ACM Conference on Computer and Communications Security

CCS 2017 - Institutions

List of Accepted Papers · Authors

Insitutions affiliated with authors of papers accepted to the 24th ACM Conference on Computer and Communications Security

Aalto University
Jian Liu, Mika Juuti, Yao Lu, N. Asokan. Oblivious Neural Network Predictions via MiniONN transformations [PDF] [Paper] (C3)
Aarhus University
Melissa Chase, David Derler, Steven Goldfeder, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig, Greg Zaverucha. Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives [PDF] (I1)
Nico Döttling, Satrajit Ghosh, Jesper Buus Nielsen, Tobias Nilges, Roberto Trifiletti. TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious Linear Function Evaluation [PDF] (K1)
Vladimir Kolesnikov, Jesper Buus Nielsen, Mike Rosulek, Ni Trieu, Roberto Trifiletti. DUPLO: Unifying Cut-and-Choose for Garbled Circuits [PDF] [Paper] [Artifact] (A1)
Academia Sinica
Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang. Certified Verification of Algebraic Properties on Low-Level Mathematical Constructs in Cryptographic Programs [PDF] (I4)
ACM Member
Daiping Liu, Zhou Li, Kun Du, Haining Wang, Baojun Liu, Haixin Duan. Don’t Let One Rotten Apple Spoil the Whole Barrel: Towards Automated Detection of Shadowed Domains [PDF] (C2)
AIT Austrian Institute of Technology
Melissa Chase, David Derler, Steven Goldfeder, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig, Greg Zaverucha. Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives [PDF] (I1)
Arizona State University
Jake Corina, Aravind Machiry, Christopher Salls, Yan Shoshitaishvili, Shuang Hao, Christopher Kruegel, Giovanni Vigna. DIFUZE: Interface Aware Fuzzing for Kernel Drivers [PDF] [Artifact] (J2)
Yan Shoshitaishvili, Michael Weissbacher, Lukas Dresel, Christopher Salls, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna. Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance [PDF] (B3)
AT&T Labs-Research
Xi He, Ashwin Machanavajjhala, Cheryl Flynn, Divesh Srivastava. Composing Differential Privacy and Secure Computation: A case study on scaling private record linkage [PDF] [Paper] (F4)
AWS
Shay Gueron, Yehuda Lindell. Better Bounds for Block Cipher Modes of Operation via Nonce-Based Key Derivation [PDF] [Paper] (E1)
Bar-Ilan University
Scott Ames, Carmit Hazay, Yuval Ishai, Muthuramakrishnan Venkitasubramaniam. Ligero: Lightweight Sublinear Arguments Without a Trusted Setup [PDF] (J1)
Shay Gueron, Yehuda Lindell. Better Bounds for Block Cipher Modes of Operation via Nonce-Based Key Derivation [PDF] [Paper] (E1)
Vladimir Kolesnikov, Naor Matania, Benny Pinkas, Mike Rosulek, Ni Trieu. Practical Multi-party Private Set Intersection from Symmetric-Key Techniques [PDF] [Paper] [Artifact] (F1)
Yehuda Lindell, Ariel Nof. A Framework for Constructing Fast MPC over Arithmetic Circuits with Malicious Adversaries and an Honest-Majority [PDF] [Paper] (B1)
Beihang University
Zhangkai Zhang, Xuhua Ding, Gene Tsudik, Jinhua Cui, Zhoujun Li. Presence Attestation: The Missing Link In Dynamic Trust Bootstrapping [PDF] (A2)
Bell Labs
Vladimir Kolesnikov, Jesper Buus Nielsen, Mike Rosulek, Ni Trieu, Roberto Trifiletti. DUPLO: Unifying Cut-and-Choose for Garbled Circuits [PDF] [Paper] [Artifact] (A1)
Vladimir Kolesnikov, Naor Matania, Benny Pinkas, Mike Rosulek, Ni Trieu. Practical Multi-party Private Set Intersection from Symmetric-Key Techniques [PDF] [Paper] [Artifact] (F1)
Ben Gurion University
Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Michele Orru. Homomorphic Secret Sharing: Optimizations and Applications [PDF] [Artifact] (J1)
Ca’ Foscari University of Venice
Matus Nemec, Marek Sys, Petr Svenda, Dusan Klinec, Vashek Matyas. The Return of Coppersmith’s Attack: Practical Factorization of Widely Used RSA Moduli [PDF] [Artifact] (H1)
California Institute of Technology
Mohammad A. Islam, Shaolei Ren, Adam Wierman. Exploiting a Thermal Side Channel for Power Attacks in Multi-Tenant Data Centers [PDF] (E3)
Carnegie Mellon University
Anupam Datta, Matthew Fredrikson, Gihyuk Ko, Piotr Mardziel, Shayak Sen. Use Privacy in Data-Driven Systems: Theory and Experiments with Machine Learnt Programs [PDF] [Paper] [Artifact] (E5)
Katherine Q. Ye, Matthew Green, Naphat Sanguansin, Lennart Beringer, Adam Petcher, Andrew W. Appel. Verified Correctness and Security of mbedTLS HMAC-DRBG [PDF] [Paper] [Artifact] (I4)
Ruiyu Zhu, Yan Huang, Darion Cassel. Pool: Scalable On-Demand Secure Computation Service Against Malicious Adversaries [PDF] [Paper] [Artifact] (B1)
Sarah Pearman, Jeremy Thomas, Pardis Emami Naeini, Hana Habib, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Serge Egelman, Alain Forget. Let’s go in for a closer look: Observing passwords in their natural habitat [PDF] (B2)
Chalmers University of Technology
Lucas Waye, Pablo Buiras, Owen Arden, Alejandro Russo, Stephen Chong. Cryptographically Secure Information Flow Control on Key-Value Stores [PDF] [Paper] (I2)
Chinese Academy of Sciences
Tongxin Li, Xueqiang Wang, Mingming Zha, Kai Chen, XiaoFeng Wang, Luyi Xing, Xiaolong Bai, Nan Zhang, Xinhui Han. Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews [PDF] (D2)
Chinese Academy of Sciences, Institute of Information Engineering
Lingguang Lei, Yi He, Kun Sun, Jiwu Jing, Yuewu Wang, Qi Li, Jian Weng. Vulnerable Implicit Service: A Revisit [PDF] (E2)
Shijie Jia, Luning Xia, Bo Chen, Peng Liu. DEFTL: Implementing Plausibly Deniable Encryption in Flash Translation Layer [PDF] (J4)
Wei You, Peiyuan Zong, Kai Chen, XiaoFeng Wang, Xiaojing Liao, Pan Bian, Bin Liang. SemFuzz: Semantics-based Automatic Generation of Proof-of-Concept Exploits [PDF] (J2)
CISPA, Saarland University
Bernd Finkbeiner, Christian Müller, Helmut Seidl, Eugen Zalinescu. Verifying Security Policies in Multi-agent Workflows with Loops [PDF] [Paper] [Artifact] (C4)
Duc Cuong Nguyen, Dominik Wermke, Yasemin Acar, Michael Backes, Charles Weir, Sascha Fahl. A Stitch in Time: Supporting Android Developers in Writing Secure Code [PDF] (E2)
Erik Derr, Sven Bugiel, Sascha Fahl, Yasemin Acar, Michael Backes. Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android [PDF] [Paper] [Artifact] (J3)
Giancarlo Pellegrino, Martin Johns, Simon Koch, Michael Backes, Christian Rossow. Deemon: Detecting CSRF with Dynamic Analysis and Property Graphs [PDF] [Paper] (H3)
Jie Huang, Oliver Schranz, Sven Bugiel, Michael Backes. The ART of App Compartmentalization: Compiler-based Library Privilege Separation on Stock Android [PDF] (E2)
Michael Backes, Mathias Humbert, Jun Pang, Yang Zhang. walk2friends: Inferring Social Links from Mobility Profiles [PDF] [Paper] [Artifact] (I3)
City College of New York
Matteo Campanelli, Rosario Gennaro, Steven Goldfeder, Luca Nizzardo. Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services [PDF] [Paper] [Artifact] (A5)
Colgate University
