hsin Yi Chen, Siddharth Prakash Rao:
On Adoptability and Use Case Exploration of Threat Modeling for Mobile Communication Systems. 2417-2419 - Azqa Nadeem, Sicco Verwer, Stephen Moskal, Shanchieh Jay Yang:
Enabling Visual Analytics via Alert-driven Attack Graphs. 2420-2422 - Elias Heftrig, Jean-Pierre Seifert, Haya Schulmann, Michael Waidner, Nils Wisiol:
Predictive Cipher-Suite Negotiation for Boosting Deployment of New Ciphers. 2423-2425 - Ao Li, Jinwen Wang, Ning Zhang:
Chronos: Timing Interference as a New Attack Vector on Autonomous Cyber-physical Systems. 2426-2428 - Grigoris Ntousakis, Sotiris Ioannidis, Nikos Vasilakis:
Demo: Detecting Third-Party Library Problems with Combined Program Analysis. 2429-2431 - Daniel Kopp, Eric Strehle, Oliver Hohlfeld:
CyberBunker 2.0 - A Domain and Traffic Perspective on a Bulletproof Hoster. 2432-2434 - Christian Ryan, Sharmishtha Dutta, Youngja Park, Nidhi Rastogi:
An Ontology-driven Knowledge Graph for Android Malware. 2435-2437 - Md. Monowar Anjum, Noman Mohammed, Xiaoqian Jiang:
De-identification of Unstructured Clinical Texts from Sequence to Sequence Perspective. 2438-2440 - Eujeanne Kim, Sung-Jun Park, Seokwoo Choi, Dong-Kyu Chae, Sang-Wook Kim:
MANIAC: A Man-Machine Collaborative System for Classifying Malware Author Groups. 2441-2443 - Markus Brandt, Haya Schulmann, Michael Waidner:
Evaluating Resilience of Domains in PKI. 2444-2446 - Vinuri Bandara, Thisura Rathnayake, Nipuna Weerasekara, Charitha Elvitigala, Kenneth Thilakarathna, Primal Wijesekera, Kasun De Zoysa, Chamath Keppitiyagama:
Demo: Large Scale Analysis on Vulnerability Remediation in Open-source JavaScript Projects. 2447-2449 - Muhammad Nouman Nafees, Neetesh Saxena, Pete Burnap:
Optimized Predictive Control for AGC Cyber Resiliency. 2450-2452 - Masanori Misono, Takahiro Shinagawa:
POSTER: OS Independent Fuzz Testing of I/O Boundary. 2453-2455
Session 10A: Crypto, Symbols and Obfuscation
- Florian Sieck, Sebastian Berndt, Jan Wichelmann, Thomas Eisenbarth:
Util: : Lookup: Exploiting Key Decoding in Cryptographic Libraries. 2456-2473 - Moosa Yahyazadeh, Sze Yiu Chau, Li Li, Man Hong Hue, Joyanta Debnath, Sheung Chiu Ip, Chun Ngai Li, Md. Endadul Hoque, Omar Chowdhury:
Morpheus: Bringing The (PKCS) One To Meet the Oracle. 2474-2496 - Daniel De Almeida Braga, Pierre-Alain Fouque, Mohamed Sabt:
PARASITE: PAssword Recovery Attack against Srp Implementations in ThE wild. 2497-2512 - Grégoire Menguy, Sébastien Bardin, Richard Bonichon, Cauim de Souza Lima:
Search-Based Local Black-Box Deobfuscation: Understand, Improve and Mitigate. 2513-2525 - Jingxuan He, Gishor Sivanrupan, Petar Tsankov, Martin T. Vechev:
Learning to Explore Paths for Symbolic Execution. 2526-2540
Session 10B: Crypto and Protocol Security
- Manuel Barbosa, Gilles Barthe, Benjamin Grégoire, Adrien Koutsos, Pierre-Yves Strub:
Mechanized Proofs of Adversarial Complexity and Application to Universal Composability. 2541-2563 - Manuel Barbosa, Gilles Barthe, Xiong Fan, Benjamin Grégoire, Shih-Han Hung, Jonathan Katz, Pierre-Yves Strub, Xiaodi Wu, Li Zhou:
EasyPQC: Verifying Post-Quantum Cryptography. 2564-2586 - José Bacelar Almeida, Manuel Barbosa, Manuel L. Correia, Karim Eldefrawy, Stéphane Graham-Lengrand, Hugo Pacheco, Vitor Pereira:
Machine-checked ZKP for NP relations: Formally Verified Security Proofs and Implementations of MPC-in-the-Head. 2587-2600 - Karthikeyan Bhargavan, Abhishek Bichhawat, Quoc Huy Do, Pedram Hosseyni, Ralf Küsters, Guido Schmitz, Tim Würtele:
An In-Depth Symbolic Security Analysis of the ACME Standard. 2601-2617 - Mei Wang, Kun He, Jing Chen, Zengpeng Li, Wei Zhao, Ruiying Du:
Biometrics-Authenticated Key Exchange for Secure Messaging. 2618-2631 - David A. Basin, Jannik Dreier, Sofia Giampietro, Sasa Radomirovic:
Verifying Table-Based Elections. 2632-2652
Session 10C: Foundations
- Sri Aravinda Krishnan Thyagarajan, Guilhem Castagnos, Fabien Laguillaumie, Giulio Malavolta:
Efficient CCA Timed Commitments in Class Groups. 2663-2684 - Nitin Agrawal, James Bell, Adrià Gascón, Matt J. Kusner:
MPC-Friendly Commitments for Publicly Verifiable Covert Security. 2685-2704 - Sourav Das, Zhuolun Xiang, Ling Ren:
Asynchronous Data Dissemination and its Applications. 2705-2721 - Julien Duman, Kathrin Hövelmanns, Eike Kiltz, Vadim Lyubashevsky, Gregor Seiler:
Faster Lattice-Based KEMs via a Generic Fujisaki-Okamoto Transform Using Prefix Hashing. 2722-2737 - Susan Hohenberger, Satyanarayana Vusirikala:
PPE Circuits for Rational Polynomials. 2738-2757 - Mihai Christodorescu, Sivanarayana Gaddam, Pratyay Mukherjee, Rohit Sinha:
Amortized Threshold Symmetric-key Encryption. 2758-2779
Session 10D: Applied Privacy
- Jian Gong, Xinyu Zhang, Ju Ren, Yaoxue Zhang:
The Invisible Shadow: How Security Cameras Leak Private Activities. 2780-2793 - Tao Wang:
The One-Page Setting: A Higher Standard for Evaluating Website Fingerprinting Defenses. 2794-2806 - Nazir Saleheen, Md. Azim Ullah, Supriyo Chakraborty, Deniz S. Ones, Mani B. Srivastava, Santosh Kumar:
WristPrint: Characterizing User Re-identification Risks from Wrist-worn Accelerometry Data. 2807-2823 - Duc Bui, Yuan Yao, Kang G. Shin, Jong-Min Choi, Junbum Shin:
Consistency Analysis of Data-Usage Purposes in Mobile Apps. 2824-2843 - Michael Smith, Peter Snyder, Benjamin Livshits, Deian Stefan:
SugarCoat: Programmatically Generating Privacy-Preserving, Web-Compatible Resource Replacements for Content Blocking. 2844-2857
Session 11A: Attestation and Firmware Security
- Wenna Song, Jiang Ming, Lin Jiang, Yi Xiang, Xuanchen Pan, Jianming Fu, Guojun Peng:
Towards Transparent and Stealthy Android OS Sandboxing via Customizable Container-Based Virtualization. 2858-2874 - Robert Buhren, Hans Niklas Jacob, Thilo Krachenfels, Jean-Pierre Seifert:
One Glitch to Rule Them All: Fault Injection Attacks Against AMD's Secure Encrypted Virtualization. 2875-2889 - Sebastian Surminski, Christian Niesler, Ferdinand Brasser, Lucas Davi, Ahmad-Reza Sadeghi:
RealSWATT: Remote Software-based Attestation for Embedded Devices under Realtime Constraints. 2890-2905 - Antoon Purnal, Furkan Turan, Ingrid Verbauwhede:
Prime+Scope: Overcoming the Observer Effect for High-Precision Cache Contention Attacks. 2906-2920 - Ivan De Oliveira Nunes, Sashidhar Jakkamsetti, Norrathep Rattanavipanon, Gene Tsudik:
On the TOCTOU Problem in Remote Attestation. 2921-2936 - Mengyuan Li, Yinqian Zhang, Zhiqiang Lin:
CrossLine: Breaking "Security-by-Crash" based Memory Isolation in AMD SEV. 2937-2950
Session 11B: Zero Knowledge II
- Zhiyong Fang, David Darais, Joseph P. Near, Yupeng Zhang:
Zero Knowledge Static Program Analysis. 2951-2967 - Tianyi Liu, Xiang Xie, Yupeng Zhang:
zkCNN: Zero Knowledge Proofs for Convolutional Neural Network Predictions and Accuracy. 2968-2985 - Kang Yang, Pratik Sarkar, Chenkai Weng, Xiao Wang:
QuickSilver: Efficient and Affordable Zero-Knowledge Proofs for Circuits and Polynomials over Any Field. 2986-3001 - Yun Li, Cun Ye, Yuguang Hu, Ivring Morpheus, Yu Guo, Chao Zhang, Yupeng Zhang, Zhipeng Sun, Yiwen Lu, Haodi Wang:
ZKCPlus: Optimized Fair-exchange Protocol Supporting Practical and Flexible Data Exchange. 3002-3021 - Cyprien Delpech de Saint Guilhem, Emmanuela Orsini, Titouan Tanguy:
Limbo: Efficient Zero-knowledge MPCitH-based Arguments. 3022-3036
Session 11C: Software Development and Analysis
- Rachel Cummings, Gabriel Kaptchuk, Elissa M. Redmiles:
"I need a better description": An Investigation Into User Expectations For Differential Privacy. 3037-3052 - Miuyin Yong Wong, Matthew Landen, Manos Antonakakis, Douglas M. Blough, Elissa M. Redmiles, Mustaque Ahamad:
An Inside Look into the Practice of Malware Analysis. 3053-3069 - Felix Fischer, Yannick Stachelscheid, Jens Grossklags:
The Effect of Google Search on Software Security: Unobtrusive Security Interventions via Content Re-ranking. 3070-3084 - Sebastian Roth, Lea Gröber, Michael Backes, Katharina Krombholz, Ben Stock:
12 Angry Developers - A Qualitative Study on Developers' Struggles with CSP. 3085-3103
Session 11D: Data Poisoning and Backdoor Attacks in ML
- Matthew Jagielski, Giorgio Severi, Niklas Pousette Harger, Alina Oprea:
Subpopulation Data Poisoning Attacks. 3104-3122 - Shaofeng Li, Hui Liu, Tian Dong, Benjamin Zi Hao Zhao, Minhui Xue, Haojin Zhu, Jialiang Lu:
Hidden Backdoors in Human-Centric Language Models. 3123-3140 - Lujia Shen, Shouling Ji, Xuhong Zhang, Jinfeng Li, Jing Chen, Jie Shi, Chengfang Fang, Jianwei Yin, Ting Wang:
Backdoor Pre-trained Models Can Transfer to All. 3141-3158 - Chaoxiang He, Bin Benjamin Zhu, Xiaojing Ma, Hai Jin, Shengshan Hu:
Feature-Indistinguishable Attack to Circumvent Trapdoor-Enabled Defense. 3159-3176 - Chong Xiang, Prateek Mittal:
DetectorGuard: Provably Securing Object Detectors against Localized Patch Hiding Attacks. 3177-3196
Session 12A: Applications and Privacy of ML
- Dongqi Han, Zhiliang Wang, Wenqi Chen, Ying Zhong, Su Wang, Han Zhang, Jiahai Yang, Xingang Shi, Xia Yin:
DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications. 3197-3217 - Kaifa Zhao, Hao Zhou, Yulin Zhu, Xian Zhan, Kai Zhou, Jianfeng Li, Le Yu, Wei Yuan, Xiapu Luo:
Structural Attack against Graph Based Android Malware Detection. 3218-3235 - Xuezixiang Li, Yu Qu, Heng Yin:
PalmTree: Learning an Assembly Language Model for Instruction Embedding. 3236-3251 - Benjamin Coleman, Anshumali Shrivastava:
A One-Pass Distributed and Private Sketch for Kernel Sums with Applications to Machine Learning at Scale. 3252-3265 - Siam Umar Hussain, Mojan Javaheripi, Mohammad Samragh, Farinaz Koushanfar:
COINN: Crypto/ML Codesign for Oblivious Inference via Neural Networks. 3266-3281
Session 12B: Analyzing Crashes and Incidents
- Xin Tan, Yuan Zhang, Chenyuan Mi, Jiajun Cao, Kun Sun, Yifan Lin, Min Yang:
Locating the Security Patches for Disclosed OSS Vulnerabilities with Vulnerability-Commit Correlation Ranking. 3282-3299 - Jiarun Dai, Yuan Zhang, Hailong Xu, Haiming Lyu, Zicheng Wu, Xinyu Xing, Min Yang:
Facilitating Vulnerability Assessment through PoC Migration. 3300-3317 - Zhiyuan Jiang, Xiyue Jiang, Ahmad Hazimeh, Chaojing Tang, Chao Zhang, Mathias Payer:
Igor: Crash Deduplication Through Root-Cause Clustering. 3318-3336 - Carter Yagemann, Mohammad A. Noureddine, Wajih Ul Hassan, Simon P. Chung, Adam Bates, Wenke Lee:
Validating the Integrity of Audit Logs Against Execution Repartitioning Attacks. 3337-3351 - Jonathan Fuller, Ranjita Pai Kasturi, Amit Kumar Sikder, Haichuan Xu, Berat Arik, Vivek Verma, Ehsan Asdar, Brendan Saltaformaggio:
C3PO: Large-Scale Study Of Covert Monitoring of C&C Servers via Over-Permissioned Protocol Infiltration. 3352-3365
Session 12C: Traffic Analysis and Side Channels
- Jordan Holland, Paul Schmitt, Nick Feamster, Prateek Mittal:
New Directions in Automated Traffic Analysis. 3366-3383 - Zhongjie Wang, Shitong Zhu, Keyu Man, Pengxiong Zhu, Yu Hao, Zhiyun Qian, Srikanth V. Krishnamurthy, Tom La Porta, Michael J. De Lucia:
Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison. 3384-3399 - Keyu Man, Xin'an Zhou, Zhiyun Qian:
DNS Cache Poisoning Attack: Resurrections with Side Channels. 3400-3414 - Andrew Beams, Sampath Kannan, Sebastian Angel:
Packet Scheduling with Optional Client Privacy. 3415-3430 - Chuanpu Fu, Qi Li, Meng Shen, Ke Xu:
Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis. 3431-3446
Session 12D: Decentralized Cryptographic Protocols
- Sri Aravinda Krishnan Thyagarajan, Tiantian Gong, Adithya Bhat, Aniket Kate, Dominique Schröder:
OpenSquare: Decentralized Repeated Modular Squaring Service. 3447-3464 - Yan Ji, Konstantinos Chalkias:
Generalized Proof of Liabilities. 3465-3486 - Aggelos Kiayias, Nikos Leonardos, Dionysis Zindros:
Mining in Logarithmic Space. 3487-3501 - Adithya Bhat, Nibesh Shrestha, Zhongtang Luo, Aniket Kate, Kartik Nayak:
RandPiper - Reconfiguration-Friendly Random Beacons with Quadratic Communication. 3502-3524
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.