Aalto University | Jian Liu, Mika Juuti, Yao Lu, N. Asokan. Oblivious Neural Network Predictions via MiniONN transformations [PDF] [Paper] (C3) |
Aarhus University | Melissa Chase, David Derler, Steven Goldfeder, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig, Greg Zaverucha. Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives [PDF] (I1)Nico Döttling, Satrajit Ghosh, Jesper Buus Nielsen, Tobias Nilges, Roberto Trifiletti. TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious Linear Function Evaluation [PDF] (K1)Vladimir Kolesnikov, Jesper Buus Nielsen, Mike Rosulek, Ni Trieu, Roberto Trifiletti. DUPLO: Unifying Cut-and-Choose for Garbled Circuits [PDF] [Paper] [Artifact] (A1) |
Academia Sinica | Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang. Certified Verification of Algebraic Properties on Low-Level Mathematical Constructs in Cryptographic Programs [PDF] (I4) |
ACM Member | Daiping Liu, Zhou Li, Kun Du, Haining Wang, Baojun Liu, Haixin Duan. Don’t Let One Rotten Apple Spoil the Whole Barrel: Towards Automated Detection of Shadowed Domains [PDF] (C2) |
AIT Austrian Institute of Technology | Melissa Chase, David Derler, Steven Goldfeder, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig, Greg Zaverucha. Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives [PDF] (I1) |
Arizona State University | Jake Corina, Aravind Machiry, Christopher Salls, Yan Shoshitaishvili, Shuang Hao, Christopher Kruegel, Giovanni Vigna. DIFUZE: Interface Aware Fuzzing for Kernel Drivers [PDF] [Artifact] (J2)Yan Shoshitaishvili, Michael Weissbacher, Lukas Dresel, Christopher Salls, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna. Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance [PDF] (B3) |
AT&T Labs-Research | Xi He, Ashwin Machanavajjhala, Cheryl Flynn, Divesh Srivastava. Composing Differential Privacy and Secure Computation: A case study on scaling private record linkage [PDF] [Paper] (F4) |
AWS | Shay Gueron, Yehuda Lindell. Better Bounds for Block Cipher Modes of Operation via Nonce-Based Key Derivation [PDF] [Paper] (E1) ★ |
Bar-Ilan University | Scott Ames, Carmit Hazay, Yuval Ishai, Muthuramakrishnan Venkitasubramaniam. Ligero: Lightweight Sublinear Arguments Without a Trusted Setup [PDF] (J1)Shay Gueron, Yehuda Lindell. Better Bounds for Block Cipher Modes of Operation via Nonce-Based Key Derivation [PDF] [Paper] (E1) ★Vladimir Kolesnikov, Naor Matania, Benny Pinkas, Mike Rosulek, Ni Trieu. Practical Multi-party Private Set Intersection from Symmetric-Key Techniques [PDF] [Paper] [Artifact] (F1)Yehuda Lindell, Ariel Nof. A Framework for Constructing Fast MPC over Arithmetic Circuits with Malicious Adversaries and an Honest-Majority [PDF] [Paper] (B1) |
Beihang University | Zhangkai Zhang, Xuhua Ding, Gene Tsudik, Jinhua Cui, Zhoujun Li. Presence Attestation: The Missing Link In Dynamic Trust Bootstrapping [PDF] (A2) |
Bell Labs | Vladimir Kolesnikov, Jesper Buus Nielsen, Mike Rosulek, Ni Trieu, Roberto Trifiletti. DUPLO: Unifying Cut-and-Choose for Garbled Circuits [PDF] [Paper] [Artifact] (A1)Vladimir Kolesnikov, Naor Matania, Benny Pinkas, Mike Rosulek, Ni Trieu. Practical Multi-party Private Set Intersection from Symmetric-Key Techniques [PDF] [Paper] [Artifact] (F1) |
Ben Gurion University | Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Michele Orru. Homomorphic Secret Sharing: Optimizations and Applications [PDF] [Artifact] (J1) |
Ca’ Foscari University of Venice | Matus Nemec, Marek Sys, Petr Svenda, Dusan Klinec, Vashek Matyas. The Return of Coppersmith’s Attack: Practical Factorization of Widely Used RSA Moduli [PDF] [Artifact] (H1) ★ |
California Institute of Technology | Mohammad A. Islam, Shaolei Ren, Adam Wierman. Exploiting a Thermal Side Channel for Power Attacks in Multi-Tenant Data Centers [PDF] (E3) |
Carnegie Mellon University | Anupam Datta, Matthew Fredrikson, Gihyuk Ko, Piotr Mardziel, Shayak Sen. Use Privacy in Data-Driven Systems: Theory and Experiments with Machine Learnt Programs [PDF] [Paper] [Artifact] (E5)Katherine Q. Ye, Matthew Green, Naphat Sanguansin, Lennart Beringer, Adam Petcher, Andrew W. Appel. Verified Correctness and Security of mbedTLS HMAC-DRBG [PDF] [Paper] [Artifact] (I4)Ruiyu Zhu, Yan Huang, Darion Cassel. Pool: Scalable On-Demand Secure Computation Service Against Malicious Adversaries [PDF] [Paper] [Artifact] (B1)Sarah Pearman, Jeremy Thomas, Pardis Emami Naeini, Hana Habib, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Serge Egelman, Alain Forget. Let’s go in for a closer look: Observing passwords in their natural habitat [PDF] (B2) |
Chalmers University of Technology | Lucas Waye, Pablo Buiras, Owen Arden, Alejandro Russo, Stephen Chong. Cryptographically Secure Information Flow Control on Key-Value Stores [PDF] [Paper] (I2) |
Chinese Academy of Sciences | Tongxin Li, Xueqiang Wang, Mingming Zha, Kai Chen, XiaoFeng Wang, Luyi Xing, Xiaolong Bai, Nan Zhang, Xinhui Han. Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews [PDF] (D2) |
Chinese Academy of Sciences, Institute of Information Engineering | Lingguang Lei, Yi He, Kun Sun, Jiwu Jing, Yuewu Wang, Qi Li, Jian Weng. Vulnerable Implicit Service: A Revisit [PDF] (E2)Shijie Jia, Luning Xia, Bo Chen, Peng Liu. DEFTL: Implementing Plausibly Deniable Encryption in Flash Translation Layer [PDF] (J4)Wei You, Peiyuan Zong, Kai Chen, XiaoFeng Wang, Xiaojing Liao, Pan Bian, Bin Liang. SemFuzz: Semantics-based Automatic Generation of Proof-of-Concept Exploits [PDF] (J2) |
CISPA, Saarland University | Bernd Finkbeiner, Christian Müller, Helmut Seidl, Eugen Zalinescu. Verifying Security Policies in Multi-agent Workflows with Loops [PDF] [Paper] [Artifact] (C4)Duc Cuong Nguyen, Dominik Wermke, Yasemin Acar, Michael Backes, Charles Weir, Sascha Fahl. A Stitch in Time: Supporting Android Developers in Writing Secure Code [PDF] (E2)Erik Derr, Sven Bugiel, Sascha Fahl, Yasemin Acar, Michael Backes. Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android [PDF] [Paper] [Artifact] (J3)Giancarlo Pellegrino, Martin Johns, Simon Koch, Michael Backes, Christian Rossow. Deemon: Detecting CSRF with Dynamic Analysis and Property Graphs [PDF] [Paper] (H3)Jie Huang, Oliver Schranz, Sven Bugiel, Michael Backes. The ART of App Compartmentalization: Compiler-based Library Privilege Separation on Stock Android [PDF] (E2)Michael Backes, Mathias Humbert, Jun Pang, Yang Zhang. walk2friends: Inferring Social Links from Mobility Profiles [PDF] [Paper] [Artifact] (I3) |
City College of New York | Matteo Campanelli, Rosario Gennaro, Steven Goldfeder, Luca Nizzardo. Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services [PDF] [Paper] [Artifact] (A5) |
Colgate University | Yan Chen, Ashwin Machanavajjhala, Michael Hay, Gerome Miklau. PeGaSus: Data-Adaptive Differentially Private Stream Processing [PDF] (F4) |
College of Science and Engineering, Hamad Bin Khalifa University | Zhan Qin, Yin Yang, Ting Yu, Xiaokui Xiao, Issa Khalil, Kui Ren. Generating Synthetic Decentralized Social Graphs with Local Differential Privacy [PDF] (B4) |