Yan Chen, Ashwin Machanavajjhala, Michael Hay, Gerome Miklau. PeGaSus: Data-Adaptive Differentially Private Stream Processing [PDF] (F4)
College of Science and Engineering, Hamad Bin Khalifa University
Zhan Qin, Yin Yang, Ting Yu, Xiaokui Xiao, Issa Khalil, Kui Ren. Generating Synthetic Decentralized Social Graphs with Local Differential Privacy [PDF] (B4)
Columbia University
Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou. Generic Semantic Security against a Kleptographic Adversary [PDF] (D4)
Theofilos Petsios, Jason Zhao, Angelos D. Keromytis, Suman Jana. SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities [PDF] [Paper] (J2)
Cornell Tech
Congzheng Song, Thomas Ristenpart, Vitaly Shmatikov. Machine Learning Models that Remember Too Much [PDF] (C3)
Rahul Chatterjee, Joanne Woodage, Yuval Pnueli, Anusha Chowdhury, Thomas Ristenpart. The TypTop System: Personalized Typo-tolerant Password Checking [PDF] [Paper] [Artifact] (B2)
Cornell Tech, Jacobs Institute
Ethan Cecchetti, Fan Zhang, Yan Ji, Ahmed Kosba, Ari Juels, Elaine Shi. Solidus: Confidential Distributed Ledger Transactions via PVORM [PDF] [Paper] (C5)
Cornell University
Congzheng Song, Thomas Ristenpart, Vitaly Shmatikov. Machine Learning Models that Remember Too Much [PDF] (C3)
Ethan Cecchetti, Andrew Myers, Owen Arden. Nonmalleable Information Flow Control [PDF] [Paper] (I2)
Ethan Cecchetti, Fan Zhang, Yan Ji, Ahmed Kosba, Ari Juels, Elaine Shi. Solidus: Confidential Distributed Ledger Transactions via PVORM [PDF] [Paper] (C5)
Keith Bonawitz, Vladimir Ivanov, Ben Kreuter, Antonio Marcedone, H. Brendan McMahan, Sarvar Patel, Daniel Ramage, Aaron Segal, Karn Seth. Practical Secure Aggregation for Privacy-Preserving Machine Learning [PDF] [Paper] (E5)
Rahul Chatterjee, Joanne Woodage, Yuval Pnueli, Anusha Chowdhury, Thomas Ristenpart. The TypTop System: Personalized Typo-tolerant Password Checking [PDF] [Paper] [Artifact] (B2)
Data61
Daniel Genkin, Luke Valenta, Yuval Yarom. May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519 [PDF] [Paper] (D3)
Peter Pessl, Leon Groot Bruinderink, Yuval Yarom. To BLISS-B or not to be - Attacking strongSwan’s Implementation of Post-Quantum Signatures [PDF] [Paper] (I1)
DCC FC Universidade do Porto
José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Arthur Blot, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Hugo Pacheco, Benedikt Schmidt, Pierre-Yves Strub. Jasmin: High-Assurance and High-Speed Cryptography [PDF] [Artifact] (H4)
José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Vitor Pereira. A Fast and Verified Software Stack for Secure Function Evaluation [PDF] [Paper] [Artifact] (I4)
Delft University of Technology
Samaneh Tajalizadehkhoob, Tom van Goethem, Maciej Korczyński, Arman Noroozian, Rainer Böhme, Tyler Moore, Wouter Joosen, Michel van Eeten. Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting [PDF] [Paper] (C2)
Denmark Technical University
Melissa Chase, David Derler, Steven Goldfeder, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig, Greg Zaverucha. Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives [PDF] (I1)
DGA.MI
Thomas Espitau, Pierre-Alain Fouque, Benoït Gérard, Mehdi Tibouchi. Side-Channel Attacks on BLISS Lattice-Based Signatures: Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers [PDF] [Paper] [Artifact] (I1)
Direction Générale de l’Armement - Maitrise de l’Information
Raphael Bost, Brice Minaud, Olga Ohrimenko. Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives [PDF] [Paper] [Artifact] (G1)
Drexel University
Rebekah Overdorf, Marc Juarez, Gunes Acar, Rachel Greenstadt, Claudia Diaz. How Unique is Your .onion? An Analysis of the Fingerprintability of Tor Onion Services [PDF] [Paper] [Artifact] (I5)
Duke University
Xi He, Ashwin Machanavajjhala, Cheryl Flynn, Divesh Srivastava. Composing Differential Privacy and Secure Computation: A case study on scaling private record linkage [PDF] [Paper] (F4)
Yan Chen, Ashwin Machanavajjhala, Michael Hay, Gerome Miklau. PeGaSus: Data-Adaptive Differentially Private Stream Processing [PDF] (F4)
Ecole Polytechnique
José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Arthur Blot, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Hugo Pacheco, Benedikt Schmidt, Pierre-Yves Strub. Jasmin: High-Assurance and High-Speed Cryptography [PDF] [Artifact] (H4)
École Polytechnique de Montréal
Shirin Nilizadeh, François Labrèche, Alireza Sadighian, Ali Zand, José Fernandez, Christopher Kruegel, Gianluca Stringhini, Giovanni Vigna. POISED: Spotting Twitter Spam Off the Beaten Paths [PDF] [Paper] (E4)
Eindhoven University of Technology
Luca Allodi. Economic Factors of Vulnerability Trade and Exploitation: Empirical evidence from a prominent Russian cybercrime market [PDF] [Paper] (G2)
EnigmaBridge
Matus Nemec, Marek Sys, Petr Svenda, Dusan Klinec, Vashek Matyas. The Return of Coppersmith’s Attack: Practical Factorization of Widely Used RSA Moduli [PDF] [Artifact] (H1)
Vasilios Mavroudis, Andrea Cerulli, Petr Svenda, Dan Cvrcek, Dusan Klinec, George Danezis. A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components [PDF] [Paper] [Artifact] (G5)
ENS Lyon
Gottfried Herold, Max Hoffmann, Michael Klooß , Carla Ràfols, Andy Rupp. New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs [PDF] [Paper] (G4)
José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Arthur Blot, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Hugo Pacheco, Benedikt Schmidt, Pierre-Yves Strub. Jasmin: High-Assurance and High-Speed Cryptography [PDF] [Artifact] (H4)
ENS Lyon, Laboratoire LIP (U. Lyon, CNRS, ENSL, INRIA, UCBL)
Shweta Agrawal, Sanjay Bhattacherjee, Duong Hieu Phan, Damien Stehle, Shota Yamada. Efficient Public Trace-and-Revoke from Standard Assumptions [PDF] [Paper] (K1)
ENS, Paris
Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Michele Orru. Homomorphic Secret Sharing: Optimizations and Applications [PDF] [Artifact] (J1)
Miguel Ambrona, Gilles Barthe, Romain Gay, Hoeteck Wee. Attribute-Based Encryption in the Generic Group Model: Automated Proofs and New Constructions [PDF] (C4)
ETH Zürich
Jan Camenisch, Manu Drijvers, Maria Dubovitskaya. Practical UC-Secure Delegatable Credentials with Attributes and Their Application to Blockchain [PDF] (C5)
Martin Kucera, Petar Tsankov, Timon Gehr, Marco Guarnieri, Martin Vechev. Synthesis of Probabilistic Privacy Enforcement [PDF] [Artifact] (B4)
Rami Khalil, Arthur Gervais. Revive: Rebalancing Off-Blockchain Payment Networks [PDF] [Artifact] (B5)
Florida State University
Linghan Zhang, Sheng Tan, Jie Yang. Hearing Your Voice Is Not Enough: An Articulatory Gesture Based Liveness Detection for Voice Authentication [PDF] (A2)
Mihir Bellare, Viet Tung Hoang. Identity-Based Format-Preserving Encryption [PDF] (G3)
Friedrich-Alexander University Erlangen Nuernberg
Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, Srivatsan Ravi. Concurrency and Privacy with Payment-Channel Networks [PDF] [Paper] (B5)
Galois, Inc.
