Star 0


Title Humans
Tracking Ransomware End-to-end Princeton University
Distance-Bounding Protocols: Verification without Time and Location University of Luxembourg
vRAM: Faster Verifiable RAM With Program-Independent Preprocessing University of Maryland
A Formal Treatment of Accountable Proxying over TLS Karthikeyan Bhargavan
seL4-US Center of Excellence Grand Opening Intelligent Automation Inc
On the Economics of Offline Password Cracking Purdue University
Study and Mitigation of Origin Stripping Vulnerabilities in Hybrid-postMessage Enabled Mobile Applications
Understanding Linux Malware Emanuele Cozzi , Eurecom
SoK: Keylogging Side Channels U.S. Army Research Laboratory
FPGA-Based Remote Power Side-Channel Attacks
Angora: Efficient Fuzzing by Principled Search
A Tale of Two Studies: The Best and Worst of YubiKey Usability University of Illinois at Urbana-Champaign
Sonar: Detecting SS7 Redirection Attacks With Audio-Based Distance Bounding University of Florida
Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes University of Maryland
Secure Device Bootstrapping without Secrets Resistant to Signal Manipulation Attacks University of Arizona
Racing in Hyperspace: Closing Hyper-Threading Side Channels on SGX with Contrived Data Races The Ohio State University
SoK: "Plug & Pray" Today - Understanding USB Insecurity in Versions 1 through C University of Florida
Blue Note: How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems University of Michigan
EyeTell: Video-Assisted Touchscreen Keystroke Inference from Eye Movements Arizona State University
Privacy Risks with Facebook's PII-based Targeting: Auditing a Data Broker's Advertising Interface Northeastern University
The Spyware Used in Intimate Partner Violence Cornell Tech
Encouraging Diversity in Security and Privacy Research and a report on GREPSEC: A Workshop for Women in Computer Security Research
Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPU Pietro Frigo , Vrije Universiteit Amsterdam
FuturesMEX: Secure, Distributed Futures Market Exchange Fabio Massacci
Static Evaluation of Noninterference using Approximate Model Counting University of North Carolina at Chapel Hill
The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators CISPA , Saarland University
Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels Georgia Institute of Technology
Digital Forensics, Digital Futures - SADFE 2018
Another Flip in the Wall of Rowhammer Defenses Daniel Gruss , Graz University of Technology , Graz
CollAFL: Path Sensitive Fuzzing
Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System Singapore University of Technology and Design
Kangacrypt 2018 Yuval Yarom , Data61 , University of Adelaide
FP-STALKER: Tracking Browser Fingerprint Evolutions Along Time
Mobile Application Web API Reconnaissance: Web-to-Mobile Inconsistencies & Vulnerabilities
Secure Two-party Threshold ECDSA from ECDSA Assumptions Northeastern University
Speechless: Analyzing the Threat to Speech Privacy from Smartphone Motion Sensors University of Alabama at Birmingham
IEEE SecDev 2018
Bulletproofs: Short Proofs for Confidential Transactions and More Stanford University
Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks Kai Jansen , Ruhr-University Bochum
DEEPSEC: Deciding Equivalence Properties in Security Protocols -- Theory and Practice
Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning Northeastern University
T-Fuzz: fuzzing by program transformation Purdue University
Compiler-assisted Code Randomization Stony Brook
Efficiently Authenticated Data Storage with Blockchain
Impact Analysis of Vulnerabilities on Business Processes in a Cloud Environment
Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage Royal Holloway , University of London
Do You Feel What I Hear? Enabling Autonomous IoT Device Pairing using Different Sensor Types Carnegie Mellon University
Protecting the Stack with Metadata Policies and Tagged Hardware University of Pennsylvania
Computer Security and Privacy for Refugees in the United States University of Washington
On Enforcing the Digital Immunity of a Large Humanitarian Organization École Polytechnique Fédérale de Lausanne
Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency --- Choose Two Purdue University
EnclaveDB: A Secure Database using SGX
A Machine Learning Approach To Prevent Malicious Calls Over Telephony Networks Shanghai Jiao Tong University
Oblix: An Efficient Oblivious Search Index UC Berkeley
Routing Around Congestion: Defeating DDoS Attacks and Adverse Network Conditions via Reactive BGP Routing University of Tennessee
xJsnark: A Framework for Efficient Verifiable Computation University of Maryland
PIR with Compressed Queries and Amortized Query Processing NYU
Stealing Hyperparameters in Machine Learning Iowa State University
Surveylance: Automatically Detecting Online Survey Scams University of Illinois Urbana-Champaign
Towards Security and Privacy for Multi-User Augmented Reality: Foundations with End Users University of Washington
The Cards Aren't Alright: Detecting Counterfeit Gift Cards Using Encoding Jitter University of Florida
Locally Differentially Private Frequent Itemset Mining Purdue University
OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding École Polytechnique Fédérale de Lausanne
AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation ETH Zürich
Droplet: Decentralized Authorization for IoT Data Streams ETH Zurich
When Your Fitness Tracker Betrays You: Quantifying the Predictability of Biometric Features Across Contexts University of Oxford
Implementing Conjunction Obfuscation under Entropic Ring LWE
Doubly-efficient zkSNARKs without trusted setup
Impossibility of Precise and Sound Termination-Sensitive Security Enforcements INRIA, France
Enumerating Active IPv6 Hosts for Large-scale Security Scans via DNSSEC-signed Reverse Zones Kevin Borgolte , University of California, Santa Barbara
Processing Publicly Disclosed Personal Data According to the GDPR - A Nole in the Privacy Regulation Framework University College Dublin
Tracking Certificate Misissuance in the Wild University of Illinois Urbana-Champaign
Let "The Hulk" Protect Your Personal Information University of New South Wales
Towards Image Privacy against Automated Classifiers Oregon State University