Last update:
Sat Feb 1 11:02:24 MST 2025
Simon Eberz and Kasper B. Rasmussen and Vincent Lenders and Ivan Martinovic Looks Like Eve: Exposing Insider Threats Using Eye Movement Biometrics . . . . . 1:1--1:?? Dimitris Mitropoulos and Konstantinos Stroggylos and Diomidis Spinellis and Angelos D. Keromytis How to Train Your Browser: Preventing XSS Attacks Using Contextual Script Fingerprints . . . . . . . . . . . . . . 2:1--2:?? Pól Mac Aonghusa and Douglas J. Leith Don't Let Google Know I'm Lonely . . . . 3:1--3:??
Babak Rahbarinia and Roberto Perdisci and Manos Antonakakis Efficient and Accurate Behavior-Based Tracking of Malware-Control Domains in Large ISP Networks . . . . . . . . . . . 4:1--4:?? Zheng Dong and Kevin Kane and L. Jean Camp Detection of Rogue Certificates from Trusted Certificate Authorities Using Deep Neural Networks . . . . . . . . . . 5:1--5:?? Juan A. Garay and Vladimir Kolesnikov and Rae Mclellan MAC Precomputation with Applications to Secure Memory . . . . . . . . . . . . . 6:1--6:??
Ismet Ozalp and Mehmet Emre Gursoy and Mehmet Ercan Nergiz and Yucel Saygin Privacy-Preserving Publishing of Hierarchical Data . . . . . . . . . . . 7:1--7:?? Jason Crampton and Andrei Gagarin and Gregory Gutin and Mark Jones and Magnus Wahlström On the Workflow Satisfiability Problem with Class-Independent Constraints for Hierarchical Organizations . . . . . . . 8:1--8:?? Christopher N. Gutierrez and Mohammed H. Almeshekah and Eugene H. Spafford and Mikhail J. Atallah and Jeff Avery Inhibiting and Detecting Offline Password Cracking Using ErsatzPasswords 9:1--9:??
Hendrik Meutzner and Santosh Gupta and Viet-Hung Nguyen and Thorsten Holz and Dorothea Kolossa Toward Improved Audio CAPTCHAs Based on Auditory Perception and Language Understanding . . . . . . . . . . . . . 10:1--10:?? Reza Shokri and George Theodorakopoulos and Carmela Troncoso Privacy Games Along Location Traces: a Game-Theoretic Framework for Optimizing Location Privacy . . . . . . . . . . . . 11:1--11:?? George Argyros and Theofilos Petsios and Suphannee Sivakorn and Angelos D. Keromytis and Jason Polakis Evaluating the Privacy Guarantees of Location Proximity Services . . . . . . 12:1--12:??
Stephanos Matsumoto and Raphael M. Reischuk and Pawel Szalachowski and Tiffany Hyun-Jin Kim and Adrian Perrig Authentication Challenges in a Global Environment . . . . . . . . . . . . . . 1:1--1:?? Isabel Wagner Evaluating the Strength of Genomic Privacy Metrics . . . . . . . . . . . . 2:1--2:?? Mathias Humbert and Erman Ayday and Jean-Pierre Hubaux and Amalio Telenti Quantifying Interdependent Risks in Genomic Privacy . . . . . . . . . . . . 3:1--3:??
Leon J. Osterweil and Matt Bishop and Heather M. Conboy and Huong Phan and Borislava I. Simidchieva and George S. Avrunin and Lori A. Clarke and Sean Peisert Iterative Analysis to Improve Key Properties of Critical Human-Intensive Processes: an Election Security Example 5:1--5:??
Job Noorman and Jo Van Bulck and Jan Tobias Mühlberg and Frank Piessens and Pieter Maene and Bart Preneel and Ingrid Verbauwhede and Johannes Götzfried and Tilo Müller and Felix Freiling Sancus 2.0: a Low-Cost Security Architecture for IoT Devices . . . . . . 7:1--7:?? Marcus Brandenburger and Christian Cachin and Nikola Knezevi\'c Don't Trust the Cloud, Verify: Integrity and Consistency for Cloud Object Stores 8:1--8:?? Ehsan Toreini and Siamak F. Shahandashti and Feng Hao Texture to the Rescue: Practical Paper Fingerprinting Based on Texture Patterns 9:1--9:?? Luis Muñoz-González and Daniele Sgandurra and Andrea Paudice and Emil C. Lupu Efficient Attack Graph Analysis through Approximate Inference . . . . . . . . . 10:1--10:?? Bradley Reaves and Jasmine Bowers and Nolen Scaife and Adam Bates and Arnav Bhartiya and Patrick Traynor and Kevin R. B. Butler Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications . . . . . . . . . . . . . . 11:1--11:??
Xiaokui Shu and Danfeng (Daphne) Yao and Naren Ramakrishnan and Trent Jaeger Long-Span Program Behavior Modeling and Attack Detection . . . . . . . . . . . . 12:1--12:?? Muhammad Ikram and Lucky Onwuzurike and Shehroze Farooqi and Emiliano De Cristofaro and Arik Friedman and Guillaume Jourjon and Mohammed Ali Kaafar and M. Zubair Shafiq Measuring, Characterizing, and Detecting Facebook Like Farms . . . . . . . . . . 13:1--13:?? Yuriy Polyakov and Kurt Rohloff and Gyana Sahu and Vinod Vaikuntanathan Fast Proxy Re-Encryption for Publish/Subscribe Systems . . . . . . . 14:1--14:?? Antonino Rullo and Daniele Midi and Edoardo Serra and Elisa Bertino Pareto Optimal Security Resource Allocation for Internet of Things . . . 15:1--15:?? Dong Su and Jianneng Cao and Ninghui Li and Elisa Bertino and Min Lyu and Hongxia Jin Differentially Private $K$-Means Clustering and a Hybrid Approach to Private Optimization . . . . . . . . . . 16:1--16:??
Abdelrahman Abdou and P. C. Van Oorschot Server Location Verification (SLV) and Server Location Pinning: Augmenting TLS Authentication . . . . . . . . . . . . . 1:1--1:?? Hao Shi and Jelena Mirkovic and Abdulla Alwabel Handling Anti-Virtual Machine Techniques in Malicious Software . . . . . . . . . 2:1--2:?? Neil Zhenqiang Gong and Bin Liu Attribute Inference Attacks in Online Social Networks . . . . . . . . . . . . 3:1--3:?? Marcus Botacin and Paulo Lício De Geus and André Grégio Enhancing Branch Monitoring for Security Purposes: From Control Flow Integrity to Malware Analysis and Debugging . . . . . 4:1--4:?? Sarani Bhattacharya and Debdeep Mukhopadhyay Utilizing Performance Counters for Compromising Public Key Ciphers . . . . 5:1--5:??
