Detection of Electromagnetic Signal Injection Attacks on Actuator Systems |
Youqian Zhang, University of Oxford
|
Kasper Rasmussen, University of Oxford
|
|
Write Me and I'll Tell You Secrets - Write-After-Write Effects On Intel CPUs |
Jan Philipp Thoma, Horst Görtz Institute for IT-Security, Ruhr University Bochum
|
Tim Güneysu , Horst Görtz Institute for IT-Security, Ruhr University Bochum
|
|
A scalable tracing tool for non-rooted and off-the-shelf Android phones |
Alain Tchana, ENS Lyon, France
|
Yérom-David Bromberg, Univ. Rennes, Inria, CNRS, IRISA
|
Lavoisier Wapet, ENS Lyon, France
|
|
Viopolicy-Detector: An Automated Approach to Detecting GDPR Compliance Violations in Websites |
Haoran Ou, School of Cyber Science and Engineering, Sichuan University
|
Yong Fang, School of Cyber Science and Engineering, Sichuan University
|
Wenbo Guo, School of Cyber Science and Engineering, Sichuan University
|
Yongyan Guo, School of Cyber Science and Engineering, Sichuan University
|
Cheng Huang, School of Cyber Science and Engineering, Sichuan University
|
|
Zigbee's Network Rejoin Procedure for IoT Systems: Vulnerabilities and Implications |
Jincheng Wang, The Chinese University of Hong Kong
|
Zhuohua Li, The Chinese University of Hong Kong
|
Mingshen Sun, Baidu
|
John C. S. Lui, The Chinese University of Hong Kong
|
|
Automated Runtime Mitigation for Misconfiguration Vulnerabilities in Industrial Control Systems |
Qingzhao Zhang, University of Michigan
|
Xiao Zhu, University of Michigan
|
Mu Zhang, University of Utah
|
Z. Morley Mao, University of Michigan and Google
|
|
OAuch: Exploring the Weaknesses of the OAuth 2.0 Ecosystem |
Pieter Philippaerts, imec-DistriNet, KU Leuven
|
Davy Preuveneers, imec-DistriNet, KU Leuven
|
Wouter Joosen, imec-DistriNet, KU Leuven
|
|
BinProv: Binary Code Provenance Identification without Disassembly |
Xu He, George Mason University
|
Shu Wang, George Mason University
|
Yunlong Xing, George Mason University
|
Pengbin Feng, George Mason University
|
Haining Wang, Virginia Tech
|
Qi Li, Tsinghua University
|
Songqing Chen, George Mason University
|
Kun Sun, George Mason University
|
|
What You See is Not What You Get: Revealing Hidden Memory Mapping for Peripheral Modeling |
Jun Yeon Won, Ohio State University
|
Haohuang Wen, Ohio State University
|
Zhiqiang Lin, Ohio State University
|
|
Content-Agnostic Detection of Phishing Domains using Certificate Transparency and Passive DNS |
Mashael Al-Sabah, Qatar Computing Research Institute
|
Mohamed Nabeel, Qatar Computing Research Institute
|
Euijin Choo, Qatar Computing Research Institute
|
Yazan Boshmaf, Qatar Computing Research Institute, HBKU
|
|
Mirrors in the Sky: On the Potential of Clouds in DNS-based DDoS Attacks |
Ramin Yazdani, University of Twente
|
Alden Hilton, Brigham Young University
|
Jeroen van der Ham, University of Twente and NCSC
|
Roland van Rijswijk-Deij, University of Twente
|
Casey Deccio, Brigham Young University
|
Anna Sperotto, University of Twente
|
Mattijs Jonker, University of Twente
|
|
Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems |
Ahmed Abusnaina, University of Central Florida
|
Afsah Anwar, Northeastern University
|
Sultan Alshamrani, University of Central Florida
|
Abdulrahman Alabduljabbar, University of Central Florida
|
RhongHo Jang, Wayne State University
|
DaeHun Nyang, Ewha Womans University
|
David Mohaisen, University of Central Florida
|
|
TrustedGateway: TEE-Assisted Routing and Firewall Enforcement Using ARM TrustZone |
