Topics · Papers
Mobile security and privacy
Hearing Your Voice Is Not Enough: An Articulatory Gesture Based Liveness Detection for Voice AuthenticationLinghan Zhang (Florida State University), Sheng Tan (Florida State University), Jie Yang (Florida State University)
Hindsight: Understanding the Evolution of UI Vulnerabilities in Mobile BrowsersMeng Luo (Stony Brook University), Oleksii Starov (Stony Brook University), Nima Honarmand (Stony Brook University), Nick Nikiforakis (Stony Brook University)
Querying for Queries: Indexes of Queries for Efficient and Expressive IT-PIRSyed Mahbub Hafiz (Indiana University), Ryan Henry (Indiana University)
DEFTL: Implementing Plausibly Deniable Encryption in Flash Translation LayerShijie Jia (Chinese Academy of Sciences, Institute of Information Engineering), Luning Xia (Chinese Academy of Sciences, Institute of Information Engineering), Bo Chen (Michigan Technological University), Peng Liu (The Pennsylvania State University, College of Information Sciences and Technology)
DolphinAttack: Inaudible Voice CommandsGuoming Zhang (Zhejiang University), Chen Yan (Zhejiang University), Xiaoyu Ji (Zhejiang University), Tianchen Zhang (Zhejiang University), Taimin Zhang (Zhejiang University), Wenyuan Xu (Zhejiang University)
The ART of App Compartmentalization: Compiler-based Library Privilege Separation on Stock AndroidJie Huang (CISPA, Saarland University), Oliver Schranz (CISPA, Saarland University), Sven Bugiel (CISPA, Saarland University), Michael Backes (CISPA, Saarland University)
DIFUZE: Interface Aware Fuzzing for Kernel DriversJake Corina (University of California, Santa Barbara), Aravind Machiry (University of California, Santa Barbara), Christopher Salls (University of California, Santa Barbara), Yan Shoshitaishvili (Arizona State University), Shuang Hao (University of Texas at Dallas), Christopher Kruegel (University of California, Santa Barbara), Giovanni Vigna (University of California, Santa Barbara)
Client-side Name Collision Vulnerability in the New gTLD Era: A Systematic StudyQi Alfred Chen (University of Michigan), Matthew Thomas (Verisign Labs), Eric Osterweil (Verisign Labs), Yulong Cao (University of Michigan), Jie You (University of Michigan), Z. Morley Mao (University of Michigan)
walk2friends: Inferring Social Links from Mobility ProfilesMichael Backes (CISPA, Saarland University), Mathias Humbert (Swiss Data Science Center, ETH/EPFL), Jun Pang (University of Luxembourg), Yang Zhang (CISPA, Saarland University)
Vulnerable Implicit Service: A RevisitLingguang Lei (Chinese Academy of Sciences, Institute of Information Engineering / George Mason University), Yi He (Tsinghua University), Kun Sun (George Mason University), Jiwu Jing (Chinese Academy of Sciences, Institute of Information Engineering), Yuewu Wang (Chinese Academy of Sciences, Institute of Information Engineering), Qi Li (Tsinghua University), Jian Weng (Jinan University)
Mass Discovery of Android Traffic Imprints through Instantiated Partial ExecutionYi Chen (University of Chinese Academy of Sciences), Wei You (Indiana University), Yeonjoon Lee (Indiana University), Kai Chen (University of Chinese Academy of Sciences), XiaoFeng Wang (Indiana University), Wei Zou (University of Chinese Academy of Sciences)
CCCP: Closed Caption Crypto Phones to Resist MITM Attacks, Human Errors and Click-ThroughMaliheh Shirvanian (University of Alabama at Birmingham), Nitesh Saxena (University of Alabama at Birmingham)
Practical Graphs for Optimal Side-Channel Resistant Memory-Hard FunctionsJoel Alwen (IST Austria), Jeremiah Blocki (Purdue University), Ben Harsha (Purdue University)
Keep me Updated: An Empirical Study of Third-Party Library Updatability on AndroidErik Derr (CISPA, Saarland University), Sven Bugiel (CISPA, Saarland University), Sascha Fahl (Leibniz University Hannover), Yasemin Acar (Leibniz University Hannover), Michael Backes (CISPA, Saarland University)
A Stitch in Time: Supporting Android Developers in Writing Secure CodeDuc Cuong Nguyen (CISPA, Saarland University), Dominik Wermke (Leibniz University Hannover), Yasemin Acar (Leibniz University Hannover), Michael Backes (CISPA, Saarland University), Charles Weir (Security Lancaster, Lancaster University), Sascha Fahl (Leibniz University Hannover)
Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViewsTongxin Li (Peking University), Xueqiang Wang (Indiana University), Mingming Zha (Chinese Academy of Sciences), Kai Chen (Chinese Academy of Sciences), XiaoFeng Wang (Indiana University), Luyi Xing (Indiana University), Xiaolong Bai (Tsinghua University), Nan Zhang (Indiana University), Xinhui Han (Peking University)