Columbia University | Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou. Generic Semantic Security against a Kleptographic Adversary [PDF] (D4)Theofilos Petsios, Jason Zhao, Angelos D. Keromytis, Suman Jana. SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities [PDF] [Paper] (J2) |
Cornell Tech | Congzheng Song, Thomas Ristenpart, Vitaly Shmatikov. Machine Learning Models that Remember Too Much [PDF] (C3)Rahul Chatterjee, Joanne Woodage, Yuval Pnueli, Anusha Chowdhury, Thomas Ristenpart. The TypTop System: Personalized Typo-tolerant Password Checking [PDF] [Paper] [Artifact] (B2) |
Cornell Tech, Jacobs Institute | Ethan Cecchetti, Fan Zhang, Yan Ji, Ahmed Kosba, Ari Juels, Elaine Shi. Solidus: Confidential Distributed Ledger Transactions via PVORM [PDF] [Paper] (C5) |
Cornell University | Congzheng Song, Thomas Ristenpart, Vitaly Shmatikov. Machine Learning Models that Remember Too Much [PDF] (C3)Ethan Cecchetti, Andrew Myers, Owen Arden. Nonmalleable Information Flow Control [PDF] [Paper] (I2) ★Ethan Cecchetti, Fan Zhang, Yan Ji, Ahmed Kosba, Ari Juels, Elaine Shi. Solidus: Confidential Distributed Ledger Transactions via PVORM [PDF] [Paper] (C5)Keith Bonawitz, Vladimir Ivanov, Ben Kreuter, Antonio Marcedone, H. Brendan McMahan, Sarvar Patel, Daniel Ramage, Aaron Segal, Karn Seth. Practical Secure Aggregation for Privacy-Preserving Machine Learning [PDF] [Paper] (E5)Rahul Chatterjee, Joanne Woodage, Yuval Pnueli, Anusha Chowdhury, Thomas Ristenpart. The TypTop System: Personalized Typo-tolerant Password Checking [PDF] [Paper] [Artifact] (B2) |
Data61 | Daniel Genkin, Luke Valenta, Yuval Yarom. May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519 [PDF] [Paper] (D3)Peter Pessl, Leon Groot Bruinderink, Yuval Yarom. To BLISS-B or not to be - Attacking strongSwan’s Implementation of Post-Quantum Signatures [PDF] [Paper] (I1) |
DCC FC Universidade do Porto | José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Arthur Blot, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Hugo Pacheco, Benedikt Schmidt, Pierre-Yves Strub. Jasmin: High-Assurance and High-Speed Cryptography [PDF] [Artifact] (H4)José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Vitor Pereira. A Fast and Verified Software Stack for Secure Function Evaluation [PDF] [Paper] [Artifact] (I4) |
Delft University of Technology | Samaneh Tajalizadehkhoob, Tom van Goethem, Maciej Korczyński, Arman Noroozian, Rainer Böhme, Tyler Moore, Wouter Joosen, Michel van Eeten. Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting [PDF] [Paper] (C2) |
Denmark Technical University | Melissa Chase, David Derler, Steven Goldfeder, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig, Greg Zaverucha. Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives [PDF] (I1) |
DGA.MI | Thomas Espitau, Pierre-Alain Fouque, Benoït Gérard, Mehdi Tibouchi. Side-Channel Attacks on BLISS Lattice-Based Signatures: Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers [PDF] [Paper] [Artifact] (I1) |
Direction Générale de l’Armement - Maitrise de l’Information | Raphael Bost, Brice Minaud, Olga Ohrimenko. Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives [PDF] [Paper] [Artifact] (G1) |
Drexel University | Rebekah Overdorf, Marc Juarez, Gunes Acar, Rachel Greenstadt, Claudia Diaz. How Unique is Your .onion? An Analysis of the Fingerprintability of Tor Onion Services [PDF] [Paper] [Artifact] (I5) ★ |
Duke University | Xi He, Ashwin Machanavajjhala, Cheryl Flynn, Divesh Srivastava. Composing Differential Privacy and Secure Computation: A case study on scaling private record linkage [PDF] [Paper] (F4)Yan Chen, Ashwin Machanavajjhala, Michael Hay, Gerome Miklau. PeGaSus: Data-Adaptive Differentially Private Stream Processing [PDF] (F4) |
Ecole Polytechnique | José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Arthur Blot, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Hugo Pacheco, Benedikt Schmidt, Pierre-Yves Strub. Jasmin: High-Assurance and High-Speed Cryptography [PDF] [Artifact] (H4) |
École Polytechnique de Montréal | Shirin Nilizadeh, François Labrèche, Alireza Sadighian, Ali Zand, José Fernandez, Christopher Kruegel, Gianluca Stringhini, Giovanni Vigna. POISED: Spotting Twitter Spam Off the Beaten Paths [PDF] [Paper] (E4) |
Eindhoven University of Technology | Luca Allodi. Economic Factors of Vulnerability Trade and Exploitation: Empirical evidence from a prominent Russian cybercrime market [PDF] [Paper] (G2) |
EnigmaBridge | Matus Nemec, Marek Sys, Petr Svenda, Dusan Klinec, Vashek Matyas. The Return of Coppersmith’s Attack: Practical Factorization of Widely Used RSA Moduli [PDF] [Artifact] (H1) ★Vasilios Mavroudis, Andrea Cerulli, Petr Svenda, Dan Cvrcek, Dusan Klinec, George Danezis. A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components [PDF] [Paper] [Artifact] (G5) |
ENS Lyon | Gottfried Herold, Max Hoffmann, Michael Klooß , Carla Ràfols, Andy Rupp. New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs [PDF] [Paper] (G4)José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Arthur Blot, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Hugo Pacheco, Benedikt Schmidt, Pierre-Yves Strub. Jasmin: High-Assurance and High-Speed Cryptography [PDF] [Artifact] (H4) |
ENS Lyon, Laboratoire LIP (U. Lyon, CNRS, ENSL, INRIA, UCBL) | Shweta Agrawal, Sanjay Bhattacherjee, Duong Hieu Phan, Damien Stehle, Shota Yamada. Efficient Public Trace-and-Revoke from Standard Assumptions [PDF] [Paper] (K1) |
ENS, Paris | Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Michele Orru. Homomorphic Secret Sharing: Optimizations and Applications [PDF] [Artifact] (J1)Miguel Ambrona, Gilles Barthe, Romain Gay, Hoeteck Wee. Attribute-Based Encryption in the Generic Group Model: Automated Proofs and New Constructions [PDF] (C4) |
ETH Zürich | Jan Camenisch, Manu Drijvers, Maria Dubovitskaya. Practical UC-Secure Delegatable Credentials with Attributes and Their Application to Blockchain [PDF] (C5)Martin Kucera, Petar Tsankov, Timon Gehr, Marco Guarnieri, Martin Vechev. Synthesis of Probabilistic Privacy Enforcement [PDF] [Artifact] (B4)Rami Khalil, Arthur Gervais. Revive: Rebalancing Off-Blockchain Payment Networks [PDF] [Artifact] (B5) |
Florida State University | Linghan Zhang, Sheng Tan, Jie Yang. Hearing Your Voice Is Not Enough: An Articulatory Gesture Based Liveness Detection for Voice Authentication [PDF] (A2)Mihir Bellare, Viet Tung Hoang. Identity-Based Format-Preserving Encryption [PDF] (G3) |
Friedrich-Alexander University Erlangen Nuernberg | Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, Srivatsan Ravi. Concurrency and Privacy with Payment-Channel Networks [PDF] [Paper] (B5) |
Galois, Inc. | Brent Carmer, Alex J. Malozemoff, Mariana Raykova. 5Gen-C: Multi-input Functional Encryption and Program Obfuscation for Arithmetic Circuits [PDF] [Artifact] (D1) |
George Mason University | Lingguang Lei, Yi He, Kun Sun, Jiwu Jing, Yuewu Wang, Qi Li, Jian Weng. Vulnerable Implicit Service: A Revisit [PDF] (E2)Xiao Wang, Samuel Ranellucci, Jonathan Katz. Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation [PDF] [Paper] [Artifact] (A1) ★ |