Fabian Schwarz, CISPA Helmholtz Center for Information Security
|
|
ULTRA: Ultimate Rootkit Detection over the Air |
Duy-Phuc Pham, Univ Rennes, Inria, CNRS, IRISA, France
|
Damien Marion, Univ Rennes, Inria, CNRS, IRISA, France
|
Annelie Heuser, Univ Rennes, Inria, CNRS, IRISA, France
|
|
Penny Wise and Pound Foolish: Quantifying the Risk of Unlimited Approval of ERC20 Tokens on Ethereum |
Dabao Wang, Monash University
|
Hang FENG, Zhejiang University
|
Siwei Wu, Zhejiang University
|
Yajin Zhou, Zhejiang University
|
Lei Wu, Zhejiang University
|
Xingliang YUAN, Monash University
|
|
HALC: A Real-time In-sensor Defense against the Magnetic Spoofing Attack on Hall Sensors |
Anomadarshi Barua, University of California, Irvine
|
Mohammad Abdullah Al Faruque, University of California, Irvine
|
|
Exploiting Metaobjects to Reinforce Data Leakage Attacks |
Hoyong Jeong, KAIST
|
Hodong Kim, Korea University
|
Junbeom Hur, Korea University
|
|
LiCA: A Fine-grained and Path-sensitive Linux Capability Analysis Framework |
Menghan Sun, The Chinese University of Hong Kong
|
Zirui SONG, The Chinese University of Hong Kong
|
Xiaoxi REN, Hunan University
|
Daoyuan Wu, The Chinese University of Hong Kong
|
Kehuan Zhang, The Chinese University of Hong Kong
|
|
Harm-DoS: Hash Algorithm Replacement for Mitigating Denial-of-Service Vulnerabilities in Binary Executables |
Nicolaas Weideman, University of Southern California - Information Sciences Institute
|
Haoda Wang, University of Southern California - Information Sciences Institute
|
Tyler Kann, Information Sciences Institute, University of Southern California
|
Spencer Zahabizadeh, Information Sciences Institute, University of Southern California
|
Wei-Cheng Wu, Information Sciences Institute, University of Southern California
|
Rajat Tandon, University of Southern California
|
Jelena Mirkovic, USC
|
Christophe Hauser, Information Sciences Institute, University of Southern California
|
|
IPAL: Breaking up Silos of Protocol-dependent and Domain-specific Industrial Intrusion Detection Systems |
Konrad Wolsing, Fraunhofer FKIE \/ RWTH Aachen University
|
Eric Wagner, Fraunhofer FKIE \/ RWTH Aachen University
|
Antoine Saillard, RWTH Aachen University \/ Fraunhofer FKIE
|
Martin Henze, RWTH Aachen University \/ Fraunhofer FKIE
|
|
Script Tainting Was Doomed From The Start (By Type Conversion): Converting Script Engines into Dynamic Taint Analysis Frameworks |
Toshinori Usui, NTT Social Informatics Laboratories
|
Yuto Otsuki, NTT Security (Japan) KK
|
Yuhei Kawakoya, NTT Social Informatics Laboratories
|
Makoto Iwamura, NTT Social Informatics Laboratories
|
Kanta Matsuura, Institute of Industrial Science, The University of Tokyo
|
|
Understanding the Behavior Transparency of Voice Assistant Applications Using the ChatterBox Framework |
Atsuko Natatsuka, Waseda University
|
Ryo Iijima, Waseda University
|
Takuya Watanabe, NTT Social Informatics Laboratories
|
Mitsuaki Akiyama, NTT Social Informatics Laboratories
|
Tetsuya Sakai, Waseda University
|
Tatsuya Mori, Waseda University \/ NICT \/ RIKEN AIP
|
|
Fuzzing@Home: Distributed Fuzzing on Untrusted Heterogeneous Clients |
Daehee Jang, Sungshin W. University
|
Ammar Askar, Georgia Institute of Technology
|
Insu Yun, KAIST
|
Stephen Tong, Georgia Institute of Technology
|
Yiqin Cai, Georgia Institute of Technology
|
Taesoo Kim, Georgia Institute of Technology
|
|
On the Challenges of Detecting Side-Channel Attacks in SGX |
Jianyu Jiang, The University of Hong Kong
|
Claudio Soriente, NEC Laboratories Europe
