Star 0

Talks

Title Humans
GenoGuard: Protecting Genomic Data Against Brute-Force Attacks Ecole Polytechnique Federale de Lausanne
Security of the J-PAKE Password-Authenticated Key Exchange Protocol ENS Paris
Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems University of Texas at Austin
Using Hardware Features for Increased Debugging Transparency George Mason University
Ad Injection at Scale: Assessing Deceptive Advertisement Modifications Google Inc.
Micro-Policies: Formally Verified, Tag-Based Security Monitors University of Pennsylvania
High System-Code Security with Low Overhead Ecole Polytechnique Fédérale de Lausanne
Riposte: An Anonymous Messaging System Handling Millions of Users Stanford University
Last-Level Cache Side-Channel Attacks are Practical Princeton University
Missing the Point(er): On the Effectiveness of Code Pointer Integrity MIT Lincoln Laboratory
SoK: Deep Packer Inspection: A Longitudinal Study of the Complexity of Run-Time Packers Xabier Ugarte-Pedrero , University of Deusto
Malicious-Client Security in Blind Seer: A Scalable Private DBMS Columbia University
Bitcoin over Tor isn't a good idea University of Luxembourg
Caelus: Verifying the Consistency of Cloud Services with Battery-Powered Devices University of Toronto
Readactor: Practical Code Randomization Resilient to Memory Disclosure Stephen Crane , University of California, Irvine
Privacy and Access Control for Outsourced Personal Records Saarland University, CISPA
VC3: Trustworthy Data Analytics in the Cloud using SGX Ruhr-Universität Bochum
A Messy State of the Union: Taming the Composite State Machines of TLS Benjamin Beurdouche , INRIA
Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs Technion
Securing Multiparty Online Services via Certification of Symbolic Transactions Carnegie Mellon University
Secure Track Verification University of Kaiserslautern, Germany
SoK: Secure Messaging University of Waterloo
Towards Making Systems Forget with Machine Unlearning Columbia University
GraphSC: Parallel Secure Computation Made Easy University Of Maryland
TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits Rice University
Program-Adaptive Mutational Fuzzing Sang Kil Cha , Carnegie Mellon University
ADSNARK: Nearly Practical and Privacy-Preserving Proofs on Authenticated Data CISPA , Saarland University
How Secure and Quick is QUIC? Provable Security and Performance Analyses Lincoln Lab
What the App is That? Deception and Countermeasures in the Android User Interface University of California, Santa Barbara
Connection-Oriented DNS to Improve Privacy and Security USC/ISI
SoK: A comprehensive analysis of game-based ballot privacy definitions
Leave Me Alone: App-level Protection Against Runtime Information Gathering on Android Nan Zhang , Indiana University, Bloomington
S$A: A Shared Cache Attack that Works Across Cores and Defies VM Sandboxing—and its Application to AES Gorka Irazoqui , Worcester Polytechnic Institute
Effective Real-time Android Application Auditing McGill University
Geppetto: Versatile Verifiable Computation Microsoft Research
ObliVM: A Programming Framework for Secure Computation University of Maryland
Cracking-Resistant Password Vaults using Natural Language Encoders University of Wisconsin
On Subnormal Floating Point and Abnormal Timing UC San Diego
SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies Princeton University
CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization University of Cambridge
The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching IMDEA Software Institute Spain
Every Second Counts: Quantifying the Negative Externalities of Cybercrime via Typosquatting University of Illinois at Chicago
Virtual Proofs of Reality and Their Physical Implementation
The Miner's Dilemma
Post-quantum key exchange for the TLS protocol from the ring learning with errors problem NXP Semiconductors
Cross-Architecture Bug Search in Binary Executables Ruhr-University Bochum , HGI
Vetting SSL Usage in Applications with SSLINT Zhejiang University
A Generic Approach to Automatic Deobfuscation of Executable Code University of Arizona
Understanding and Monitoring Embedded Web Scripts University of Virginia
Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications Ruhr-Universität Bochum
Protecting Private Keys against Memory Disclosure Attacks using Hardware Transactional Memory Chinese Academy of Sciences
Automatic Inference of Search Patterns for Taint-Style Vulnerabilities Fabian Yamaguchi , University of Goettingen
Temporal Lensing and its Application in Pulsing Denial-of-Service Attacks UC Berkeley, ICSI
Forward Secure Asynchronous Messaging from Puncturable Encryption JHU
SurroundWeb: Mitigating Privacy Concerns in a 3D Web Browser University of Massachusetts