Title Authors
(Tool/dataset Paper) Building a commit-level dataset of real-world vulnerabilities Alexis Challande, Robin David and Guénaël Renault.
Quantifying the Risk of Wormhole Attacks on Bluetooth Contact Tracing Stefan Czybik, Daniel Arp and Konrad Rieck.
Toward Deep Learning Based Access Control Mohammad Nur Nobi, Ram Krishnan, Yufei Huang, Mehrnoosh Shakarami and Ravi Sandhu.
Leveraging Disentangled Representations to Improve Keystroke Inference Attacks Under Low Data Constraints John Lim, Jan-Michael Frahm and Fabian Monrose.
NEUTRON: A Graph-based Pipeline for Zero-Trust Network Architectures Charalampos Katsis, Fabrizio Cicala, Dan Thomsen, Nathan Ringo and Elisa Bertino.
Cache Shaping: An Effective Defense Against Cache-Based Website Fingerprinting Haipeng Li, Nan Niu and Boyang Wang.
Landmark privacy: Configurable differential privacy protection for time series Manos Katsomallos, Katerina Tzompanaki and Dimitris Kotzinos.
ReSIL: Revivifying Function Signature Inference using Deep Learning with Domain-Specific Knowledge Yan Lin, Debin Gao and David Lo.
GINN: Fast GPU-TEE Based Integrity for Neural Network Training Aref Asvadishirehjini, Murat Kantarcioglu and Bradley Malin.
Securing Smart Grids Through an Incentive Mechanism for Blockchain-Based Data Sharing Daniel Reijsbergen, Aung Maw, Anh Dinh, Yuen Chau and Wentai Li.
(Tool/dataset Paper) A modular and extensible framework for securing TLS Matteo Rizzi, Salvatore Manfredi, Giada Sciarretta and Silvio Ranise.
(Tool/dataset Paper) Hardening with Scapolite: A DevOps-based Approach for Improved Authoring, Maintaining, and Testing of Security-Configuration Guides in Large-Scale Organizations Patrick Stöckle, Ionuț Pruteanu, Bernd Grobauer and Alexander Pretschner.
A TOCTOU Attack on DICE Attestation Stefan Hristozov, Moritz Wettermann and Manuel Huber.
Recovering Structure of Input of a Binary Program Seshagiri Prabhu Narasimha and Arun Lakhotia.
Towards Practical Privacy-Preserving Kidney Exchange Malte Breuer, Ulrike Meyer and Susanne Wetzel.
EG-Booster: Explanation-Guided Booster of ML Evasion Attacks Abderrahmen Amich and Birhanu Eshete.
Security Analysis of IoT Frameworks using Static Taint Analysis Tuba Yavuz and Christopher Brant.
Prediction of Mobile App Privacy Preferences with User Profilesvia Federated Learning André Brandão, Ricardo Mendes and Joao P. Vilela.
DP-UTIL: Comprehensive Utility Analysis of Differential Privacy in Machine Learning Ismat Jarin and Birhanu Eshete.
Private Lives Matter: A Differential Private Functional Encryption Scheme Alexandros Bakas, Antonis Michalas and Tassos Dimitriou.
ProSPEC: Proactive Security Policy Enforcement for Containers Hugo Kermabon-Bobinnec, Mahmood Gholipourchoubeh, Sima Bagheri, Suryadipta Majumdar, Yosr Jarraya, Makan Pourzandi and Lingyu Wang.
(Tool/dataset Paper) Shared Multi-Keyboard and Bilingual Datasets to Support Keystroke Dynamics Research Ahmed Wahab and Daqing Hou.
Towards Automated Content-based Photo Privacy Control in User-Centered Social Networks Nishant Vishwamitra, Yifang Li, Hongxin Hu, Kelly Caine, Long Cheng, Ziming Zhao and Gail-Joon Ahn.
RS-PKE: Ranked Searchable Public-Key Encryption for Cloud-Assisted Lightweight Platforms Israt Jahan Mouri, Muhammad Ridowan and Muhammad Abdullah Adnan.
Genomic Data Sharing under Dependent Local Differential Privacy Emre Yilmaz, Tianxi Ji, Erman Ayday and Pan Li.
Toward a Resilient Key Exchange Protocol for IoT Zhangxiang Hu, Jun Li, Samuel Mergendahl and Christopher Wilson.
Efficient Dynamic Searchable Encryption with Forward Privacy under the Decent Leakage Yohei Watanabe, Kazuma Ohara, Mitsugu Iwamoto and Kazuo Ohta.
Parallel Operations over TFHE-Encrypted Multi-Digit Integers Jakub Klemsa and Melek Önen.
Towards Resiliency of Heavy Vehicles through Compromised Sensor Data Reconstruction Hossein Shirazi, William Pickard, Indrakshi Ray and Haonan Wang.
Leveraging Synthetic Data and PU Learning For Phishing Email Detection Fatima Zahra Qachfar, Rakesh Verma and Arjun Mukherjee.