|
Ghassan Karame, Ruhr University Bochum
|
|
CJ-Sniffer: Measurement and Content-Agnostic Detection of Cryptojacking Traffic |
Yebo Feng, University of Oregon
|
Jun Li, University of Oregon
|
Devkishen Sisodia, University of Oregon
|
|
RiscyROP: Automated Return-Oriented Programming Attacks on RISC-V and ARM64 |
Tobias Cloosters, University of Duisburg-Essen
|
David Paaßen, University of Duisburg-Essen
|
Jianqiang Wang, Technical University of Darmstadt
|
Oussama Draissi, University of Duisburg-Essen
|
Patrick Jauernig, Technical University of Darmstadt
|
Emmanuel Stapf, Technical University of Darmstadt
|
Lucas Davi, University of Duisburg-Essen
|
Ahmad-Reza Sadeghi, Technical University of Darmstadt
|
|
Elysium: Context-Aware Bytecode-Level Patching to Automatically Heal Vulnerable Smart Contracts |
Christof Ferreira Torres, University of Luxembourg
|
Hugo Jonker, Open University of the Netherlands
|
Radu State, University of Luxembourg
|
|
Transferable Graph Backdoor Attack |
Shuiqiao Yang, The University of New South Wales
|
Bao Doan, The University of Adelaide
|
Paul Montague, Defence Science and Technology Group
|
Olivier De Vel, Defence Science and Technology Group
|
Tamas Abraham, Defence Science and Technology Group
|
Seyit Camtepe, CSIRO Data61, Australia
|
Damith C. Ranasinghe, The University of Adelaide
|
Salil S. Kanhere, UNSW, Sydney, Australia
|
|
Threshold EdDSA Signature for Blockchain-based Decentralized Finance Applications |
Yang Shi, Tongji University
|
Junqing Liang , Tongji University
|
Mianhong Li, Tongji University
|
Tianchen Ma, Tongji University
|
Guodong Ye, Guangdong Ocean University
|
Jiangfeng Li, Tongji University
|
Qinpei Zhao, Tongji University
|
|
Decap: Deprivileging Programs by Reducing Their Capabilities |
Md Mehedi Hasan, Stony Brook University
|
Seyedhamed Ghavamnia, Stony Brook University
|
Michalis Polychronakis, Stony Brook University
|
|
Context-Auditor: Context-sensitive Content Injection Mitigation |
Faezeh Kalantari, Arizona State University
|
Mehrnoosh Zaeifi, Arizona State University
|
Tiffany Bao, Arizona State University
|
Ruoyu Wang, Arizona State University
|
Yan Shoshitaishvili, Arizona State University
|
Adam Doupé, Arizona State University
|
|
Katana: Robust, Automated, Binary-Only Forensic Analysis of Linux Memory Snapshots |
Fabian Franzen, Technical University of Munich
|
Tobias Holl, Technical University of Munich
|
Manuel Andreas, Technical University of Munich
|
Julian Kirsch, Technical University of Munich
|
Jens Grossklags, Technical University of Munich
|
|
Towards Deceptive Defense in Software Security with Chaff Bugs |
Zhenghao Hu, New York University
|
Yu Hu, New York University
|
Brendan Dolan-Gavitt, New York University
|
|
New Cloaking Region Obfuscation for Road Network-Indistinguishability and Location Privacy |
Baihe Ma, University of Technology Sydney
|
Xiaojie Lin, University of Technology Sydney
|
Xu Wang, University of Technology Sydney
|
Bin Liu, University of Technology Sydney
|
Ying He, University of Technology Sydney
|
Wei Ni, CSIRO
|
Ren Ping Liu, University of Technology Sydney
|
|
Encrypted Malware Traffic Detection via Graph-based Network Analysis |
Zhuoqun Fu, Tsinghua University
|
Mingxuan Liu, Tsinghua University
|
Yue Qin, Indiana University Bloomington
|
Jia Zhang, Tsinghua University
|
Yuan Zou, Tsinghua University; GeekSec Security Group
|
Qilei Yin, Tsinghua University
|
Qi Li, Tsinghua University
|
Haixin Duan, Tsinghua University; Qi An Xin Group Corp
|
|