Yihua Zhang and Marina Blanton and Ghada Almashaqbeh Implementing Support for Pointers to Private Data in a General-Purpose Secure Multi-Party Compiler . . . . . . . . . . 6:1--6:?? Benny Pinkas and Thomas Schneider and Michael Zohner Scalable Private Set Intersection Based on OT Extension . . . . . . . . . . . . 7:1--7:?? Saed Alrabaee and Paria Shirani and Lingyu Wang and Mourad Debbabi FOSSIL: A Resilient and Efficient System for Identifying FOSS Functions in Malware Binaries . . . . . . . . . . . . 8:1--8:?? Roberto Giacobazzi and Isabella Mastroeni Abstract Non-Interference: A Unifying Framework for Weakening Information-flow 9:1--9:?? Yunmok Son and Juhwan Noh and Jaeyeong Choi and Yongdae Kim GyrosFinger: Fingerprinting Drones for Location Tracking Based on the Outputs of MEMS Gyroscopes . . . . . . . . . . . 10:1--10:??
Michele Carminati and Mario Polino and Andrea Continella and Andrea Lanzi and Federico Maggi and Stefano Zanero Security Evaluation of a Banking Fraud Analysis System . . . . . . . . . . . . 11:1--11:?? Florian Kelbert and Alexander Pretschner Data Usage Control for Distributed Systems . . . . . . . . . . . . . . . . 12:1--12:?? Elizabeth Stobert and Robert Biddle The Password Life Cycle . . . . . . . . 13:1--13:?? Fengguo Wei and Sankardas Roy and Xinming Ou and Robby Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps . . . . . . . . . . . . . . 14:1--14:?? Siqi Zhao and Xuhua Ding FIMCE: A Fully Isolated Micro-Computing Environment for Multicore Systems . . . 15:1--15:??
Katheryn A. Farris and Ankit Shah and George Cybenko and Rajesh Ganesan and Sushil Jajodia VULCON: A System for Vulnerability Prioritization, Mitigation, and Management . . . . . . . . . . . . . . . 16:1--16:?? Jinsu Kim and Dongyoung Koo and Yuna Kim and Hyunsoo Yoon and Junbum Shin and Sungwook Kim Efficient Privacy-Preserving Matrix Factorization for Recommendation via Fully Homomorphic Encryption . . . . . . 17:1--17:?? Fanny Lalonde Lévesque and Sonia Chiasson and Anil Somayaji and José M. Fernandez Technological and Human Factors of Malware Attacks: A Computer Security Clinical Trial Approach . . . . . . . . 18:1--18:?? Guixin Ye and Zhanyong Tang and Dingyi Fang and Xiaojiang Chen and Willy Wolff and Adam J. Aviv and Zheng Wang A Video-based Attack for Android Pattern Lock . . . . . . . . . . . . . . . . . . 19:1--19:?? Yupeng Zhang and Charalampos Papamanthou and Jonathan Katz Verifiable Graph Processing . . . . . . 20:1--20:??
Taous Madi and Yosr Jarraya and Amir Alimohammadifar and Suryadipta Majumdar and Yushun Wang and Makan Pourzandi and Lingyu Wang and Mourad Debbabi ISOTOP: Auditing Virtual Networks Isolation Across Cloud Layers in OpenStack . . . . . . . . . . . . . . . 1:1--1:?? Bradley Reaves and Luis Vargas and Nolen Scaife and Dave Tian and Logan Blue and Patrick Traynor and Kevin R. B. Butler Characterizing the Security of the SMS Ecosystem with Public Gateways . . . . . 2:1--2:?? Rob Jansen and Matthew Traudt and John Geddes and Chris Wacek and Micah Sherr and Paul Syverson KIST: Kernel-Informed Socket Transport for Tor . . . . . . . . . . . . . . . . 3:1--3:?? Ivo Sluganovic and Marc Roeschlin and Kasper B. Rasmussen and Ivan Martinovic Analysis of Reflexive Eye Movements for Fast Replay-Resistant Biometric Authentication . . . . . . . . . . . . . 4:1--4:?? Marios Pomonis and Theofilos Petsios and Angelos D. Keromytis and Michalis Polychronakis and Vasileios P. Kemerlis Kernel Protection Against Just-In-Time Code Reuse . . . . . . . . . . . . . . . 5:1--5:?? Xabier Ugarte-Pedrero and Mariano Graziano and Davide Balzarotti A Close Look at a Daily Dataset of Malware Samples . . . . . . . . . . . . 6:1--6:?? Sebastian Mödersheim and Luca Vigan\`o Alpha--Beta Privacy . . . . . . . . . . 7:1--7:??
Diego Kreutz and Jiangshan Yu and Fernando M. V. Ramos and Paulo Esteves-Verissimo ANCHOR: Logically Centralized Security for Software-Defined Networks . . . . . 8:1--8:?? Fabio Pagani and Oleksii Fedorov and Davide Balzarotti Introducing the Temporal Dimension to Memory Forensics . . . . . . . . . . . . 9:1--9:?? Donghyun Kwon and Hayoon Yi and Yeongpil Cho and Yunheung Paek Safe and Efficient Implementation of a Security System on ARM using Intra-level Privilege Separation . . . . . . . . . . 10:1--10:?? Simon S. Woo and Ron Artstein and Elsi Kaiser and Xiao Le and Jelena Mirkovic Using Episodic Memory for User Authentication . . . . . . . . . . . . . 11:1--11:?? Juhwan Noh and Yujin Kwon and Yunmok Son and Hocheol Shin and Dohyun Kim and Jaeyeong Choi and Yongdae Kim Tractor Beam: Safe-hijacking of Consumer Drones with Adaptive GPS Spoofing . . . 12:1--12:?? Scott Ruoti and Jeff Andersen and Luke Dickinson and Scott Heidbrink and Tyler Monson and Mark O'Neill and Ken Reese and Brad Spendlove and Elham Vaziripour and Justin Wu and Daniel Zappala and Kent Seamons A Usability Study of Four Secure Email Tools Using Paired Participants . . . . 13:1--13:?? Lucky Onwuzurike and Enrico Mariconti and Panagiotis Andriotis and Emiliano De Cristofaro and Gordon Ross and Gianluca Stringhini MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version) . . . . . . . 14:1--14:??
Fang-Yu Rao and Jianneng Cao and Elisa Bertino and Murat Kantarcioglu Hybrid Private Record Linkage: Separating Differentially Private Synopses from Matching Records . . . . . 15:1--15:?? Mahmood Sharif and Sruti Bhagavatula and Lujo Bauer and Michael K. Reiter A General Framework for Adversarial Examples with Objectives . . . . . . . . 16:1--16:?? Chao Yan and Bo Li and Yevgeniy Vorobeychik and Aron Laszka and Daniel Fabbri and Bradley Malin Database Audit Workload Prioritization via Game Theory . . . . . . . . . . . . 17:1--17:?? Alexander V. Outkin and Brandon K. Eames and Meghan A. Galiardi and Sarah Walsh and Eric D. Vugrin and Byron Heersink and Jacob Hobbs and Gregory D. Wyss GPLADD: Quantifying Trust in Government and Commercial Systems: a Game-Theoretic Approach . . . . . . . . . . . . . . . . 18:1--18:?? Samuel Wedaj and Kolin Paul and Vinay J. Ribeiro DADS: Decentralized Attestation for Device Swarms . . . . . . . . . . . . . 19:1--19:??
