Last update:
Wed Apr 16 12:56:44 MDT 2025
Simon Eberz and
Kasper B. Rasmussen and
Vincent Lenders and
Ivan Martinovic Looks Like Eve: Exposing Insider Threats
Using Eye Movement Biometrics . . . . . 1:1--1:??
Dimitris Mitropoulos and
Konstantinos Stroggylos and
Diomidis Spinellis and
Angelos D. Keromytis How to Train Your Browser: Preventing
XSS Attacks Using Contextual Script
Fingerprints . . . . . . . . . . . . . . 2:1--2:??
Pól Mac Aonghusa and
Douglas J. Leith Don't Let Google Know I'm Lonely . . . . 3:1--3:??
Babak Rahbarinia and
Roberto Perdisci and
Manos Antonakakis Efficient and Accurate Behavior-Based
Tracking of Malware-Control Domains in
Large ISP Networks . . . . . . . . . . . 4:1--4:??
Zheng Dong and
Kevin Kane and
L. Jean Camp Detection of Rogue Certificates from
Trusted Certificate Authorities Using
Deep Neural Networks . . . . . . . . . . 5:1--5:??
Juan A. Garay and
Vladimir Kolesnikov and
Rae Mclellan MAC Precomputation with Applications to
Secure Memory . . . . . . . . . . . . . 6:1--6:??
Ismet Ozalp and
Mehmet Emre Gursoy and
Mehmet Ercan Nergiz and
Yucel Saygin Privacy-Preserving Publishing of
Hierarchical Data . . . . . . . . . . . 7:1--7:??
Jason Crampton and
Andrei Gagarin and
Gregory Gutin and
Mark Jones and
Magnus Wahlström On the Workflow Satisfiability Problem
with Class-Independent Constraints for
Hierarchical Organizations . . . . . . . 8:1--8:??
Christopher N. Gutierrez and
Mohammed H. Almeshekah and
Eugene H. Spafford and
Mikhail J. Atallah and
Jeff Avery Inhibiting and Detecting Offline
Password Cracking Using ErsatzPasswords 9:1--9:??
Hendrik Meutzner and
Santosh Gupta and
Viet-Hung Nguyen and
Thorsten Holz and
Dorothea Kolossa Toward Improved Audio CAPTCHAs Based on
Auditory Perception and Language
Understanding . . . . . . . . . . . . . 10:1--10:??
Reza Shokri and
George Theodorakopoulos and
Carmela Troncoso Privacy Games Along Location Traces: a
Game-Theoretic Framework for Optimizing
Location Privacy . . . . . . . . . . . . 11:1--11:??
George Argyros and
Theofilos Petsios and
Suphannee Sivakorn and
Angelos D. Keromytis and
Jason Polakis Evaluating the Privacy Guarantees of
Location Proximity Services . . . . . . 12:1--12:??
Stephanos Matsumoto and
Raphael M. Reischuk and
Pawel Szalachowski and
Tiffany Hyun-Jin Kim and
Adrian Perrig Authentication Challenges in a Global
Environment . . . . . . . . . . . . . . 1:1--1:??
Isabel Wagner Evaluating the Strength of Genomic
Privacy Metrics . . . . . . . . . . . . 2:1--2:??
Mathias Humbert and
Erman Ayday and
Jean-Pierre Hubaux and
Amalio Telenti Quantifying Interdependent Risks in
Genomic Privacy . . . . . . . . . . . . 3:1--3:??
Leon J. Osterweil and
Matt Bishop and
Heather M. Conboy and
Huong Phan and
Borislava I. Simidchieva and
George S. Avrunin and
Lori A. Clarke and
Sean Peisert Iterative Analysis to Improve Key
Properties of Critical Human-Intensive
Processes: an Election Security Example 5:1--5:??
Job Noorman and
Jo Van Bulck and
Jan Tobias Mühlberg and
Frank Piessens and
Pieter Maene and
Bart Preneel and
Ingrid Verbauwhede and
Johannes Götzfried and
Tilo Müller and
Felix Freiling Sancus 2.0: a Low-Cost Security
Architecture for IoT Devices . . . . . . 7:1--7:??
Marcus Brandenburger and
Christian Cachin and
Nikola Knezevi\'c Don't Trust the Cloud, Verify: Integrity
and Consistency for Cloud Object Stores 8:1--8:??
Ehsan Toreini and
Siamak F. Shahandashti and
Feng Hao Texture to the Rescue: Practical Paper
Fingerprinting Based on Texture Patterns 9:1--9:??
Luis Muñoz-González and
Daniele Sgandurra and
Andrea Paudice and
Emil C. Lupu Efficient Attack Graph Analysis through
Approximate Inference . . . . . . . . . 10:1--10:??
Bradley Reaves and
Jasmine Bowers and
Nolen Scaife and
Adam Bates and
Arnav Bhartiya and
Patrick Traynor and
Kevin R. B. Butler Mo(bile) Money, Mo(bile) Problems:
Analysis of Branchless Banking
Applications . . . . . . . . . . . . . . 11:1--11:??
Xiaokui Shu and
Danfeng (Daphne) Yao and
Naren Ramakrishnan and
Trent Jaeger Long-Span Program Behavior Modeling and
Attack Detection . . . . . . . . . . . . 12:1--12:??
Muhammad Ikram and
Lucky Onwuzurike and
Shehroze Farooqi and
Emiliano De Cristofaro and
Arik Friedman and
Guillaume Jourjon and
Mohammed Ali Kaafar and
M. Zubair Shafiq Measuring, Characterizing, and Detecting
Facebook Like Farms . . . . . . . . . . 13:1--13:??
Yuriy Polyakov and
Kurt Rohloff and
Gyana Sahu and
Vinod Vaikuntanathan Fast Proxy Re-Encryption for
Publish/Subscribe Systems . . . . . . . 14:1--14:??
Antonino Rullo and
Daniele Midi and
Edoardo Serra and
Elisa Bertino Pareto Optimal Security Resource
Allocation for Internet of Things . . . 15:1--15:??
Dong Su and
Jianneng Cao and
Ninghui Li and
Elisa Bertino and
Min Lyu and
Hongxia Jin Differentially Private $K$-Means
Clustering and a Hybrid Approach to
Private Optimization . . . . . . . . . . 16:1--16:??
Abdelrahman Abdou and
P. C. Van Oorschot Server Location Verification (SLV) and
Server Location Pinning: Augmenting TLS
Authentication . . . . . . . . . . . . . 1:1--1:??
Hao Shi and
Jelena Mirkovic and
Abdulla Alwabel Handling Anti-Virtual Machine Techniques
in Malicious Software . . . . . . . . . 2:1--2:??
Neil Zhenqiang Gong and
Bin Liu Attribute Inference Attacks in Online
Social Networks . . . . . . . . . . . . 3:1--3:??
Marcus Botacin and
Paulo Lício De Geus and
André Grégio Enhancing Branch Monitoring for Security
Purposes: From Control Flow Integrity to
Malware Analysis and Debugging . . . . . 4:1--4:??
Sarani Bhattacharya and
Debdeep Mukhopadhyay Utilizing Performance Counters for
Compromising Public Key Ciphers . . . . 5:1--5:??
Yihua Zhang and
Marina Blanton and
Ghada Almashaqbeh Implementing Support for Pointers to
Private Data in a General-Purpose Secure
Multi-Party Compiler . . . . . . . . . . 6:1--6:??
Benny Pinkas and
Thomas Schneider and
Michael Zohner Scalable Private Set Intersection Based
on OT Extension . . . . . . . . . . . . 7:1--7:??
Saed Alrabaee and
Paria Shirani and
Lingyu Wang and
Mourad Debbabi FOSSIL: A Resilient and Efficient System
for Identifying FOSS Functions in
Malware Binaries . . . . . . . . . . . . 8:1--8:??
