GenoGuard: Protecting Genomic Data Against Brute-Force Attacks
|
Ecole Polytechnique Federale de Lausanne
|
Security of the J-PAKE Password-Authenticated Key Exchange Protocol
|
ENS Paris
|
Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems
|
University of Texas at Austin
|
Using Hardware Features for Increased Debugging Transparency
|
George Mason University
|
Ad Injection at Scale: Assessing Deceptive Advertisement Modifications
|
Google Inc.
|
Micro-Policies: Formally Verified, Tag-Based Security Monitors
|
University of Pennsylvania
|
High System-Code Security with Low Overhead
|
Ecole Polytechnique Fédérale de Lausanne
|
Riposte: An Anonymous Messaging System Handling Millions of Users
|
Stanford University
|
Last-Level Cache Side-Channel Attacks are Practical
|
Princeton University
|
Missing the Point(er): On the Effectiveness of Code Pointer Integrity
|
MIT Lincoln Laboratory
|
SoK: Deep Packer Inspection: A Longitudinal Study of the Complexity of Run-Time Packers
|
Xabier Ugarte-Pedrero
,
University of Deusto
|
Malicious-Client Security in Blind Seer: A Scalable Private DBMS
|
Columbia University
|
Bitcoin over Tor isn't a good idea
|
University of Luxembourg
|
Caelus: Verifying the Consistency of Cloud Services with Battery-Powered Devices
|
University of Toronto
|
Readactor: Practical Code Randomization Resilient to Memory Disclosure
|
Stephen Crane
,
University of California, Irvine
|
Privacy and Access Control for Outsourced Personal Records
|
Saarland University, CISPA
|
VC3: Trustworthy Data Analytics in the Cloud using SGX
|
Ruhr-Universität Bochum
|
A Messy State of the Union: Taming the Composite State Machines of TLS
|
Benjamin Beurdouche
,
INRIA
|
Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs
|
Technion
|
Securing Multiparty Online Services via Certification of Symbolic Transactions
|
Carnegie Mellon University
|
Secure Track Verification
|
University of Kaiserslautern, Germany
|
SoK: Secure Messaging
|
University of Waterloo
|
Towards Making Systems Forget with Machine Unlearning
|
Columbia University
|
GraphSC: Parallel Secure Computation Made Easy
|
University Of Maryland
|
TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits
|
Rice University
|
Program-Adaptive Mutational Fuzzing
|
Sang Kil Cha
,
Carnegie Mellon University
|
ADSNARK: Nearly Practical and Privacy-Preserving Proofs on Authenticated Data
|
CISPA
,
Saarland University
|
How Secure and Quick is QUIC? Provable Security and Performance Analyses
|
Lincoln Lab
|
What the App is That? Deception and Countermeasures in the Android User Interface
|
University of California, Santa Barbara
|
Connection-Oriented DNS to Improve Privacy and Security
|
USC/ISI
|
SoK: A comprehensive analysis of game-based ballot privacy definitions
|
|
Leave Me Alone: App-level Protection Against Runtime Information Gathering on Android
|
Nan Zhang
,
Indiana University, Bloomington
|
S$A: A Shared Cache Attack that Works Across Cores and Defies VM Sandboxing—and its Application to AES
|
Gorka Irazoqui
,
Worcester Polytechnic Institute
|
Effective Real-time Android Application Auditing
|
McGill University
|
Geppetto: Versatile Verifiable Computation
|
Microsoft Research
|
ObliVM: A Programming Framework for Secure Computation
|
University of Maryland
|
Cracking-Resistant Password Vaults using Natural Language Encoders
|
University of Wisconsin
|
On Subnormal Floating Point and Abnormal Timing
|
UC San Diego
|
SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies
|
Princeton University
|
CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization
|
University of Cambridge
|
The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching
|
IMDEA Software Institute Spain
|
Every Second Counts: Quantifying the Negative Externalities of Cybercrime via Typosquatting
|
University of Illinois at Chicago
|
Virtual Proofs of Reality and Their Physical Implementation
|
|
The Miner's Dilemma
|
|
Post-quantum key exchange for the TLS protocol from the ring learning with errors problem
|
NXP Semiconductors
|
Cross-Architecture Bug Search in Binary Executables
|
Ruhr-University Bochum
,
HGI
|
Vetting SSL Usage in Applications with SSLINT
|
Zhejiang University
|
A Generic Approach to Automatic Deobfuscation of Executable Code
|
University of Arizona
|
Understanding and Monitoring Embedded Web Scripts
|
University of Virginia
|
Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications
|
Ruhr-Universität Bochum
|
Protecting Private Keys against Memory Disclosure Attacks using Hardware Transactional Memory
|
Chinese Academy of Sciences
|
Automatic Inference of Search Patterns for Taint-Style Vulnerabilities
|
Fabian Yamaguchi
,
University of Goettingen
|
Temporal Lensing and its Application in Pulsing Denial-of-Service Attacks
|
UC Berkeley, ICSI
|
Forward Secure Asynchronous Messaging from Puncturable Encryption
|
JHU
|
SurroundWeb: Mitigating Privacy Concerns in a 3D Web Browser
|
University of Massachusetts
|