Gokcan Cantali and Orhan Ermis and Mehmet Ufuk Çaglayan and Cem Ersoy Analytical Models for the Scalability of Dynamic Group-key Agreement Protocols and Secure File Sharing Systems . . . . 20:1--20:?? Hongyu Jin and Panos Papadimitratos Resilient Privacy Protection for Location-Based Services through Decentralization . . . . . . . . . . . . 21:1--21:?? Brian A. Powell Malicious Overtones: Hunting Data Theft in the Frequency Domain with One-class Learning . . . . . . . . . . . . . . . . 22:1--22:?? Awanthika Senarath and Marthie Grobler and Nalin Asanka Gamagedara Arachchilage Will They Use It or Not? Investigating Software Developers' Intention to Follow Privacy Engineering Methodologies . . . 23:1--23:?? Stefano Cecconello and Alberto Compagno and Mauro Conti and Daniele Lain and Gene Tsudik Skype & Type: Keyboard Eavesdropping in Voice-over-IP . . . . . . . . . . . . . 24:1--24:??
Thang Hoang and Attila A. Yavuz and Jorge Guajardo A Multi-server ORAM Framework with Constant Client Bandwidth Blowup . . . . 1:1--1:35 Hassan Khan and Urs Hengartner and Daniel Vogel Mimicry Attacks on Smartphone Keystroke Authentication . . . . . . . . . . . . . 2:1--2:34 Ruggero Lanotte and Massimo Merro and Andrei Munteanu and Luca Vigan\`o A Formal Approach to Physics-based Attacks in Cyber-physical Systems . . . 3:1--3:41 Amith K. Belman and Vir V. Phoha Discriminative Power of Typing Features on Desktops, Tablets, and Phones for User Identification . . . . . . . . . . 4:1--4:36 Farzaneh Karegar and John Sören Pettersson and Simone Fischer-Hübner The Dilemma of User Engagement in Privacy Notices: Effects of Interaction Modes and Habituation on User Attention 5:1--5:38 Fang-Jing Wu and Tie Luo CrowdPrivacy: Publish More Useful Data with Less Privacy Exposure in Crowdsourced Location-Based Services . . 6:1--6:25
Guixin Ye and Zhanyong Tang and Dingyi Fang and Zhanxing Zhu and Yansong Feng and Pengfei Xu and Xiaojiang Chen and Jungong Han and Zheng Wang Using Generative Adversarial Networks to Break and Protect Text Captchas . . . . 7:1--7:29 Muhammad Ikram and Rahat Masood and Gareth Tyson and Mohamed Ali Kaafar and Noha Loizon and Roya Ensafi Measuring and Analysing the Chain of Implicit Trust: a Study of Third-party Resources Loading . . . . . . . . . . . 8:1--8:27 Moni Naor and Lior Rotem and Gil Segev The Security of Lazy Users in Out-of-Band Authentication . . . . . . . 9:1--9:32 James Parker and Michael Hicks and Andrew Ruef and Michelle L. Mazurek and Dave Levin and Daniel Votipka and Piotr Mardziel and Kelsey R. Fulton Build It, Break It, Fix It: Contesting Secure Development . . . . . . . . . . . 10:1--10:36 Fatima M. Anwar and Mani Srivastava A Case for Feedforward Control with Feedback Trim to Mitigate Time Transfer Attacks . . . . . . . . . . . . . . . . 11:1--11:25
Sanaz Taheri Boshrooyeh and Alptekin Küpçü and Öznur Özkasap Privado: Privacy-preserving Group-based Advertising Using Multiple Independent Social Network Providers . . . . . . . . 12:1--12:36 Giada Sciarretta and Roberto Carbone and Silvio Ranise and Luca Vigan\`o Formal Analysis of Mobile Multi-Factor Authentication with Single Sign-On Login 13:1--13:37 Daniele Antonioli and Nils Ole Tippenhauer and Kasper Rasmussen Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy . . . 14:1--14:28 Hocheol Shin and Juhwan Noh and Dohyun Kim and Yongdae Kim The System That Cried Wolf: Sensor Security Analysis of Wide-area Smoke Detectors for Critical Infrastructure 15:1--15:32 Darren Hurley-Smith and Julio Hernandez-Castro Quantum Leap and Crash: Searching and Finding Bias in Quantum Random Number Generators . . . . . . . . . . . . . . . 16:1--16:25
Mohamed Nabeel and Issa M. Khalil and Bei Guan and Ting Yu Following Passive DNS Traces to Detect Stealthy Malicious Domains Via Graph Inference . . . . . . . . . . . . . . . 17:1--17:36 Syed Zain Raza Rizvi and Philip W. L. Fong Efficient Authorization of Graph-database Queries in an Attribute-supporting ReBAC Model . . . . 18:1--18:33 Michalis Diamantaris and Francesco Marcantoni and Sotiris Ioannidis and Jason Polakis The Seven Deadly Sins of the HTML5 WebAPI: a Large-scale Study on the Risks of Mobile Sensor-based Attacks . . . . . 19:1--19:31 Bert Abrath and Bart Coppens and Jens Van Den Broeck and Brecht Wyseur and Alessandro Cabutto and Paolo Falcarin and Bjorn De Sutter Code Renewability for Native Software Protection . . . . . . . . . . . . . . . 20:1--20:31 Sagar Samtani and Hongyi Zhu and Hsinchun Chen Proactively Identifying Emerging Hacker Threats from the Dark Web: a Diachronic Graph Embedding Framework (D-GEF) . . . 21:1--21:33 Geumhwan Cho and Jun Ho Huh and Soolin Kim and Junsung Cho and Heesung Park and Yenah Lee and Konstantin Beznosov and Hyoungshick Kim On the Security and Usability Implications of Providing Multiple Authentication Choices on Smartphones: The More, the Better? . . . . . . . . . 22:1--22:32
Benjamin Zi Hao Zhao and Hassan Jameel Asghar and Mohamed Ali Kaafar and Francesca Trevisan and Haiyue Yuan Exploiting Behavioral Side Channels in Observation Resilient Cognitive Authentication Schemes . . . . . . . . . 1:1--1:33 Chuadhry Mujeeb Ahmed and Aditya P. Mathur and Martín Ochoa NoiSense Print: Detecting Data Integrity Attacks on Sensor Measurements Using Hardware-based Fingerprints . . . . . . 2:1--2:35 Nikolaos Alexopoulos and Sheikh Mahbub Habib and Steffen Schulz and Max Mühlhäuser The Tip of the Iceberg: On the Merits of Finding Security Bugs . . . . . . . . . 3:1--3:33 Alexandre Meylan and Mauro Cherubini and Bertil Chapuis and Mathias Humbert and Igor Bilogrevic and Kévin Huguenin A Study on the Use of Checksums for Integrity Verification of Web Downloads 4:1--4:36 Benjamin Shreeve and Joseph Hallett and Matthew Edwards and Pauline Anthonysamy and Sylvain Frey and Awais Rashid ``So if Mr Blue Head here clicks the link\ldots'' Risk Thinking in Cyber Security Decision Making . . . . . . . . 5:1--5:29 Zhisheng Hu and Minghui Zhu and Peng Liu Adaptive Cyber Defense Against Multi-Stage Attacks Using Learning-Based POMDP . . . . . . . . . . . . . . . . . 6:1--6:25