Roberto Giacobazzi and
Isabella Mastroeni Abstract Non-Interference: A Unifying
Framework for Weakening Information-flow 9:1--9:??
Yunmok Son and
Juhwan Noh and
Jaeyeong Choi and
Yongdae Kim GyrosFinger: Fingerprinting Drones for
Location Tracking Based on the Outputs
of MEMS Gyroscopes . . . . . . . . . . . 10:1--10:??
Michele Carminati and
Mario Polino and
Andrea Continella and
Andrea Lanzi and
Federico Maggi and
Stefano Zanero Security Evaluation of a Banking Fraud
Analysis System . . . . . . . . . . . . 11:1--11:??
Florian Kelbert and
Alexander Pretschner Data Usage Control for Distributed
Systems . . . . . . . . . . . . . . . . 12:1--12:??
Elizabeth Stobert and
Robert Biddle The Password Life Cycle . . . . . . . . 13:1--13:??
Fengguo Wei and
Sankardas Roy and
Xinming Ou and
Robby Amandroid: A Precise and General
Inter-component Data Flow Analysis
Framework for Security Vetting of
Android Apps . . . . . . . . . . . . . . 14:1--14:??
Siqi Zhao and
Xuhua Ding FIMCE: A Fully Isolated Micro-Computing
Environment for Multicore Systems . . . 15:1--15:??
Katheryn A. Farris and
Ankit Shah and
George Cybenko and
Rajesh Ganesan and
Sushil Jajodia VULCON: A System for Vulnerability
Prioritization, Mitigation, and
Management . . . . . . . . . . . . . . . 16:1--16:??
Jinsu Kim and
Dongyoung Koo and
Yuna Kim and
Hyunsoo Yoon and
Junbum Shin and
Sungwook Kim Efficient Privacy-Preserving Matrix
Factorization for Recommendation via
Fully Homomorphic Encryption . . . . . . 17:1--17:??
Fanny Lalonde Lévesque and
Sonia Chiasson and
Anil Somayaji and
José M. Fernandez Technological and Human Factors of
Malware Attacks: A Computer Security
Clinical Trial Approach . . . . . . . . 18:1--18:??
Guixin Ye and
Zhanyong Tang and
Dingyi Fang and
Xiaojiang Chen and
Willy Wolff and
Adam J. Aviv and
Zheng Wang A Video-based Attack for Android Pattern
Lock . . . . . . . . . . . . . . . . . . 19:1--19:??
Yupeng Zhang and
Charalampos Papamanthou and
Jonathan Katz Verifiable Graph Processing . . . . . . 20:1--20:??
Taous Madi and
Yosr Jarraya and
Amir Alimohammadifar and
Suryadipta Majumdar and
Yushun Wang and
Makan Pourzandi and
Lingyu Wang and
Mourad Debbabi ISOTOP: Auditing Virtual Networks
Isolation Across Cloud Layers in
OpenStack . . . . . . . . . . . . . . . 1:1--1:??
Bradley Reaves and
Luis Vargas and
Nolen Scaife and
Dave Tian and
Logan Blue and
Patrick Traynor and
Kevin R. B. Butler Characterizing the Security of the SMS
Ecosystem with Public Gateways . . . . . 2:1--2:??
Rob Jansen and
Matthew Traudt and
John Geddes and
Chris Wacek and
Micah Sherr and
Paul Syverson KIST: Kernel-Informed Socket Transport
for Tor . . . . . . . . . . . . . . . . 3:1--3:??
Ivo Sluganovic and
Marc Roeschlin and
Kasper B. Rasmussen and
Ivan Martinovic Analysis of Reflexive Eye Movements for
Fast Replay-Resistant Biometric
Authentication . . . . . . . . . . . . . 4:1--4:??
Marios Pomonis and
Theofilos Petsios and
Angelos D. Keromytis and
Michalis Polychronakis and
Vasileios P. Kemerlis Kernel Protection Against Just-In-Time
Code Reuse . . . . . . . . . . . . . . . 5:1--5:??
Xabier Ugarte-Pedrero and
Mariano Graziano and
Davide Balzarotti A Close Look at a Daily Dataset of
Malware Samples . . . . . . . . . . . . 6:1--6:??
Sebastian Mödersheim and
Luca Vigan\`o Alpha--Beta Privacy . . . . . . . . . . 7:1--7:??
Diego Kreutz and
Jiangshan Yu and
Fernando M. V. Ramos and
Paulo Esteves-Verissimo ANCHOR: Logically Centralized Security
for Software-Defined Networks . . . . . 8:1--8:??
Fabio Pagani and
Oleksii Fedorov and
Davide Balzarotti Introducing the Temporal Dimension to
Memory Forensics . . . . . . . . . . . . 9:1--9:??
Donghyun Kwon and
Hayoon Yi and
Yeongpil Cho and
Yunheung Paek Safe and Efficient Implementation of a
Security System on ARM using Intra-level
Privilege Separation . . . . . . . . . . 10:1--10:??
Simon S. Woo and
Ron Artstein and
Elsi Kaiser and
Xiao Le and
Jelena Mirkovic Using Episodic Memory for User
Authentication . . . . . . . . . . . . . 11:1--11:??
Juhwan Noh and
Yujin Kwon and
Yunmok Son and
Hocheol Shin and
Dohyun Kim and
Jaeyeong Choi and
Yongdae Kim Tractor Beam: Safe-hijacking of Consumer
Drones with Adaptive GPS Spoofing . . . 12:1--12:??
Scott Ruoti and
Jeff Andersen and
Luke Dickinson and
Scott Heidbrink and
Tyler Monson and
Mark O'Neill and
Ken Reese and
Brad Spendlove and
Elham Vaziripour and
Justin Wu and
Daniel Zappala and
Kent Seamons A Usability Study of Four Secure Email
Tools Using Paired Participants . . . . 13:1--13:??
Lucky Onwuzurike and
Enrico Mariconti and
Panagiotis Andriotis and
Emiliano De Cristofaro and
Gordon Ross and
Gianluca Stringhini MaMaDroid: Detecting Android Malware by
Building Markov Chains of Behavioral
Models (Extended Version) . . . . . . . 14:1--14:??
Fang-Yu Rao and
Jianneng Cao and
Elisa Bertino and
Murat Kantarcioglu Hybrid Private Record Linkage:
Separating Differentially Private
Synopses from Matching Records . . . . . 15:1--15:??
Mahmood Sharif and
Sruti Bhagavatula and
Lujo Bauer and
Michael K. Reiter A General Framework for Adversarial
Examples with Objectives . . . . . . . . 16:1--16:??
Chao Yan and
Bo Li and
Yevgeniy Vorobeychik and
Aron Laszka and
Daniel Fabbri and
Bradley Malin Database Audit Workload Prioritization
via Game Theory . . . . . . . . . . . . 17:1--17:??
Alexander V. Outkin and
Brandon K. Eames and
Meghan A. Galiardi and
Sarah Walsh and
Eric D. Vugrin and
Byron Heersink and
Jacob Hobbs and
Gregory D. Wyss GPLADD: Quantifying Trust in Government
and Commercial Systems: a Game-Theoretic
Approach . . . . . . . . . . . . . . . . 18:1--18:??
Samuel Wedaj and
Kolin Paul and
Vinay J. Ribeiro DADS: Decentralized Attestation for
Device Swarms . . . . . . . . . . . . . 19:1--19:??
Gokcan Cantali and
Orhan Ermis and
Mehmet Ufuk Çaglayan and
Cem Ersoy Analytical Models for the Scalability of
Dynamic Group-key Agreement Protocols
and Secure File Sharing Systems . . . . 20:1--20:??