Brent Carmer, Alex J. Malozemoff, Mariana Raykova. 5Gen-C: Multi-input Functional Encryption and Program Obfuscation for Arithmetic Circuits [PDF] [Artifact] (D1)
George Mason University
Lingguang Lei, Yi He, Kun Sun, Jiwu Jing, Yuewu Wang, Qi Li, Jian Weng. Vulnerable Implicit Service: A Revisit [PDF] (E2)
Xiao Wang, Samuel Ranellucci, Jonathan Katz. Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation [PDF] [Paper] [Artifact] (A1)
Xiao Wang, Samuel Ranellucci, Jonathan Katz. Global-Scale Secure Multiparty Computation [PDF] [Paper] [Artifact] (A1)
Georgetown University
Ellis Fenske, Akshaya Mani, Aaron Johnson, Micah Sherr. Distributed Measurement with Private Set-Union Cardinality [PDF] (K1)
Riad S. Wahby, Ye Ji, Andrew J. Blumberg, abhi shelat, Justin Thaler, Michael Walfish, Thomas Wies. Full accounting for verifiable outsourcing [PDF] [Paper] (J1)
Georgia Institute of Technology
Huasong Shan, Qingyang Wang, Calton Pu. Tail Attacks on Web Applications [PDF] (H3)
Jian Huang, Jun Xu, Xinyu Xing, Peng Liu, Moinuddin K. Qureshi. FlashGuard: Leveraging Intrinsic Flash Properties to Defend Against Encryption Ransomware [PDF] (J4)
Panagiotis Kintis, Najmeh Miramirkhani, Charles Lever, Yizheng Chen, Rosa Romero-Gómez, Nikolaos Pitropakis, Nick Nikiforakis, Manos Antonakakis. Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse [PDF] [Paper] (C2)
Ruian Duan, Ashish Bijlani, Meng Xu, Taesoo Kim, Wenke Lee. Checking Open-Source License Violation and 1-day Security Risk at Large Scale [PDF] (J3)
Wen Xu, Sanidhya Kashyap, Changwoo Min, Taesoo Kim. Designing New Operating Primitives to Improve Fuzzing Performance [PDF] (K2)
Xiaojun Xu, Chang Liu, Qian Feng, Heng Yin, Le Song, Dawn Song. Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection [PDF] [Paper] (B3)
Yang Ji, Sangho Lee, Evan Downing, Weiren Wang, Mattia Fazzini, Taesoo Kim, Alessandro Orso, Wenke Lee. RAIN: Refinable Attack Investigation with On-demand Inter-Process Information Flow Tracking [PDF] (B3)
Yizheng Chen, Yacin Nadji, Athanasios Kountouras, Fabian Monrose, Roberto Perdisci, Manos Antonakakis, Nikolaos Vasiloglou. Practical Attacks Against Graph-based Clustering [PDF] [Paper] (E4)
Google
Keith Bonawitz, Vladimir Ivanov, Ben Kreuter, Antonio Marcedone, H. Brendan McMahan, Sarvar Patel, Daniel Ramage, Aaron Segal, Karn Seth. Practical Secure Aggregation for Privacy-Preserving Machine Learning [PDF] [Paper] (E5)
Kurt Thomas, Frank Li, Ali Zand, Jake Barrett, Juri Ranieri, Luca Invernizzi, Yarik Markov, Oxana Comanescu, Vijay Eranti, Angelika Moscicki, Dan Margolis, Vern Paxson, Elie Bursztein. Data breaches, phishing, or malware? Understanding the risks of stolen credentials [PDF] (F5)
Mustafa Emre Acer, Emily Stark, Adrienne Porter Felt, Sascha Fahl, Radhika Bhargava, Bhanu Dev, Matt Braithwaite, Ryan Sleevi, Parisa Tabriz. Where the Wild Warnings Are: Root Causes of Chrome HTTPS Certificate Errors [PDF] (F5)
Sarah Pearman, Jeremy Thomas, Pardis Emami Naeini, Hana Habib, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Serge Egelman, Alain Forget. Let’s go in for a closer look: Observing passwords in their natural habitat [PDF] (B2)
Sebastian Lekies, Krzysztof Kotowicz, Samuel Groß , Eduardo Vela, Martin Johns. Code-reuse attacks for the Web: Breaking Cross-Site Scripting Mitigations via Script Gadgets [PDF] (H2)
Graz University of Technology
Melissa Chase, David Derler, Steven Goldfeder, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig, Greg Zaverucha. Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives [PDF] (I1)
Peter Pessl, Leon Groot Bruinderink, Yuval Yarom. To BLISS-B or not to be - Attacking strongSwan’s Implementation of Post-Quantum Signatures [PDF] [Paper] (I1)
Haifa University
Shay Gueron, Yehuda Lindell. Better Bounds for Block Cipher Modes of Operation via Nonce-Based Key Derivation [PDF] [Paper] (E1)
Harvard University
Lucas Waye, Pablo Buiras, Owen Arden, Alejandro Russo, Stephen Chong. Cryptographically Secure Information Flow Control on Key-Value Stores [PDF] [Paper] (I2)
HASLab – INESC TEC
José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Arthur Blot, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Hugo Pacheco, Benedikt Schmidt, Pierre-Yves Strub. Jasmin: High-Assurance and High-Speed Cryptography [PDF] [Artifact] (H4)
José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Vitor Pereira. A Fast and Verified Software Stack for Secure Function Evaluation [PDF] [Paper] [Artifact] (I4)
Huawei Technologies Düsseldorf
Yong Li, Sven Schäge. No-Match Attacks and Robust Partnering Definitions — Defining Trivial Attacks for Security Protocols is Not Trivial [PDF] [Paper] (F3)
IBM
Shai Halevi, Tzipora Halevi, Victor Shoup, Noah Stephens-Davidowitz. Implementing BP-Obfuscation Using Graph-Induced Encoding [PDF] [Paper] (D1)
IBM and New York University
Shai Halevi, Tzipora Halevi, Victor Shoup, Noah Stephens-Davidowitz. Implementing BP-Obfuscation Using Graph-Induced Encoding [PDF] [Paper] (D1)
IBM Research - Zürich
Jan Camenisch, Manu Drijvers, Maria Dubovitskaya. Practical UC-Secure Delegatable Credentials with Attributes and Their Application to Blockchain [PDF] (C5)
Rafael del Pino, Vadim Lyubashevsky, Gregory Neven, Gregor Seiler. Practical Quantum-Safe Voting from Lattices [PDF] (G4)
IDC Herzliya
Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Michele Orru. Homomorphic Secret Sharing: Optimizations and Applications [PDF] [Artifact] (J1)
IIT Madras
Shweta Agrawal, Sanjay Bhattacherjee, Duong Hieu Phan, Damien Stehle, Shota Yamada. Efficient Public Trace-and-Revoke from Standard Assumptions [PDF] [Paper] (K1)
IMDEA Software Institute
José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Arthur Blot, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Hugo Pacheco, Benedikt Schmidt, Pierre-Yves Strub. Jasmin: High-Assurance and High-Speed Cryptography [PDF] [Artifact] (H4)
José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Vitor Pereira. A Fast and Verified Software Stack for Secure Function Evaluation [PDF] [Paper] [Artifact] (I4)
Miguel Ambrona, Gilles Barthe, Romain Gay, Hoeteck Wee. Attribute-Based Encryption in the Generic Group Model: Automated Proofs and New Constructions [PDF] (C4)
Simon Oya, Carmela Troncoso, Fernando Pérez-González. Back to the drawing board: Revisiting the design of optimal location privacy-preserving mechanisms [PDF] [Paper] (I3)
IMDEA Software Institute and Universidad Politécnica de Madrid
Matteo Campanelli, Rosario Gennaro, Steven Goldfeder, Luca Nizzardo. Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services [PDF] [Paper] [Artifact] (A5)
Indiana University
Ruiyu Zhu, Yan Huang, Darion Cassel. Pool: Scalable On-Demand Secure Computation Service Against Malicious Adversaries [PDF] [Paper] [Artifact] (B1)
Syed Mahbub Hafiz, Ryan Henry. Querying for Queries: Indexes of Queries for Efficient and Expressive IT-PIR [PDF] [Paper] (F4)
Tongxin Li, Xueqiang Wang, Mingming Zha, Kai Chen, XiaoFeng Wang, Luyi Xing, Xiaolong Bai, Nan Zhang, Xinhui Han. Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews [PDF] (D2)
Wei You, Peiyuan Zong, Kai Chen, XiaoFeng Wang, Xiaojing Liao, Pan Bian, Bin Liang. SemFuzz: Semantics-based Automatic Generation of Proof-of-Concept Exploits [PDF] (J2)
Wenhao Wang, Guoxing Chen, Xiaorui Pan, Yinqian Zhang, XiaoFeng Wang, Vincent Bindschaedler, Haixu Tang, Carl A. Gunter. Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX [PDF] (K4)
Yi Chen, Wei You, Yeonjoon Lee, Kai Chen, XiaoFeng Wang, Wei Zou. Mass Discovery of Android Traffic Imprints through Instantiated Partial Execution [PDF] (D2)
Innsbruck University
Samaneh Tajalizadehkhoob, Tom van Goethem, Maciej Korczyński, Arman Noroozian, Rainer Böhme, Tyler Moore, Wouter Joosen, Michel van Eeten. Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting [PDF] [Paper] (C2)
Inria