Michalis Papaevripides and Elias Athanasopoulos Exploiting Mixed Binaries . . . . . . . 7:1--7:29 Carlos Garcia Cordero and Emmanouil Vasilomanolakis and Aidmar Wainakh and Max Mühlhäuser and Simin Nadjm-Tehrani On Generating Network Traffic Datasets with Synthetic Attacks for Intrusion Detection . . . . . . . . . . . . . . . 8:1--8:39 Shameek Bhattacharjee and Venkata Praveen Kumar Madhavarapu and Simone Silvestri and Sajal K. Das Attack Context Embedded Data Driven Trust Diagnostics in Smart Metering Infrastructure . . . . . . . . . . . . . 9:1--9:36 Vincenzo Arceri and Isabella Mastroeni Analyzing Dynamic Code: a Sound Abstract Interpreter for Evil Eval . . . . . . . 10:1--10:38 Marcus Botacin and Hojjat Aghakhani and Stefano Ortolani and Christopher Kruegel and Giovanni Vigna and Daniela Oliveira and Paulo Lício De Geus and André Grégio One Size Does Not Fit All: a Longitudinal Analysis of Brazilian Financial Malware . . . . . . . . . . . 11:1--11:31 Isabel Wagner and Iryna Yevseyeva Designing Strong Privacy Metrics Suites Using Evolutionary Optimization . . . . 12:1--12:35 Charlie Jacomme and Steve Kremer An Extensive Formal Analysis of Multi-factor Authentication Protocols 13:1--13:34
Meisam Mohammady and Momen Oqaily and Lingyu Wang and Yuan Hong and Habib Louafi and Makan Pourzandi and Mourad Debbabi A Multi-view Approach to Preserve Privacy and Utility in Network Trace Anonymization . . . . . . . . . . . . . 14:1--14:36 Amit Seal Ami and Kaushal Kafle and Kevin Moran and Adwait Nadkarni and Denys Poshyvanyk Systematic Mutation-Based Evaluation of the Soundness of Security-Focused Android Static Analysis Techniques . . . 15:1--15:37 Musard Balliu and Massimo Merro and Michele Pasqua and Mikhail Shcherbakov Friendly Fire: Cross-app Interactions in IoT Platforms . . . . . . . . . . . . . 16:1--16:40 Stanislaw Jarecki and Mohammed Jubur and Hugo Krawczyk and Nitesh Saxena and Maliheh Shirvanian Two-factor Password-authenticated Key Exchange with End-to-end Security . . . 17:1--17:37 Shujie Cui and Xiangfu Song and Muhammad Rizwan Asghar and Steven D. Galbraith and Giovanni Russello Privacy-preserving Dynamic Symmetric Searchable Encryption with Controllable Leakage . . . . . . . . . . . . . . . . 18:1--18:35 René Mayrhofer and Jeffrey Vander Stoep and Chad Brubaker and Nick Kralevich The Android Platform Security Model . . 19:1--19:35 Rafael Veras and Christopher Collins and Julie Thorpe A Large-Scale Analysis of the Semantic Password Model and Linguistic Patterns in Passwords . . . . . . . . . . . . . . 20:1--20:21
Mohammed Abuhamad and Tamer Abuhmed and David Mohaisen and Daehun Nyang Large-scale and Robust Code Authorship Identification with Deep Feature Learning . . . . . . . . . . . . . . . . 23:1--23:35 Abbas Acar and Shoukat Ali and Koray Karabina and Cengiz Kaygusuz and Hidayet Aksu and Kemal Akkaya and Selcuk Uluagac A Lightweight Privacy-Aware Continuous Authentication Protocol --- PACA . . . . 24:1--24:28 Aleieldin Salem and Sebastian Banescu and Alexander Pretschner \pkgMaat: Automatically Analyzing VirusTotal for Accurate Labeling and Effective Malware Detection . . . . . . 25:1--25:35 Long Cheng and Salman Ahmed and Hans Liljestrand and Thomas Nyman and Haipeng Cai and Trent Jaeger and N. Asokan and Danfeng (Daphne) Yao Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches . . . . . . 26:1--26:36 Luca Demetrio and Scott E. Coull and Battista Biggio and Giovanni Lagorio and Alessandro Armando and Fabio Roli Adversarial EXEmples: a Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection . . . . . . . . . . . 27:1--27:31 Sana Maqsood and Sonia Chiasson Design, Development, and Evaluation of a Cybersecurity, Privacy, and Digital Literacy Game for Tweens . . . . . . . . 28:1--28:37 Sarah C. Helble and Ian D. Kretz and Peter A. Loscocco and John D. Ramsdell and Paul D. Rowe and Perry Alexander Flexible Mechanisms for Remote Attestation . . . . . . . . . . . . . . 29:1--29:23 Philipp Markert and Daniel V. Bailey and Maximilian Golla and Markus Dürmuth and Adam J. Aviv On the Security of Smartphone Unlock PINs . . . . . . . . . . . . . . . . . . 30:1--30:36 Simon Birnbach and Richard Baker and Simon Eberz and Ivan Martinovic #PrettyFlyForAWiFi: Real-world Detection of Privacy Invasion Attacks by Drones 31:1--31:34
