Title Authors
ProximiTEE: Hardened SGX Attestation by Proximity Verification Aritra Dhar (ETH Zurich), Ivan Puddu (ETH Zurich), Kari Kostiainen (ETH Zurich) and Srdjan Capkun (ETH Zurich)
Deceiving Portable Executable Malware Classifiers into Targeted Misclassification with Practical Adversarial Examples Yunus Kucuk (Binghamton University) and Guanhua Yan (Binghamton University)
Random Spiking and Systematic Evaluation of Defenses Against Adversarial Examples Huangyi Ge (Purdue University), Sze Yiu Chau (Purdue University), Bruno Ribeiro (Purdue University) and Ninghui Li (Purdue University)
AuthPDB: Authentication of Probabilistic Queries on Outsourced Uncertain Data Bo Zhang (Stevens Institute of Technology), Boxiang Dong (Montclair State University), Haipei Sun (Stevens Institute of Technology) and Hui Wang (Stevens Institute of Technology)
PESC: A Per System-Call Stack Canary Design for Linux Kernel Jiadong Sun (Zhejiang University), Xia Zhou (Zhejiang University), Wenbo Shen (Zhejiang University), Yajin Zhou (Zhejiang University) and Kui Ren (Zhejiang University)
CRAPE: A Privacy-Enhanced Crash Reporting System Kiavash Satvat (University of Illinois at Chicago), Maliheh Shirvanian (Visa Research Lab), Mahshid Hosseini (University of Illinois at Chicago) and Nitesh Saxena (University of Alabama at Birmingham)
(Dataset/Tool Paper) ISAdetect: Usable Automated Detection of CPU Architecture and Endianness for Arbitrary Binary Files and Object Code Sequences Sami Kairajärvi (University of Jyväskylä), Andrei Costin (University of Jyväskylä) and Timo Hamalainen (University of Jyväskylä)
A Hypothesis Testing Approach to Sharing Logs with Confidence Yunhui Long (University of Illinois at Urbana-Champaign), Le Xu (University of Illinois at Urbana-Champaign) and Carl Gunter (University of Illinois at Urbana-Champaign)
DeepTrust: An Automatic Framework to Detect Trustworthy Users in Opinion-based Systems Edoardo Serra (Boise State University), Anu Shrestha (Boise State University), Francesca Spezzano (Boise State University) and Anna Squicciarini (The Pennsylvania State University)
n-m-Variant Systems: Adversarial-Resistant Software Rejuvenation for Cloud-Based Web Applications Isaac Polinsky (North Carolina State University), Kyle Martin (North Carolina State University), William Enck (North Carolina State University) and Mike Reiter (The University of North Carolina at Chapel Hill)
DANdroid: A Multi-View Discriminative Adversarial Network for Obfuscated Android Malware Detection Stuart Millar (Queen's University of Belfast), Niall McLaughlin (Queen's University of Belfast), Jesus Martinez del Rincon (Queen's University of Belfast), Paul Miller (Queen's University of Belfast) and Ziming Zhao (Rochester Institute of Technology)
FridgeLock: Preventing Data Theft on Suspended Linux with Usable Memory Encryption Fabian Franzen (Technical University of Munich), Manuel Andreas (Technical University of Munich) and Manuel Huber (Fraunhofer)
MOSE: Practical Multi-User Oblivious Storage via Secure Enclaves Thang Hoang (University of South Florida), Rouzbeh Behnia (University of South Florida), Yeongjin Jang (Oregon State University) and Attila Yavuz (University of South Florida)
CREHMA: Cache-aware REST-ful HTTP Message Authentication Hoai Viet Nguyen (TH Köln) and Luigi Lo Iacono (Cologne University of Applied Sciences)
DeepDoor: Targeted Attack Against Convolutional Neural Networks via Stealthy Backdoor Injection Haoti Zhong (The Pennsylvania State University), Cong Liao (The Pennsylvania State University), Anna Squicciarini (The Pennsylvania State University), Sencun Zhu (The Pennsylvania State University) and David Miller (The Pennsylvania State University)
