Tracking Ransomware End-to-end
|
Princeton University
|
Distance-Bounding Protocols: Verification without Time and Location
|
University of Luxembourg
|
vRAM: Faster Verifiable RAM With Program-Independent Preprocessing
|
University of Maryland
|
A Formal Treatment of Accountable Proxying over TLS
|
Karthikeyan Bhargavan
|
seL4-US Center of Excellence Grand Opening
|
Intelligent Automation Inc
|
On the Economics of Offline Password Cracking
|
Purdue University
|
Study and Mitigation of Origin Stripping Vulnerabilities in Hybrid-postMessage Enabled Mobile Applications
|
|
Understanding Linux Malware
|
Emanuele Cozzi
,
Eurecom
|
SoK: Keylogging Side Channels
|
U.S. Army Research Laboratory
|
FPGA-Based Remote Power Side-Channel Attacks
|
|
Angora: Efficient Fuzzing by Principled Search
|
|
A Tale of Two Studies: The Best and Worst of YubiKey Usability
|
University of Illinois at Urbana-Champaign
|
Sonar: Detecting SS7 Redirection Attacks With Audio-Based Distance Bounding
|
University of Florida
|
Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes
|
University of Maryland
|
Secure Device Bootstrapping without Secrets Resistant to Signal Manipulation Attacks
|
University of Arizona
|
Racing in Hyperspace: Closing Hyper-Threading Side Channels on SGX with Contrived Data Races
|
The Ohio State University
|
SoK: "Plug & Pray" Today - Understanding USB Insecurity in Versions 1 through C
|
University of Florida
|
Blue Note: How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems
|
University of Michigan
|
EyeTell: Video-Assisted Touchscreen Keystroke Inference from Eye Movements
|
Arizona State University
|
Privacy Risks with Facebook's PII-based Targeting: Auditing a Data Broker's Advertising Interface
|
Northeastern University
|
The Spyware Used in Intimate Partner Violence
|
Cornell Tech
|
Encouraging Diversity in Security and Privacy Research and a report on GREPSEC: A Workshop for Women in Computer Security Research
|
|
Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPU
|
Pietro Frigo
,
Vrije Universiteit Amsterdam
|
FuturesMEX: Secure, Distributed Futures Market Exchange
|
Fabio Massacci
|
Static Evaluation of Noninterference using Approximate Model Counting
|
University of North Carolina at Chapel Hill
|
The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators
|
CISPA
,
Saarland University
|
Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels
|
Georgia Institute of Technology
|
Digital Forensics, Digital Futures - SADFE 2018
|
|
Another Flip in the Wall of Rowhammer Defenses
|
Daniel Gruss
,
Graz University of Technology
,
Graz
|
CollAFL: Path Sensitive Fuzzing
|
|
Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System
|
Singapore University of Technology and Design
|
Kangacrypt 2018
|
Yuval Yarom
,
Data61
,
University of Adelaide
|
FP-STALKER: Tracking Browser Fingerprint Evolutions Along Time
|
|
Mobile Application Web API Reconnaissance: Web-to-Mobile Inconsistencies & Vulnerabilities
|
|
Secure Two-party Threshold ECDSA from ECDSA Assumptions
|
Northeastern University
|
Speechless: Analyzing the Threat to Speech Privacy from Smartphone Motion Sensors
|
University of Alabama at Birmingham
|
IEEE SecDev 2018
|
|
Bulletproofs: Short Proofs for Confidential Transactions and More
|
Stanford University
|
Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks
|
Kai Jansen
,
Ruhr-University Bochum
|
DEEPSEC: Deciding Equivalence Properties in Security Protocols -- Theory and Practice
|
|
Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning
|
Northeastern University
|
T-Fuzz: fuzzing by program transformation
|
Purdue University
|
Compiler-assisted Code Randomization
|
Stony Brook
|
Efficiently Authenticated Data Storage with Blockchain
|
|
Impact Analysis of Vulnerabilities on Business Processes in a Cloud Environment
|
|
Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage
|
Royal Holloway
,
University of London
|
Do You Feel What I Hear? Enabling Autonomous IoT Device Pairing using Different Sensor Types
|
Carnegie Mellon University
|
Protecting the Stack with Metadata Policies and Tagged Hardware
|
University of Pennsylvania
|
Computer Security and Privacy for Refugees in the United States
|
University of Washington
|
On Enforcing the Digital Immunity of a Large Humanitarian Organization
|
École Polytechnique Fédérale de Lausanne
|
Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency --- Choose Two
|
Purdue University
|
EnclaveDB: A Secure Database using SGX
|
|
A Machine Learning Approach To Prevent Malicious Calls Over Telephony Networks
|
Shanghai Jiao Tong University
|
Oblix: An Efficient Oblivious Search Index
|
UC Berkeley
|
Routing Around Congestion: Defeating DDoS Attacks and Adverse Network Conditions via Reactive BGP Routing
|
University of Tennessee
|
xJsnark: A Framework for Efficient Verifiable Computation
|
University of Maryland
|
PIR with Compressed Queries and Amortized Query Processing
|
NYU
|
Stealing Hyperparameters in Machine Learning
|
Iowa State University
|
Surveylance: Automatically Detecting Online Survey Scams
|
University of Illinois Urbana-Champaign
|
Towards Security and Privacy for Multi-User Augmented Reality: Foundations with End Users
|
University of Washington
|
The Cards Aren't Alright: Detecting Counterfeit Gift Cards Using Encoding Jitter
|
University of Florida
|
Locally Differentially Private Frequent Itemset Mining
|
Purdue University
|
OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding
|
École Polytechnique Fédérale de Lausanne
|
AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation
|
ETH Zürich
|
Droplet: Decentralized Authorization for IoT Data Streams
|
ETH Zurich
|
When Your Fitness Tracker Betrays You: Quantifying the Predictability of Biometric Features Across Contexts
|
University of Oxford
|
Implementing Conjunction Obfuscation under Entropic Ring LWE
|
|
Doubly-efficient zkSNARKs without trusted setup
|
|
Impossibility of Precise and Sound Termination-Sensitive Security Enforcements
|
INRIA, France
|
Enumerating Active IPv6 Hosts for Large-scale Security Scans via DNSSEC-signed Reverse Zones
|
Kevin Borgolte
,
University of California, Santa Barbara
|
Processing Publicly Disclosed Personal Data According to the GDPR - A Nole in the Privacy Regulation Framework
|
University College Dublin
|
Tracking Certificate Misissuance in the Wild
|
University of Illinois Urbana-Champaign
|
Let "The Hulk" Protect Your Personal Information
|
University of New South Wales
|
Towards Image Privacy against Automated Classifiers
|
Oregon State University
|