Savvas Savvides and Seema Kumar and Julian James Stephen and Patrick Eugster C3PO: Cloud-based Confidentiality-preserving Continuous Query Processing . . . . . . . . . . . . 1:1--1:36 Stefano Berlato and Roberto Carbone and Adam J. Lee and Silvio Ranise Formal Modelling and Automated Trade-off Analysis of Enforcement Architectures for Cryptographic Access Control in the Cloud . . . . . . . . . . . . . . . . . 2:1--2:37 Handan Kilinç Alper and Alptek\.\in Küpçü Optimally Efficient Multi-party Fair Exchange and Fair Secure Multi-party Computation . . . . . . . . . . . . . . 3:1--3:34 Le Qin and Fei Peng and Min Long and Raghavendra Ramachandra and Christoph Busch Vulnerabilities of Unattended Face Verification Systems to Facial Components-based Presentation Attacks: an Empirical Study . . . . . . . . . . . 4:1--4:28 Sibghat Ullah Bazai and Julian Jang-Jaccard and Hooman Alavizadeh A Novel Hybrid Approach for Multi-Dimensional Data Anonymization for Apache Spark . . . . . . . . . . . . . . 5:1--5:25 Fabio Pagani and Davide Balzarotti AutoProfile: Towards Automated Profile Generation for Memory Analysis . . . . . 6:1--6:26 Angelo Massimo Perillo and Giuseppe Persiano and Alberto Trombetta Secure Selections on Encrypted Multi-writer Streams . . . . . . . . . . 7:1--7:33
Lennart Braun and Daniel Demmler and Thomas Schneider and Oleksandr Tkachenko MOTION --- A Framework for Mixed-Protocol Multi-Party Computation 8:1--8:35 Marcus Botacin and Francis B. Moreira and Philippe O. A. Navaux and André Grégio and Marco A. Z. Alves Terminator: a Secure Coprocessor to Accelerate Real-Time AntiViruses Using Inspection Breakpoints . . . . . . . . . 9:1--9:34 Xueou Wang and Xiaolu Hou and Ruben Rios and Nils Ole Tippenhauer and Martín Ochoa Constrained Proximity Attacks on Mobile Targets . . . . . . . . . . . . . . . . 10:1--10:29 Alexandre Debant and Stéphanie Delaune and Cyrille Wiedling So Near and Yet So Far --- Symbolic Verification of Distance-Bounding Protocols . . . . . . . . . . . . . . . 11:1--11:39 Yevhen Zolotavkin and Jongkil Jay Jeong and Veronika Kuchta and Maksym Slavnenko and Robin Doss Improving Unlinkability of Attribute-based Authentication through Game Theory . . . . . . . . . . . . . . 12:1--12:36 Nadia Daoudi and Kevin Allix and Tegawendé François Bissyandé and Jacques Klein A Deep Dive Inside DREBIN: an Explorative Analysis beyond Android Malware Detection Scores . . . . . . . . 13:1--13:28 Pascal Oser and Rens W. van der Heijden and Stefan Lüders and Frank Kargl Risk Prediction of IoT Devices Based on Vulnerability Analysis . . . . . . . . . 14:1--14:36 Julian de Gortari Briseno and Akash Deep Singh and Mani Srivastava InkFiltration: Using Inkjet Printers for Acoustic Data Exfiltration from Air-Gapped Networks . . . . . . . . . . 15:1--15:26
Chris Clifton and Eric J. Hanson and Keith Merrill and Shawn Merrill Differentially Private $k$-Nearest Neighbor Missing Data Imputation . . . . 16:1--16:23 Yuxuan Chen and Jiangshan Zhang and Xuejing Yuan and Shengzhi Zhang and Kai Chen and Xiaofeng Wang and Shanqing Guo SoK: a Modularized Approach to Study the Security of Automatic Speech Recognition Systems . . . . . . . . . . . . . . . . 17:1--17:31 Max Landauer and Florian Skopik and Markus Wurzenberger and Andreas Rauber Dealing with Security Alert Flooding: Using Machine Learning for Domain-independent Alert Aggregation . . 18:1--18:36 Cláudio Martins and Ibéria Medeiros Generating Quality Threat Intelligence Leveraging OSINT and a Cyber Threat Unified Taxonomy . . . . . . . . . . . . 19:1--19:39 Mário S. Alvim and Konstantinos Chatzikokolakis and Yusuke Kawamoto and Catuscia Palamidessi Information Leakage Games: Exploring Information as a Utility Function . . . 20:1--20:36 Andreas Fischer and Benny Fuhry and Jörn Kußmaul and Jonas Janneck and Florian Kerschbaum and Eric Bodden Computation on Encrypted Data Using Dataflow Authentication . . . . . . . . 21:1--21:36 Padmavathi Iyer and Amirreza Masoumzadeh Learning Relationship-Based Access Control Policies from Black-Box Systems 22:1--22:36 Yaguan Qian and Yankai Guo and Qiqi Shao and Jiamin Wang and Bin Wang and Zhaoquan Gu and Xiang Ling and Chunming Wu EI-MTD: Moving Target Defense for Edge Intelligence against Adversarial Attacks 23:1--23:24 Adi Akavia and Max Leibovich and Yehezkel S. Resheff and Roey Ron and Moni Shahar and Margarita Vald Privacy-Preserving Decision Trees Training and Prediction . . . . . . . . 24:1--24:30
Ellis Fenske and Akshaya Mani and Aaron Johnson and Micah Sherr Accountable Private Set Cardinality for Distributed Measurement . . . . . . . . 25:1--25:?? Sarah M. Lehman and Abrar S. Alrumayh and Kunal Kolhe and Haibin Ling and Chiu C. Tan Hidden in Plain Sight: Exploring Privacy Risks of Mobile Augmented Reality Applications . . . . . . . . . . . . . . 26:1--26:?? Andrea Oliveri and Davide Balzarotti In the Land of MMUs: Multiarchitecture OS-Agnostic Virtual Memory Forensics . . 27:1--27:?? Jason Crampton and Eduard Eiben and Gregory Gutin and Daniel Karapetyan and Diptapriyo Majumdar Valued Authorization Policy Existence Problem: Theory and Experiments . . . . 28:1--28:?? Lihi Idan and Joan Feigenbaum PRShare: a Framework for Privacy-preserving, Interorganizational Data Sharing . . . . . . . . . . . . . . 29:1--29:?? Milica Stojmenovi\'c and Eric Spero and Milos Stojmenovi\'c and Robert Biddle What is Beautiful is Secure . . . . . . 30:1--30:?? Eyal Nussbaum and Michael Segal Privacy Analysis of Query-Set-Size Control . . . . . . . . . . . . . . . . 31:1--31:?? Jinhua Cui and Shweta Shinde and Satyaki Sen and Prateek Saxena and Pinghai Yuan Dynamic Binary Translation for SGX Enclaves . . . . . . . . . . . . . . . . 32:1--32:?? William Blair and Andrea Mambretti and Sajjad Arshad and Michael Weissbacher and William Robertson and Engin Kirda and Manuel Egele HotFuzz: Discovering Temporal and Spatial Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing . . . . . . . . . . . . . 33:1--33:?? Alesia Chernikova and Alina Oprea FENCE: Feasible Evasion Attacks on Neural Networks in Constrained Environments . . . . . . . . . . . . . . 34:1--34:??
