 
| Detection of Electromagnetic Signal Injection Attacks on Actuator Systems | 
| Youqian Zhang, University of Oxford | 
| Kasper Rasmussen, University of Oxford | 
| Write Me and I'll Tell You Secrets - Write-After-Write Effects On Intel CPUs | 
| Jan Philipp Thoma, Horst Görtz Institute for IT-Security, Ruhr University Bochum | 
| Tim Güneysu , Horst Görtz Institute for IT-Security, Ruhr University Bochum | 
| A scalable tracing tool for non-rooted and off-the-shelf Android phones | 
| Alain Tchana, ENS Lyon, France | 
| Yérom-David Bromberg, Univ. Rennes, Inria, CNRS, IRISA | 
| Lavoisier Wapet, ENS Lyon, France | 
| Viopolicy-Detector: An Automated Approach to Detecting GDPR Compliance Violations in Websites | 
| Haoran Ou, School of Cyber Science and Engineering, Sichuan University | 
| Yong Fang, School of Cyber Science and Engineering, Sichuan University | 
| Wenbo Guo, School of Cyber Science and Engineering, Sichuan University | 
| Yongyan Guo, School of Cyber Science and Engineering, Sichuan University | 
| Cheng Huang, School of Cyber Science and Engineering, Sichuan University | 
| Zigbee's Network Rejoin Procedure for IoT Systems: Vulnerabilities and Implications | 
| Jincheng Wang, The Chinese University of Hong Kong | 
| Zhuohua Li, The Chinese University of Hong Kong | 
| Mingshen Sun, Baidu | 
| John C. S. Lui, The Chinese University of Hong Kong | 
| Automated Runtime Mitigation for Misconfiguration Vulnerabilities in Industrial Control Systems | 
| Qingzhao Zhang, University of Michigan | 
| Xiao Zhu, University of Michigan | 
| Mu Zhang, University of Utah | 
| Z. Morley Mao, University of Michigan and Google | 
| OAuch: Exploring the Weaknesses of the OAuth 2.0 Ecosystem | 
| Pieter Philippaerts, imec-DistriNet, KU Leuven | 
| Davy Preuveneers, imec-DistriNet, KU Leuven | 
| Wouter Joosen, imec-DistriNet, KU Leuven | 
| BinProv: Binary Code Provenance Identification without Disassembly | 
| Xu He, George Mason University | 
| Shu Wang, George Mason University | 
| Yunlong Xing, George Mason University | 
| Pengbin Feng, George Mason University | 
| Haining Wang, Virginia Tech | 
| Qi Li, Tsinghua University | 
| Songqing Chen, George Mason University | 
| Kun Sun, George Mason University | 
| What You See is Not What You Get: Revealing Hidden Memory Mapping for Peripheral Modeling | 
| Jun Yeon Won, Ohio State University | 
| Haohuang Wen, Ohio State University | 
| Zhiqiang Lin, Ohio State University | 
| Content-Agnostic Detection of Phishing Domains using Certificate Transparency and Passive DNS | 
| Mashael Al-Sabah, Qatar Computing Research Institute | 
| Mohamed Nabeel, Qatar Computing Research Institute | 
| Euijin Choo, Qatar Computing Research Institute | 
| Yazan Boshmaf, Qatar Computing Research Institute, HBKU | 
| Mirrors in the Sky: On the Potential of Clouds in DNS-based DDoS Attacks | 
| Ramin Yazdani, University of Twente | 
| Alden Hilton, Brigham Young University | 
| Jeroen van der Ham, University of Twente and NCSC | 
| Roland van Rijswijk-Deij, University of Twente | 
| Casey Deccio, Brigham Young University | 
| Anna Sperotto, University of Twente | 
| Mattijs Jonker, University of Twente | 
| Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems | 
| Ahmed Abusnaina, University of Central Florida | 
| Afsah Anwar, Northeastern University | 
| Sultan Alshamrani, University of Central Florida | 
| Abdulrahman Alabduljabbar, University of Central Florida | 
| RhongHo Jang, Wayne State University | 
| DaeHun Nyang, Ewha Womans University | 
| David Mohaisen, University of Central Florida | 
| TrustedGateway: TEE-Assisted Routing and Firewall Enforcement Using ARM TrustZone | 
| Fabian Schwarz, CISPA Helmholtz Center for Information Security | 
| ULTRA: Ultimate Rootkit Detection over the Air | 
| Duy-Phuc Pham, Univ Rennes, Inria, CNRS, IRISA, France | 
| Damien Marion, Univ Rennes, Inria, CNRS, IRISA, France | 
| Annelie Heuser, Univ Rennes, Inria, CNRS, IRISA, France | 
| Penny Wise and Pound Foolish: Quantifying the Risk of Unlimited Approval of ERC20 Tokens on Ethereum | 
| Dabao Wang, Monash University | 
| Hang FENG, Zhejiang University | 
| Siwei Wu, Zhejiang University | 
| Yajin Zhou, Zhejiang University | 
| Lei Wu, Zhejiang University | 
| Xingliang YUAN, Monash University | 
| HALC: A Real-time In-sensor Defense against the Magnetic Spoofing Attack on Hall Sensors | 
| Anomadarshi Barua, University of California, Irvine | 
| Mohammad Abdullah Al Faruque, University of California, Irvine | 
| Exploiting Metaobjects to Reinforce Data Leakage Attacks | 
| Hoyong Jeong, KAIST | 
| Hodong Kim, Korea University | 
| Junbeom Hur, Korea University | 
| LiCA: A Fine-grained and Path-sensitive Linux Capability Analysis Framework | 
| Menghan Sun, The Chinese University of Hong Kong | 
| Zirui SONG, The Chinese University of Hong Kong | 
| Xiaoxi REN, Hunan University | 
| Daoyuan Wu, The Chinese University of Hong Kong | 
| Kehuan Zhang, The Chinese University of Hong Kong | 
| Harm-DoS: Hash Algorithm Replacement for Mitigating Denial-of-Service Vulnerabilities in Binary Executables | 
| Nicolaas Weideman, University of Southern California - Information Sciences Institute | 
| Haoda Wang, University of Southern California - Information Sciences Institute | 
| Tyler Kann, Information Sciences Institute, University of Southern California | 
| Spencer Zahabizadeh, Information Sciences Institute, University of Southern California | 
| Wei-Cheng Wu, Information Sciences Institute, University of Southern California | 
| Rajat Tandon, University of Southern California | 
| Jelena Mirkovic, USC | 
| Christophe Hauser, Information Sciences Institute, University of Southern California | 
| IPAL: Breaking up Silos of Protocol-dependent and Domain-specific Industrial Intrusion Detection Systems | 
| Konrad Wolsing, Fraunhofer FKIE \/ RWTH Aachen University | 
| Eric Wagner, Fraunhofer FKIE \/ RWTH Aachen University | 
| Antoine Saillard, RWTH Aachen University \/ Fraunhofer FKIE | 
| Martin Henze, RWTH Aachen University \/ Fraunhofer FKIE | 
| Script Tainting Was Doomed From The Start (By Type Conversion): Converting Script Engines into Dynamic Taint Analysis Frameworks | 
| Toshinori Usui, NTT Social Informatics Laboratories | 
| Yuto Otsuki, NTT Security (Japan) KK | 
| Yuhei Kawakoya, NTT Social Informatics Laboratories | 
| Makoto Iwamura, NTT Social Informatics Laboratories | 
| Kanta Matsuura, Institute of Industrial Science, The University of Tokyo | 
| Understanding the Behavior Transparency of Voice Assistant Applications Using the ChatterBox Framework | 
| Atsuko Natatsuka, Waseda University | 
| Ryo Iijima, Waseda University | 
| Takuya Watanabe, NTT Social Informatics Laboratories | 
| Mitsuaki Akiyama, NTT Social Informatics Laboratories | 
| Tetsuya Sakai, Waseda University | 
| Tatsuya Mori, Waseda University \/ NICT \/ RIKEN AIP | 
| Fuzzing@Home: Distributed Fuzzing on Untrusted Heterogeneous Clients | 
| Daehee Jang, Sungshin W. University | 
| Ammar Askar, Georgia Institute of Technology | 
| Insu Yun, KAIST | 
| Stephen Tong, Georgia Institute of Technology | 
| Yiqin Cai, Georgia Institute of Technology | 
| Taesoo Kim, Georgia Institute of Technology | 
| On the Challenges of Detecting Side-Channel Attacks in SGX | 
| Jianyu Jiang, The University of Hong Kong | 
| Claudio Soriente, NEC Laboratories Europe | 
| Ghassan Karame, Ruhr University Bochum | 
| CJ-Sniffer: Measurement and Content-Agnostic Detection of Cryptojacking Traffic | 
| Yebo Feng, University of Oregon | 
| Jun Li, University of Oregon | 
| Devkishen Sisodia, University of Oregon | 
| RiscyROP: Automated Return-Oriented Programming Attacks on RISC-V and ARM64 | 
| Tobias Cloosters, University of Duisburg-Essen | 
| David Paaßen, University of Duisburg-Essen | 
| Jianqiang Wang, Technical University of Darmstadt | 
| Oussama Draissi, University of Duisburg-Essen | 
| Patrick Jauernig, Technical University of Darmstadt | 
| Emmanuel Stapf, Technical University of Darmstadt | 
| Lucas Davi, University of Duisburg-Essen | 
| Ahmad-Reza Sadeghi, Technical University of Darmstadt | 
| Elysium: Context-Aware Bytecode-Level Patching to Automatically Heal Vulnerable Smart Contracts | 
| Christof Ferreira Torres, University of Luxembourg | 
| Hugo Jonker, Open University of the Netherlands | 
| Radu State, University of Luxembourg | 
| Transferable Graph Backdoor Attack | 
| Shuiqiao Yang, The University of New South Wales | 
| Bao Doan, The University of Adelaide | 
| Paul Montague, Defence Science and Technology Group | 
| Olivier De Vel, Defence Science and Technology Group | 
| Tamas Abraham, Defence Science and Technology Group | 
| Seyit Camtepe, CSIRO Data61, Australia | 
| Damith C. Ranasinghe, The University of Adelaide | 
| Salil S. Kanhere, UNSW, Sydney, Australia | 
| Threshold EdDSA Signature for Blockchain-based Decentralized Finance Applications | 
| Yang Shi, Tongji University | 
| Junqing Liang , Tongji University | 
| Mianhong Li, Tongji University | 
| Tianchen Ma, Tongji University | 
| Guodong Ye, Guangdong Ocean University | 
| Jiangfeng Li, Tongji University | 
| Qinpei Zhao, Tongji University | 
| Decap: Deprivileging Programs by Reducing Their Capabilities | 
| Md Mehedi Hasan, Stony Brook University | 
| Seyedhamed Ghavamnia, Stony Brook University | 
| Michalis Polychronakis, Stony Brook University | 
| Context-Auditor: Context-sensitive Content Injection Mitigation | 
| Faezeh Kalantari, Arizona State University | 
| Mehrnoosh Zaeifi, Arizona State University | 
| Tiffany Bao, Arizona State University | 
| Ruoyu Wang, Arizona State University | 
| Yan Shoshitaishvili, Arizona State University | 
| Adam Doupé, Arizona State University | 
| Katana: Robust, Automated, Binary-Only Forensic Analysis of Linux Memory Snapshots | 
| Fabian Franzen, Technical University of Munich | 
| Tobias Holl, Technical University of Munich | 
| Manuel Andreas, Technical University of Munich | 
| Julian Kirsch, Technical University of Munich | 
| Jens Grossklags, Technical University of Munich | 
| Towards Deceptive Defense in Software Security with Chaff Bugs | 
| Zhenghao Hu, New York University | 
| Yu Hu, New York University | 
| Brendan Dolan-Gavitt, New York University | 
| New Cloaking Region Obfuscation for Road Network-Indistinguishability and Location Privacy | 
| Baihe Ma, University of Technology Sydney | 
| Xiaojie Lin, University of Technology Sydney | 
| Xu Wang, University of Technology Sydney | 
| Bin Liu, University of Technology Sydney | 
| Ying He, University of Technology Sydney | 
| Wei Ni, CSIRO | 
| Ren Ping Liu, University of Technology Sydney | 
| Encrypted Malware Traffic Detection via Graph-based Network Analysis | 
| Zhuoqun Fu, Tsinghua University | 
| Mingxuan Liu, Tsinghua University | 
| Yue Qin, Indiana University Bloomington | 
| Jia Zhang, Tsinghua University | 
| Yuan Zou, Tsinghua University; GeekSec Security Group | 
| Qilei Yin, Tsinghua University | 
| Qi Li, Tsinghua University | 
| Haixin Duan, Tsinghua University; Qi An Xin Group Corp |