Hongyu Jin and
Panos Papadimitratos Resilient Privacy Protection for
Location-Based Services through
Decentralization . . . . . . . . . . . . 21:1--21:??
Brian A. Powell Malicious Overtones: Hunting Data Theft
in the Frequency Domain with One-class
Learning . . . . . . . . . . . . . . . . 22:1--22:??
Awanthika Senarath and
Marthie Grobler and
Nalin Asanka Gamagedara Arachchilage Will They Use It or Not? Investigating
Software Developers' Intention to Follow
Privacy Engineering Methodologies . . . 23:1--23:??
Stefano Cecconello and
Alberto Compagno and
Mauro Conti and
Daniele Lain and
Gene Tsudik Skype & Type: Keyboard Eavesdropping in
Voice-over-IP . . . . . . . . . . . . . 24:1--24:??
Thang Hoang and
Attila A. Yavuz and
Jorge Guajardo A Multi-server ORAM Framework with
Constant Client Bandwidth Blowup . . . . 1:1--1:35
Hassan Khan and
Urs Hengartner and
Daniel Vogel Mimicry Attacks on Smartphone Keystroke
Authentication . . . . . . . . . . . . . 2:1--2:34
Ruggero Lanotte and
Massimo Merro and
Andrei Munteanu and
Luca Vigan\`o A Formal Approach to Physics-based
Attacks in Cyber-physical Systems . . . 3:1--3:41
Amith K. Belman and
Vir V. Phoha Discriminative Power of Typing Features
on Desktops, Tablets, and Phones for
User Identification . . . . . . . . . . 4:1--4:36
Farzaneh Karegar and
John Sören Pettersson and
Simone Fischer-Hübner The Dilemma of User Engagement in
Privacy Notices: Effects of Interaction
Modes and Habituation on User Attention 5:1--5:38
Fang-Jing Wu and
Tie Luo CrowdPrivacy: Publish More Useful Data
with Less Privacy Exposure in
Crowdsourced Location-Based Services . . 6:1--6:25
Guixin Ye and
Zhanyong Tang and
Dingyi Fang and
Zhanxing Zhu and
Yansong Feng and
Pengfei Xu and
Xiaojiang Chen and
Jungong Han and
Zheng Wang Using Generative Adversarial Networks to
Break and Protect Text Captchas . . . . 7:1--7:29
Muhammad Ikram and
Rahat Masood and
Gareth Tyson and
Mohamed Ali Kaafar and
Noha Loizon and
Roya Ensafi Measuring and Analysing the Chain of
Implicit Trust: a Study of Third-party
Resources Loading . . . . . . . . . . . 8:1--8:27
Moni Naor and
Lior Rotem and
Gil Segev The Security of Lazy Users in
Out-of-Band Authentication . . . . . . . 9:1--9:32
James Parker and
Michael Hicks and
Andrew Ruef and
Michelle L. Mazurek and
Dave Levin and
Daniel Votipka and
Piotr Mardziel and
Kelsey R. Fulton Build It, Break It, Fix It: Contesting
Secure Development . . . . . . . . . . . 10:1--10:36
Fatima M. Anwar and
Mani Srivastava A Case for Feedforward Control with
Feedback Trim to Mitigate Time Transfer
Attacks . . . . . . . . . . . . . . . . 11:1--11:25
Sanaz Taheri Boshrooyeh and
Alptekin Küpçü and
Öznur Özkasap Privado: Privacy-preserving Group-based
Advertising Using Multiple Independent
Social Network Providers . . . . . . . . 12:1--12:36
Giada Sciarretta and
Roberto Carbone and
Silvio Ranise and
Luca Vigan\`o Formal Analysis of Mobile Multi-Factor
Authentication with Single Sign-On Login 13:1--13:37
Daniele Antonioli and
Nils Ole Tippenhauer and
Kasper Rasmussen Key Negotiation Downgrade Attacks on
Bluetooth and Bluetooth Low Energy . . . 14:1--14:28
Hocheol Shin and
Juhwan Noh and
Dohyun Kim and
Yongdae Kim The System That Cried Wolf: Sensor
Security Analysis of Wide-area Smoke
Detectors for Critical Infrastructure 15:1--15:32
Darren Hurley-Smith and
Julio Hernandez-Castro Quantum Leap and Crash: Searching and
Finding Bias in Quantum Random Number
Generators . . . . . . . . . . . . . . . 16:1--16:25
Mohamed Nabeel and
Issa M. Khalil and
Bei Guan and
Ting Yu Following Passive DNS Traces to Detect
Stealthy Malicious Domains Via Graph
Inference . . . . . . . . . . . . . . . 17:1--17:36
Syed Zain Raza Rizvi and
Philip W. L. Fong Efficient Authorization of
Graph-database Queries in an
Attribute-supporting ReBAC Model . . . . 18:1--18:33
Michalis Diamantaris and
Francesco Marcantoni and
Sotiris Ioannidis and
Jason Polakis The Seven Deadly Sins of the HTML5
WebAPI: a Large-scale Study on the Risks
of Mobile Sensor-based Attacks . . . . . 19:1--19:31
Bert Abrath and
Bart Coppens and
Jens Van Den Broeck and
Brecht Wyseur and
Alessandro Cabutto and
Paolo Falcarin and
Bjorn De Sutter Code Renewability for Native Software
Protection . . . . . . . . . . . . . . . 20:1--20:31
Sagar Samtani and
Hongyi Zhu and
Hsinchun Chen Proactively Identifying Emerging Hacker
Threats from the Dark Web: a Diachronic
Graph Embedding Framework (D-GEF) . . . 21:1--21:33
Geumhwan Cho and
Jun Ho Huh and
Soolin Kim and
Junsung Cho and
Heesung Park and
Yenah Lee and
Konstantin Beznosov and
Hyoungshick Kim On the Security and Usability
Implications of Providing Multiple
Authentication Choices on Smartphones:
The More, the Better? . . . . . . . . . 22:1--22:32
Benjamin Zi Hao Zhao and
Hassan Jameel Asghar and
Mohamed Ali Kaafar and
Francesca Trevisan and
Haiyue Yuan Exploiting Behavioral Side Channels in
Observation Resilient Cognitive
Authentication Schemes . . . . . . . . . 1:1--1:33
Chuadhry Mujeeb Ahmed and
Aditya P. Mathur and
Martín Ochoa NoiSense Print: Detecting Data Integrity
Attacks on Sensor Measurements Using
Hardware-based Fingerprints . . . . . . 2:1--2:35
Nikolaos Alexopoulos and
Sheikh Mahbub Habib and
Steffen Schulz and
Max Mühlhäuser The Tip of the Iceberg: On the Merits of
Finding Security Bugs . . . . . . . . . 3:1--3:33
Alexandre Meylan and
Mauro Cherubini and
Bertil Chapuis and
Mathias Humbert and
Igor Bilogrevic and
Kévin Huguenin A Study on the Use of Checksums for
Integrity Verification of Web Downloads 4:1--4:36
Benjamin Shreeve and
Joseph Hallett and
Matthew Edwards and
Pauline Anthonysamy and
Sylvain Frey and
Awais Rashid ``So if Mr Blue Head here clicks the
link\ldots'' Risk Thinking in Cyber
Security Decision Making . . . . . . . . 5:1--5:29
Zhisheng Hu and
Minghui Zhu and
Peng Liu Adaptive Cyber Defense Against
Multi-Stage Attacks Using Learning-Based
POMDP . . . . . . . . . . . . . . . . . 6:1--6:25
Michalis Papaevripides and
Elias Athanasopoulos Exploiting Mixed Binaries . . . . . . . 7:1--7:29
Carlos Garcia Cordero and
Emmanouil Vasilomanolakis and
Aidmar Wainakh and
Max Mühlhäuser and
