(Tool/dataset Paper) Building a commit-level dataset of real-world vulnerabilities |
Alexis Challande, Robin David and Guénaël Renault. |
Quantifying the Risk of Wormhole Attacks on Bluetooth Contact Tracing |
Stefan Czybik, Daniel Arp and Konrad Rieck. |
Toward Deep Learning Based Access Control |
Mohammad Nur Nobi, Ram Krishnan, Yufei Huang, Mehrnoosh Shakarami and Ravi Sandhu. |
Leveraging Disentangled Representations to Improve Keystroke Inference Attacks Under Low Data Constraints |
John Lim, Jan-Michael Frahm and Fabian Monrose. |
NEUTRON: A Graph-based Pipeline for Zero-Trust Network Architectures |
Charalampos Katsis, Fabrizio Cicala, Dan Thomsen, Nathan Ringo and Elisa Bertino. |
Cache Shaping: An Effective Defense Against Cache-Based Website Fingerprinting |
Haipeng Li, Nan Niu and Boyang Wang. |
Landmark privacy: Configurable differential privacy protection for time series |
Manos Katsomallos, Katerina Tzompanaki and Dimitris Kotzinos. |
ReSIL: Revivifying Function Signature Inference using Deep Learning with Domain-Specific Knowledge |
Yan Lin, Debin Gao and David Lo. |
GINN: Fast GPU-TEE Based Integrity for Neural Network Training |
Aref Asvadishirehjini, Murat Kantarcioglu and Bradley Malin. |
Securing Smart Grids Through an Incentive Mechanism for Blockchain-Based Data Sharing |
Daniel Reijsbergen, Aung Maw, Anh Dinh, Yuen Chau and Wentai Li. |
(Tool/dataset Paper) A modular and extensible framework for securing TLS |
Matteo Rizzi, Salvatore Manfredi, Giada Sciarretta and Silvio Ranise. |
(Tool/dataset Paper) Hardening with Scapolite: A DevOps-based Approach for Improved Authoring, Maintaining, and Testing of Security-Configuration Guides in Large-Scale Organizations |
Patrick Stöckle, Ionuț Pruteanu, Bernd Grobauer and Alexander Pretschner. |
A TOCTOU Attack on DICE Attestation |
Stefan Hristozov, Moritz Wettermann and Manuel Huber. |
Recovering Structure of Input of a Binary Program |
Seshagiri Prabhu Narasimha and Arun Lakhotia. |
Towards Practical Privacy-Preserving Kidney Exchange |
Malte Breuer, Ulrike Meyer and Susanne Wetzel. |
EG-Booster: Explanation-Guided Booster of ML Evasion Attacks |
Abderrahmen Amich and Birhanu Eshete. |
Security Analysis of IoT Frameworks using Static Taint Analysis |
Tuba Yavuz and Christopher Brant. |
Prediction of Mobile App Privacy Preferences with User Profilesvia Federated Learning |
André Brandão, Ricardo Mendes and Joao P. Vilela. |
DP-UTIL: Comprehensive Utility Analysis of Differential Privacy in Machine Learning |
Ismat Jarin and Birhanu Eshete. |
Private Lives Matter: A Differential Private Functional Encryption Scheme |
Alexandros Bakas, Antonis Michalas and Tassos Dimitriou. |
ProSPEC: Proactive Security Policy Enforcement for Containers |
Hugo Kermabon-Bobinnec, Mahmood Gholipourchoubeh, Sima Bagheri, Suryadipta Majumdar, Yosr Jarraya, Makan Pourzandi and Lingyu Wang. |
(Tool/dataset Paper) Shared Multi-Keyboard and Bilingual Datasets to Support Keystroke Dynamics Research |
Ahmed Wahab and Daqing Hou. |
Towards Automated Content-based Photo Privacy Control in User-Centered Social Networks |
Nishant Vishwamitra, Yifang Li, Hongxin Hu, Kelly Caine, Long Cheng, Ziming Zhao and Gail-Joon Ahn. |
RS-PKE: Ranked Searchable Public-Key Encryption for Cloud-Assisted Lightweight Platforms |
Israt Jahan Mouri, Muhammad Ridowan and Muhammad Abdullah Adnan. |
Genomic Data Sharing under Dependent Local Differential Privacy |
Emre Yilmaz, Tianxi Ji, Erman Ayday and Pan Li. |
Toward a Resilient Key Exchange Protocol for IoT
|
Zhangxiang Hu, Jun Li, Samuel Mergendahl and Christopher Wilson. |
Efficient Dynamic Searchable Encryption with Forward Privacy under the Decent Leakage |
Yohei Watanabe, Kazuma Ohara, Mitsugu Iwamoto and Kazuo Ohta. |
Parallel Operations over TFHE-Encrypted Multi-Digit Integers |
Jakub Klemsa and Melek Önen. |
Towards Resiliency of Heavy Vehicles through Compromised Sensor Data Reconstruction |
Hossein Shirazi, William Pickard, Indrakshi Ray and Haonan Wang. |
Leveraging Synthetic Data and PU Learning For Phishing Email Detection |
Fatima Zahra Qachfar, Rakesh Verma and Arjun Mukherjee. |