Georgetown University | Ellis Fenske, Akshaya Mani, Aaron Johnson, Micah Sherr. Distributed Measurement with Private Set-Union Cardinality [PDF] (K1)Riad S. Wahby, Ye Ji, Andrew J. Blumberg, abhi shelat, Justin Thaler, Michael Walfish, Thomas Wies. Full accounting for verifiable outsourcing [PDF] [Paper] (J1) |
Georgia Institute of Technology | Huasong Shan, Qingyang Wang, Calton Pu. Tail Attacks on Web Applications [PDF] (H3)Jian Huang, Jun Xu, Xinyu Xing, Peng Liu, Moinuddin K. Qureshi. FlashGuard: Leveraging Intrinsic Flash Properties to Defend Against Encryption Ransomware [PDF] (J4)Panagiotis Kintis, Najmeh Miramirkhani, Charles Lever, Yizheng Chen, Rosa Romero-Gómez, Nikolaos Pitropakis, Nick Nikiforakis, Manos Antonakakis. Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse [PDF] [Paper] (C2)Ruian Duan, Ashish Bijlani, Meng Xu, Taesoo Kim, Wenke Lee. Checking Open-Source License Violation and 1-day Security Risk at Large Scale [PDF] (J3)Wen Xu, Sanidhya Kashyap, Changwoo Min, Taesoo Kim. Designing New Operating Primitives to Improve Fuzzing Performance [PDF] (K2)Xiaojun Xu, Chang Liu, Qian Feng, Heng Yin, Le Song, Dawn Song. Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection [PDF] [Paper] (B3)Yang Ji, Sangho Lee, Evan Downing, Weiren Wang, Mattia Fazzini, Taesoo Kim, Alessandro Orso, Wenke Lee. RAIN: Refinable Attack Investigation with On-demand Inter-Process Information Flow Tracking [PDF] (B3)Yizheng Chen, Yacin Nadji, Athanasios Kountouras, Fabian Monrose, Roberto Perdisci, Manos Antonakakis, Nikolaos Vasiloglou. Practical Attacks Against Graph-based Clustering [PDF] [Paper] (E4) |
Google | Keith Bonawitz, Vladimir Ivanov, Ben Kreuter, Antonio Marcedone, H. Brendan McMahan, Sarvar Patel, Daniel Ramage, Aaron Segal, Karn Seth. Practical Secure Aggregation for Privacy-Preserving Machine Learning [PDF] [Paper] (E5)Kurt Thomas, Frank Li, Ali Zand, Jake Barrett, Juri Ranieri, Luca Invernizzi, Yarik Markov, Oxana Comanescu, Vijay Eranti, Angelika Moscicki, Dan Margolis, Vern Paxson, Elie Bursztein. Data breaches, phishing, or malware? Understanding the risks of stolen credentials [PDF] (F5)Mustafa Emre Acer, Emily Stark, Adrienne Porter Felt, Sascha Fahl, Radhika Bhargava, Bhanu Dev, Matt Braithwaite, Ryan Sleevi, Parisa Tabriz. Where the Wild Warnings Are: Root Causes of Chrome HTTPS Certificate Errors [PDF] (F5)Sarah Pearman, Jeremy Thomas, Pardis Emami Naeini, Hana Habib, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Serge Egelman, Alain Forget. Let’s go in for a closer look: Observing passwords in their natural habitat [PDF] (B2)Sebastian Lekies, Krzysztof Kotowicz, Samuel Groß , Eduardo Vela, Martin Johns. Code-reuse attacks for the Web: Breaking Cross-Site Scripting Mitigations via Script Gadgets [PDF] (H2) |
Graz University of Technology | Melissa Chase, David Derler, Steven Goldfeder, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig, Greg Zaverucha. Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives [PDF] (I1)Peter Pessl, Leon Groot Bruinderink, Yuval Yarom. To BLISS-B or not to be - Attacking strongSwan’s Implementation of Post-Quantum Signatures [PDF] [Paper] (I1) |
Haifa University | Shay Gueron, Yehuda Lindell. Better Bounds for Block Cipher Modes of Operation via Nonce-Based Key Derivation [PDF] [Paper] (E1) ★ |
Harvard University | Lucas Waye, Pablo Buiras, Owen Arden, Alejandro Russo, Stephen Chong. Cryptographically Secure Information Flow Control on Key-Value Stores [PDF] [Paper] (I2) |
HASLab – INESC TEC | José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Arthur Blot, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Hugo Pacheco, Benedikt Schmidt, Pierre-Yves Strub. Jasmin: High-Assurance and High-Speed Cryptography [PDF] [Artifact] (H4)José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Vitor Pereira. A Fast and Verified Software Stack for Secure Function Evaluation [PDF] [Paper] [Artifact] (I4) |
Huawei Technologies Düsseldorf | Yong Li, Sven Schäge. No-Match Attacks and Robust Partnering Definitions — Defining Trivial Attacks for Security Protocols is Not Trivial [PDF] [Paper] (F3) |
IBM | Shai Halevi, Tzipora Halevi, Victor Shoup, Noah Stephens-Davidowitz. Implementing BP-Obfuscation Using Graph-Induced Encoding [PDF] [Paper] (D1) |
IBM and New York University | Shai Halevi, Tzipora Halevi, Victor Shoup, Noah Stephens-Davidowitz. Implementing BP-Obfuscation Using Graph-Induced Encoding [PDF] [Paper] (D1) |
IBM Research - Zürich | Jan Camenisch, Manu Drijvers, Maria Dubovitskaya. Practical UC-Secure Delegatable Credentials with Attributes and Their Application to Blockchain [PDF] (C5)Rafael del Pino, Vadim Lyubashevsky, Gregory Neven, Gregor Seiler. Practical Quantum-Safe Voting from Lattices [PDF] (G4) |
IDC Herzliya | Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Michele Orru. Homomorphic Secret Sharing: Optimizations and Applications [PDF] [Artifact] (J1) |
IIT Madras | Shweta Agrawal, Sanjay Bhattacherjee, Duong Hieu Phan, Damien Stehle, Shota Yamada. Efficient Public Trace-and-Revoke from Standard Assumptions [PDF] [Paper] (K1) |
IMDEA Software Institute | José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Arthur Blot, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Hugo Pacheco, Benedikt Schmidt, Pierre-Yves Strub. Jasmin: High-Assurance and High-Speed Cryptography [PDF] [Artifact] (H4)José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Vitor Pereira. A Fast and Verified Software Stack for Secure Function Evaluation [PDF] [Paper] [Artifact] (I4)Miguel Ambrona, Gilles Barthe, Romain Gay, Hoeteck Wee. Attribute-Based Encryption in the Generic Group Model: Automated Proofs and New Constructions [PDF] (C4)Simon Oya, Carmela Troncoso, Fernando Pérez-González. Back to the drawing board: Revisiting the design of optimal location privacy-preserving mechanisms [PDF] [Paper] (I3) |
IMDEA Software Institute and Universidad Politécnica de Madrid | Matteo Campanelli, Rosario Gennaro, Steven Goldfeder, Luca Nizzardo. Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services [PDF] [Paper] [Artifact] (A5) |
Indiana University | Ruiyu Zhu, Yan Huang, Darion Cassel. Pool: Scalable On-Demand Secure Computation Service Against Malicious Adversaries [PDF] [Paper] [Artifact] (B1)Syed Mahbub Hafiz, Ryan Henry. Querying for Queries: Indexes of Queries for Efficient and Expressive IT-PIR [PDF] [Paper] (F4)Tongxin Li, Xueqiang Wang, Mingming Zha, Kai Chen, XiaoFeng Wang, Luyi Xing, Xiaolong Bai, Nan Zhang, Xinhui Han. Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews [PDF] (D2)Wei You, Peiyuan Zong, Kai Chen, XiaoFeng Wang, Xiaojing Liao, Pan Bian, Bin Liang. SemFuzz: Semantics-based Automatic Generation of Proof-of-Concept Exploits [PDF] (J2)Wenhao Wang, Guoxing Chen, Xiaorui Pan, Yinqian Zhang, XiaoFeng Wang, Vincent Bindschaedler, Haixu Tang, Carl A. Gunter. Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX [PDF] (K4)Yi Chen, Wei You, Yeonjoon Lee, Kai Chen, XiaoFeng Wang, Wei Zou. Mass Discovery of Android Traffic Imprints through Instantiated Partial Execution [PDF] (D2) |
Innsbruck University | Samaneh Tajalizadehkhoob, Tom van Goethem, Maciej Korczyński, Arman Noroozian, Rainer Böhme, Tyler Moore, Wouter Joosen, Michel van Eeten. Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting [PDF] [Paper] (C2) |