Attacking and Protecting Tunneled Traffic of Smart Home Devices Ahmed Alshehri (Colorado School of Mines), Jacob Granley (Colorado School of Mines) and Chuan Yue (Colorado School of Mines)
SeCaS: Secure Capability Sharing Framework for IoT Devices in a Structured P2P Network Angeliki Aktypi (University of Oxford), Kubra Kalkan (University of Oxford) and Kasper Rasmussen (University of Oxford)
TrustAV: Practical and Privacy Preserving Malware Analysis in the Cloud Dimitris Deyannis (FORTH), Eva Papadogiannaki (FORTH), George Kalivianakis (FORTH), Giorgos Vasiliadis (FORTH) and Sotiris Ioannidis (FORTH)
The Good, the Bad and the (Not So) Ugly of Out-Of-Band Authentication with eID Cards and Push Notifications: Design, Formal and Risk Analysis Marco Pernpruner (Fondazione Bruno Kessler), Roberto Carbone (Fondazione Bruno Kessler), Silvio Ranise (Fondazione Bruno Kessler) and Giada Sciarretta (Fondazione Bruno Kessler)
Explore the Transformation Space for Adversarial Images Jiyu Chen (University of California, Davis) and Hao Chen (University of California, Davis)
Tap-Pair: Using Spatial Secrets for Single-Tap Device Pairing of Augmented Reality Headsets Ivo Sluganovic (University of Oxford), Mihael Liskij (ETH Zurich), Ante Derek (University of Zagreb) and Ivan Martinovic (University of Oxford)
A Baseline for Attribute Disclosure Risk in Synthetic Data Markus Hittmeir (SBA Research), Rudolf Mayer (SBA Research) and Andreas Ekelhart (SBA Research)
Dissecting Android Cryptocurrency Miners Stanislav Dashevskyi (University of Luxembourg), Yury Zhauniarovich (Perfect Equanimity), Olga Gadyatskaya (University of Luxembourg), Aleksandr Pilgun (University of Luxembourg) and Hamza Ouhssain (University of Luxembourg)
Admin-CBAC: An Administration Model for Category-Based Access Control Clara Bertolissi (LIF-Universite Aix-Marseille 1 and King's College London), Maribel Fernandez (King's College London) and Bhavani Thuraisingham (The University of Texas at Dallas)
Efficient Private Disease Susceptibility Testing in Direct-to-Consumer Model Chibuike Ugwuoke (Delft University of Technology), Zekeriya Erkin (Delft University of Technology), Reginald Lagendijk (Delft University of Technology) and Marcel Reinders (Delft University of Technology)
Understanding Privacy Awareness in Android App Descriptions Using Deep Learning Johannes Feichtner (Graz University of Technology) and Stefan Gruber (Graz University of Technology)
Defensive Charging: Mitigating Power Side-Channel Attacks on Charging Smartphones Richard Matovu (Texas Tech University), Abdul Serwadda (Texas Tech University), Argenis V. Bilbao (U.S. Army Research Laboratory) and Isaac Griswold-Steiner (Texas Tech University)
Renyi Differentially Private ADMM for Non-Smooth Regularized Optimization Chen Chen (University of Georgia) and Jaewoo Lee (University of Georgia)
ZeroLender: Trustless Peer-to-Peer Bitcoin Lending Platform Yi Xie (Boise State University), Joshua Holmes (Boise State University) and Gaby G. Dagher (Boise State University)
IoT Expunge: Implementing Verifiable Retention of IoT Data Nisha Panwar (University of California, Irvine), Shantanu Sharma (University of California, Irvine), Peeyush Gupta (University of California, Irvine), Dhrubajyoti Ghosh (University of California, Irvine), Sharad Mehrotra (University of California, Irvine) and Nalini Venkatasubramanian (University of California, Irvine)