Xueru Zhang and Mohammad Mahdi Khalili and Mingyan Liu Differentially Private Real-Time Release of Sequential Data . . . . . . . . . . . 1:1--1:?? Christoph Hagen and Christian Weinert and Christoph Sendner and Alexandra Dmitrienko and Thomas Schneider Contact Discovery in Mobile Messengers: Low-cost Attacks, Quantitative Analyses, and Efficient Mitigations . . . . . . . 2:1--2:?? Shaharyar Khan and Ilya Kabanov and Yunke Hua and Stuart Madnick A Systematic Analysis of the Capital One Data Breach: Critical Lessons Learned 3:1--3:?? Ruggero Lanotte and Massimo Merro and Andrei Munteanu Industrial Control Systems Security via Runtime Enforcement . . . . . . . . . . 4:1--4:?? Kopo Marvin Ramokapane and Jose Such and Awais Rashid What Users Want From Cloud Deletion and the Information They Need: a Participatory Action Study . . . . . . . 5:1--5:?? Stephan Wiefling and Paul René Jòrgensen and Sigurd Thunem and Luigi Lo Iacono Pump Up Password Security! Evaluating and Enhancing Risk-Based Authentication on a Real-World Large-Scale Online Service . . . . . . . . . . . . . . . . 6:1--6:?? Huanran Wang and Wu Yang and Wei Wang and Dapeng Man and Jiguang Lv A Novel Cross-Network Embedding for Anchor Link Prediction with Social Adversarial Attacks . . . . . . . . . . 7:1--7:?? James Lembke and Srivatsan Ravi and Pierre-Louis Roman and Patrick Eugster Secure and Reliable Network Updates . . 8:1--8:?? Euijin Choo and Mohamed Nabeel and Mashael Alsabah and Issa Khalil and Ting Yu and Wei Wang DeviceWatch: a Data-Driven Network Analysis Approach to Identifying Compromised Mobile Devices with Graph-Inference . . . . . . . . . . . . 9:1--9:?? Gonzalo Gil and Aitor Arnaiz and Mariví Higuero and Francisco Javier Diez Assessment Framework for the Identification and Evaluation of Main Features for Distributed Usage Control Solutions . . . . . . . . . . . . . . . 10:1--10:??
Lesly-Ann Daniel and Sébastien Bardin and Tamara Rezk Binsec/Rel: Symbolic Binary Analyzer for Security with Applications to Constant-Time and Secret-Erasure . . . . 11:1--11:?? Norah Alotaibi and John Williamson and Mohamed Khamis ThermoSecure: Investigating the Effectiveness of AI-Driven Thermal Attacks on Commonly Used Computer Keyboards . . . . . . . . . . . . . . . 12:1--12:?? David Barrera and Christopher Bellman and Paul Van Oorschot Security Best Practices: a Critical Analysis Using IoT as a Case Study . . . 13:1--13:?? Anh-Tu Hoang and Barbara Carminati and Elena Ferrari Time-aware Anonymization of Knowledge Graphs . . . . . . . . . . . . . . . . . 14:1--14:?? Rodrigo Otoni and Matteo Marescotti and Leonardo Alt and Patrick Eugster and Antti Hyvärinen and Natasha Sharygina A Solicitous Approach to Smart Contract Verification . . . . . . . . . . . . . . 15:1--15:?? Savino Dambra and Leyla Bilge and Davide Balzarotti A Comparison of Systemic and Systematic Risks of Malware Encounters in Consumer and Enterprise Environments . . . . . . 16:1--16:?? Farzana Ahamed Bhuiyan and Akond Rahman Log-related Coding Patterns to Conduct Postmortems of Attacks in Supervised Learning-based Projects . . . . . . . . 17:1--17:?? Giorgio Di Tizio and Patrick Speicher and Milivoj Simeonovski and Michael Backes and Ben Stock and Robert Künnemann Pareto-optimal Defenses for the Web Infrastructure: Theory and Practice . . 18:1--18:?? Ranya Aloufi and Hamed Haddadi and David Boyle Paralinguistic Privacy Protection at the Edge . . . . . . . . . . . . . . . . . . 19:1--19:?? Viktor Engström and Pontus Johnson and Robert Lagerström and Erik Ringdahl and Max Wällstedt Automated Security Assessments of Amazon Web Services Environments . . . . . . . 20:1--20:?? Sohail Habib and Hassan Khan and Andrew Hamilton-Wright and Urs Hengartner Revisiting the Security of Biometric Authentication Systems Against Statistical Attacks . . . . . . . . . . 21:1--21:?? Ahmed Amro and Vasileios Gkioulos and Sokratis Katsikas Assessing Cyber Risk in Cyber-Physical Systems Using the ATT&CK Framework . . . 22:1--22:??
Seoyeon Hwang and Ercan Ozturk and Gene Tsudik Balancing Security and Privacy in Genomic Range Queries . . . . . . . . . 23:1--23:?? Sijie Zhuo and Robert Biddle and Yun Sing Koh and Danielle Lottridge and Giovanni Russello SoK: Human-centered Phishing Susceptibility . . . . . . . . . . . . . 24:1--24:?? Andreas V. Hess and Sebastian A. MÖdersheim and Achim D. Brucker Stateful Protocol Composition in Isabelle/HOL . . . . . . . . . . . . . . 25:1--25:?? Patricia Arias-Cabarcos and Matin Fallahi and Thilo Habrich and Karen Schulze and Christian Becker and Thorsten Strufe Performance and Usability Evaluation of Brainwave Authentication Techniques with Consumer Devices . . . . . . . . . . . . 26:1--26:?? Nada Lachtar and Duha Ibdah and Hamza Khan and Anys Bacha RansomShield: a Visualization Approach to Defending Mobile Systems Against Ransomware . . . . . . . . . . . . . . . 27:1--27:?? Litao Li and Steven H. H. Ding and Yuan Tian and Benjamin C. M. Fung and Philippe Charland and Weihan Ou and Leo Song and Congwei Chen VulANalyzeR: Explainable Binary Vulnerability Detection with Multi-task Learning and Attentional Graph Convolution . . . . . . . . . . . . . . 28:1--28:?? Sona Alex and Dhanaraj K. J. and Deepthi P. P. Energy Efficient and Secure Neural Network-based Disease Detection Framework for Mobile Healthcare Network 29:1--29:?? Hazel Murray and David Malone Costs and Benefits of Authentication Advice . . . . . . . . . . . . . . . . . 30:1--30:?? Tom Bolton and Tooska Dargahi and Sana Belguith and Carsten Maple PrivExtractor: Toward Redressing the Imbalance of Understanding between Virtual Assistant Users and Vendors . . 31:1--31:?? Isabel Wagner Privacy Policies across the Ages: Content of Privacy Policies 1996--2021 32:1--32:?? Yang Lu and Zhengxin Yu and Neeraj Suri Privacy-preserving Decentralized Federated Learning over Time-varying Communication Graph . . . . . . . . . . 33:1--33:?? Jian Hou and Jing Wang and Mingyue Zhang and Zhi Jin and Chunlin Wei and Zuohua Ding Privacy-preserving Resilient Consensus for Multi-agent Systems in a General Topology Structure . . . . . . . . . . . 34:1--34:?? Isaiah J. King and H. Howie Huang Euler: Detecting Network Lateral Movement via Scalable Temporal Link Prediction . . . . . . . . . . . . . . . 35:1--35:?? Anushka Vidanage and Peter Christen and Thilina Ranbaduge and Rainer Schnell A Vulnerability Assessment Framework for Privacy-preserving Record Linkage . . . 36:1--36:?? Chun Guo and Xiao Wang and Xiang Xie and Yu Yu The Multi-User Constrained Pseudorandom Function Security of Generalized GGM Trees for MPC and Hierarchical Wallets 37:1--37:?? Dmitrii Usynin and Daniel Rueckert and Georgios Kaissis Beyond Gradients: Exploiting Adversarial Priors in Model Inversion Attacks . . . 38:1--38:?? Gianluca Scopelliti and Sepideh Pouyanrad and Job Noorman and Fritz Alder and Christoph Baumann and Frank Piessens and Jan Tobias Mühlberg End-to-End Security for Distributed Event-driven Enclave Applications on Heterogeneous TEEs . . . . . . . . . . . 39:1--39:?? Ranwa Al Mallah and Talal Halabi and Bilal Farooq Resilience-by-design in Adaptive Multi-agent Traffic Control Systems . . 40:1--40:?? Manuel Barbosa and Gilles Barthe and Benjamin Grégoire and Adrien Koutsos and Pierre-Yves Strub Mechanized Proofs of Adversarial Complexity and Application to Universal Composability . . . . . . . . . . . . . 41:1--41:?? Rajagopal Venkatesaramani and Zhiyu Wan and Bradley A. Malin and Yevgeniy Vorobeychik Defending Against Membership Inference Attacks on Beacon Services . . . . . . . 42:1--42:??