Inria | José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Arthur Blot, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Hugo Pacheco, Benedikt Schmidt, Pierre-Yves Strub. Jasmin: High-Assurance and High-Speed Cryptography [PDF] [Artifact] (H4)Véronique Cortier, Niklas Grimm, Joseph Lallemand, Matteo Maffei. A Type System for Privacy Properties [PDF] [Paper] [Artifact] (B4) |
Inria Paris | Jean-Karim Zinzindohoué, Karthikeyan Bhargavan, Jonathan Protzenko, Benjamin Beurdouche. HACL*: A Verified Modern Cryptographic Library [PDF] [Paper] [Artifact] (H4) |
INRIA Sophia-Antipolis | José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Vitor Pereira. A Fast and Verified Software Stack for Secure Function Evaluation [PDF] [Paper] [Artifact] (I4) |
International Institute of Information Technology Hyderabad | Mustafa Emre Acer, Emily Stark, Adrienne Porter Felt, Sascha Fahl, Radhika Bhargava, Bhanu Dev, Matt Braithwaite, Ryan Sleevi, Parisa Tabriz. Where the Wild Warnings Are: Root Causes of Chrome HTTPS Certificate Errors [PDF] (F5) |
IST Austria | Joel Alwen, Jeremiah Blocki, Ben Harsha. Practical Graphs for Optimal Side-Channel Resistant Memory-Hard Functions [PDF] [Paper] [Artifact] (E1) |
Jinan University | Lingguang Lei, Yi He, Kun Sun, Jiwu Jing, Yuewu Wang, Qi Li, Jian Weng. Vulnerable Implicit Service: A Revisit [PDF] (E2) |
Johns Hopkins University | Arka Rai Choudhuri, Matthew Green, Abhishek Jain, Gabriel Kaptchuk, Ian Miers. Fairness in an Unfair World: Fair Multiparty Computation from Public Bulletin Boards [PDF] (C5)Katherine Q. Ye, Matthew Green, Naphat Sanguansin, Lennart Beringer, Adam Petcher, Andrew W. Appel. Verified Correctness and Security of mbedTLS HMAC-DRBG [PDF] [Paper] [Artifact] (I4)Matthew Green, Ian Miers. Bolt: Anonymous Payment Channels for Decentralized Currencies [PDF] (B5) |
KAIST | Yujin Kwon, Dohyun Kim, Yunmok Son, Eugene Vasserman, Yongdae Kim. Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin [PDF] [Paper] (A5) |
Kansas State University | Yujin Kwon, Dohyun Kim, Yunmok Son, Eugene Vasserman, Yongdae Kim. Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin [PDF] [Paper] (A5) |
Karlsruhe Institute of Technology | Gottfried Herold, Max Hoffmann, Michael Klooß , Carla Ràfols, Andy Rupp. New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs [PDF] [Paper] (G4)Gunnar Hartung, Max Hoffmann, Matthias Nagel, Andy Rupp. BBA+: Improving the Security and Applicability of Privacy-Preserving Point Collection [PDF] (I3) |
KU Leuven | Rebekah Overdorf, Marc Juarez, Gunes Acar, Rachel Greenstadt, Claudia Diaz. How Unique is Your .onion? An Analysis of the Fingerprintability of Tor Onion Services [PDF] [Paper] [Artifact] (I5) ★ |
KU Leuven, imec-DistriNet | Mathy Vanhoef, Frank Piessens. Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2 [PDF] [Paper] (F3) ★Samaneh Tajalizadehkhoob, Tom van Goethem, Maciej Korczyński, Arman Noroozian, Rainer Böhme, Tyler Moore, Wouter Joosen, Michel van Eeten. Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting [PDF] [Paper] (C2)Thomas Vissers, Timothy Barron, Tom Van Goethem, Wouter Joosen, Nick Nikiforakis. The Wolf of Name Street: Hijacking Domains Through Their Nameservers [PDF] [Paper] (D5) |
Lehigh University | |
Leibniz University Hannover | Duc Cuong Nguyen, Dominik Wermke, Yasemin Acar, Michael Backes, Charles Weir, Sascha Fahl. A Stitch in Time: Supporting Android Developers in Writing Secure Code [PDF] (E2)Erik Derr, Sven Bugiel, Sascha Fahl, Yasemin Acar, Michael Backes. Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android [PDF] [Paper] [Artifact] (J3)Mustafa Emre Acer, Emily Stark, Adrienne Porter Felt, Sascha Fahl, Radhika Bhargava, Bhanu Dev, Matt Braithwaite, Ryan Sleevi, Parisa Tabriz. Where the Wild Warnings Are: Root Causes of Chrome HTTPS Certificate Errors [PDF] (F5) |
London South Bank University | Panagiotis Kintis, Najmeh Miramirkhani, Charles Lever, Yizheng Chen, Rosa Romero-Gómez, Nikolaos Pitropakis, Nick Nikiforakis, Manos Antonakakis. Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse [PDF] [Paper] (C2) |
Loria, CNRS | Véronique Cortier, Niklas Grimm, Joseph Lallemand, Matteo Maffei. A Type System for Privacy Properties [PDF] [Paper] [Artifact] (B4) |
Louisiana State University, Computer Science and Engineering Division | Huasong Shan, Qingyang Wang, Calton Pu. Tail Attacks on Web Applications [PDF] (H3) |
Masaryk University | Matus Nemec, Marek Sys, Petr Svenda, Dusan Klinec, Vashek Matyas. The Return of Coppersmith’s Attack: Practical Factorization of Widely Used RSA Moduli [PDF] [Artifact] (H1) ★Vasilios Mavroudis, Andrea Cerulli, Petr Svenda, Dan Cvrcek, Dusan Klinec, George Danezis. A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components [PDF] [Paper] [Artifact] (G5) |
Massachusetts Institute of Technology | Pramod Subramanyan, Rohit Sinha, Ilia Lebedev, Srinivas Devadas, Sanjit Seshia. A Formal Foundation for Secure Remote Execution of Enclaves [PDF] [Paper] [Artifact] (K4) ★ |
The Max Planck Institute For Software Systems | Cas Cremers, Marko Horvat, Jonathan Hoyland, Sam Scott, Thyla van der Merwe. A Comprehensive Symbolic Analysis of TLS 1.3 [PDF] [Paper] [Artifact] (H4) |
Michigan Technological University | Shijie Jia, Luning Xia, Bo Chen, Peng Liu. DEFTL: Implementing Plausibly Deniable Encryption in Flash Translation Layer [PDF] (J4) |
Microsoft | Victor van der Veen, Dennis Andriesse, Manolis Stamatogiannakis, Xi Chen, Herbert Bos, Cristiano Giuffrida. The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years Later [PDF] [Paper] [Artifact] (H2) |
Microsoft Research | Hao Chen, Kim Laine, Peter Rindal. Fast Private Set Intersection from Homomorphic Encryption [PDF] [Paper] (F1)Jean-Karim Zinzindohoué, Karthikeyan Bhargavan, Jonathan Protzenko, Benjamin Beurdouche. HACL*: A Verified Modern Cryptographic Library [PDF] [Paper] [Artifact] (H4)Melissa Chase, David Derler, Steven Goldfeder, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig, Greg Zaverucha. Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives [PDF] (I1) |
Microsoft Research India | Nishanth Chandran, Juan Garay, Payman Mohassel, Satyanarayana Vusirikala. Efficient, Constant-Round and Actively Secure MPC: Beyond the Three-Party Case [PDF] [Paper] (B1) |
Microsoft Research, Cambridge | Raphael Bost, Brice Minaud, Olga Ohrimenko. Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives [PDF] [Paper] [Artifact] (G1) |
Nanyang Technological University | Zhan Qin, Yin Yang, Ting Yu, Xiaokui Xiao, Issa Khalil, Kui Ren. Generating Synthetic Decentralized Social Graphs with Local Differential Privacy [PDF] (B4) |
National Institute of Advanced Industrial Science and Technology (AIST), Japan | Shweta Agrawal, Sanjay Bhattacherjee, Duong Hieu Phan, Damien Stehle, Shota Yamada. Efficient Public Trace-and-Revoke from Standard Assumptions [PDF] [Paper] (K1) |
National Security Research Institute | Kee Sung Kim, Minkyu Kim, Dongsoo Lee, Je Hong Park, Woo-Hwan Kim. Forward Secure Dynamic Searchable Symmetric Encryption with Efficient Updates [PDF] (G1) |
