Securing wireless neurostimulators |
Eduard Marin, Dave Singelee, Bohan Yang, Vladimir Volskiy, Guy Vandenbosch, Bart Nuttin and Bart Prenee |
Killing Two Birds with One Stone: Malicious Domain Detection with High Accuracy and Coverage |
Ting Yu, Bei Guan, Issa Khalil and Mohamed Yoosuf Mohamed Nabeel |
Beyond Precision and Recall: Understanding Uses (and Misuses) of Similarity Hashes in Binary Analysis |
Fabio Pagani, Matteo Dell'Amico and Davide Balzarotti |
Minimizing Privilege Assignment Errors in Cloud Services |
Matthew Sanders and Chuan Yue |
From Debugging-Information Based Binary-Level Type Inference to CFG Generation |
Dongrui Zeng and Gang Tan |
A Multi-Enterprise Containerization Approach With An Interoperable Position-Based System |
Oyindamola Oluwatimi and Elisa Bertino |
Secure Storage with Replication and Transparent Deduplication |
Iraklis Leontiadis and Reza Curtmola |
DIALERAUTH: A Motion-assisted Touch-based Smartphone User Authentication Scheme |
Attaullah Buriro, Bruno Crispo, Sandeep Gupta and Filippo Del Frari |
Server-Based Manipulation Attacks Against Machine Learning Models |
Cong Liao, Haoti Zhong, Sencun Zhu and Anna Squicciarini |
Remote Attestation for Low-End Prover Devices with Post-Quantum Capabilities |
Xiruo Liu, Rafael Misoczki and Manoj R. Sastry |
Secure, Consistent, and High-Performance Memory Snapshotting |
Guilherme Cox, Zi Yan, Abhishek Bhattacharjee and Vinod Ganapathy |
SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in 6LoWPAN |
Mahmud Hossain, Yasser Karim and Ragib Hasan |
Access Control Model for Virtual Objects (Shadows) Communication for AWS Internet of Things |
Asma Alshehri, James Benson, Farhan Patwa and Ravi Sandhu |
Privacy-Preserving Certification of Sustainability Metrics |
Cetin Sahin, Brandon Kuczenski, Omer Egecioglu and Amr El Abbadi |
Private Finding Common Friends of Friends is Social Networks |
Dan Boneh, Yan Michalevsky, Marc Joye and Nicko van Someren |
Cross-App Tracking via Nearby Bluetooth Low Energy Devices |
Aleksandra Korolova and Vinod Sharma |
Capacity: an Abstract Model of Control over Personal Data |
Pablo Rauzy and Daniel Le Métayer |
MASCAT: Preventing Microarchitectural Attacks before distribution |
Gorka Irazoqui, Thomas Eisenbarth and Berk Sunar |
Hyperagents: Migrating Host Agents to the Hypervisor |
Micah Bushouse and Douglas Reeves |
Denial of Engineering Operations Attacks in Industrial Control Systems |
Saranyan Senthivel, Shrey Dhungana, Hyunguk Yoo, Irfan Ahmed and Vassil Roussev |
CacheShield: Detecting Cache Attacks through Self-Observation |
Samira Briongos, Gorka Irazoqui, Pedro Malagón and Thomas Eisenbarth |
Authorship Attribution of Android Apps |
Hugo Gonzalez, Natalia Stakhanova and Ali A Ghorbani |
Security Analysis of Relationship-Based Access Control Policies |
Amirreza Masoumzadeh |
Forgetting with Puzzles: Using Cryptographic Puzzles to support Digital Forgetting |
Ghous Amjad, Muhammad Shujaat Mirza and Christina Pöpper |