Xueluan Gong and Yanjiao Chen and Wenbin Yang and Huayang Huang and Qian Wang $ B^3 $: Backdoor Attacks against Black-box Machine Learning Models . . . 43:1--43:?? Jinfu Chen and Luo Song and Saihua Cai and Haodi Xie and Shang Yin and Bilal Ahmad TLS-MHSA: an Efficient Detection Model for Encrypted Malicious Traffic based on Multi-Head Self-Attention Mechanism . . 44:1--44:?? Tommaso Paladini and Francesco Monti and Mario Polino and Michele Carminati and Stefano Zanero Fraud Detection under Siege: Practical Poisoning Attacks and Defense Strategies 45:1--45:?? Dohyun Kim and Mangi Cho and Hocheol Shin and Jaehoon Kim and Juhwan Noh and Yongdae Kim Lightbox: Sensor Attack Detection for Photoelectric Sensors via Spectrum Fingerprinting . . . . . . . . . . . . . 46:1--46:?? Shahnewaz Karim Sakib and George T. Amariucai and Yong Guan Measures of Information Leakage for Incomplete Statistical Information: Application to a Binary Privacy Mechanism . . . . . . . . . . . . . . . 47:1--47:?? Maksim E. Eren and Manish Bhattarai and Robert J. Joyce and Edward Raff and Charles Nicholas and Boian S. Alexandrov Semi-Supervised Classification of Malware Families Under Extreme Class Imbalance via Hierarchical Non-Negative Matrix Factorization with Automatic Model Selection . . . . . . . . . . . . 48:1--48:?? Chenhan Zhang and Shiyao Zhang and James J. Q. Yu and Shui Yu SAM: Query-efficient Adversarial Attacks against Graph Neural Networks . . . . . 49:1--49:?? Ayoosh Bansal and Anant Kandikuppa and Monowar Hasan and Chien-Ying Chen and Adam Bates and Sibin Mohan System Auditing for Real-Time Systems 50:1--50:?? Md Sajidul Islam Sajid and Jinpeng Wei and Ehab Al-Shaer and Qi Duan and Basel Abdeen and Latifur Khan symbSODA: Configurable and Verifiable Orchestration Automation for Active Malware Deception . . . . . . . . . . . 51:1--51:??
Shen Wang and Mahshid Delavar and Muhammad Ajmal Azad and Farshad Nabizadeh and Steve Smith and Feng Hao Spoofing Against Spoofing: Toward Caller ID Verification in Heterogeneous Telecommunication Systems . . . . . . . 1:1--1:?? Jenny Ottmann and Frank Breitinger and Felix Freiling An Experimental Assessment of Inconsistencies in Memory Forensics . . 2:1--2:?? Erik-Oliver Blass and Guevara Noubir Forward Security with Crash Recovery for Secure Logs . . . . . . . . . . . . . . 3:1--3:?? Han Cao and Qindong Sun and Yaqi Li and Rong Geng and Xiaoxiong Wang Efficient History-Driven Adversarial Perturbation Distribution Learning in Low Frequency Domain . . . . . . . . . . 4:1--4:?? Prakash Shrestha and Ahmed Tanvir Mahdad and Nitesh Saxena Sound-based Two-factor Authentication: Vulnerabilities and Redesign . . . . . . 5:1--5:?? Mayank Swarnkar and Neha Sharma OptiClass: an Optimized Classifier for Application Layer Protocols Using Bit Level Signatures . . . . . . . . . . . . 6:1--6:?? Yong Zeng and Jiale Liu and Tong Dong and Qingqi Pei and Jianfeng Ma and Yao Liu Eyes See Hazy while Algorithms Recognize Who You Are . . . . . . . . . . . . . . 7:1--7:?? Maryna Kluban and Mohammad Mannan and Amr Youssef On Detecting and Measuring Exploitable JavaScript Functions in Real-world Applications . . . . . . . . . . . . . . 8:1--8:?? Li Tang and Qingqing Ye and Haibo Hu and Qiao Xue and Yaxin Xiao and Jin Li DeepMark: a Scalable and Robust Framework for DeepFake Video Detection 9:1--9:?? Li Wang and Xiangtao Meng and Dan Li and Xuhong Zhang and Shouling Ji and Shanqing Guo DEEPFAKER: a Unified Evaluation Platform for Facial Deepfake and Detection Models 10:1--10:?? Liqun Chen and Changyu Dong and Christopher J. P. Newton and Yalan Wang Sphinx-in-the-Head: Group Signatures from Symmetric Primitives . . . . . . . 11:1--11:?? Yan Qiao and Kui Wu and Majid Khabbazian Non-intrusive Balance Tomography Using Reinforcement Learning in the Lightning Network . . . . . . . . . . . . . . . . 12:1--12:?? Zhenpeng Shi and Nikolay Matyunin and Kalman Graffi and David Starobinski Uncovering CWE-CVE-CPE Relations with Threat Knowledge Graphs . . . . . . . . 13:1--13:??
