Title Authors
BFastPay: a Routing-free Protocol for Fast Payment in Bitcoin Network Xinyu Lei (Michigan State University), Guan-Hua Tu (Michigan State University), Tian Xie (Michigan State University) and Sihan Wang (Michigan State University)
Security Threats from Bitcoin Wallet Smartphone Applications: Vulnerabilities, Attacks, and Countermeasures Yiwen Hu (Michigan State University), Sihan Wang (Michigan State University), Guan-Hua Tu (Michigan State University), Li Xiao (Michigan State University), Tian Xie (Michigan State Univeristy), Xinyu Lei (Michigan State University) and Chi-Yu Li (National Chiao Tung University)
Real-Time Evasion Attacks against Deep Learning-Based Anomaly Detection from Distributed System Logs Jerome Dinal Herath (State University of New York at Binghamton), Ping Yang (State University of New York at Binghamton) and Guanhua Yan (State University of New York at Binghamton)
Don’t fool yourself with Forward Privacy, Your queries STILL belong to us! Khosro Salmani (Mount Royal University) and Ken Barker (University of Calgary)
Towards Accurate Labeling of Android Apps for Reliable Malware Detection Aleieldin Salem (Technische Universität München)
Brittle Features of Device Authentication Washington Garcia (University of Florida), Animesh Chhotaray (University of Florida), Joseph Choi (University of Florida), Suman Kalyan Adari (University of Florida), Kevin Butler (University of Florida) and Somesh Jha (University of Wisconsin-Madison)
Code Specialization through Dynamic Feature Observation Priyam Biswas (Purdue University), Nathan Burow (Purdue University) and Mathias Payer (EPFL)
Ghost Thread: Effective User-Space Cache Side Channel Protection Robert Brotzman (Pennsylvania State University), Danfeng Zhang (Pennsylvania State University), Mahmut Kandemir (Pennsylvania State University) and Gang Tan (Pennsylvania State University)
Adaptive Fingerprinting: Website Fingerprinting over Few Encrypted Traffic Chenggang Wang (University of Cincinnati), Jimmy Dani (University of Cincinnati), Xiang Li (University of Cincinnati), Xiaodong Jia (University of Cincinnati) and Boyang Wang (University of Cincinnati)
BlockFLA: Accountable Federated Learning via Hybrid Blockchain Architecture Harsh Desai (The University of Texas at Dallas), Mustafa Ozdayi (The University of Texas at Dallas) and Murat Kantarcioglu (The University of Texas at Dallas)
(Dataset/Tool Paper) SteemOps: Extracting and Analyzing Key Operations in Steemit Blockchain-based Social Media Platform Chao Li (Beijing Jiaotong University), Balaji Palanisamy (University of Pittsburgh), Runhua Xu (IBM Research - Almaden), Jinlai Xu (University of Pittsburgh) and Jingzhe Wang (University of Pittsburgh)
SE-PAC: A Self-Evolving Packer Classifier against rapid packers evolution Lamine Noureddine (Univ Rennes, Inria, CNRS, IRISA, Rennes, France), Annelie Heuser (Univ Rennes, Inria, CNRS, IRISA, Rennes, France), Cassius Puodzius (Univ Rennes, Inria, CNRS, IRISA, Rennes, France) and Olivier Zendra (Univ Rennes, Inria, CNRS, IRISA, Rennes, France)
Role-Based Deception in Enterprise Networks Iffat Anjum (North Carolina State University), Mu Zhu (North Carolina State University), Isaac Polinsky (North Carolina State University), William Enck (North Carolina State University), Michael Reiter (University of North Carolina, Chapel Hill) and Munindar Singh (North Carolina State University)
Contact Tracing Made Un-relay-able Marco Casagrande (University of Padua), Mauro Conti (University of Padua) and Eleonora Losiouk (University of Padua)
(Dataset/Tool Paper) The Cost of OSCORE and EDHOC for Constrained Devices Stefan Hristozov (Fraunhofer AISEC), Manuel Huber (Microsoft), Lei Xu (Fraunhofer AISEC), Jaro Fietz (Fraunhofer AISEC), Marco Liess (Fraunhofer AISEC) and Georg Sigl (Technical University of Munich)
Decentralized Reputation Tassos Dimitriou (Computer Technology Institute, Greece and Kuwait University, Kuwait)
Identifying and Characterizing COVID-19 Themed Malicious Domain Campaigns Pengcheng Xia (Beijing University of Posts and Telecommunications), Mohamed Nabeel (Qatar Computing Research Institute), Issa Khalil (Qatar Computing Research Institute), Haoyu Wang (Beijing University of Posts and Telecommunications) and Ting Yu (Qatar Computing Research Institute)
Graph-Based Specification of Admin-CBAC Policies Clara Bertolissi (Université Aix-Marseille, CNRS UMR 7020), Maribel Fernandez (KCL) and Bhavani Thuraisingham (University of Texas at Dallas)
(Dataset/Tool Paper) Secure Pull Printing with QR Codes and National eID Cards: a Software-oriented Design and an Open-source Implementation Matteo Leonelli (Fondazione Bruno Kessler (FBK)), Umberto Morelli (Fondazione Bruno Kessler (FBK)), Giada Sciarretta (Fondazione Bruno Kessler (FBK)) and Silvio Ranise (Fondazione Bruno Kessler (FBK), University of Trento)
Incremental Maintenance of ABAC Policies Gunjan Batra (Rutgers University), Vijay Atluri (Rutgers University), Jaideep Vaidya (Rutgers University) and Shamik Sural (IIT, Kharagpur)
(Dataset/Tool Paper) A Large Publicly Available Corpus of Website Privacy Policies Based on DMOZ Razieh Nokhbeh Zaeem (The University of Texas at Austin) and K. Suzanne Barber (The University of Texas at Austin)
Formal Analysis of ReBAC Policy Mining Feasibility Shuvra Chakraborty (The University of Texas at San Antonio) and Ravi Sandhu (The University of Texas at San Antonio)
Utrack: Enterprise User Tracking Based on OS-Level Audit Logs Yue Li (College of William & Mary), Zhenyu Wu (Google), Haining Wang (Virginia Tech), Kun Sun (George Mason University), Zhichun Li (Stellar Cyber), Kangkook Jee (University of Texas at Dallas), Junghwan Rhee (University of Central Oklahoma) and Haifeng Chen (NEC Laboratories America)
Using Single-Step Adversarial Training to Defend Iterative Adversarial Examples Guanxiong Liu (New Jersey Institute of Technology), Issa Khalil (QCRI) and Abdallah Khreishah (New Jersey Institute of Technology)
Membership Inference Attacks and Defenses in Classification Models Jiacheng Li (Purdue University), Ninghui Li (Purdue University) and Bruno Ribeiro (Purdue University)
We can pay less : Coordinated False Data Injection Attack against Residential Demand Response in Smart Grids Thusitha Dayaratne (Monash University), Carsten Rudolph (Monash University), Ariel Liebman (Monash University) and Mahsa Salehi (Monash University)