Simin Nadjm-Tehrani On Generating Network Traffic Datasets
with Synthetic Attacks for Intrusion
Detection . . . . . . . . . . . . . . . 8:1--8:39
Shameek Bhattacharjee and
Venkata Praveen Kumar Madhavarapu and
Simone Silvestri and
Sajal K. Das Attack Context Embedded Data Driven
Trust Diagnostics in Smart Metering
Infrastructure . . . . . . . . . . . . . 9:1--9:36
Vincenzo Arceri and
Isabella Mastroeni Analyzing Dynamic Code: a Sound Abstract
Interpreter for Evil Eval . . . . . . . 10:1--10:38
Marcus Botacin and
Hojjat Aghakhani and
Stefano Ortolani and
Christopher Kruegel and
Giovanni Vigna and
Daniela Oliveira and
Paulo Lício De Geus and
André Grégio One Size Does Not Fit All: a
Longitudinal Analysis of Brazilian
Financial Malware . . . . . . . . . . . 11:1--11:31
Isabel Wagner and
Iryna Yevseyeva Designing Strong Privacy Metrics Suites
Using Evolutionary Optimization . . . . 12:1--12:35
Charlie Jacomme and
Steve Kremer An Extensive Formal Analysis of
Multi-factor Authentication Protocols 13:1--13:34
Meisam Mohammady and
Momen Oqaily and
Lingyu Wang and
Yuan Hong and
Habib Louafi and
Makan Pourzandi and
Mourad Debbabi A Multi-view Approach to Preserve
Privacy and Utility in Network Trace
Anonymization . . . . . . . . . . . . . 14:1--14:36
Amit Seal Ami and
Kaushal Kafle and
Kevin Moran and
Adwait Nadkarni and
Denys Poshyvanyk Systematic Mutation-Based Evaluation of
the Soundness of Security-Focused
Android Static Analysis Techniques . . . 15:1--15:37
Musard Balliu and
Massimo Merro and
Michele Pasqua and
Mikhail Shcherbakov Friendly Fire: Cross-app Interactions in
IoT Platforms . . . . . . . . . . . . . 16:1--16:40
Stanislaw Jarecki and
Mohammed Jubur and
Hugo Krawczyk and
Nitesh Saxena and
Maliheh Shirvanian Two-factor Password-authenticated Key
Exchange with End-to-end Security . . . 17:1--17:37
Shujie Cui and
Xiangfu Song and
Muhammad Rizwan Asghar and
Steven D. Galbraith and
Giovanni Russello Privacy-preserving Dynamic Symmetric
Searchable Encryption with Controllable
Leakage . . . . . . . . . . . . . . . . 18:1--18:35
René Mayrhofer and
Jeffrey Vander Stoep and
Chad Brubaker and
Nick Kralevich The Android Platform Security Model . . 19:1--19:35
Rafael Veras and
Christopher Collins and
Julie Thorpe A Large-Scale Analysis of the Semantic
Password Model and Linguistic Patterns
in Passwords . . . . . . . . . . . . . . 20:1--20:21
Mohammed Abuhamad and
Tamer Abuhmed and
David Mohaisen and
Daehun Nyang Large-scale and Robust Code Authorship
Identification with Deep Feature
Learning . . . . . . . . . . . . . . . . 23:1--23:35
Abbas Acar and
Shoukat Ali and
Koray Karabina and
Cengiz Kaygusuz and
Hidayet Aksu and
Kemal Akkaya and
Selcuk Uluagac A Lightweight Privacy-Aware Continuous
Authentication Protocol --- PACA . . . . 24:1--24:28
Aleieldin Salem and
Sebastian Banescu and
Alexander Pretschner \pkgMaat: Automatically Analyzing
VirusTotal for Accurate Labeling and
Effective Malware Detection . . . . . . 25:1--25:35
Long Cheng and
Salman Ahmed and
Hans Liljestrand and
Thomas Nyman and
Haipeng Cai and
Trent Jaeger and
N. Asokan and
Danfeng (Daphne) Yao Exploitation Techniques for
Data-oriented Attacks with Existing and
Potential Defense Approaches . . . . . . 26:1--26:36
Luca Demetrio and
Scott E. Coull and
Battista Biggio and
Giovanni Lagorio and
Alessandro Armando and
Fabio Roli Adversarial EXEmples: a Survey and
Experimental Evaluation of Practical
Attacks on Machine Learning for Windows
Malware Detection . . . . . . . . . . . 27:1--27:31
Sana Maqsood and
Sonia Chiasson Design, Development, and Evaluation of a
Cybersecurity, Privacy, and Digital
Literacy Game for Tweens . . . . . . . . 28:1--28:37
Sarah C. Helble and
Ian D. Kretz and
Peter A. Loscocco and
John D. Ramsdell and
Paul D. Rowe and
Perry Alexander Flexible Mechanisms for Remote
Attestation . . . . . . . . . . . . . . 29:1--29:23
Philipp Markert and
Daniel V. Bailey and
Maximilian Golla and
Markus Dürmuth and
Adam J. Aviv On the Security of Smartphone Unlock
PINs . . . . . . . . . . . . . . . . . . 30:1--30:36
Simon Birnbach and
Richard Baker and
Simon Eberz and
Ivan Martinovic #PrettyFlyForAWiFi: Real-world Detection
of Privacy Invasion Attacks by Drones 31:1--31:34
Savvas Savvides and
Seema Kumar and
Julian James Stephen and
Patrick Eugster C3PO: Cloud-based
Confidentiality-preserving Continuous
Query Processing . . . . . . . . . . . . 1:1--1:36
Stefano Berlato and
Roberto Carbone and
Adam J. Lee and
Silvio Ranise Formal Modelling and Automated Trade-off
Analysis of Enforcement Architectures
for Cryptographic Access Control in the
Cloud . . . . . . . . . . . . . . . . . 2:1--2:37
Handan Kilinç Alper and
Alptek\.\in Küpçü Optimally Efficient Multi-party Fair
Exchange and Fair Secure Multi-party
Computation . . . . . . . . . . . . . . 3:1--3:34
Le Qin and
Fei Peng and
Min Long and
Raghavendra Ramachandra and
Christoph Busch Vulnerabilities of Unattended Face
Verification Systems to Facial
Components-based Presentation Attacks:
an Empirical Study . . . . . . . . . . . 4:1--4:28
Sibghat Ullah Bazai and
Julian Jang-Jaccard and
Hooman Alavizadeh A Novel Hybrid Approach for
Multi-Dimensional Data Anonymization for
Apache Spark . . . . . . . . . . . . . . 5:1--5:25
Fabio Pagani and
Davide Balzarotti AutoProfile: Towards Automated Profile
Generation for Memory Analysis . . . . . 6:1--6:26
Angelo Massimo Perillo and
Giuseppe Persiano and
Alberto Trombetta Secure Selections on Encrypted
Multi-writer Streams . . . . . . . . . . 7:1--7:33
Lennart Braun and
Daniel Demmler and
Thomas Schneider and
Oleksandr Tkachenko MOTION --- A Framework for
Mixed-Protocol Multi-Party Computation 8:1--8:35
Marcus Botacin and
Francis B. Moreira and
Philippe O. A. Navaux and
André Grégio and
Marco A. Z. Alves Terminator: a Secure Coprocessor to
Accelerate Real-Time AntiViruses Using
Inspection Breakpoints . . . . . . . . . 9:1--9:34
Xueou Wang and
Xiaolu Hou and
Ruben Rios and
Nils Ole Tippenhauer and
Martín Ochoa Constrained Proximity Attacks on Mobile
Targets . . . . . . . . . . . . . . . . 10:1--10:29
Alexandre Debant and
Stéphanie Delaune and