National University of Singapore | Hung Dang, Yue Huang, Ee-Chien Chang. Evading Classifiers by Morphing in the Dark [PDF] (A3) |
New Jersey Institute of Technology | Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou. Generic Semantic Security against a Kleptographic Adversary [PDF] (D4) |
New York University | Hossein Siadati, Nasir Memon. Detecting Structurally Anomalous Logins Within Enterprise Networks [PDF] (F2)Muhammad Yasin, Abhrajit Sengupta, Mohammed Thari Nabeel, Mohammed Ashraf, Jeyavijayan (JV) Rajendran, Ozgur Sinanoglu. Provably-Secure Logic Locking: From Theory To Practice [PDF] (G5)Riad S. Wahby, Ye Ji, Andrew J. Blumberg, abhi shelat, Justin Thaler, Michael Walfish, Thomas Wies. Full accounting for verifiable outsourcing [PDF] [Paper] (J1)Shai Halevi, Tzipora Halevi, Victor Shoup, Noah Stephens-Davidowitz. Implementing BP-Obfuscation Using Graph-Induced Encoding [PDF] [Paper] (D1) |
Newcastle University | Changyu Dong, Yilei Wang, Amjad Aldweesh, Patrick McCorry, Aad van Moorsel. Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing [PDF] [Paper] [Artifact] (A5) |
Northeastern University | Riad S. Wahby, Ye Ji, Andrew J. Blumberg, abhi shelat, Justin Thaler, Michael Walfish, Thomas Wies. Full accounting for verifiable outsourcing [PDF] [Paper] (J1)Yan Shoshitaishvili, Michael Weissbacher, Lukas Dresel, Christopher Salls, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna. Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance [PDF] (B3) |
NTT Secure Platform Laboratories | Thomas Espitau, Pierre-Alain Fouque, Benoït Gérard, Mehdi Tibouchi. Side-Channel Attacks on BLISS Lattice-Based Signatures: Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers [PDF] [Paper] [Artifact] (I1) |
The Ohio State University | Wenhao Wang, Guoxing Chen, Xiaorui Pan, Yinqian Zhang, XiaoFeng Wang, Vincent Bindschaedler, Haixu Tang, Carl A. Gunter. Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX [PDF] (K4)Yuan Xiao, Mengyuan Li, Sanchuan Chen, Yinqian Zhang. Stacco: Differentially Analyzing Side-Channel Traces for Detecting SSL/TLS Vulnerabilities in Secure Enclaves [PDF] [Paper] (D3) |
Oracle | Katherine Q. Ye, Matthew Green, Naphat Sanguansin, Lennart Beringer, Adam Petcher, Andrew W. Appel. Verified Correctness and Security of mbedTLS HMAC-DRBG [PDF] [Paper] [Artifact] (I4) |
Oregon State University | Brent Carmer, Alex J. Malozemoff, Mariana Raykova. 5Gen-C: Multi-input Functional Encryption and Program Obfuscation for Arithmetic Circuits [PDF] [Artifact] (D1)Hao Chen, Kim Laine, Peter Rindal. Fast Private Set Intersection from Homomorphic Encryption [PDF] [Paper] (F1)Thang Hoang, Ceyhun D. Ozkaptan, Attila A. Yavuz, Jorge Guajardo, Tam Nguyen. S3ORAM: A Computation-Efficient and Constant Client Bandwidth Blowup ORAM with Shamir Secret Sharing [PDF] [Paper] [Artifact] (C1)Vladimir Kolesnikov, Jesper Buus Nielsen, Mike Rosulek, Ni Trieu, Roberto Trifiletti. DUPLO: Unifying Cut-and-Choose for Garbled Circuits [PDF] [Paper] [Artifact] (A1)Vladimir Kolesnikov, Naor Matania, Benny Pinkas, Mike Rosulek, Ni Trieu. Practical Multi-party Private Set Intersection from Symmetric-Key Techniques [PDF] [Paper] [Artifact] (F1) |
Peking University | Tongxin Li, Xueqiang Wang, Mingming Zha, Kai Chen, XiaoFeng Wang, Luyi Xing, Xiaolong Bai, Nan Zhang, Xinhui Han. Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews [PDF] (D2) |
The Pennsylvania State University | Jian Huang, Jun Xu, Xinyu Xing, Peng Liu, Moinuddin K. Qureshi. FlashGuard: Leveraging Intrinsic Flash Properties to Defend Against Encryption Ransomware [PDF] (J4)Shen Liu, Gang Tan, Trent Jaeger. PtrSplit: Supporting general pointers in automatic program partitioning [PDF] (K3) |
The Pennsylvania State University, College of Information Sciences and Technology | Shijie Jia, Luning Xia, Bo Chen, Peng Liu. DEFTL: Implementing Plausibly Deniable Encryption in Flash Translation Layer [PDF] (J4) |
Princeton University | Katherine Q. Ye, Matthew Green, Naphat Sanguansin, Lennart Beringer, Adam Petcher, Andrew W. Appel. Verified Correctness and Security of mbedTLS HMAC-DRBG [PDF] [Paper] [Artifact] (I4)Matteo Campanelli, Rosario Gennaro, Steven Goldfeder, Luca Nizzardo. Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services [PDF] [Paper] [Artifact] (A5)Melissa Chase, David Derler, Steven Goldfeder, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig, Greg Zaverucha. Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives [PDF] (I1) |
Purdue University | Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, Srivatsan Ravi. Concurrency and Privacy with Payment-Channel Networks [PDF] [Paper] (B5)Joel Alwen, Jeremiah Blocki, Ben Harsha. Practical Graphs for Optimal Side-Channel Resistant Memory-Hard Functions [PDF] [Paper] [Artifact] (E1)Mustafa Emre Acer, Emily Stark, Adrienne Porter Felt, Sascha Fahl, Radhika Bhargava, Bhanu Dev, Matt Braithwaite, Ryan Sleevi, Parisa Tabriz. Where the Wild Warnings Are: Root Causes of Chrome HTTPS Certificate Errors [PDF] (F5)Yuseok Jeon, Priyam Biswas, Scott Carr, Byoungyoung Lee, Mathias Payer. HexType: Efficient Detection of Type Confusion Errors for C++ [PDF] (K3) |
Qatar Computing Research Institute, Hamad Bin Khalifa University | Zhan Qin, Yin Yang, Ting Yu, Xiaokui Xiao, Issa Khalil, Kui Ren. Generating Synthetic Decentralized Social Graphs with Local Differential Privacy [PDF] (B4) |
Renmin University of China | Wei You, Peiyuan Zong, Kai Chen, XiaoFeng Wang, Xiaojing Liao, Pan Bian, Bin Liang. SemFuzz: Semantics-based Automatic Generation of Proof-of-Concept Exploits [PDF] (J2) |
Robert Bosch Research and Technology Center | Thang Hoang, Ceyhun D. Ozkaptan, Attila A. Yavuz, Jorge Guajardo, Tam Nguyen. S3ORAM: A Computation-Efficient and Constant Client Bandwidth Blowup ORAM with Shamir Secret Sharing [PDF] [Paper] [Artifact] (C1) |
Royal Holloway, University of London | Cas Cremers, Marko Horvat, Jonathan Hoyland, Sam Scott, Thyla van der Merwe. A Comprehensive Symbolic Analysis of TLS 1.3 [PDF] [Paper] [Artifact] (H4)Rahul Chatterjee, Joanne Woodage, Yuval Pnueli, Anusha Chowdhury, Thomas Ristenpart. The TypTop System: Personalized Typo-tolerant Password Checking [PDF] [Paper] [Artifact] (B2)Raphael Bost, Brice Minaud, Olga Ohrimenko. Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives [PDF] [Paper] [Artifact] (G1) |
Ruhr-Universität Bochum | Gottfried Herold, Max Hoffmann, Michael Klooß , Carla Ràfols, Andy Rupp. New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs [PDF] [Paper] (G4)Gunnar Hartung, Max Hoffmann, Matthias Nagel, Andy Rupp. BBA+: Improving the Security and Applicability of Privacy-Preserving Point Collection [PDF] (I3)Yong Li, Sven Schäge. No-Match Attacks and Robust Partnering Definitions — Defining Trivial Attacks for Security Protocols is Not Trivial [PDF] [Paper] (F3) |
Rutgers University | Jian Liu, Chen Wang, Yingying Chen, Nitesh Saxena. VibWrite: Towards Finger-input Authentication on Ubiquitous Surfaces via Physical Vibration [PDF] (A2)Yi Han, Sriharsha Etigowni, Hua Liu, Saman Zonouz, Athina Petropulu. Watch Me, but Don’t Touch Me! Contactless Control Flow Monitoring via Electromagnetic Emanations [PDF] [Paper] (E3) |