José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Arthur Blot, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Hugo Pacheco, Benedikt Schmidt, Pierre-Yves Strub. Jasmin: High-Assurance and High-Speed Cryptography [PDF] [Artifact] (H4)
Véronique Cortier, Niklas Grimm, Joseph Lallemand, Matteo Maffei. A Type System for Privacy Properties [PDF] [Paper] [Artifact] (B4)
Inria Paris
Jean-Karim Zinzindohoué, Karthikeyan Bhargavan, Jonathan Protzenko, Benjamin Beurdouche. HACL*: A Verified Modern Cryptographic Library [PDF] [Paper] [Artifact] (H4)
INRIA Sophia-Antipolis
José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Vitor Pereira. A Fast and Verified Software Stack for Secure Function Evaluation [PDF] [Paper] [Artifact] (I4)
International Institute of Information Technology Hyderabad
Mustafa Emre Acer, Emily Stark, Adrienne Porter Felt, Sascha Fahl, Radhika Bhargava, Bhanu Dev, Matt Braithwaite, Ryan Sleevi, Parisa Tabriz. Where the Wild Warnings Are: Root Causes of Chrome HTTPS Certificate Errors [PDF] (F5)
IST Austria
Joel Alwen, Jeremiah Blocki, Ben Harsha. Practical Graphs for Optimal Side-Channel Resistant Memory-Hard Functions [PDF] [Paper] [Artifact] (E1)
Jinan University
Lingguang Lei, Yi He, Kun Sun, Jiwu Jing, Yuewu Wang, Qi Li, Jian Weng. Vulnerable Implicit Service: A Revisit [PDF] (E2)
Johns Hopkins University
Arka Rai Choudhuri, Matthew Green, Abhishek Jain, Gabriel Kaptchuk, Ian Miers. Fairness in an Unfair World: Fair Multiparty Computation from Public Bulletin Boards [PDF] (C5)
Katherine Q. Ye, Matthew Green, Naphat Sanguansin, Lennart Beringer, Adam Petcher, Andrew W. Appel. Verified Correctness and Security of mbedTLS HMAC-DRBG [PDF] [Paper] [Artifact] (I4)
Matthew Green, Ian Miers. Bolt: Anonymous Payment Channels for Decentralized Currencies [PDF] (B5)
KAIST
HyungSeok Han, Sang Kil Cha. IMF: Inferred Model-based Fuzzer [PDF] [Artifact] (K2)
Yujin Kwon, Dohyun Kim, Yunmok Son, Eugene Vasserman, Yongdae Kim. Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin [PDF] [Paper] (A5)
Kansas State University
Yujin Kwon, Dohyun Kim, Yunmok Son, Eugene Vasserman, Yongdae Kim. Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin [PDF] [Paper] (A5)
Karlsruhe Institute of Technology
Gottfried Herold, Max Hoffmann, Michael Klooß , Carla Ràfols, Andy Rupp. New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs [PDF] [Paper] (G4)
Gunnar Hartung, Max Hoffmann, Matthias Nagel, Andy Rupp. BBA+: Improving the Security and Applicability of Privacy-Preserving Point Collection [PDF] (I3)
KU Leuven
Rebekah Overdorf, Marc Juarez, Gunes Acar, Rachel Greenstadt, Claudia Diaz. How Unique is Your .onion? An Analysis of the Fingerprintability of Tor Onion Services [PDF] [Paper] [Artifact] (I5)
KU Leuven, imec-DistriNet
Mathy Vanhoef, Frank Piessens. Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2 [PDF] [Paper] (F3)
Samaneh Tajalizadehkhoob, Tom van Goethem, Maciej Korczyński, Arman Noroozian, Rainer Böhme, Tyler Moore, Wouter Joosen, Michel van Eeten. Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting [PDF] [Paper] (C2)
Thomas Vissers, Timothy Barron, Tom Van Goethem, Wouter Joosen, Nick Nikiforakis. The Wolf of Name Street: Hijacking Domains Through Their Nameservers [PDF] [Paper] (D5)
Lehigh University
Yinzhi Cao, Zhanhao Chen, Song Li, Shujiang Wu. Deterministic Browser [PDF] [Paper] [Artifact] (A4)
Leibniz University Hannover
Duc Cuong Nguyen, Dominik Wermke, Yasemin Acar, Michael Backes, Charles Weir, Sascha Fahl. A Stitch in Time: Supporting Android Developers in Writing Secure Code [PDF] (E2)
Erik Derr, Sven Bugiel, Sascha Fahl, Yasemin Acar, Michael Backes. Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android [PDF] [Paper] [Artifact] (J3)
Mustafa Emre Acer, Emily Stark, Adrienne Porter Felt, Sascha Fahl, Radhika Bhargava, Bhanu Dev, Matt Braithwaite, Ryan Sleevi, Parisa Tabriz. Where the Wild Warnings Are: Root Causes of Chrome HTTPS Certificate Errors [PDF] (F5)
London South Bank University
Panagiotis Kintis, Najmeh Miramirkhani, Charles Lever, Yizheng Chen, Rosa Romero-Gómez, Nikolaos Pitropakis, Nick Nikiforakis, Manos Antonakakis. Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse [PDF] [Paper] (C2)
Loria, CNRS
Véronique Cortier, Niklas Grimm, Joseph Lallemand, Matteo Maffei. A Type System for Privacy Properties [PDF] [Paper] [Artifact] (B4)
Louisiana State University, Computer Science and Engineering Division
Huasong Shan, Qingyang Wang, Calton Pu. Tail Attacks on Web Applications [PDF] (H3)
Masaryk University
Matus Nemec, Marek Sys, Petr Svenda, Dusan Klinec, Vashek Matyas. The Return of Coppersmith’s Attack: Practical Factorization of Widely Used RSA Moduli [PDF] [Artifact] (H1)
Vasilios Mavroudis, Andrea Cerulli, Petr Svenda, Dan Cvrcek, Dusan Klinec, George Danezis. A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components [PDF] [Paper] [Artifact] (G5)
Massachusetts Institute of Technology
Pramod Subramanyan, Rohit Sinha, Ilia Lebedev, Srinivas Devadas, Sanjit Seshia. A Formal Foundation for Secure Remote Execution of Enclaves [PDF] [Paper] [Artifact] (K4)
The Max Planck Institute For Software Systems
Cas Cremers, Marko Horvat, Jonathan Hoyland, Sam Scott, Thyla van der Merwe. A Comprehensive Symbolic Analysis of TLS 1.3 [PDF] [Paper] [Artifact] (H4)
Michigan Technological University
Shijie Jia, Luning Xia, Bo Chen, Peng Liu. DEFTL: Implementing Plausibly Deniable Encryption in Flash Translation Layer [PDF] (J4)
Microsoft
Victor van der Veen, Dennis Andriesse, Manolis Stamatogiannakis, Xi Chen, Herbert Bos, Cristiano Giuffrida. The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years Later [PDF] [Paper] [Artifact] (H2)
Microsoft Research
Hao Chen, Kim Laine, Peter Rindal. Fast Private Set Intersection from Homomorphic Encryption [PDF] [Paper] (F1)
Jean-Karim Zinzindohoué, Karthikeyan Bhargavan, Jonathan Protzenko, Benjamin Beurdouche. HACL*: A Verified Modern Cryptographic Library [PDF] [Paper] [Artifact] (H4)
Melissa Chase, David Derler, Steven Goldfeder, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig, Greg Zaverucha. Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives [PDF] (I1)
Shashank Agrawal, Melissa Chase. FAME: Fast Attribute-based Message Encryption [PDF] [Paper] [Artifact] (C4)
Microsoft Research India
Nishanth Chandran, Juan Garay, Payman Mohassel, Satyanarayana Vusirikala. Efficient, Constant-Round and Actively Secure MPC: Beyond the Three-Party Case [PDF] [Paper] (B1)
Microsoft Research, Cambridge
Raphael Bost, Brice Minaud, Olga Ohrimenko. Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives [PDF] [Paper] [Artifact] (G1)
Nanyang Technological University
Zhan Qin, Yin Yang, Ting Yu, Xiaokui Xiao, Issa Khalil, Kui Ren. Generating Synthetic Decentralized Social Graphs with Local Differential Privacy [PDF] (B4)
National Institute of Advanced Industrial Science and Technology (AIST), Japan
Shweta Agrawal, Sanjay Bhattacherjee, Duong Hieu Phan, Damien Stehle, Shota Yamada. Efficient Public Trace-and-Revoke from Standard Assumptions [PDF] [Paper] (K1)
National Security Research Institute
Kee Sung Kim, Minkyu Kim, Dongsoo Lee, Je Hong Park, Woo-Hwan Kim. Forward Secure Dynamic Searchable Symmetric Encryption with Efficient Updates [PDF] (G1)
National University of Singapore
Hung Dang, Yue Huang, Ee-Chien Chang. Evading Classifiers by Morphing in the Dark [PDF] (A3)
Marcel Böhme, Van-Thuan Pham, Manh-Dung Nguyen, Abhik Roychoudhury. Directed Greybox Fuzzing [PDF] [Paper] [Artifact] (K2)
New Jersey Institute of Technology
Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou. Generic Semantic Security against a Kleptographic Adversary [PDF] (D4)
New York University
Hossein Siadati, Nasir Memon. Detecting Structurally Anomalous Logins Within Enterprise Networks [PDF] (F2)
Muhammad Yasin, Abhrajit Sengupta, Mohammed Thari Nabeel, Mohammed Ashraf, Jeyavijayan (JV) Rajendran, Ozgur Sinanoglu. Provably-Secure Logic Locking: From Theory To Practice [PDF] (G5)