Cyrille Wiedling So Near and Yet So Far --- Symbolic
Verification of Distance-Bounding
Protocols . . . . . . . . . . . . . . . 11:1--11:39
Yevhen Zolotavkin and
Jongkil Jay Jeong and
Veronika Kuchta and
Maksym Slavnenko and
Robin Doss Improving Unlinkability of
Attribute-based Authentication through
Game Theory . . . . . . . . . . . . . . 12:1--12:36
Nadia Daoudi and
Kevin Allix and
Tegawendé François Bissyandé and
Jacques Klein A Deep Dive Inside DREBIN: an
Explorative Analysis beyond Android
Malware Detection Scores . . . . . . . . 13:1--13:28
Pascal Oser and
Rens W. van der Heijden and
Stefan Lüders and
Frank Kargl Risk Prediction of IoT Devices Based on
Vulnerability Analysis . . . . . . . . . 14:1--14:36
Julian de Gortari Briseno and
Akash Deep Singh and
Mani Srivastava InkFiltration: Using Inkjet Printers for
Acoustic Data Exfiltration from
Air-Gapped Networks . . . . . . . . . . 15:1--15:26
Chris Clifton and
Eric J. Hanson and
Keith Merrill and
Shawn Merrill Differentially Private $k$-Nearest
Neighbor Missing Data Imputation . . . . 16:1--16:23
Yuxuan Chen and
Jiangshan Zhang and
Xuejing Yuan and
Shengzhi Zhang and
Kai Chen and
Xiaofeng Wang and
Shanqing Guo SoK: a Modularized Approach to Study the
Security of Automatic Speech Recognition
Systems . . . . . . . . . . . . . . . . 17:1--17:31
Max Landauer and
Florian Skopik and
Markus Wurzenberger and
Andreas Rauber Dealing with Security Alert Flooding:
Using Machine Learning for
Domain-independent Alert Aggregation . . 18:1--18:36
Cláudio Martins and
Ibéria Medeiros Generating Quality Threat Intelligence
Leveraging OSINT and a Cyber Threat
Unified Taxonomy . . . . . . . . . . . . 19:1--19:39
Mário S. Alvim and
Konstantinos Chatzikokolakis and
Yusuke Kawamoto and
Catuscia Palamidessi Information Leakage Games: Exploring
Information as a Utility Function . . . 20:1--20:36
Andreas Fischer and
Benny Fuhry and
Jörn Kußmaul and
Jonas Janneck and
Florian Kerschbaum and
Eric Bodden Computation on Encrypted Data Using
Dataflow Authentication . . . . . . . . 21:1--21:36
Padmavathi Iyer and
Amirreza Masoumzadeh Learning Relationship-Based Access
Control Policies from Black-Box Systems 22:1--22:36
Yaguan Qian and
Yankai Guo and
Qiqi Shao and
Jiamin Wang and
Bin Wang and
Zhaoquan Gu and
Xiang Ling and
Chunming Wu EI-MTD: Moving Target Defense for Edge
Intelligence against Adversarial Attacks 23:1--23:24
Adi Akavia and
Max Leibovich and
Yehezkel S. Resheff and
Roey Ron and
Moni Shahar and
Margarita Vald Privacy-Preserving Decision Trees
Training and Prediction . . . . . . . . 24:1--24:30
Ellis Fenske and
Akshaya Mani and
Aaron Johnson and
Micah Sherr Accountable Private Set Cardinality for
Distributed Measurement . . . . . . . . 25:1--25:??
Sarah M. Lehman and
Abrar S. Alrumayh and
Kunal Kolhe and
Haibin Ling and
Chiu C. Tan Hidden in Plain Sight: Exploring Privacy
Risks of Mobile Augmented Reality
Applications . . . . . . . . . . . . . . 26:1--26:??
Andrea Oliveri and
Davide Balzarotti In the Land of MMUs: Multiarchitecture
OS-Agnostic Virtual Memory Forensics . . 27:1--27:??
Jason Crampton and
Eduard Eiben and
Gregory Gutin and
Daniel Karapetyan and
Diptapriyo Majumdar Valued Authorization Policy Existence
Problem: Theory and Experiments . . . . 28:1--28:??
Lihi Idan and
Joan Feigenbaum PRShare: a Framework for
Privacy-preserving, Interorganizational
Data Sharing . . . . . . . . . . . . . . 29:1--29:??
Milica Stojmenovi\'c and
Eric Spero and
Milos Stojmenovi\'c and
Robert Biddle What is Beautiful is Secure . . . . . . 30:1--30:??
Eyal Nussbaum and
Michael Segal Privacy Analysis of Query-Set-Size
Control . . . . . . . . . . . . . . . . 31:1--31:??
Jinhua Cui and
Shweta Shinde and
Satyaki Sen and
Prateek Saxena and
Pinghai Yuan Dynamic Binary Translation for SGX
Enclaves . . . . . . . . . . . . . . . . 32:1--32:??
William Blair and
Andrea Mambretti and
Sajjad Arshad and
Michael Weissbacher and
William Robertson and
Engin Kirda and
Manuel Egele HotFuzz: Discovering Temporal and
Spatial Denial-of-Service
Vulnerabilities Through Guided
Micro-Fuzzing . . . . . . . . . . . . . 33:1--33:??
Alesia Chernikova and
Alina Oprea FENCE: Feasible Evasion Attacks on
Neural Networks in Constrained
Environments . . . . . . . . . . . . . . 34:1--34:??
Xueru Zhang and
Mohammad Mahdi Khalili and
Mingyan Liu Differentially Private Real-Time Release
of Sequential Data . . . . . . . . . . . 1:1--1:??
Christoph Hagen and
Christian Weinert and
Christoph Sendner and
Alexandra Dmitrienko and
Thomas Schneider Contact Discovery in Mobile Messengers:
Low-cost Attacks, Quantitative Analyses,
and Efficient Mitigations . . . . . . . 2:1--2:??
Shaharyar Khan and
Ilya Kabanov and
Yunke Hua and
Stuart Madnick A Systematic Analysis of the Capital One
Data Breach: Critical Lessons Learned 3:1--3:??
Ruggero Lanotte and
Massimo Merro and
Andrei Munteanu Industrial Control Systems Security via
Runtime Enforcement . . . . . . . . . . 4:1--4:??
Kopo Marvin Ramokapane and
Jose Such and
Awais Rashid What Users Want From Cloud Deletion and
the Information They Need: a
Participatory Action Study . . . . . . . 5:1--5:??
Stephan Wiefling and
Paul René Jòrgensen and
Sigurd Thunem and
Luigi Lo Iacono Pump Up Password Security! Evaluating
and Enhancing Risk-Based Authentication
on a Real-World Large-Scale Online
Service . . . . . . . . . . . . . . . . 6:1--6:??
Huanran Wang and
Wu Yang and
Wei Wang and
Dapeng Man and
Jiguang Lv A Novel Cross-Network Embedding for
Anchor Link Prediction with Social
Adversarial Attacks . . . . . . . . . . 7:1--7:??
James Lembke and
Srivatsan Ravi and
Pierre-Louis Roman and
Patrick Eugster Secure and Reliable Network Updates . . 8:1--8:??
Euijin Choo and
Mohamed Nabeel and
Mashael Alsabah and
Issa Khalil and
Ting Yu and
Wei Wang DeviceWatch: a Data-Driven Network
Analysis Approach to Identifying
Compromised Mobile Devices with
Graph-Inference . . . . . . . . . . . . 9:1--9:??
Gonzalo Gil and
Aitor Arnaiz and
Mariví Higuero and
Francisco Javier Diez Assessment Framework for the
Identification and Evaluation of Main
Features for Distributed Usage Control
Solutions . . . . . . . . . . . . . . . 10:1--10:??
Lesly-Ann Daniel and
Sébastien Bardin and
Tamara Rezk Binsec/Rel: Symbolic Binary Analyzer for
Security with Applications to
Constant-Time and Secret-Erasure . . . . 11:1--11:??
Norah Alotaibi and
John Williamson and
Mohamed Khamis ThermoSecure: Investigating the
Effectiveness of AI-Driven Thermal
Attacks on Commonly Used Computer
Keyboards . . . . . . . . . . . . . . . 12:1--12:??
David Barrera and
Christopher Bellman and
Paul Van Oorschot Security Best Practices: a Critical
Analysis Using IoT as a Case Study . . . 13:1--13:??
Anh-Tu Hoang and
Barbara Carminati and
Elena Ferrari Time-aware Anonymization of Knowledge
Graphs . . . . . . . . . . . . . . . . . 14:1--14:??
Rodrigo Otoni and
Matteo Marescotti and
Leonardo Alt and
Patrick Eugster and
Antti Hyvärinen and
Natasha Sharygina A Solicitous Approach to Smart Contract
Verification . . . . . . . . . . . . . . 15:1--15:??
Savino Dambra and
Leyla Bilge and
Davide Balzarotti A Comparison of Systemic and Systematic
Risks of Malware Encounters in Consumer
and Enterprise Environments . . . . . . 16:1--16:??
Farzana Ahamed Bhuiyan and
Akond Rahman Log-related Coding Patterns to Conduct
Postmortems of Attacks in Supervised
Learning-based Projects . . . . . . . . 17:1--17:??
Giorgio Di Tizio and
Patrick Speicher and
Milivoj Simeonovski and
Michael Backes and
Ben Stock and
Robert Künnemann Pareto-optimal Defenses for the Web
Infrastructure: Theory and Practice . . 18:1--18:??
Ranya Aloufi and
Hamed Haddadi and
David Boyle Paralinguistic Privacy Protection at the
Edge . . . . . . . . . . . . . . . . . . 19:1--19:??
Viktor Engström and
Pontus Johnson and
Robert Lagerström and
Erik Ringdahl and
Max Wällstedt Automated Security Assessments of Amazon
Web Services Environments . . . . . . . 20:1--20:??
Sohail Habib and
Hassan Khan and
Andrew Hamilton-Wright and
Urs Hengartner Revisiting the Security of Biometric
Authentication Systems Against
Statistical Attacks . . . . . . . . . . 21:1--21:??
Ahmed Amro and
Vasileios Gkioulos and
Sokratis Katsikas Assessing Cyber Risk in Cyber-Physical
Systems Using the ATT&CK Framework . . . 22:1--22:??
Seoyeon Hwang and
Ercan Ozturk and
Gene Tsudik Balancing Security and Privacy in
Genomic Range Queries . . . . . . . . . 23:1--23:??
Sijie Zhuo and
Robert Biddle and
Yun Sing Koh and
Danielle Lottridge and
Giovanni Russello SoK: Human-centered Phishing
Susceptibility . . . . . . . . . . . . . 24:1--24:??
Andreas V. Hess and
Sebastian A. MÖdersheim and
Achim D. Brucker Stateful Protocol Composition in
Isabelle/HOL . . . . . . . . . . . . . . 25:1--25:??
Patricia Arias-Cabarcos and
Matin Fallahi and
Thilo Habrich and
Karen Schulze and
Christian Becker and
Thorsten Strufe Performance and Usability Evaluation of
Brainwave Authentication Techniques with
Consumer Devices . . . . . . . . . . . . 26:1--26:??
Nada Lachtar and
Duha Ibdah and
Hamza Khan and
Anys Bacha RansomShield: a Visualization Approach
to Defending Mobile Systems Against
Ransomware . . . . . . . . . . . . . . . 27:1--27:??
Litao Li and
Steven H. H. Ding and
Yuan Tian and
Benjamin C. M. Fung and
Philippe Charland and
Weihan Ou and
Leo Song and
Congwei Chen VulANalyzeR: Explainable Binary
Vulnerability Detection with Multi-task
Learning and Attentional Graph
Convolution . . . . . . . . . . . . . . 28:1--28:??
Sona Alex and
Dhanaraj K. J. and
Deepthi P. P. Energy Efficient and Secure Neural
Network-based Disease Detection
Framework for Mobile Healthcare Network 29:1--29:??
Hazel Murray and
David Malone Costs and Benefits of Authentication
Advice . . . . . . . . . . . . . . . . . 30:1--30:??
Tom Bolton and
Tooska Dargahi and
Sana Belguith and
Carsten Maple PrivExtractor: Toward Redressing the
Imbalance of Understanding between
Virtual Assistant Users and Vendors . . 31:1--31:??
Isabel Wagner Privacy Policies across the Ages:
Content of Privacy Policies 1996--2021 32:1--32:??
Yang Lu and
Zhengxin Yu and
Neeraj Suri Privacy-preserving Decentralized
Federated Learning over Time-varying
Communication Graph . . . . . . . . . . 33:1--33:??
Jian Hou and
Jing Wang and
Mingyue Zhang and
Zhi Jin and
Chunlin Wei and
Zuohua Ding Privacy-preserving Resilient Consensus
for Multi-agent Systems in a General
Topology Structure . . . . . . . . . . . 34:1--34:??
Isaiah J. King and
H. Howie Huang Euler: Detecting Network Lateral
Movement via Scalable Temporal Link
Prediction . . . . . . . . . . . . . . . 35:1--35:??
Anushka Vidanage and
Peter Christen and
Thilina Ranbaduge and
Rainer Schnell A Vulnerability Assessment Framework for
Privacy-preserving Record Linkage . . . 36:1--36:??
Chun Guo and
Xiao Wang and
Xiang Xie and
Yu Yu The Multi-User Constrained Pseudorandom
Function Security of Generalized GGM
Trees for MPC and Hierarchical Wallets 37:1--37:??
Dmitrii Usynin and
Daniel Rueckert and
Georgios Kaissis Beyond Gradients: Exploiting Adversarial
Priors in Model Inversion Attacks . . . 38:1--38:??
Gianluca Scopelliti and
Sepideh Pouyanrad and
Job Noorman and
Fritz Alder and
Christoph Baumann and
Frank Piessens and
Jan Tobias Mühlberg End-to-End Security for Distributed
Event-driven Enclave Applications on
Heterogeneous TEEs . . . . . . . . . . . 39:1--39:??
Ranwa Al Mallah and
Talal Halabi and
Bilal Farooq Resilience-by-design in Adaptive
Multi-agent Traffic Control Systems . . 40:1--40:??
Manuel Barbosa and
Gilles Barthe and
Benjamin Grégoire and
Adrien Koutsos and
Pierre-Yves Strub Mechanized Proofs of Adversarial
Complexity and Application to Universal
Composability . . . . . . . . . . . . . 41:1--41:??
Rajagopal Venkatesaramani and
Zhiyu Wan and
Bradley A. Malin and
Yevgeniy Vorobeychik Defending Against Membership Inference
Attacks on Beacon Services . . . . . . . 42:1--42:??
Xueluan Gong and
Yanjiao Chen and
Wenbin Yang and
Huayang Huang and
Qian Wang $ B^3 $: Backdoor Attacks against
Black-box Machine Learning Models . . . 43:1--43:??
Jinfu Chen and
Luo Song and
Saihua Cai and
Haodi Xie and
Shang Yin and
Bilal Ahmad TLS-MHSA: an Efficient Detection Model
for Encrypted Malicious Traffic based on
Multi-Head Self-Attention Mechanism . . 44:1--44:??
Tommaso Paladini and
Francesco Monti and
Mario Polino and
Michele Carminati and
Stefano Zanero Fraud Detection under Siege: Practical
Poisoning Attacks and Defense Strategies 45:1--45:??
Dohyun Kim and
Mangi Cho and
Hocheol Shin and
Jaehoon Kim and
Juhwan Noh and
Yongdae Kim Lightbox: Sensor Attack Detection for
Photoelectric Sensors via Spectrum
Fingerprinting . . . . . . . . . . . . . 46:1--46:??
Shahnewaz Karim Sakib and
George T. Amariucai and
Yong Guan Measures of Information Leakage for
Incomplete Statistical Information:
Application to a Binary Privacy
Mechanism . . . . . . . . . . . . . . . 47:1--47:??
Maksim E. Eren and
Manish Bhattarai and
Robert J. Joyce and
Edward Raff and
Charles Nicholas and
Boian S. Alexandrov Semi-Supervised Classification of
Malware Families Under Extreme Class
Imbalance via Hierarchical Non-Negative
Matrix Factorization with Automatic
Model Selection . . . . . . . . . . . . 48:1--48:??
Chenhan Zhang and
Shiyao Zhang and
James J. Q. Yu and
Shui Yu SAM: Query-efficient Adversarial Attacks
against Graph Neural Networks . . . . . 49:1--49:??
Ayoosh Bansal and
Anant Kandikuppa and
Monowar Hasan and
Chien-Ying Chen and
Adam Bates and
Sibin Mohan System Auditing for Real-Time Systems 50:1--50:??
Md Sajidul Islam Sajid and
Jinpeng Wei and
Ehab Al-Shaer and
Qi Duan and
Basel Abdeen and
Latifur Khan symbSODA: Configurable and Verifiable
Orchestration Automation for Active
Malware Deception . . . . . . . . . . . 51:1--51:??
Shen Wang and
Mahshid Delavar and
Muhammad Ajmal Azad and
Farshad Nabizadeh and
Steve Smith and
Feng Hao Spoofing Against Spoofing: Toward Caller
ID Verification in Heterogeneous
Telecommunication Systems . . . . . . . 1:1--1:??
Jenny Ottmann and
Frank Breitinger and
Felix Freiling An Experimental Assessment of
Inconsistencies in Memory Forensics . . 2:1--2:??
Erik-Oliver Blass and
Guevara Noubir Forward Security with Crash Recovery for
Secure Logs . . . . . . . . . . . . . . 3:1--3:??
Han Cao and
Qindong Sun and
Yaqi Li and
Rong Geng and
Xiaoxiong Wang Efficient History-Driven Adversarial
Perturbation Distribution Learning in
Low Frequency Domain . . . . . . . . . . 4:1--4:??
Prakash Shrestha and
Ahmed Tanvir Mahdad and
Nitesh Saxena Sound-based Two-factor Authentication:
Vulnerabilities and Redesign . . . . . . 5:1--5:??
Mayank Swarnkar and
Neha Sharma OptiClass: an Optimized Classifier for
Application Layer Protocols Using Bit
Level Signatures . . . . . . . . . . . . 6:1--6:??
Yong Zeng and
Jiale Liu and
Tong Dong and
Qingqi Pei and
Jianfeng Ma and
Yao Liu Eyes See Hazy while Algorithms Recognize
Who You Are . . . . . . . . . . . . . . 7:1--7:??
Maryna Kluban and
Mohammad Mannan and
Amr Youssef On Detecting and Measuring Exploitable
JavaScript Functions in Real-world
Applications . . . . . . . . . . . . . . 8:1--8:??
Li Tang and
Qingqing Ye and
Haibo Hu and
Qiao Xue and
Yaxin Xiao and
Jin Li DeepMark: a Scalable and Robust
Framework for DeepFake Video Detection 9:1--9:??
Li Wang and
Xiangtao Meng and
Dan Li and
Xuhong Zhang and
Shouling Ji and
Shanqing Guo DEEPFAKER: a Unified Evaluation Platform
for Facial Deepfake and Detection Models 10:1--10:??
Liqun Chen and
Changyu Dong and
Christopher J. P. Newton and
Yalan Wang Sphinx-in-the-Head: Group Signatures
from Symmetric Primitives . . . . . . . 11:1--11:??
Yan Qiao and
Kui Wu and
Majid Khabbazian Non-intrusive Balance Tomography Using
Reinforcement Learning in the Lightning
Network . . . . . . . . . . . . . . . . 12:1--12:??
Zhenpeng Shi and
Nikolay Matyunin and
Kalman Graffi and
David Starobinski Uncovering CWE-CVE-CPE Relations with
Threat Knowledge Graphs . . . . . . . . 13:1--13:??
Ghader Ebrahimpour and
Mohammad Sayad Haghighi Is Bitcoin Future as Secure as We Think?
Analysis of Bitcoin Vulnerability to
Bribery Attacks Launched through Large
Transactions . . . . . . . . . . . . . . 14:1--14:??
Federico Concone and
Salvatore Gaglio and
Andrea Giammanco and
Giuseppe Lo Re and
Marco Morana AdverSPAM: Adversarial SPam Account
Manipulation in Online Social Networks 15:1--15:??
Florian Sommer and
Mona Gierl and
Reiner Kriesten and
Frank Kargl and
Eric Sax Combining Cyber Security Intelligence to
Refine Automotive Cyber Threats . . . . 16:1--16:??
Jiayi Chen and
Urs Hengartner and
Hassan Khan MRAAC: a Multi-stage Risk-aware Adaptive
Authentication and Access Control
Framework for Android . . . . . . . . . 17:1--17:??
Markus Bayer and
Philipp Kuehn and
Ramin Shanehsaz and
Christian Reuter CySecBERT: a Domain-Adapted Language
Model for the Cybersecurity Domain . . . 18:1--18:??
Julen Bernabé-Rodríguez and
Albert Garreta and
Oscar Lage A Decentralized Private Data Marketplace
using Blockchain and Secure Multi-Party
Computation . . . . . . . . . . . . . . 19:1--19:??
Namgyu Park and
Jong Kim Toward Robust ASR System against Audio
Adversarial Examples using Agitated
Logit . . . . . . . . . . . . . . . . . 20:1--20:??
Rodolfo Vieira Valentim and
Idilio Drago and
Marco Mellia and
Federico Cerutti X-squatter: AI Multilingual Generation
of Cross-Language Sound-squatting . . . 21:1--21:??
Safwa Ameer and
Lopamudra Praharaj and
Ravi Sandhu and
Smriti Bhatt and
Maanak Gupta ZTA-IoT: a Novel Architecture for
Zero-Trust in IoT Systems and an Ensuing
Usage Control Model . . . . . . . . . . 22:1--22:??
Abu Shohel Ahmed and
Aleksi Peltonen and
Mohit Sethi and
Tuomas Aura Security Analysis of the Consumer Remote
SIM Provisioning Protocol . . . . . . . 23:1--23:??
Xinyu He and
Fengrui Hao and
Tianlong Gu and
Liang Chang CBAs: Character-level Backdoor Attacks
against Chinese Pre-trained Language
Models . . . . . . . . . . . . . . . . . 24:1--24:??
Hasini Gunasinghe and
Mikhail Atallah and
Elisa Bertino PEBASI: a Privacy preserving, Efficient
Biometric Authentication Scheme based on
Irises . . . . . . . . . . . . . . . . . 25:1--25:??
Weihan Ou and
Steven Ding and
Mohammad Zulkernine and
Li Tao Li and
Sarah Labrosse VeriBin: a Malware Authorship
Verification Approach for APT Tracking
through Explainable and
Functionality-Debiasing Adversarial
Representation Learning . . . . . . . . 26:1--26:??
Vipin N. Sathi and
C. Siva Ram Murthy Boost Your Immunity: VACCINE for
Preventing a Novel Stealthy Slice
Selection Attack in 5G and Beyond . . . 27:1--27:??
