


default search action
39th SP 2018: San Francisco, CA, USA
- 2018 IEEE Symposium on Security and Privacy, SP 2018, Proceedings, 21-23 May 2018, San Francisco, California, USA. IEEE Computer Society 2018, ISBN 978-1-5386-4353-2

Machine Learning
- Timon Gehr, Matthew Mirman, Dana Drachsler-Cohen, Petar Tsankov, Swarat Chaudhuri, Martin T. Vechev:

AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation. 3-18 - Matthew Jagielski, Alina Oprea, Battista Biggio

, Chang Liu, Cristina Nita-Rotaru, Bo Li:
Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning. 19-35 - Binghui Wang, Neil Zhenqiang Gong:

Stealing Hyperparameters in Machine Learning. 36-52 - Huichen Li, Xiaojun Xu, Chang Liu, Teng Ren, Kun Wu, Xuezhi Cao, Weinan Zhang, Yong Yu, Dawn Song:

A Machine Learning Approach to Prevent Malicious Calls over Telephony Networks. 53-69 - Amin Kharraz, William K. Robertson, Engin Kirda:

Surveylance: Automatically Detecting Online Survey Scams. 70-86
Privacy
- Giridhari Venkatadri, Athanasios Andreou

, Yabing Liu, Alan Mislove, Krishna P. Gummadi
, Patrick Loiseau, Oana Goga:
Privacy Risks with Facebook's PII-Based Targeting: Auditing a Data Broker's Advertising Interface. 89-107 - Debajyoti Das

, Sebastian Meiser, Esfandiar Mohammadi, Aniket Kate:
Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency - Choose Two. 108-126 - Tianhao Wang

, Ninghui Li, Somesh Jha:
Locally Differentially Private Frequent Itemset Mining. 127-143 - Yimin Chen, Tao Li, Rui Zhang

, Yanchao Zhang, Terri Hedgpeth:
EyeTell: Video-Assisted Touchscreen Keystroke Inference from Eye Movements. 144-160 - Emanuele Cozzi, Mariano Graziano, Yanick Fratantonio, Davide Balzarotti:

Understanding Linux Malware. 161-175
Side Channels
- Guoxing Chen, Wenhao Wang, Tianyu Chen

, Sanchuan Chen
, Yinqian Zhang, XiaoFeng Wang, Ten-Hwang Lai, Dongdai Lin:
Racing in Hyperspace: Closing Hyper-Threading Side Channels on SGX with Contrived Data Races. 178-194 - Pietro Frigo, Cristiano Giuffrida

, Herbert Bos
, Kaveh Razavi:
Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPU. 195-210 - John V. Monaco

:
SoK: Keylogging Side Channels. 211-228 - Mark Zhao

, G. Edward Suh
:
FPGA-Based Remote Power Side-Channel Attacks. 229-244 - Daniel Gruss, Moritz Lipp, Michael Schwarz, Daniel Genkin, Jonas Juffinger, Sioli O'Connell, Wolfgang Schoechl, Yuval Yarom

:
Another Flip in the Wall of Rowhammer Defenses. 245-261
Computing on Hidden Data
- Christian Priebe, Kapil Vaswani, Manuel Costa:

EnclaveDB: A Secure Database Using SGX. 264-278 - Pratyush Mishra

, Rishabh Poddar, Jerry Chen, Alessandro Chiesa, Raluca Ada Popa:
Oblix: An Efficient Oblivious Search Index. 279-296 - Marie-Sarah Lacharité, Brice Minaud, Kenneth G. Paterson:

Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage. 297-314 - Benedikt Bünz

, Jonathan Bootle
, Dan Boneh, Andrew Poelstra, Pieter Wuille
, Gregory Maxwell:
Bulletproofs: Short Proofs for Confidential Transactions and More. 315-334 - Fabio Massacci

, Chan Nam Ngo
, Jing Nie, Daniele Venturi, Julian Williams:
FuturesMEX: Secure, Distributed Futures Market Exchange. 335-353 - David Bruce Cousins, Giovanni Di Crescenzo, Kamil Doruk Gür, Kevin King, Yuriy Polyakov

, Kurt Rohloff
, Gerard W. Ryan, Erkay Savas:
Implementing Conjunction Obfuscation Under Entropic Ring LWE. 354-371
Understanding Users
- Daniel Votipka, Rock Stevens, Elissa M. Redmiles, Jeremy Hu, Michelle L. Mazurek:

Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes. 374-391 - Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner:

Towards Security and Privacy for Multi-user Augmented Reality: Foundations with End Users. 392-408 - Lucy Simko, Ada Lerner

, Samia Ibtasam, Franziska Roesner, Tadayoshi Kohno:
Computer Security and Privacy for Refugees in the United States. 409-423 - Stevens Le Blond, Alejandro Cuevas, Juan Ramón Troncoso-Pastoriza, Philipp Jovanovic, Bryan Ford