Riad S. Wahby, Ye Ji, Andrew J. Blumberg, abhi shelat, Justin Thaler, Michael Walfish, Thomas Wies. Full accounting for verifiable outsourcing [PDF] [Paper] (J1)
Shai Halevi, Tzipora Halevi, Victor Shoup, Noah Stephens-Davidowitz. Implementing BP-Obfuscation Using Graph-Induced Encoding [PDF] [Paper] (D1)
Newcastle University
Changyu Dong, Yilei Wang, Amjad Aldweesh, Patrick McCorry, Aad van Moorsel. Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing [PDF] [Paper] [Artifact] (A5)
Northeastern University
Jack Doerner, abhi shelat. Scaling ORAM for Secure Computation [PDF] [Paper] [Artifact] (C1)
Riad S. Wahby, Ye Ji, Andrew J. Blumberg, abhi shelat, Justin Thaler, Michael Walfish, Thomas Wies. Full accounting for verifiable outsourcing [PDF] [Paper] (J1)
Yan Shoshitaishvili, Michael Weissbacher, Lukas Dresel, Christopher Salls, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna. Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance [PDF] (B3)
NTT Secure Platform Laboratories
Thomas Espitau, Pierre-Alain Fouque, Benoït Gérard, Mehdi Tibouchi. Side-Channel Attacks on BLISS Lattice-Based Signatures: Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers [PDF] [Paper] [Artifact] (I1)
The Ohio State University
Wenhao Wang, Guoxing Chen, Xiaorui Pan, Yinqian Zhang, XiaoFeng Wang, Vincent Bindschaedler, Haixu Tang, Carl A. Gunter. Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX [PDF] (K4)
Yuan Xiao, Mengyuan Li, Sanchuan Chen, Yinqian Zhang. Stacco: Differentially Analyzing Side-Channel Traces for Detecting SSL/TLS Vulnerabilities in Secure Enclaves [PDF] [Paper] (D3)
Oracle
Katherine Q. Ye, Matthew Green, Naphat Sanguansin, Lennart Beringer, Adam Petcher, Andrew W. Appel. Verified Correctness and Security of mbedTLS HMAC-DRBG [PDF] [Paper] [Artifact] (I4)
Oregon State University
Brent Carmer, Alex J. Malozemoff, Mariana Raykova. 5Gen-C: Multi-input Functional Encryption and Program Obfuscation for Arithmetic Circuits [PDF] [Artifact] (D1)
Hao Chen, Kim Laine, Peter Rindal. Fast Private Set Intersection from Homomorphic Encryption [PDF] [Paper] (F1)
Peter Rindal, Mike Rosulek. Malicious-Secure Private Set Intersection via Dual Execution [PDF] [Paper] [Artifact] (F1)
Thang Hoang, Ceyhun D. Ozkaptan, Attila A. Yavuz, Jorge Guajardo, Tam Nguyen. S3ORAM: A Computation-Efficient and Constant Client Bandwidth Blowup ORAM with Shamir Secret Sharing [PDF] [Paper] [Artifact] (C1)
Vladimir Kolesnikov, Jesper Buus Nielsen, Mike Rosulek, Ni Trieu, Roberto Trifiletti. DUPLO: Unifying Cut-and-Choose for Garbled Circuits [PDF] [Paper] [Artifact] (A1)
Vladimir Kolesnikov, Naor Matania, Benny Pinkas, Mike Rosulek, Ni Trieu. Practical Multi-party Private Set Intersection from Symmetric-Key Techniques [PDF] [Paper] [Artifact] (F1)
Peking University
Tongxin Li, Xueqiang Wang, Mingming Zha, Kai Chen, XiaoFeng Wang, Luyi Xing, Xiaolong Bai, Nan Zhang, Xinhui Han. Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews [PDF] (D2)
The Pennsylvania State University
Jian Huang, Jun Xu, Xinyu Xing, Peng Liu, Moinuddin K. Qureshi. FlashGuard: Leveraging Intrinsic Flash Properties to Defend Against Encryption Ransomware [PDF] (J4)
Shen Liu, Gang Tan, Trent Jaeger. PtrSplit: Supporting general pointers in automatic program partitioning [PDF] (K3)
The Pennsylvania State University, College of Information Sciences and Technology
Shijie Jia, Luning Xia, Bo Chen, Peng Liu. DEFTL: Implementing Plausibly Deniable Encryption in Flash Translation Layer [PDF] (J4)
Princeton University
Katherine Q. Ye, Matthew Green, Naphat Sanguansin, Lennart Beringer, Adam Petcher, Andrew W. Appel. Verified Correctness and Security of mbedTLS HMAC-DRBG [PDF] [Paper] [Artifact] (I4)
Matteo Campanelli, Rosario Gennaro, Steven Goldfeder, Luca Nizzardo. Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services [PDF] [Paper] [Artifact] (A5)
Melissa Chase, David Derler, Steven Goldfeder, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig, Greg Zaverucha. Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives [PDF] (I1)
Purdue University
Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, Srivatsan Ravi. Concurrency and Privacy with Payment-Channel Networks [PDF] [Paper] (B5)
Joel Alwen, Jeremiah Blocki, Ben Harsha. Practical Graphs for Optimal Side-Channel Resistant Memory-Hard Functions [PDF] [Paper] [Artifact] (E1)
Mustafa Emre Acer, Emily Stark, Adrienne Porter Felt, Sascha Fahl, Radhika Bhargava, Bhanu Dev, Matt Braithwaite, Ryan Sleevi, Parisa Tabriz. Where the Wild Warnings Are: Root Causes of Chrome HTTPS Certificate Errors [PDF] (F5)
Yuseok Jeon, Priyam Biswas, Scott Carr, Byoungyoung Lee, Mathias Payer. HexType: Efficient Detection of Type Confusion Errors for C++ [PDF] (K3)
Qatar Computing Research Institute, Hamad Bin Khalifa University
Zhan Qin, Yin Yang, Ting Yu, Xiaokui Xiao, Issa Khalil, Kui Ren. Generating Synthetic Decentralized Social Graphs with Local Differential Privacy [PDF] (B4)
Renmin University of China
Wei You, Peiyuan Zong, Kai Chen, XiaoFeng Wang, Xiaojing Liao, Pan Bian, Bin Liang. SemFuzz: Semantics-based Automatic Generation of Proof-of-Concept Exploits [PDF] (J2)
Robert Bosch Research and Technology Center
Thang Hoang, Ceyhun D. Ozkaptan, Attila A. Yavuz, Jorge Guajardo, Tam Nguyen. S3ORAM: A Computation-Efficient and Constant Client Bandwidth Blowup ORAM with Shamir Secret Sharing [PDF] [Paper] [Artifact] (C1)
Royal Holloway, University of London
Cas Cremers, Marko Horvat, Jonathan Hoyland, Sam Scott, Thyla van der Merwe. A Comprehensive Symbolic Analysis of TLS 1.3 [PDF] [Paper] [Artifact] (H4)
Rahul Chatterjee, Joanne Woodage, Yuval Pnueli, Anusha Chowdhury, Thomas Ristenpart. The TypTop System: Personalized Typo-tolerant Password Checking [PDF] [Paper] [Artifact] (B2)
Raphael Bost, Brice Minaud, Olga Ohrimenko. Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives [PDF] [Paper] [Artifact] (G1)
Ruhr-Universität Bochum
Gottfried Herold, Max Hoffmann, Michael Klooß , Carla Ràfols, Andy Rupp. New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs [PDF] [Paper] (G4)
Gunnar Hartung, Max Hoffmann, Matthias Nagel, Andy Rupp. BBA+: Improving the Security and Applicability of Privacy-Preserving Point Collection [PDF] (I3)
Yong Li, Sven Schäge. No-Match Attacks and Robust Partnering Definitions — Defining Trivial Attacks for Security Protocols is Not Trivial [PDF] [Paper] (F3)
Rutgers University
Jian Liu, Chen Wang, Yingying Chen, Nitesh Saxena. VibWrite: Towards Finger-input Authentication on Ubiquitous Surfaces via Physical Vibration [PDF] (A2)
Yi Han, Sriharsha Etigowni, Hua Liu, Saman Zonouz, Athina Petropulu. Watch Me, but Don’t Touch Me! Contactless Control Flow Monitoring via Electromagnetic Emanations [PDF] [Paper] (E3)
Samsung Research America
Xiaojun Xu, Chang Liu, Qian Feng, Heng Yin, Le Song, Dawn Song. Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection [PDF] [Paper] (B3)
SAP SE
Giancarlo Pellegrino, Martin Johns, Simon Koch, Michael Backes, Christian Rossow. Deemon: Detecting CSRF with Dynamic Analysis and Property Graphs [PDF] [Paper] (H3)
Sebastian Lekies, Krzysztof Kotowicz, Samuel Groß , Eduardo Vela, Martin Johns. Code-reuse attacks for the Web: Breaking Cross-Site Scripting Mitigations via Script Gadgets [PDF] (H2)
Security Lancaster, Lancaster University
Duc Cuong Nguyen, Dominik Wermke, Yasemin Acar, Michael Backes, Charles Weir, Sascha Fahl. A Stitch in Time: Supporting Android Developers in Writing Secure Code [PDF] (E2)
Shanghai Jiao Tong University
Xiaojun Xu, Chang Liu, Qian Feng, Heng Yin, Le Song, Dawn Song. Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection [PDF] [Paper] (B3)
ShanghaiTech University
Dongyu Meng, Hao Chen. MagNet: a Two-Pronged Defense against Adversarial Examples [PDF] [Paper] (A3)
Singapore Management University
Zhangkai Zhang, Xuhua Ding, Gene Tsudik, Jinhua Cui, Zhoujun Li. Presence Attestation: The Missing Link In Dynamic Trust Bootstrapping [PDF] (A2)
Snap, Inc.
Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou. Generic Semantic Security against a Kleptographic Adversary [PDF] (D4)
Stanford University
Ben Fisch, Dhinakaran Vinayagamurthy, Dan Boneh, Sergey Gorbunov. Iron: Functional Encryption using Intel SGX [PDF] [Paper] (D1)
Dmitry Kogan, Nathan Manohar, Dan Boneh. T/Key: Second-Factor Authentication From Secure Hash Chains [PDF] [Paper] (E1)
Riad S. Wahby, Ye Ji, Andrew J. Blumberg, abhi shelat, Justin Thaler, Michael Walfish, Thomas Wies. Full accounting for verifiable outsourcing [PDF] [Paper] (J1)
State University of New York at Buffalo
Zhan Qin, Yin Yang, Ting Yu, Xiaokui Xiao, Issa Khalil, Kui Ren. Generating Synthetic Decentralized Social Graphs with Local Differential Privacy [PDF] (B4)
Stevens Institute of Technology
Briland Hitaj, Giuseppe Ateniese, Fernando Perez-Cruz. Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning [PDF] [Paper] (C3)
Stony Brook University
Meng Luo, Oleksii Starov, Nima Honarmand, Nick Nikiforakis. Hindsight: Understanding the Evolution of UI Vulnerabilities in Mobile Browsers [PDF] (A4)
Panagiotis Kintis, Najmeh Miramirkhani, Charles Lever, Yizheng Chen, Rosa Romero-Gómez, Nikolaos Pitropakis, Nick Nikiforakis, Manos Antonakakis. Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse [PDF] [Paper] (C2)
Thomas Vissers, Timothy Barron, Tom Van Goethem, Wouter Joosen, Nick Nikiforakis. The Wolf of Name Street: Hijacking Domains Through Their Nameservers [PDF] [Paper] (D5)
Swiss Data Science Center, ETH/EPFL
Michael Backes, Mathias Humbert, Jun Pang, Yang Zhang. walk2friends: Inferring Social Links from Mobility Profiles [PDF] [Paper] [Artifact] (I3)
Symantec
Yizheng Chen, Yacin Nadji, Athanasios Kountouras, Fabian Monrose, Roberto Perdisci, Manos Antonakakis, Nikolaos Vasiloglou. Practical Attacks Against Graph-based Clustering [PDF] [Paper] (E4)
Symantec Research Labs
Leyla Bilge, Yufei Han, Matteo Dell’Amico. Predicting the Risk of Cyber Incidents [PDF] (F2)
Technion
Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Michele Orru. Homomorphic Secret Sharing: Optimizations and Applications [PDF] [Artifact] (J1)
Scott Ames, Carmit Hazay, Yuval Ishai, Muthuramakrishnan Venkitasubramaniam. Ligero: Lightweight Sublinear Arguments Without a Trusted Setup [PDF] (J1)
Technion - Israel Institute of Technology
Rahul Chatterjee, Joanne Woodage, Yuval Pnueli, Anusha Chowdhury, Thomas Ristenpart. The TypTop System: Personalized Typo-tolerant Password Checking [PDF] [Paper] [Artifact] (B2)
Technische Universität Berlin
Shahin Tajik, Heiko Lohrke, Jean-Pierre Seifert, Christian Boit. On the Power of Optical Contactless Probing: Attacking Bitstream Encryption of FPGAs [PDF] [Paper] (H1)
Technische Universität Darmstadt
Tommaso Frassetto, David Gens, Christopher Liebchen, Ahmad-Reza Sadeghi. JITGuard: Hardening Just-in-time Compilers with SGX [PDF] [Paper] (K4)
Technische Universität München
Bernd Finkbeiner, Christian Müller, Helmut Seidl, Eugen Zalinescu. Verifying Security Policies in Multi-agent Workflows with Loops [PDF] [Paper] [Artifact] (C4)
Technische Universiteit Eindhoven
Peter Pessl, Leon Groot Bruinderink, Yuval Yarom. To BLISS-B or not to be - Attacking strongSwan’s Implementation of Post-Quantum Signatures [PDF] [Paper] (I1)
Texas A&M University
Nishanth Chandran, Juan Garay, Payman Mohassel, Satyanarayana Vusirikala. Efficient, Constant-Round and Actively Secure MPC: Beyond the Three-Party Case [PDF] [Paper] (B1)
Zain Shamsi, Daren B.H. Cline, Dmitri Loguinov. Faulds: A Non-Parametric Iterative Classifier for Internet-Wide OS Fingerprinting [PDF] [Paper] (D5)
Tsinghua University
Daiping Liu, Zhou Li, Kun Du, Haining Wang, Baojun Liu, Haixin Duan. Don’t Let One Rotten Apple Spoil the Whole Barrel: Towards Automated Detection of Shadowed Domains [PDF] (C2)
Lingguang Lei, Yi He, Kun Sun, Jiwu Jing, Yuewu Wang, Qi Li, Jian Weng. Vulnerable Implicit Service: A Revisit [PDF] (E2)
Tongxin Li, Xueqiang Wang, Mingming Zha, Kai Chen, XiaoFeng Wang, Luyi Xing, Xiaolong Bai, Nan Zhang, Xinhui Han. Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews [PDF] (D2)
TU Wien
Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, Srivatsan Ravi. Concurrency and Privacy with Payment-Channel Networks [PDF] [Paper] (B5)
Véronique Cortier, Niklas Grimm, Joseph Lallemand, Matteo Maffei. A Type System for Privacy Properties [PDF] [Paper] [Artifact] (B4)
Tulane University
Ellis Fenske, Akshaya Mani, Aaron Johnson, Micah Sherr. Distributed Measurement with Private Set-Union Cardinality [PDF] (K1)
Turing Lab, ASU, ISI Kolkata
Shweta Agrawal, Sanjay Bhattacherjee, Duong Hieu Phan, Damien Stehle, Shota Yamada. Efficient Public Trace-and-Revoke from Standard Assumptions [PDF] [Paper] (K1)
U.S. Naval Research Lab
Ellis Fenske, Akshaya Mani, Aaron Johnson, Micah Sherr. Distributed Measurement with Private Set-Union Cardinality [PDF] (K1)
United States Naval Academy
Daniel S. Roche, Adam J. Aviv, Seung Geol Choi, Travis Mayberry. Deterministic, Stash-Free Write-Only ORAM [PDF] [Paper] [Artifact] (C1)
Universidad Politécnica de Madrid
Miguel Ambrona, Gilles Barthe, Romain Gay, Hoeteck Wee. Attribute-Based Encryption in the Generic Group Model: Automated Proofs and New Constructions [PDF] (C4)
Universidade do Minho
José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Arthur Blot, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Hugo Pacheco, Benedikt Schmidt, Pierre-Yves Strub. Jasmin: High-Assurance and High-Speed Cryptography [PDF] [Artifact] (H4)
José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Vitor Pereira. A Fast and Verified Software Stack for Secure Function Evaluation [PDF] [Paper] [Artifact] (I4)
Université de Rennes 1
Raphael Bost, Brice Minaud, Olga Ohrimenko. Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives [PDF] [Paper] [Artifact] (G1)
Thomas Espitau, Pierre-Alain Fouque, Benoït Gérard, Mehdi Tibouchi. Side-Channel Attacks on BLISS Lattice-Based Signatures: Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers [PDF] [Paper] [Artifact] (I1)
University College London
Shirin Nilizadeh, François Labrèche, Alireza Sadighian, Ali Zand, José Fernandez, Christopher Kruegel, Gianluca Stringhini, Giovanni Vigna. POISED: Spotting Twitter Spam Off the Beaten Paths [PDF] [Paper] (E4)
Vasilios Mavroudis, Andrea Cerulli, Petr Svenda, Dan Cvrcek, Dusan Klinec, George Danezis. A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components [PDF] [Paper] [Artifact] (G5)
University of Adelaide
Daniel Genkin, Luke Valenta, Yuval Yarom. May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519 [PDF] [Paper] (D3)
Peter Pessl, Leon Groot Bruinderink, Yuval Yarom. To BLISS-B or not to be - Attacking strongSwan’s Implementation of Post-Quantum Signatures [PDF] [Paper] (I1)