Haya Schulmann and
Shujie Zhao ZPredict: ML-Based IPID Side-channel
Measurements . . . . . . . . . . . . . . 28:1--28:??
Arish Sateesan and
Jo Vliegen and
Simon Scherrer and
Hsu-Chun Hsiao and
Adrian Perrig and
Nele Mentens SPArch: a Hardware-oriented Sketch-based
Architecture for High-speed Network Flow
Measurements . . . . . . . . . . . . . . 29:1--29:??
Susil Kumar Mohanty and
Somanath Tripathy Flexichain: Flexible Payment Channel
Network to Defend Against Channel
Exhaustion Attack . . . . . . . . . . . 30:1--30:??
Lorenzo Ceragioli and
Letterio Galletta and
Pierpaolo Degano and
David Basin Specifying and Verifying Information
Flow Control in SELinux Configurations 31:1--31:??
Mukhtar Ahmed and
Jinfu Chen and
Ernest Akpaku and
Rexford Nii Ayitey Sosu and
Ajmal Latif DELM: Deep Ensemble Learning Model for
Anomaly Detection in Malicious Network
Traffic-based Adaptive Feature
Aggregation and Network Optimization . . 32:1--32:??
Blake Hayden and
Timothy Walsh and
Armon Barton Defending Against Deep Learning-Based
Traffic Fingerprinting Attacks With
Adversarial Examples . . . . . . . . . . 1:1--1:??
Huan Dai and
Yuefeng Chen and
Yicong Du and
Luping Wang and
Ziyu Shao and
Hongbo Liu and
Yanzhi Ren and
Jiadi Yu and
Bo Liu ArmSpy++: Enhanced PIN Inference through
Video-based Fine-grained Arm Posture
Analysis . . . . . . . . . . . . . . . . 2:1--2:??
Clara Bertolissi and
Maribel Fernandez and
Bhavani Thuraisingham Category-Based Administrative Access
Control Policies . . . . . . . . . . . . 3:1--3:??
Pedram Hosseyni and
Ralf Küsters and
Tim Würtele Formal Security Analysis of the OpenID
FAPI 2.0 Family of Protocols:
Accompanying a Standardization Process 4:1--4:??
Jason Crampton and
Eduard Eiben and
Gregory Gutin and
Daniel Karapetyan and
Diptapriyo Majumdar Bi-objective Optimization in Role Mining 5:1--5:??
Björn Bjurling and
Shahid Raza Cyber Threat Intelligence meets the
Analytic Tradecraft . . . . . . . . . . 6:1--6:??
Haibin Zheng and
Jinyin Chen and
Tao Liu and
Yao Cheng and
Zhao Wang and
Yun Wang and
Lan Gao and
Shouling Ji and
Xuhong Zhang DP-Poison: Poisoning Federated Learning
under the Cover of Differential Privacy 7:1--7:??
Georgios Syros and
Gokberk Yar and
Simona Boboila and
Cristina Nita-Rotaru and
Alina Oprea Backdoor Attacks in Peer-to-Peer
Federated Learning . . . . . . . . . . . 8:1--8:??
Yubing Bao and
Jianping Zeng and
Jirui Yang and
Ruining Yang and
Zhihui Lu The Effect of Domain Terms on Password
Security . . . . . . . . . . . . . . . . 9:1--9:??
Xuejing Yuan and
Jiangshan Zhang and
Kai Chen and
Cheng'an Wei and
Ruiyuan Li and
Zhenkun Ma and
Xinqi Ling Adversarial Attack and Defense for
Commercial Black-box Chinese--English
Speech Recognition Systems . . . . . . . 10:1--10:??
Hieu Le and
Salma Elmalaki and
Athina Markopoulou and
Zubair Shafiq AutoFR: Automated Filter Rule Generation
for Adblocking . . . . . . . . . . . . . 11:1--11:??
Alessandro Baccarini and
Marina Blanton and
Shaofeng Zou Understanding Information Disclosure
from Secure Computation Output: a
Comprehensive Study of Average Salary
Computation . . . . . . . . . . . . . . 12:1--12:??
Antonio Ruggia and
Andrea Possemato and
Savino Dambra and
Alessio Merlo and
Simone Aonzo and
Davide Balzarotti The Dark Side of Native Code on Android 13:1--13:??
Long Chen and
Ya-Nan Li and
Qiang Tang and
Moti Yung End-to-Same-End Encryption: Modularly
Augmenting an App with an Efficient,
Portable, and Blind Cloud Storage . . . 14:1--14:??
Soumyadeep Hore and
Jalal Ghadermazi and
Diwas Paudel and
Ankit Shah and
Tapas Das and
Nathaniel Bastian Deep PackGen: a Deep Reinforcement
Learning Framework for Adversarial
Network Packet Generation . . . . . . . 15:1--15:??
Srivathsan G. Morkonda and
S. Chiasson and
P. C. van Oorschot ``Sign in with \ldots Privacy'': Timely
Disclosure of Privacy Differences among
Web SSO Login Options . . . . . . . . . 16:1--16:??
Hamid Bostani and
Zhengyu Zhao and
Zhuoran Liu and
Veelasha Moonsamy Level Up with ML Vulnerability
Identification: Leveraging Domain
Constraints in Feature Space for Robust
Android Malware Detection . . . . . . . 17:1--17:??
Liang Wang and
Zhuangkun Wei and
Weisi Guo Multi-agent Deep Reinforcement
Learning-based Key Generation for Graph
Layer Security . . . . . . . . . . . . . 18:1--18:??
Yingkai Dong and
Li Wang and
Zheng Li and
Hao Li and
Peng Tang and
Chengyu Hu and
Shanqing Guo Safe Driving Adversarial Trajectory Can
Mislead: Toward More Stealthy
Adversarial Attack Against Autonomous
Driving Prediction Module . . . . . . . 19:1--19:??
Danushka Bollegala and
Shuichi Otake and
Tomoya Machide and
Ken-ichi Kawarabayashi A Metric Differential Privacy Mechanism
for Sentence Embeddings . . . . . . . . 20:1--20:??
Shuaijv Fang and
Zhiyong Zhang and
Bin Song Deepfake Detection Model Combining
Texture Differences and Frequency Domain
Information . . . . . . . . . . . . . . 21:1--21:??
Jeyamohan Neera and
Xiaomin Chen and
Nauman Aslam and
Biju Issac A Trustworthy and Untraceable
Centralised Payment Protocol for Mobile
Payment . . . . . . . . . . . . . . . . 22:1--22:??
Charalampos Katsis and
Elisa Bertino ZT-SDN: an ML-Powered Zero-Trust
Architecture for Software-Defined
Networks . . . . . . . . . . . . . . . . 23:1--23:??
Naveen Karunanayake and
Bhanuka Silva and
Yasod Ginige and
Suranga Seneviratne and
Sanjay Chawla Quantifying and Exploiting Adversarial
Vulnerability: Gradient-Based Input
Pre-Filtering for Enhanced Performance
in Black-Box Attacks . . . . . . . . . . 24:1--24:??
Sulthana Shams and
Douglas Leith Attack Detection Using Item Vector Shift
in Matrix Factorisation Recommenders . . 25:1--25:??
Chunghyo Kim and
Juhwan Noh and
Esmaeil Ghahremani and
Yongdae Kim Revisiting GPS Spoofing in Phasor
Measurement: Real-World Exploitation and
Practical Detection in Power Grids . . . 26:1--26:??
Yuxin Yang and
Qiang Li and
Yuede Ji and
Binghui Wang A Secret Sharing-Inspired Robust
Distributed Backdoor Attack to Federated
Learning . . . . . . . . . . . . . . . . 27:1--27:??