Samsung Research America | Xiaojun Xu, Chang Liu, Qian Feng, Heng Yin, Le Song, Dawn Song. Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection [PDF] [Paper] (B3) |
SAP SE | Giancarlo Pellegrino, Martin Johns, Simon Koch, Michael Backes, Christian Rossow. Deemon: Detecting CSRF with Dynamic Analysis and Property Graphs [PDF] [Paper] (H3)Sebastian Lekies, Krzysztof Kotowicz, Samuel Groß , Eduardo Vela, Martin Johns. Code-reuse attacks for the Web: Breaking Cross-Site Scripting Mitigations via Script Gadgets [PDF] (H2) |
Security Lancaster, Lancaster University | Duc Cuong Nguyen, Dominik Wermke, Yasemin Acar, Michael Backes, Charles Weir, Sascha Fahl. A Stitch in Time: Supporting Android Developers in Writing Secure Code [PDF] (E2) |
Shanghai Jiao Tong University | Xiaojun Xu, Chang Liu, Qian Feng, Heng Yin, Le Song, Dawn Song. Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection [PDF] [Paper] (B3) |
ShanghaiTech University | Dongyu Meng, Hao Chen. MagNet: a Two-Pronged Defense against Adversarial Examples [PDF] [Paper] (A3) |
Singapore Management University | Zhangkai Zhang, Xuhua Ding, Gene Tsudik, Jinhua Cui, Zhoujun Li. Presence Attestation: The Missing Link In Dynamic Trust Bootstrapping [PDF] (A2) |
Snap, Inc. | Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou. Generic Semantic Security against a Kleptographic Adversary [PDF] (D4) |
Stanford University | Ben Fisch, Dhinakaran Vinayagamurthy, Dan Boneh, Sergey Gorbunov. Iron: Functional Encryption using Intel SGX [PDF] [Paper] (D1) ★Dmitry Kogan, Nathan Manohar, Dan Boneh. T/Key: Second-Factor Authentication From Secure Hash Chains [PDF] [Paper] (E1)Riad S. Wahby, Ye Ji, Andrew J. Blumberg, abhi shelat, Justin Thaler, Michael Walfish, Thomas Wies. Full accounting for verifiable outsourcing [PDF] [Paper] (J1) |
State University of New York at Buffalo | Zhan Qin, Yin Yang, Ting Yu, Xiaokui Xiao, Issa Khalil, Kui Ren. Generating Synthetic Decentralized Social Graphs with Local Differential Privacy [PDF] (B4) |
Stevens Institute of Technology | Briland Hitaj, Giuseppe Ateniese, Fernando Perez-Cruz. Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning [PDF] [Paper] (C3) |
Stony Brook University | Meng Luo, Oleksii Starov, Nima Honarmand, Nick Nikiforakis. Hindsight: Understanding the Evolution of UI Vulnerabilities in Mobile Browsers [PDF] (A4)Panagiotis Kintis, Najmeh Miramirkhani, Charles Lever, Yizheng Chen, Rosa Romero-Gómez, Nikolaos Pitropakis, Nick Nikiforakis, Manos Antonakakis. Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse [PDF] [Paper] (C2)Thomas Vissers, Timothy Barron, Tom Van Goethem, Wouter Joosen, Nick Nikiforakis. The Wolf of Name Street: Hijacking Domains Through Their Nameservers [PDF] [Paper] (D5) |
Swiss Data Science Center, ETH/EPFL | Michael Backes, Mathias Humbert, Jun Pang, Yang Zhang. walk2friends: Inferring Social Links from Mobility Profiles [PDF] [Paper] [Artifact] (I3) |
Symantec | Yizheng Chen, Yacin Nadji, Athanasios Kountouras, Fabian Monrose, Roberto Perdisci, Manos Antonakakis, Nikolaos Vasiloglou. Practical Attacks Against Graph-based Clustering [PDF] [Paper] (E4) |
Symantec Research Labs | Leyla Bilge, Yufei Han, Matteo Dell’Amico. Predicting the Risk of Cyber Incidents [PDF] (F2) |
Technion | Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Michele Orru. Homomorphic Secret Sharing: Optimizations and Applications [PDF] [Artifact] (J1)Scott Ames, Carmit Hazay, Yuval Ishai, Muthuramakrishnan Venkitasubramaniam. Ligero: Lightweight Sublinear Arguments Without a Trusted Setup [PDF] (J1) |
Technion - Israel Institute of Technology | Rahul Chatterjee, Joanne Woodage, Yuval Pnueli, Anusha Chowdhury, Thomas Ristenpart. The TypTop System: Personalized Typo-tolerant Password Checking [PDF] [Paper] [Artifact] (B2) |
Technische Universität Berlin | Shahin Tajik, Heiko Lohrke, Jean-Pierre Seifert, Christian Boit. On the Power of Optical Contactless Probing: Attacking Bitstream Encryption of FPGAs [PDF] [Paper] (H1) ★ |
Technische Universität Darmstadt | Tommaso Frassetto, David Gens, Christopher Liebchen, Ahmad-Reza Sadeghi. JITGuard: Hardening Just-in-time Compilers with SGX [PDF] [Paper] (K4) |
Technische Universität München | Bernd Finkbeiner, Christian Müller, Helmut Seidl, Eugen Zalinescu. Verifying Security Policies in Multi-agent Workflows with Loops [PDF] [Paper] [Artifact] (C4) |
Technische Universiteit Eindhoven | Peter Pessl, Leon Groot Bruinderink, Yuval Yarom. To BLISS-B or not to be - Attacking strongSwan’s Implementation of Post-Quantum Signatures [PDF] [Paper] (I1) |
Texas A&M University | Nishanth Chandran, Juan Garay, Payman Mohassel, Satyanarayana Vusirikala. Efficient, Constant-Round and Actively Secure MPC: Beyond the Three-Party Case [PDF] [Paper] (B1)Zain Shamsi, Daren B.H. Cline, Dmitri Loguinov. Faulds: A Non-Parametric Iterative Classifier for Internet-Wide OS Fingerprinting [PDF] [Paper] (D5) |
Tsinghua University | Daiping Liu, Zhou Li, Kun Du, Haining Wang, Baojun Liu, Haixin Duan. Don’t Let One Rotten Apple Spoil the Whole Barrel: Towards Automated Detection of Shadowed Domains [PDF] (C2)Lingguang Lei, Yi He, Kun Sun, Jiwu Jing, Yuewu Wang, Qi Li, Jian Weng. Vulnerable Implicit Service: A Revisit [PDF] (E2)Tongxin Li, Xueqiang Wang, Mingming Zha, Kai Chen, XiaoFeng Wang, Luyi Xing, Xiaolong Bai, Nan Zhang, Xinhui Han. Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews [PDF] (D2) |
TU Wien | Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, Srivatsan Ravi. Concurrency and Privacy with Payment-Channel Networks [PDF] [Paper] (B5)Véronique Cortier, Niklas Grimm, Joseph Lallemand, Matteo Maffei. A Type System for Privacy Properties [PDF] [Paper] [Artifact] (B4) |
Tulane University | Ellis Fenske, Akshaya Mani, Aaron Johnson, Micah Sherr. Distributed Measurement with Private Set-Union Cardinality [PDF] (K1) |
Turing Lab, ASU, ISI Kolkata | Shweta Agrawal, Sanjay Bhattacherjee, Duong Hieu Phan, Damien Stehle, Shota Yamada. Efficient Public Trace-and-Revoke from Standard Assumptions [PDF] [Paper] (K1) |
U.S. Naval Research Lab | Ellis Fenske, Akshaya Mani, Aaron Johnson, Micah Sherr. Distributed Measurement with Private Set-Union Cardinality [PDF] (K1) |
United States Naval Academy | Daniel S. Roche, Adam J. Aviv, Seung Geol Choi, Travis Mayberry. Deterministic, Stash-Free Write-Only ORAM [PDF] [Paper] [Artifact] (C1) |
Universidad Politécnica de Madrid | Miguel Ambrona, Gilles Barthe, Romain Gay, Hoeteck Wee. Attribute-Based Encryption in the Generic Group Model: Automated Proofs and New Constructions [PDF] (C4) |
Universidade do Minho | José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Arthur Blot, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Hugo Pacheco, Benedikt Schmidt, Pierre-Yves Strub. Jasmin: High-Assurance and High-Speed Cryptography [PDF] [Artifact] (H4)José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Vitor Pereira. A Fast and Verified Software Stack for Secure Function Evaluation [PDF] [Paper] [Artifact] (I4) |