University of Alabama at Birmingham
Jian Liu, Chen Wang, Yingying Chen, Nitesh Saxena. VibWrite: Towards Finger-input Authentication on Ubiquitous Surfaces via Physical Vibration [PDF] (A2)
Maliheh Shirvanian, Nitesh Saxena. CCCP: Closed Caption Crypto Phones to Resist MITM Attacks, Human Errors and Click-Through [PDF] (F3)
University of Bonn
Alena Naiakshina, Anastasia Danilova, Christian Tiefenau, Marco Herzog, Sergej Dechand, Matthew Smith. Why Do Developers Get Password Storage Wrong? A Qualitative Usability Study [PDF] [Paper] (B2)
University of California, Berkeley
Frank Li, Vern Paxson. A Large-Scale Empirical Study of Security Patches [PDF] (J3)
Kurt Thomas, Frank Li, Ali Zand, Jake Barrett, Juri Ranieri, Luca Invernizzi, Yarik Markov, Oxana Comanescu, Vijay Eranti, Angelika Moscicki, Dan Margolis, Vern Paxson, Elie Bursztein. Data breaches, phishing, or malware? Understanding the risks of stolen credentials [PDF] (F5)
Nico Döttling, Satrajit Ghosh, Jesper Buus Nielsen, Tobias Nilges, Roberto Trifiletti. TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious Linear Function Evaluation [PDF] (K1)
Pramod Subramanyan, Rohit Sinha, Ilia Lebedev, Srinivas Devadas, Sanjit Seshia. A Formal Foundation for Secure Remote Execution of Enclaves [PDF] [Paper] [Artifact] (K4)
Sarah Pearman, Jeremy Thomas, Pardis Emami Naeini, Hana Habib, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Serge Egelman, Alain Forget. Let’s go in for a closer look: Observing passwords in their natural habitat [PDF] (B2)
Xiaojun Xu, Chang Liu, Qian Feng, Heng Yin, Le Song, Dawn Song. Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection [PDF] [Paper] (B3)
University of California, Davis
Dongyu Meng, Hao Chen. MagNet: a Two-Pronged Defense against Adversarial Examples [PDF] [Paper] (A3)
University of California, Irvine
Zhangkai Zhang, Xuhua Ding, Gene Tsudik, Jinhua Cui, Zhoujun Li. Presence Attestation: The Missing Link In Dynamic Trust Bootstrapping [PDF] (A2)
University of California, Los Angeles
Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Michele Orru. Homomorphic Secret Sharing: Optimizations and Applications [PDF] [Artifact] (J1)
Scott Ames, Carmit Hazay, Yuval Ishai, Muthuramakrishnan Venkitasubramaniam. Ligero: Lightweight Sublinear Arguments Without a Trusted Setup [PDF] (J1)
University of California, Riverside
David Korczynski, Heng Yin. Capturing Malware Propagations with Code Injections and Code-Reuse attacks [PDF] (H2)
Mohammad A. Islam, Shaolei Ren, Adam Wierman. Exploiting a Thermal Side Channel for Power Attacks in Multi-Tenant Data Centers [PDF] (E3)
Xiaojun Xu, Chang Liu, Qian Feng, Heng Yin, Le Song, Dawn Song. Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection [PDF] [Paper] (B3)
University of California, San Diego
Alexander Gamero-Garrido, Stefan Savage, Kirill Levchenko, Alex C. Snoeren. Quantifying the Pressure of Legal Risks on Third-party Vulnerability Research [PDF] [Paper] [Artifact] (G2)
Mihir Bellare, Joseph Jaeger, Julia Len. Better Than Advertised: Improved Collision-Resistance Guarantees for MD-Based Hash Functions [PDF] (D4)
Mihir Bellare, Viet Tung Hoang. Identity-Based Format-Preserving Encryption [PDF] (G3)
Mihir Bellare, Wei Dai. Defending Against Key Exfiltration: Efficiency Improvements for Big-Key Cryptography via Large-Alphabet Subkey Prediction [PDF] (D4)
University of California, Santa Barbara
Jake Corina, Aravind Machiry, Christopher Salls, Yan Shoshitaishvili, Shuang Hao, Christopher Kruegel, Giovanni Vigna. DIFUZE: Interface Aware Fuzzing for Kernel Drivers [PDF] [Artifact] (J2)
Shirin Nilizadeh, François Labrèche, Alireza Sadighian, Ali Zand, José Fernandez, Christopher Kruegel, Gianluca Stringhini, Giovanni Vigna. POISED: Spotting Twitter Spam Off the Beaten Paths [PDF] [Paper] (E4)
Yan Shoshitaishvili, Michael Weissbacher, Lukas Dresel, Christopher Salls, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna. Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance [PDF] (B3)
University of California, Santa Cruz
Ethan Cecchetti, Andrew Myers, Owen Arden. Nonmalleable Information Flow Control [PDF] [Paper] (I2)
Lucas Waye, Pablo Buiras, Owen Arden, Alejandro Russo, Stephen Chong. Cryptographically Secure Information Flow Control on Key-Value Stores [PDF] [Paper] (I2)
University of Chicago
Yuanshun Yao, Bimal Viswanath, Jenna Cryan, Haitao Zheng, Ben Y. Zhao. Automated Crowdturfing Attacks and Defenses in Online Review Systems [PDF] [Paper] (E4)
University of Chinese Academy of Sciences
Yi Chen, Wei You, Yeonjoon Lee, Kai Chen, XiaoFeng Wang, Wei Zou. Mass Discovery of Android Traffic Imprints through Instantiated Partial Execution [PDF] (D2)
University of Connecticut
Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou. Generic Semantic Security against a Kleptographic Adversary [PDF] (D4)
University of Delaware
Daiping Liu, Zhou Li, Kun Du, Haining Wang, Baojun Liu, Haixin Duan. Don’t Let One Rotten Apple Spoil the Whole Barrel: Towards Automated Detection of Shadowed Domains [PDF] (C2)
University of Florida
Animesh Chhotaray, Adib Nahiyan, Thomas Shrimpton, Domenic J Forte, Mark Tehranipoor. Standardizing Bad Cryptographic Practice - A teardown of the IEEE standard for protecting electronic-design intellectual property [PDF] (G3)
Grant Hernandez, Farhaan Fowze, Dave (Jing) Tian, Tuba Yavuz, Kevin Butler. FirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution [PDF] [Paper] (J4)
University of Georgia
Yizheng Chen, Yacin Nadji, Athanasios Kountouras, Fabian Monrose, Roberto Perdisci, Manos Antonakakis, Nikolaos Vasiloglou. Practical Attacks Against Graph-based Clustering [PDF] [Paper] (E4)
University of Illinois at Chicago
Peter Snyder, Cynthia Taylor, Chris Kanich. Most Websites Don’t Need to Vibrate: A Cost-Benefit Approach to Improving Browser Security [PDF] [Paper] (A4)
University of Illinois at Urbana-Champaign
Wenhao Wang, Guoxing Chen, Xiaorui Pan, Yinqian Zhang, XiaoFeng Wang, Vincent Bindschaedler, Haixu Tang, Carl A. Gunter. Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX [PDF] (K4)
University of Luebeck
Sebastian Berndt, Maciej Liskiewicz. Algorithm Substitution Attacks from a Steganographic Perspective [PDF] [Paper] (H1)
University of Luxembourg
Michael Backes, Mathias Humbert, Jun Pang, Yang Zhang. walk2friends: Inferring Social Links from Mobility Profiles [PDF] [Paper] [Artifact] (I3)
University of Maryland
Daniel Genkin, Luke Valenta, Yuval Yarom. May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519 [PDF] [Paper] (D3)
Doowon Kim, Bum Jun Kwon, Tudor Dumitraş . Certified Malware: Measuring Breaches of Trust in the Windows Code-Signing PKI [PDF] (F5)
