Computer security paper
Paper list
Paper list
1214
A Formal Treatment of Accountable Proxying over TLS
1215
A Machine Learning Approach To Prevent Malicious Calls Over Telephony Networks
1216
A Tale of Two Studies: The Best and Worst of YubiKey Usability
1217
AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation
1218
Angora: Efficient Fuzzing by Principled Search
1219
Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency --- Choose Two
1220
Another Flip in the Wall of Rowhammer Defenses
1221
Blue Note: How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems
1222
Bulletproofs: Short Proofs for Confidential Transactions and More
1223
CollAFL: Path Sensitive Fuzzing
1224
Compiler-assisted Code Randomization
1225
Computer Security and Privacy for Refugees in the United States
1226
Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks
1227
DEEPSEC: Deciding Equivalence Properties in Security Protocols -- Theory and Practice
1228
Distance-Bounding Protocols: Verification without Time and Location
1229
Do You Feel What I Hear? Enabling Autonomous IoT Device Pairing using Different Sensor Types
1230
Doubly-efficient zkSNARKs without trusted setup
1231
EnclaveDB: A Secure Database using SGX
1232
Enumerating Active IPv6 Hosts for Large-scale Security Scans via DNSSEC-signed Reverse Zones
1233
EyeTell: Video-Assisted Touchscreen Keystroke Inference from Eye Movements
1234
FP-STALKER: Tracking Browser Fingerprint Evolutions Along Time
1235
FPGA-Based Remote Power Side-Channel Attacks
1236
FuturesMEX: Secure, Distributed Futures Market Exchange
1237
Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPU
1238
Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes
1239
Implementing Conjunction Obfuscation under Entropic Ring LWE
1240
Impossibility of Precise and Sound Termination-Sensitive Security Enforcements
1241
Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage
1242
Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System
1243
Locally Differentially Private Frequent Itemset Mining
1244
Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning
1245
Mobile Application Web API Reconnaissance: Web-to-Mobile Inconsistencies & Vulnerabilities
1246
Oblix: An Efficient Oblivious Search Index
1247
OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding
1248
On Enforcing the Digital Immunity of a Large Humanitarian Organization
1249
On the Economics of Offline Password Cracking
1250
PIR with Compressed Queries and Amortized Query Processing
1251
Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels
1252
Privacy Risks with Facebook's PII-based Targeting: Auditing a Data Broker's Advertising Interface
1253
Protecting the Stack with Metadata Policies and Tagged Hardware
1254
Racing in Hyperspace: Closing Hyper-Threading Side Channels on SGX with Contrived Data Races
1255
Routing Around Congestion: Defeating DDoS Attacks and Adverse Network Conditions via Reactive BGP Routing
1256
Secure Device Bootstrapping without Secrets Resistant to Signal Manipulation Attacks
1257
Secure Two-party Threshold ECDSA from ECDSA Assumptions
1258
SoK: "Plug & Pray" Today - Understanding USB Insecurity in Versions 1 through C
1259
SoK: Keylogging Side Channels
1260
Sonar: Detecting SS7 Redirection Attacks With Audio-Based Distance Bounding
1261
Speechless: Analyzing the Threat to Speech Privacy from Smartphone Motion Sensors
1262
Static Evaluation of Noninterference using Approximate Model Counting
1263
Stealing Hyperparameters in Machine Learning
1264
Study and Mitigation of Origin Stripping Vulnerabilities in Hybrid-postMessage Enabled Mobile Applications
1265
Surveylance: Automatically Detecting Online Survey Scams
1266
T-Fuzz: fuzzing by program transformation
1267
The Cards Aren't Alright: Detecting Counterfeit Gift Cards Using Encoding Jitter
1268
The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators
1269
The Spyware Used in Intimate Partner Violence
1270
Towards Security and Privacy for Multi-User Augmented Reality: Foundations with End Users
1271
Tracking Certificate Misissuance in the Wild
1272
Tracking Ransomware End-to-end
1273
Understanding Linux Malware
1274
When Your Fitness Tracker Betrays You: Quantifying the Predictability of Biometric Features Across Contexts
1275
vRAM: Faster Verifiable RAM With Program-Independent Preprocessing
1276
xJsnark: A Framework for Efficient Verifiable Computation