Université de Rennes 1 | Raphael Bost, Brice Minaud, Olga Ohrimenko. Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives [PDF] [Paper] [Artifact] (G1)Thomas Espitau, Pierre-Alain Fouque, Benoït Gérard, Mehdi Tibouchi. Side-Channel Attacks on BLISS Lattice-Based Signatures: Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers [PDF] [Paper] [Artifact] (I1) |
University College London | Shirin Nilizadeh, François Labrèche, Alireza Sadighian, Ali Zand, José Fernandez, Christopher Kruegel, Gianluca Stringhini, Giovanni Vigna. POISED: Spotting Twitter Spam Off the Beaten Paths [PDF] [Paper] (E4)Vasilios Mavroudis, Andrea Cerulli, Petr Svenda, Dan Cvrcek, Dusan Klinec, George Danezis. A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components [PDF] [Paper] [Artifact] (G5) |
University of Adelaide | Daniel Genkin, Luke Valenta, Yuval Yarom. May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519 [PDF] [Paper] (D3)Peter Pessl, Leon Groot Bruinderink, Yuval Yarom. To BLISS-B or not to be - Attacking strongSwan’s Implementation of Post-Quantum Signatures [PDF] [Paper] (I1) |
University of Alabama at Birmingham | Jian Liu, Chen Wang, Yingying Chen, Nitesh Saxena. VibWrite: Towards Finger-input Authentication on Ubiquitous Surfaces via Physical Vibration [PDF] (A2)Maliheh Shirvanian, Nitesh Saxena. CCCP: Closed Caption Crypto Phones to Resist MITM Attacks, Human Errors and Click-Through [PDF] (F3) |
University of Bonn | Alena Naiakshina, Anastasia Danilova, Christian Tiefenau, Marco Herzog, Sergej Dechand, Matthew Smith. Why Do Developers Get Password Storage Wrong? A Qualitative Usability Study [PDF] [Paper] (B2) |
University of California, Berkeley | Frank Li, Vern Paxson. A Large-Scale Empirical Study of Security Patches [PDF] (J3)Kurt Thomas, Frank Li, Ali Zand, Jake Barrett, Juri Ranieri, Luca Invernizzi, Yarik Markov, Oxana Comanescu, Vijay Eranti, Angelika Moscicki, Dan Margolis, Vern Paxson, Elie Bursztein. Data breaches, phishing, or malware? Understanding the risks of stolen credentials [PDF] (F5)Nico Döttling, Satrajit Ghosh, Jesper Buus Nielsen, Tobias Nilges, Roberto Trifiletti. TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious Linear Function Evaluation [PDF] (K1)Pramod Subramanyan, Rohit Sinha, Ilia Lebedev, Srinivas Devadas, Sanjit Seshia. A Formal Foundation for Secure Remote Execution of Enclaves [PDF] [Paper] [Artifact] (K4) ★Sarah Pearman, Jeremy Thomas, Pardis Emami Naeini, Hana Habib, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Serge Egelman, Alain Forget. Let’s go in for a closer look: Observing passwords in their natural habitat [PDF] (B2)Xiaojun Xu, Chang Liu, Qian Feng, Heng Yin, Le Song, Dawn Song. Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection [PDF] [Paper] (B3) |
University of California, Davis | Dongyu Meng, Hao Chen. MagNet: a Two-Pronged Defense against Adversarial Examples [PDF] [Paper] (A3) |
University of California, Irvine | Zhangkai Zhang, Xuhua Ding, Gene Tsudik, Jinhua Cui, Zhoujun Li. Presence Attestation: The Missing Link In Dynamic Trust Bootstrapping [PDF] (A2) |
University of California, Los Angeles | Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Michele Orru. Homomorphic Secret Sharing: Optimizations and Applications [PDF] [Artifact] (J1)Scott Ames, Carmit Hazay, Yuval Ishai, Muthuramakrishnan Venkitasubramaniam. Ligero: Lightweight Sublinear Arguments Without a Trusted Setup [PDF] (J1) |
University of California, Riverside | David Korczynski, Heng Yin. Capturing Malware Propagations with Code Injections and Code-Reuse attacks [PDF] (H2)Mohammad A. Islam, Shaolei Ren, Adam Wierman. Exploiting a Thermal Side Channel for Power Attacks in Multi-Tenant Data Centers [PDF] (E3)Xiaojun Xu, Chang Liu, Qian Feng, Heng Yin, Le Song, Dawn Song. Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection [PDF] [Paper] (B3) |
University of California, San Diego | Alexander Gamero-Garrido, Stefan Savage, Kirill Levchenko, Alex C. Snoeren. Quantifying the Pressure of Legal Risks on Third-party Vulnerability Research [PDF] [Paper] [Artifact] (G2)Mihir Bellare, Joseph Jaeger, Julia Len. Better Than Advertised: Improved Collision-Resistance Guarantees for MD-Based Hash Functions [PDF] (D4)Mihir Bellare, Viet Tung Hoang. Identity-Based Format-Preserving Encryption [PDF] (G3)Mihir Bellare, Wei Dai. Defending Against Key Exfiltration: Efficiency Improvements for Big-Key Cryptography via Large-Alphabet Subkey Prediction [PDF] (D4) |
University of California, Santa Barbara | Jake Corina, Aravind Machiry, Christopher Salls, Yan Shoshitaishvili, Shuang Hao, Christopher Kruegel, Giovanni Vigna. DIFUZE: Interface Aware Fuzzing for Kernel Drivers [PDF] [Artifact] (J2)Shirin Nilizadeh, François Labrèche, Alireza Sadighian, Ali Zand, José Fernandez, Christopher Kruegel, Gianluca Stringhini, Giovanni Vigna. POISED: Spotting Twitter Spam Off the Beaten Paths [PDF] [Paper] (E4)Yan Shoshitaishvili, Michael Weissbacher, Lukas Dresel, Christopher Salls, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna. Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance [PDF] (B3) |
University of California, Santa Cruz | Ethan Cecchetti, Andrew Myers, Owen Arden. Nonmalleable Information Flow Control [PDF] [Paper] (I2) ★Lucas Waye, Pablo Buiras, Owen Arden, Alejandro Russo, Stephen Chong. Cryptographically Secure Information Flow Control on Key-Value Stores [PDF] [Paper] (I2) |
University of Chicago | Yuanshun Yao, Bimal Viswanath, Jenna Cryan, Haitao Zheng, Ben Y. Zhao. Automated Crowdturfing Attacks and Defenses in Online Review Systems [PDF] [Paper] (E4) |
University of Chinese Academy of Sciences | Yi Chen, Wei You, Yeonjoon Lee, Kai Chen, XiaoFeng Wang, Wei Zou. Mass Discovery of Android Traffic Imprints through Instantiated Partial Execution [PDF] (D2) |
University of Connecticut | Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou. Generic Semantic Security against a Kleptographic Adversary [PDF] (D4) |
University of Delaware | Daiping Liu, Zhou Li, Kun Du, Haining Wang, Baojun Liu, Haixin Duan. Don’t Let One Rotten Apple Spoil the Whole Barrel: Towards Automated Detection of Shadowed Domains [PDF] (C2) |
University of Florida | Animesh Chhotaray, Adib Nahiyan, Thomas Shrimpton, Domenic J Forte, Mark Tehranipoor. Standardizing Bad Cryptographic Practice - A teardown of the IEEE standard for protecting electronic-design intellectual property [PDF] (G3)Grant Hernandez, Farhaan Fowze, Dave (Jing) Tian, Tuba Yavuz, Kevin Butler. FirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution [PDF] [Paper] (J4) |
University of Georgia | Yizheng Chen, Yacin Nadji, Athanasios Kountouras, Fabian Monrose, Roberto Perdisci, Manos Antonakakis, Nikolaos Vasiloglou. Practical Attacks Against Graph-based Clustering [PDF] [Paper] (E4) |
University of Illinois at Chicago | Peter Snyder, Cynthia Taylor, Chris Kanich. Most Websites Don’t Need to Vibrate: A Cost-Benefit Approach to Improving Browser Security [PDF] [Paper] (A4) |
University of Illinois at Urbana-Champaign | Wenhao Wang, Guoxing Chen, Xiaorui Pan, Yinqian Zhang, XiaoFeng Wang, Vincent Bindschaedler, Haixu Tang, Carl A. Gunter. Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX [PDF] (K4) |
University of Luebeck | Sebastian Berndt, Maciej Liskiewicz. Algorithm Substitution Attacks from a Steganographic Perspective [PDF] [Paper] (H1) |