Ghader Ebrahimpour and Mohammad Sayad Haghighi Is Bitcoin Future as Secure as We Think? Analysis of Bitcoin Vulnerability to Bribery Attacks Launched through Large Transactions . . . . . . . . . . . . . . 14:1--14:?? Federico Concone and Salvatore Gaglio and Andrea Giammanco and Giuseppe Lo Re and Marco Morana AdverSPAM: Adversarial SPam Account Manipulation in Online Social Networks 15:1--15:?? Florian Sommer and Mona Gierl and Reiner Kriesten and Frank Kargl and Eric Sax Combining Cyber Security Intelligence to Refine Automotive Cyber Threats . . . . 16:1--16:?? Jiayi Chen and Urs Hengartner and Hassan Khan MRAAC: a Multi-stage Risk-aware Adaptive Authentication and Access Control Framework for Android . . . . . . . . . 17:1--17:?? Markus Bayer and Philipp Kuehn and Ramin Shanehsaz and Christian Reuter CySecBERT: a Domain-Adapted Language Model for the Cybersecurity Domain . . . 18:1--18:?? Julen Bernabé-Rodríguez and Albert Garreta and Oscar Lage A Decentralized Private Data Marketplace using Blockchain and Secure Multi-Party Computation . . . . . . . . . . . . . . 19:1--19:?? Namgyu Park and Jong Kim Toward Robust ASR System against Audio Adversarial Examples using Agitated Logit . . . . . . . . . . . . . . . . . 20:1--20:??
Rodolfo Vieira Valentim and Idilio Drago and Marco Mellia and Federico Cerutti X-squatter: AI Multilingual Generation of Cross-Language Sound-squatting . . . 21:1--21:?? Safwa Ameer and Lopamudra Praharaj and Ravi Sandhu and Smriti Bhatt and Maanak Gupta ZTA-IoT: a Novel Architecture for Zero-Trust in IoT Systems and an Ensuing Usage Control Model . . . . . . . . . . 22:1--22:?? Abu Shohel Ahmed and Aleksi Peltonen and Mohit Sethi and Tuomas Aura Security Analysis of the Consumer Remote SIM Provisioning Protocol . . . . . . . 23:1--23:?? Xinyu He and Fengrui Hao and Tianlong Gu and Liang Chang CBAs: Character-level Backdoor Attacks against Chinese Pre-trained Language Models . . . . . . . . . . . . . . . . . 24:1--24:?? Hasini Gunasinghe and Mikhail Atallah and Elisa Bertino PEBASI: a Privacy preserving, Efficient Biometric Authentication Scheme based on Irises . . . . . . . . . . . . . . . . . 25:1--25:?? Weihan Ou and Steven Ding and Mohammad Zulkernine and Li Tao Li and Sarah Labrosse VeriBin: a Malware Authorship Verification Approach for APT Tracking through Explainable and Functionality-Debiasing Adversarial Representation Learning . . . . . . . . 26:1--26:??
Vipin N. Sathi and C. Siva Ram Murthy Boost Your Immunity: VACCINE for Preventing a Novel Stealthy Slice Selection Attack in 5G and Beyond . . . 27:1--27:?? Haya Schulmann and Shujie Zhao ZPredict: ML-Based IPID Side-channel Measurements . . . . . . . . . . . . . . 28:1--28:?? Arish Sateesan and Jo Vliegen and Simon Scherrer and Hsu-Chun Hsiao and Adrian Perrig and Nele Mentens SPArch: a Hardware-oriented Sketch-based Architecture for High-speed Network Flow Measurements . . . . . . . . . . . . . . 29:1--29:?? Susil Kumar Mohanty and Somanath Tripathy Flexichain: Flexible Payment Channel Network to Defend Against Channel Exhaustion Attack . . . . . . . . . . . 30:1--30:?? Lorenzo Ceragioli and Letterio Galletta and Pierpaolo Degano and David Basin Specifying and Verifying Information Flow Control in SELinux Configurations 31:1--31:?? Mukhtar Ahmed and Jinfu Chen and Ernest Akpaku and Rexford Nii Ayitey Sosu and Ajmal Latif DELM: Deep Ensemble Learning Model for Anomaly Detection in Malicious Network Traffic-based Adaptive Feature Aggregation and Network Optimization . . 32:1--32:??
Blake Hayden and Timothy Walsh and Armon Barton Defending Against Deep Learning-Based Traffic Fingerprinting Attacks With Adversarial Examples . . . . . . . . . . 1:1--1:?? Huan Dai and Yuefeng Chen and Yicong Du and Luping Wang and Ziyu Shao and Hongbo Liu and Yanzhi Ren and Jiadi Yu and Bo Liu ArmSpy++: Enhanced PIN Inference through Video-based Fine-grained Arm Posture Analysis . . . . . . . . . . . . . . . . 2:1--2:?? Clara Bertolissi and Maribel Fernandez and Bhavani Thuraisingham Category-Based Administrative Access Control Policies . . . . . . . . . . . . 3:1--3:?? Pedram Hosseyni and Ralf Küsters and Tim Würtele Formal Security Analysis of the OpenID FAPI 2.0 Family of Protocols: Accompanying a Standardization Process 4:1--4:?? Jason Crampton and Eduard Eiben and Gregory Gutin and Daniel Karapetyan and Diptapriyo Majumdar Bi-objective Optimization in Role Mining 5:1--5:?? Björn Bjurling and Shahid Raza Cyber Threat Intelligence meets the Analytic Tradecraft . . . . . . . . . . 6:1--6:?? Haibin Zheng and Jinyin Chen and Tao Liu and Yao Cheng and Zhao Wang and Yun Wang and Lan Gao and Shouling Ji and Xuhong Zhang DP-Poison: Poisoning Federated Learning under the Cover of Differential Privacy 7:1--7:?? Georgios Syros and Gokberk Yar and Simona Boboila and Cristina Nita-Rotaru and Alina Oprea Backdoor Attacks in Peer-to-Peer Federated Learning . . . . . . . . . . . 8:1--8:?? Yubing Bao and Jianping Zeng and Jirui Yang and Ruining Yang and Zhihui Lu The Effect of Domain Terms on Password Security . . . . . . . . . . . . . . . . 9:1--9:?? Xuejing Yuan and Jiangshan Zhang and Kai Chen and Cheng'an Wei and Ruiyuan Li and Zhenkun Ma and Xinqi Ling Adversarial Attack and Defense for Commercial Black-box Chinese--English Speech Recognition Systems . . . . . . . 10:1--10:?? Hieu Le and Salma Elmalaki and Athina Markopoulou and Zubair Shafiq AutoFR: Automated Filter Rule Generation for Adblocking . . . . . . . . . . . . . 11:1--11:?? Alessandro Baccarini and Marina Blanton and Shaofeng Zou Understanding Information Disclosure from Secure Computation Output: a Comprehensive Study of Average Salary Computation . . . . . . . . . . . . . . 12:1--12:??