Ethan Cecchetti, Fan Zhang, Yan Ji, Ahmed Kosba, Ari Juels, Elaine Shi. Solidus: Confidential Distributed Ledger Transactions via PVORM [PDF] [Paper] (C5)
Xiao Wang, Samuel Ranellucci, Jonathan Katz. Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation [PDF] [Paper] [Artifact] (A1)
Xiao Wang, Samuel Ranellucci, Jonathan Katz. Global-Scale Secure Multiparty Computation [PDF] [Paper] [Artifact] (A1)
University of Massachusetts Amherst
Milad Nasr, Amir Houmansadr, Arya Mazumdar. Compressive Traffic Analysis: A New Paradigm for Scalable Traffic Analysis [PDF] [Paper] (I5)
Milad Nasr, Hadi Zolfaghari, Amir Houmansadr. The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing Attacks [PDF] [Artifact] (I5)
Yan Chen, Ashwin Machanavajjhala, Michael Hay, Gerome Miklau. PeGaSus: Data-Adaptive Differentially Private Stream Processing [PDF] (F4)
University of Michigan
Kyong-Tak Cho, Kang G. Shin. Viden: Attacker Identification on In-Vehicle Networks [PDF] [Paper] (E3)
Qi Alfred Chen, Matthew Thomas, Eric Osterweil, Yulong Cao, Jie You, Z. Morley Mao. Client-side Name Collision Vulnerability in the New gTLD Era: A Systematic Study [PDF] [Paper] (D5)
University of North Carolina at Chapel Hill
Yizheng Chen, Yacin Nadji, Athanasios Kountouras, Fabian Monrose, Roberto Perdisci, Manos Antonakakis, Nikolaos Vasiloglou. Practical Attacks Against Graph-based Clustering [PDF] [Paper] (E4)
University of Oxford
Cas Cremers, Marko Horvat, Jonathan Hoyland, Sam Scott, Thyla van der Merwe. A Comprehensive Symbolic Analysis of TLS 1.3 [PDF] [Paper] [Artifact] (H4)
David Korczynski, Heng Yin. Capturing Malware Propagations with Code Injections and Code-Reuse attacks [PDF] (H2)
University of Pennsylvania
Daniel Genkin, Luke Valenta, Yuval Yarom. May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519 [PDF] [Paper] (D3)
University of Rochester
Scott Ames, Carmit Hazay, Yuval Ishai, Muthuramakrishnan Venkitasubramaniam. Ligero: Lightweight Sublinear Arguments Without a Trusted Setup [PDF] (J1)
University of Southern California
Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, Srivatsan Ravi. Concurrency and Privacy with Payment-Channel Networks [PDF] [Paper] (B5)
University of Surrey
José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Vitor Pereira. A Fast and Verified Software Stack for Secure Function Evaluation [PDF] [Paper] [Artifact] (I4)
University of Texas at Austin
Jia Chen, Yu Feng, Isil Dillig. Precise Detection of Side-Channel Vulnerabilities using Quantitative Cartesian Hoare Logic [PDF] (D3)
Riad S. Wahby, Ye Ji, Andrew J. Blumberg, abhi shelat, Justin Thaler, Michael Walfish, Thomas Wies. Full accounting for verifiable outsourcing [PDF] [Paper] (J1)
University of Texas at Dallas
Chaoshun Zuo, Qingchuan Zhao, Zhiqiang Lin. AUTHSCOPE: Towards Automatic Discovery of Vulnerable Access Control in Online Services [PDF] (D2)
Fahad Shaon, Murat Kantarcioglu, Zhiqiang Lin, Latifur Khan. SGX-BigMatrix: A Practical Encrypted Data Analytic Framework With Trusted Processors [PDF] (E5)
Jake Corina, Aravind Machiry, Christopher Salls, Yan Shoshitaishvili, Shuang Hao, Christopher Kruegel, Giovanni Vigna. DIFUZE: Interface Aware Fuzzing for Kernel Drivers [PDF] [Artifact] (J2)
Muhammad Yasin, Abhrajit Sengupta, Mohammed Thari Nabeel, Mohammed Ashraf, Jeyavijayan (JV) Rajendran, Ozgur Sinanoglu. Provably-Secure Logic Locking: From Theory To Practice [PDF] (G5)
Sam Silvestro, Hongyu Liu, Corey Crosser, Zhiqiang Lin, Tongping Liu. FreeGuard: A Faster Secure Heap Allocator [PDF] [Artifact] (K3)
Wenhao Wang, Xiaoyang Xu, Kevin Hamlen. Object Flow Integrity [PDF] (I2)
University of Texas at San Antonio
Sam Silvestro, Hongyu Liu, Corey Crosser, Zhiqiang Lin, Tongping Liu. FreeGuard: A Faster Secure Heap Allocator [PDF] [Artifact] (K3)
The University of Tulsa
Samaneh Tajalizadehkhoob, Tom van Goethem, Maciej Korczyński, Arman Noroozian, Rainer Böhme, Tyler Moore, Wouter Joosen, Michel van Eeten. Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting [PDF] [Paper] (C2)
University of Utah
Min Du, Feifei Li, Guineng Zheng, Vivek Srikumar. DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning [PDF] (F2)
University of Vigo
Simon Oya, Carmela Troncoso, Fernando Pérez-González. Back to the drawing board: Revisiting the design of optimal location privacy-preserving mechanisms [PDF] [Paper] (I3)
University of Washington
Ada Lerner, Tadayoshi Kohno, Franziska Roesner. Rewriting History: Changing the Archived Web from the Present [PDF] [Paper] [Artifact] (H3)
University of Waterloo
Ben Fisch, Dhinakaran Vinayagamurthy, Dan Boneh, Sergey Gorbunov. Iron: Functional Encryption using Intel SGX [PDF] [Paper] (D1)
UPF Barcelona
Gottfried Herold, Max Hoffmann, Michael Klooß , Carla Ràfols, Andy Rupp. New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs [PDF] [Paper] (G4)
UPMC
Thomas Espitau, Pierre-Alain Fouque, Benoït Gérard, Mehdi Tibouchi. Side-Channel Attacks on BLISS Lattice-Based Signatures: Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers [PDF] [Paper] [Artifact] (I1)
Verisign Labs
Qi Alfred Chen, Matthew Thomas, Eric Osterweil, Yulong Cao, Jie You, Z. Morley Mao. Client-side Name Collision Vulnerability in the New gTLD Era: A Systematic Study [PDF] [Paper] (D5)
Virginia Commonwealth University
Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou. Generic Semantic Security against a Kleptographic Adversary [PDF] (D4)
Visa Research
Nishanth Chandran, Juan Garay, Payman Mohassel, Satyanarayana Vusirikala. Efficient, Constant-Round and Actively Secure MPC: Beyond the Three-Party Case [PDF] [Paper] (B1)
Shashank Agrawal, Melissa Chase. FAME: Fast Attribute-based Message Encryption [PDF] [Paper] [Artifact] (C4)
Vrije Universiteit Amsterdam
Victor van der Veen, Dennis Andriesse, Manolis Stamatogiannakis, Xi Chen, Herbert Bos, Cristiano Giuffrida. The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years Later [PDF] [Paper] [Artifact] (H2)
Wellesley College
Ada Lerner, Tadayoshi Kohno, Franziska Roesner. Rewriting History: Changing the Archived Web from the Present [PDF] [Paper] [Artifact] (H3)
William and Mary
Wei You, Peiyuan Zong, Kai Chen, XiaoFeng Wang, Xiaojing Liao, Pan Bian, Bin Liang. SemFuzz: Semantics-based Automatic Generation of Proof-of-Concept Exploits [PDF] (J2)
XLIM (U. Limoges, CNRS), France
Shweta Agrawal, Sanjay Bhattacherjee, Duong Hieu Phan, Damien Stehle, Shota Yamada. Efficient Public Trace-and-Revoke from Standard Assumptions [PDF] [Paper] (K1)
Yale University
Brent Carmer, Alex J. Malozemoff, Mariana Raykova. 5Gen-C: Multi-input Functional Encryption and Program Obfuscation for Arithmetic Circuits [PDF] [Artifact] (D1)
Zhejiang University
Guoming Zhang, Chen Yan, Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, Wenyuan Xu. DolphinAttack: Inaudible Voice Commands [PDF] [Paper] (A3)