Computer security paper
Paper list
Paper list
1099
A Method for Verifying Privacy-Type Properties: The Unbounded Case
1100
A Practical Oblivious Map Data Structure with Secure Deletion and History Independence
1101
A Tough call: Mitigating Advanced Code-Reuse Attacks At The Binary Level
1102
A2: Analog Malicious Hardware
1103
Algorithmic Transparency via Quantitative Input Influence: Theory and Experiments with Learning Systems
1104
Automated Analysis and Verification of TLS 1.3: 0-RTT, Resumption and Delayed Authentication
1105
Back in Black: Towards Formal, Black Box Analysis of Sanitizers and Filters
1106
Beauty and the Beast: Diverting modern web browsers to build unique browser fingerprints
1107
CaSE: Cache-Assisted Secure Execution on ARM Processors
1108
Cache Storage Channels: Alias-Driven Attacks and Verified Countermeasures
1109
Cinderella: Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with the Magic of Verifiable Computation
1110
Cloak of Visibility: Detecting When Machines Browse a Different Web
1111
Data-Oriented Programming: On the Expressiveness of Non-Control Data Attacks
1112
Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector
1113
Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks
1114
Domain-Z: 28 Registrations Later
1115
Downgrade Resilience in Key-Exchange Protocols
1116
Following Devil's Footprints: Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS
1117
HDFI: Hardware-Assisted Data-Flow Isolation
1118
Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts
1119
Helping Johnny to Analyze Malware: A Usability-Optimized Decompiler and Malware Analysis User Study
1120
High-Speed Inter-domain Fault Localization
1121
I Think They're Trying to Tell Me Something: Advice Sources and Selection for Digital Security
1122
Inferring User Routes and Locations using Zero-Permission Mobile Sensors
1123
Keeping Authorities "Honest or Bust" with Decentralized Witness Cosigning
1124
Key Confirmation in Key Exchange: A Formal Treatment and Implications for TLS 1.3
1125
LAVA: Large-scale Automated Vulnerability Addition
1126
MitM Attack by Name Collision: Cause Analysis and Vulnerability Assessment in the New gTLD Era
1127
Multiple Handshakes Security of TLS 1.3 Candidates
1128
No Pardon for the Interruption: New Inference Attacks on Android Through Interrupt Timing Analysis
1129
On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud
1130
PhotoProof: Cryptographic Image Authentication for Any Set of Permissible Transformations
1131
Prepose: Privacy, Security, and Reliability for Gesture-Based Programming
1132
Return to the Zombie Gadgets: Undermining Destructive Code Reads via Code-Inference Attacks
1133
Revisiting Square Root ORAM: Efficient Random Access in Multi-Party Computation
1134
Security Analysis of Emerging Smart Home Applications
1135
Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search
1136
Sending out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways
1137
Shreds: Fine-grained Execution Units with Private Memory
1138
SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis
1139
SoK: Everyone Hates Robocalls: A Survey of Techniques against Telephone Spam
1140
SoK: Lessons Learned From Android Security Research For Appified Software Platforms
1141
SoK: Towards Grounding Censorship Circumvention in Empiricism
1142
SoK: Verifiability Notions for E-Voting Protocols
1143
Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf
1144
Synthesizing Plausible Privacy-Preserving Location Traces
1145
Talos: Neutralizing Vulnerabilities with Security Workarounds for Rapid Response
1146
TaoStore: Overcoming Asynchronicity in Oblivious Data Storage
1147
The Cracked Cookie Jar: HTTP Cookie Hijacking and the Exposure of Private Information
1148
TriggerScope: Towards Detecting Logic Bombs in Android Applications
1149
Users Really Do Plug in USB Drives They Find
1150
Verena: End-to-End Integrity Protection for Web Applications
1151
Verifiable ASICs
1152
You Get Where You're Looking For: The Impact Of Information Sources On Code Security
1153
pASSWORD tYPOS and How to Correct Them Securely