University of Luxembourg | Michael Backes, Mathias Humbert, Jun Pang, Yang Zhang. walk2friends: Inferring Social Links from Mobility Profiles [PDF] [Paper] [Artifact] (I3) |
University of Maryland | Daniel Genkin, Luke Valenta, Yuval Yarom. May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519 [PDF] [Paper] (D3)Doowon Kim, Bum Jun Kwon, Tudor Dumitraş . Certified Malware: Measuring Breaches of Trust in the Windows Code-Signing PKI [PDF] (F5)Ethan Cecchetti, Fan Zhang, Yan Ji, Ahmed Kosba, Ari Juels, Elaine Shi. Solidus: Confidential Distributed Ledger Transactions via PVORM [PDF] [Paper] (C5)Xiao Wang, Samuel Ranellucci, Jonathan Katz. Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation [PDF] [Paper] [Artifact] (A1) ★ |
University of Massachusetts Amherst | Milad Nasr, Amir Houmansadr, Arya Mazumdar. Compressive Traffic Analysis: A New Paradigm for Scalable Traffic Analysis [PDF] [Paper] (I5)Milad Nasr, Hadi Zolfaghari, Amir Houmansadr. The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing Attacks [PDF] [Artifact] (I5)Yan Chen, Ashwin Machanavajjhala, Michael Hay, Gerome Miklau. PeGaSus: Data-Adaptive Differentially Private Stream Processing [PDF] (F4) |
University of Michigan | Kyong-Tak Cho, Kang G. Shin. Viden: Attacker Identification on In-Vehicle Networks [PDF] [Paper] (E3)Qi Alfred Chen, Matthew Thomas, Eric Osterweil, Yulong Cao, Jie You, Z. Morley Mao. Client-side Name Collision Vulnerability in the New gTLD Era: A Systematic Study [PDF] [Paper] (D5) |
University of North Carolina at Chapel Hill | Yizheng Chen, Yacin Nadji, Athanasios Kountouras, Fabian Monrose, Roberto Perdisci, Manos Antonakakis, Nikolaos Vasiloglou. Practical Attacks Against Graph-based Clustering [PDF] [Paper] (E4) |
University of Oxford | Cas Cremers, Marko Horvat, Jonathan Hoyland, Sam Scott, Thyla van der Merwe. A Comprehensive Symbolic Analysis of TLS 1.3 [PDF] [Paper] [Artifact] (H4)David Korczynski, Heng Yin. Capturing Malware Propagations with Code Injections and Code-Reuse attacks [PDF] (H2) |
University of Pennsylvania | Daniel Genkin, Luke Valenta, Yuval Yarom. May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519 [PDF] [Paper] (D3) |
University of Rochester | Scott Ames, Carmit Hazay, Yuval Ishai, Muthuramakrishnan Venkitasubramaniam. Ligero: Lightweight Sublinear Arguments Without a Trusted Setup [PDF] (J1) |
University of Southern California | Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, Srivatsan Ravi. Concurrency and Privacy with Payment-Channel Networks [PDF] [Paper] (B5) |
University of Surrey | José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Vitor Pereira. A Fast and Verified Software Stack for Secure Function Evaluation [PDF] [Paper] [Artifact] (I4) |
University of Texas at Austin | Jia Chen, Yu Feng, Isil Dillig. Precise Detection of Side-Channel Vulnerabilities using Quantitative Cartesian Hoare Logic [PDF] (D3)Riad S. Wahby, Ye Ji, Andrew J. Blumberg, abhi shelat, Justin Thaler, Michael Walfish, Thomas Wies. Full accounting for verifiable outsourcing [PDF] [Paper] (J1) |
University of Texas at Dallas | Chaoshun Zuo, Qingchuan Zhao, Zhiqiang Lin. AUTHSCOPE: Towards Automatic Discovery of Vulnerable Access Control in Online Services [PDF] (D2)Fahad Shaon, Murat Kantarcioglu, Zhiqiang Lin, Latifur Khan. SGX-BigMatrix: A Practical Encrypted Data Analytic Framework With Trusted Processors [PDF] (E5)Jake Corina, Aravind Machiry, Christopher Salls, Yan Shoshitaishvili, Shuang Hao, Christopher Kruegel, Giovanni Vigna. DIFUZE: Interface Aware Fuzzing for Kernel Drivers [PDF] [Artifact] (J2)Muhammad Yasin, Abhrajit Sengupta, Mohammed Thari Nabeel, Mohammed Ashraf, Jeyavijayan (JV) Rajendran, Ozgur Sinanoglu. Provably-Secure Logic Locking: From Theory To Practice [PDF] (G5)Sam Silvestro, Hongyu Liu, Corey Crosser, Zhiqiang Lin, Tongping Liu. FreeGuard: A Faster Secure Heap Allocator [PDF] [Artifact] (K3)Wenhao Wang, Xiaoyang Xu, Kevin Hamlen. Object Flow Integrity [PDF] (I2) |
University of Texas at San Antonio | Sam Silvestro, Hongyu Liu, Corey Crosser, Zhiqiang Lin, Tongping Liu. FreeGuard: A Faster Secure Heap Allocator [PDF] [Artifact] (K3) |
The University of Tulsa | Samaneh Tajalizadehkhoob, Tom van Goethem, Maciej Korczyński, Arman Noroozian, Rainer Böhme, Tyler Moore, Wouter Joosen, Michel van Eeten. Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting [PDF] [Paper] (C2) |
University of Utah | Min Du, Feifei Li, Guineng Zheng, Vivek Srikumar. DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning [PDF] (F2) |
University of Vigo | Simon Oya, Carmela Troncoso, Fernando Pérez-González. Back to the drawing board: Revisiting the design of optimal location privacy-preserving mechanisms [PDF] [Paper] (I3) |
University of Washington | Ada Lerner, Tadayoshi Kohno, Franziska Roesner. Rewriting History: Changing the Archived Web from the Present [PDF] [Paper] [Artifact] (H3) |
University of Waterloo | Ben Fisch, Dhinakaran Vinayagamurthy, Dan Boneh, Sergey Gorbunov. Iron: Functional Encryption using Intel SGX [PDF] [Paper] (D1) ★ |
UPF Barcelona | Gottfried Herold, Max Hoffmann, Michael Klooß , Carla Ràfols, Andy Rupp. New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs [PDF] [Paper] (G4) |
UPMC | Thomas Espitau, Pierre-Alain Fouque, Benoït Gérard, Mehdi Tibouchi. Side-Channel Attacks on BLISS Lattice-Based Signatures: Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers [PDF] [Paper] [Artifact] (I1) |
Verisign Labs | Qi Alfred Chen, Matthew Thomas, Eric Osterweil, Yulong Cao, Jie You, Z. Morley Mao. Client-side Name Collision Vulnerability in the New gTLD Era: A Systematic Study [PDF] [Paper] (D5) |
Virginia Commonwealth University | Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou. Generic Semantic Security against a Kleptographic Adversary [PDF] (D4) |
Visa Research | Nishanth Chandran, Juan Garay, Payman Mohassel, Satyanarayana Vusirikala. Efficient, Constant-Round and Actively Secure MPC: Beyond the Three-Party Case [PDF] [Paper] (B1) |
Vrije Universiteit Amsterdam | Victor van der Veen, Dennis Andriesse, Manolis Stamatogiannakis, Xi Chen, Herbert Bos, Cristiano Giuffrida. The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years Later [PDF] [Paper] [Artifact] (H2) |
Wellesley College | Ada Lerner, Tadayoshi Kohno, Franziska Roesner. Rewriting History: Changing the Archived Web from the Present [PDF] [Paper] [Artifact] (H3) |
William and Mary | Wei You, Peiyuan Zong, Kai Chen, XiaoFeng Wang, Xiaojing Liao, Pan Bian, Bin Liang. SemFuzz: Semantics-based Automatic Generation of Proof-of-Concept Exploits [PDF] (J2) |
XLIM (U. Limoges, CNRS), France | Shweta Agrawal, Sanjay Bhattacherjee, Duong Hieu Phan, Damien Stehle, Shota Yamada. Efficient Public Trace-and-Revoke from Standard Assumptions [PDF] [Paper] (K1) |
Yale University | Brent Carmer, Alex J. Malozemoff, Mariana Raykova. 5Gen-C: Multi-input Functional Encryption and Program Obfuscation for Arithmetic Circuits [PDF] [Artifact] (D1) |
Zhejiang University | Guoming Zhang, Chen Yan, Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, Wenyuan Xu. DolphinAttack: Inaudible Voice Commands [PDF] [Paper] (A3) ★ |