Computer security paper
Paper list
Paper list
1154
A Framework for Universally Composable Diffie-Hellman Key Exchange
1155
A Lustrum of Malware Network Communication: Evolution and Insights
1156
An Experimental Security Analysis of an Industrial Robot Controller
1157
Augur: Internet-Wide Detection of Connectivity Disruptions
1158
Backward-bounded DSE: Targeting Infeasibility Questions on Obfuscated Codes
1159
CRLite: A Scalable System for Pushing All TLS Revocations to All Browsers
1160
Catena: Efficient Non-equivocation via Bitcoin
1161
Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop
1162
CoSMeDis: A Distributed Social Media Platform with Formally Verified Confidentiality Guarantees
1163
Comparing the Usability of Cryptographic APIs
1164
Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks
1165
Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping
1166
Finding and Preventing Bugs in JavaScript Bindings
1167
From Trash to Treasure: Timing-Sensitive Garbage Collection
1168
HVLearn: Automated Black-box Analysis of Hostname Verification in SSL/TLS Implementations
1169
Hardening Java's Access Control by Abolishing Implicit Privilege Elevation
1170
Hijacking Bitcoin: Routing Attacks on Cryptocurrencies
1171
How They Did It: An Analysis of Emission Defeat Devices in Modern Automobiles
1172
How to Learn Klingon Without Dictionary: Detection and Measurement of Black Keywords Used by Underground Economy
1173
IKP: Turning a PKI Around with Decentralized Automated Incentives
1174
IVD: Automatic Learning and Enforcement of Authorization Rules in Online Social Networks
1175
Identifying Personal DNA Methylation Profiles by Genotype Inference
1176
Implementing and Proving the TLS 1.3 Record Layer
1177
IoT Goes Nuclear: Creating a Zigbee Chain Reaction
1178
Is Interaction Necessary for Distributed Private Learning?
1179
Leakage-Abuse Attacks on Order-Revealing Encryption
1180
Machine-Checked Proofs of Privacy for Electronic Voting Protocols
1181
Membership Inference Attacks against Machine Learning Models
1182
Multi-touch Authentication Using Hand Geometry and Behavioral Information
1183
NEZHA: Efficient Domain-independent Differential Testing
1184
Norax: Enabling Execute-Only Memory for COTS Binaries on AArch64
1185
Obstacles to the Adoption of Secure Communication Tools
1186
One TPM to Bind Them All: Fixing TPM2.0 for Provably Secure Anonymous Attestation
1187
Optimized Honest-Majority MPC for Malicious Adversaries - Breaking the 1 Billion-Gate Per Second Barrier
1188
Protecting Bare-metal Embedded Systems with Privilege Overlays
1189
Pyramid: Enhancing Selectivity in Big Data Protection with Count Featurization
1190
Scalable Bias-Resistant Distributed Randomness
1191
SecureML: A System for Scalable Privacy-Preserving Machine Learning
1192
Securing Augmented Reality Output
1193
Side-Channel Attacks on Shared Search Indexes
1194
Skyfire: Data-Driven Seed Generation for Fuzzing
1195
SmarPer: Context-Aware and Automatic Runtime-Permissions for Mobile Devices
1196
SoK: Cryptographically Protected Database Search
1197
SoK: Exploiting Network Printers
1198
SoK: Science, Security, and the Elusive Goal of Security as a Scientific Pursuit
1199
Spotless Sandboxes: Evading Malware Analysis Systems using Wear-and-Tear Artifacts
1200
Stack Overflow Considered Harmful? --- The Impact of Copy&Paste on Android Application Security
1201
SymCerts: Practical Symbolic Execution For Exposing Noncompliance in X.509 Certificate Validation Implementations
1202
SysPal:System-guided Pattern Locks for Android
1203
The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences
1204
The Password Reset MitM Attack
1205
To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild
1206
Towards Evaluating the Robustness of Neural Networks
1207
Under the Shadow of Sunshine: Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider Networks
1208
VUDDY: A Scalable Approach for Vulnerable Code Clone Discovery
1209
Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate
1210
Verifying and Synthesizing Constant-Resource Implementations with Types
1211
XHOUND: Quantifying the Fingerprintability of Browser Extensions
1212
Your Exploit is Mine: Automatic Shellcode Transplant for Remote Exploits
1213
vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases