Accepted papers


Detection of Electromagnetic Signal Injection Attacks on Actuator Systems
Youqian Zhang, University of Oxford
Kasper Rasmussen, University of Oxford

Write Me and I'll Tell You Secrets - Write-After-Write Effects On Intel CPUs
Jan Philipp Thoma, Horst Görtz Institute for IT-Security, Ruhr University Bochum
Tim Güneysu , Horst Görtz Institute for IT-Security, Ruhr University Bochum

A scalable tracing tool for non-rooted and off-the-shelf Android phones
Alain Tchana, ENS Lyon, France
Yérom-David Bromberg, Univ. Rennes, Inria, CNRS, IRISA
Lavoisier Wapet, ENS Lyon, France

Viopolicy-Detector: An Automated Approach to Detecting GDPR Compliance Violations in Websites
Haoran Ou, School of Cyber Science and Engineering, Sichuan University
Yong Fang, School of Cyber Science and Engineering, Sichuan University
Wenbo Guo, School of Cyber Science and Engineering, Sichuan University
Yongyan Guo, School of Cyber Science and Engineering, Sichuan University
Cheng Huang, School of Cyber Science and Engineering, Sichuan University

Zigbee's Network Rejoin Procedure for IoT Systems: Vulnerabilities and Implications
Jincheng Wang, The Chinese University of Hong Kong
Zhuohua Li, The Chinese University of Hong Kong
Mingshen Sun, Baidu
John C. S. Lui, The Chinese University of Hong Kong

Automated Runtime Mitigation for Misconfiguration Vulnerabilities in Industrial Control Systems
Qingzhao Zhang, University of Michigan
Xiao Zhu, University of Michigan
Mu Zhang, University of Utah
Z. Morley Mao, University of Michigan and Google

OAuch: Exploring the Weaknesses of the OAuth 2.0 Ecosystem
Pieter Philippaerts, imec-DistriNet, KU Leuven
Davy Preuveneers, imec-DistriNet, KU Leuven
Wouter Joosen, imec-DistriNet, KU Leuven

BinProv: Binary Code Provenance Identification without Disassembly
Xu He, George Mason University
Shu Wang, George Mason University
Yunlong Xing, George Mason University
Pengbin Feng, George Mason University
Haining Wang, Virginia Tech
Qi Li, Tsinghua University
Songqing Chen, George Mason University
Kun Sun, George Mason University

What You See is Not What You Get: Revealing Hidden Memory Mapping for Peripheral Modeling
Jun Yeon Won, Ohio State University
Haohuang Wen, Ohio State University
Zhiqiang Lin, Ohio State University

Content-Agnostic Detection of Phishing Domains using Certificate Transparency and Passive DNS
Mashael Al-Sabah, Qatar Computing Research Institute
Mohamed Nabeel, Qatar Computing Research Institute
Euijin Choo, Qatar Computing Research Institute
Yazan Boshmaf, Qatar Computing Research Institute, HBKU

Mirrors in the Sky: On the Potential of Clouds in DNS-based DDoS Attacks
Ramin Yazdani, University of Twente
Alden Hilton, Brigham Young University
Jeroen van der Ham, University of Twente and NCSC
Roland van Rijswijk-Deij, University of Twente
Casey Deccio, Brigham Young University
Anna Sperotto, University of Twente
Mattijs Jonker, University of Twente

Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems
Ahmed Abusnaina, University of Central Florida
Afsah Anwar, Northeastern University
Sultan Alshamrani, University of Central Florida
Abdulrahman Alabduljabbar, University of Central Florida
RhongHo Jang, Wayne State University
DaeHun Nyang, Ewha Womans University
David Mohaisen, University of Central Florida

TrustedGateway: TEE-Assisted Routing and Firewall Enforcement Using ARM TrustZone
Fabian Schwarz, CISPA Helmholtz Center for Information Security

ULTRA: Ultimate Rootkit Detection over the Air
Duy-Phuc Pham, Univ Rennes, Inria, CNRS, IRISA, France
Damien Marion, Univ Rennes, Inria, CNRS, IRISA, France
Annelie Heuser, Univ Rennes, Inria, CNRS, IRISA, France

Penny Wise and Pound Foolish: Quantifying the Risk of Unlimited Approval of ERC20 Tokens on Ethereum
Dabao Wang, Monash University
Hang FENG, Zhejiang University
Siwei Wu, Zhejiang University
Yajin Zhou, Zhejiang University
Lei Wu, Zhejiang University
Xingliang YUAN, Monash University

HALC: A Real-time In-sensor Defense against the Magnetic Spoofing Attack on Hall Sensors
Anomadarshi Barua, University of California, Irvine
Mohammad Abdullah Al Faruque, University of California, Irvine

Exploiting Metaobjects to Reinforce Data Leakage Attacks
Hoyong Jeong, KAIST
Hodong Kim, Korea University
Junbeom Hur, Korea University

LiCA: A Fine-grained and Path-sensitive Linux Capability Analysis Framework
Menghan Sun, The Chinese University of Hong Kong
Zirui SONG, The Chinese University of Hong Kong
Xiaoxi REN, Hunan University
Daoyuan Wu, The Chinese University of Hong Kong
Kehuan Zhang, The Chinese University of Hong Kong

Harm-DoS: Hash Algorithm Replacement for Mitigating Denial-of-Service Vulnerabilities in Binary Executables
Nicolaas Weideman, University of Southern California - Information Sciences Institute
Haoda Wang, University of Southern California - Information Sciences Institute
Tyler Kann, Information Sciences Institute, University of Southern California
Spencer Zahabizadeh, Information Sciences Institute, University of Southern California
Wei-Cheng Wu, Information Sciences Institute, University of Southern California
Rajat Tandon, University of Southern California
Jelena Mirkovic, USC
Christophe Hauser, Information Sciences Institute, University of Southern California

IPAL: Breaking up Silos of Protocol-dependent and Domain-specific Industrial Intrusion Detection Systems
Konrad Wolsing, Fraunhofer FKIE \/ RWTH Aachen University
Eric Wagner, Fraunhofer FKIE \/ RWTH Aachen University
Antoine Saillard, RWTH Aachen University \/ Fraunhofer FKIE
Martin Henze, RWTH Aachen University \/ Fraunhofer FKIE

Script Tainting Was Doomed From The Start (By Type Conversion): Converting Script Engines into Dynamic Taint Analysis Frameworks
Toshinori Usui, NTT Social Informatics Laboratories
Yuto Otsuki, NTT Security (Japan) KK
Yuhei Kawakoya, NTT Social Informatics Laboratories
Makoto Iwamura, NTT Social Informatics Laboratories
Kanta Matsuura, Institute of Industrial Science, The University of Tokyo

Understanding the Behavior Transparency of Voice Assistant Applications Using the ChatterBox Framework
Atsuko Natatsuka, Waseda University
Ryo Iijima, Waseda University
Takuya Watanabe, NTT Social Informatics Laboratories
Mitsuaki Akiyama, NTT Social Informatics Laboratories
Tetsuya Sakai, Waseda University
Tatsuya Mori, Waseda University \/ NICT \/ RIKEN AIP

Fuzzing@Home: Distributed Fuzzing on Untrusted Heterogeneous Clients
Daehee Jang, Sungshin W. University
Ammar Askar, Georgia Institute of Technology
Insu Yun, KAIST
Stephen Tong, Georgia Institute of Technology
Yiqin Cai, Georgia Institute of Technology
Taesoo Kim, Georgia Institute of Technology

On the Challenges of Detecting Side-Channel Attacks in SGX
Jianyu Jiang, The University of Hong Kong
Claudio Soriente, NEC Laboratories Europe
Ghassan Karame, Ruhr University Bochum

CJ-Sniffer: Measurement and Content-Agnostic Detection of Cryptojacking Traffic
Yebo Feng, University of Oregon
Jun Li, University of Oregon
Devkishen Sisodia, University of Oregon

RiscyROP: Automated Return-Oriented Programming Attacks on RISC-V and ARM64
Tobias Cloosters, University of Duisburg-Essen
David Paaßen, University of Duisburg-Essen
Jianqiang Wang, Technical University of Darmstadt
Oussama Draissi, University of Duisburg-Essen
Patrick Jauernig, Technical University of Darmstadt
Emmanuel Stapf, Technical University of Darmstadt
Lucas Davi, University of Duisburg-Essen
Ahmad-Reza Sadeghi, Technical University of Darmstadt

Elysium: Context-Aware Bytecode-Level Patching to Automatically Heal Vulnerable Smart Contracts
Christof Ferreira Torres, University of Luxembourg
Hugo Jonker, Open University of the Netherlands
Radu State, University of Luxembourg

Transferable Graph Backdoor Attack
Shuiqiao Yang, The University of New South Wales
Bao Doan, The University of Adelaide
Paul Montague, Defence Science and Technology Group
Olivier De Vel, Defence Science and Technology Group
Tamas Abraham, Defence Science and Technology Group
Seyit Camtepe, CSIRO Data61, Australia
Damith C. Ranasinghe, The University of Adelaide
Salil S. Kanhere, UNSW, Sydney, Australia

Threshold EdDSA Signature for Blockchain-based Decentralized Finance Applications
Yang Shi, Tongji University
Junqing Liang , Tongji University
Mianhong Li, Tongji University
Tianchen Ma, Tongji University
Guodong Ye, Guangdong Ocean University
Jiangfeng Li, Tongji University
Qinpei Zhao, Tongji University

Decap: Deprivileging Programs by Reducing Their Capabilities
Md Mehedi Hasan, Stony Brook University
Seyedhamed Ghavamnia, Stony Brook University
Michalis Polychronakis, Stony Brook University

Context-Auditor: Context-sensitive Content Injection Mitigation
Faezeh Kalantari, Arizona State University
Mehrnoosh Zaeifi, Arizona State University
Tiffany Bao, Arizona State University
Ruoyu Wang, Arizona State University
Yan Shoshitaishvili, Arizona State University
Adam Doupé, Arizona State University

Katana: Robust, Automated, Binary-Only Forensic Analysis of Linux Memory Snapshots
Fabian Franzen, Technical University of Munich
Tobias Holl, Technical University of Munich
Manuel Andreas, Technical University of Munich
Julian Kirsch, Technical University of Munich
Jens Grossklags, Technical University of Munich

Towards Deceptive Defense in Software Security with Chaff Bugs
Zhenghao Hu, New York University
Yu Hu, New York University
Brendan Dolan-Gavitt, New York University

New Cloaking Region Obfuscation for Road Network-Indistinguishability and Location Privacy
Baihe Ma, University of Technology Sydney
Xiaojie Lin, University of Technology Sydney
Xu Wang, University of Technology Sydney
Bin Liu, University of Technology Sydney
Ying He, University of Technology Sydney
Wei Ni, CSIRO
Ren Ping Liu, University of Technology Sydney

Encrypted Malware Traffic Detection via Graph-based Network Analysis
Zhuoqun Fu, Tsinghua University
Mingxuan Liu, Tsinghua University
Yue Qin, Indiana University Bloomington
Jia Zhang, Tsinghua University
Yuan Zou, Tsinghua University; GeekSec Security Group
Qilei Yin, Tsinghua University
Qi Li, Tsinghua University
Haixin Duan, Tsinghua University; Qi An Xin Group Corp