, Jean-Pierre Hubaux:
On Enforcing the Digital Immunity of a Large Humanitarian Organization. 424-440 - Rahul Chatterjee, Periwinkle Doerfler, Hadas Orgad, Sam Havron, Jackeline Palmer, Diana Freed, Karen Levy

, Nicola Dell, Damon McCoy, Thomas Ristenpart:
The Spyware Used in Intimate Partner Violence. 441-458
Programming Languages
- Hyungjoon Koo

, Yaohui Chen, Long Lu, Vasileios P. Kemerlis
, Michalis Polychronakis:
Compiler-Assisted Code Randomization. 461-477 - Nick Roessler, André DeHon:

Protecting the Stack with Metadata Policies and Tagged Hardware. 478-495 - Minh Ngo

, Frank Piessens, Tamara Rezk:
Impossibility of Precise and Sound Termination-Sensitive Security Enforcements. 496-513 - Ziqiao Zhou, Zhiyun Qian

, Michael K. Reiter, Yinqian Zhang:
Static Evaluation of Noninterference Using Approximate Model Counting. 514-528 - Vincent Cheval

, Steve Kremer
, Itsaka Rakotonirina:
DEEPSEC: Deciding Equivalence Properties in Security Protocols Theory and Practice. 529-546
Networked Systems
- Sjouke Mauw, Zach Smith, Jorge Toro-Pozo

, Rolando Trujillo-Rasua
:
Distance-Bounding Protocols: Verification without Time and Location. 549-566 - Christian Peeters, Hadi Abdullah, Nolen Scaife

, Jasmine D. Bowers, Patrick Traynor, Bradley Reaves, Kevin R. B. Butler
:
Sonar: Detecting SS7 Redirection Attacks with Audio-Based Distance Bounding. 567-582 - Eleftherios Kokoris-Kogias, Philipp Jovanovic, Linus Gasser

, Nicolas Gailly, Ewa Syta
, Bryan Ford
:
OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding. 583-598 - Jared M. Smith, Max Schuchard:

Routing Around Congestion: Defeating DDoS Attacks and Adverse Network Conditions via Reactive BGP Routing. 599-617 - Danny Yuxing Huang, Maxwell Matthaios Aliapoulios, Vector Guo Li, Luca Invernizzi, Elie Bursztein, Kylie McRoberts, Jonathan Levin, Kirill Levchenko, Alex C. Snoeren, Damon McCoy:

Tracking Ransomware End-to-end. 618-631
Program Analysis
- Marten Oltrogge, Erik Derr, Christian Stransky, Yasemin Acar, Sascha Fahl, Christian Rossow, Giancarlo Pellegrino, Sven Bugiel, Michael Backes:

The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators. 634-647 - Yuqi Chen, Christopher M. Poskitt

, Jun Sun:
Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System. 648-660 - Meng Xu, Chenxiong Qian, Kangjie Lu, Michael Backes, Taesoo Kim:

Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels. 661-678 - Shuitao Gan, Chao Zhang, Xiaojun Qin, Xuwen Tu, Kang Li, Zhongyu Pei, Zuoning Chen:

CollAFL: Path Sensitive Fuzzing. 679-696 - Hui Peng

, Yan Shoshitaishvili, Mathias Payer:
T-Fuzz: Fuzzing by Program Transformation. 697-710 - Peng Chen, Hao Chen

:
Angora: Efficient Fuzzing by Principled Search. 711-725
Web
- Antoine Vastel, Pierre Laperdrix, Walter Rudametkin, Romain Rouvoy

:
FP-STALKER: Tracking Browser Fingerprint Evolutions. 728-741 - Guangliang Yang, Jeff Huang, Guofei Gu, Abner Mendoza:

Study and Mitigation of Origin Stripping Vulnerabilities in Hybrid-postMessage Enabled Mobile Applications. 742-755 - Abner Mendoza, Guofei Gu:

Mobile Application Web API Reconnaissance: Web-to-Mobile Inconsistencies & Vulnerabilities. 756-769 - Kevin Borgolte, Shuang Hao, Tobias Fiebig

, Giovanni Vigna:
Enumerating Active IPv6 Hosts for Large-Scale Security Scans via DNSSEC-Signed Reverse Zones. 770-784 - Deepak Kumar, Zhengping Wang, Matthew Hyder, Joseph Dickinson, Gabrielle Beck, David Adrian, Joshua Mason, Zakir Durumeric

, J. Alex Halderman, Michael D. Bailey:
Tracking Certificate Misissuance in the Wild. 785-798 - Karthikeyan Bhargavan, Ioana Boureanu

, Antoine Delignat-Lavaud, Pierre-Alain Fouque
, Cristina Onete
:
A Formal Treatment of Accountable Proxying Over TLS. 799-816
Authentication
- Nirnimesh Ghose, Loukas Lazos, Ming Li:

Secure Device Bootstrapping Without Secrets Resistant to Signal Manipulation Attacks. 819-835 - Jun Han, Albert Jin Chung, Manal Kumar Sinha, Madhumitha Harishankar, Shijia Pan

, Hae Young Noh, Pei Zhang, Patrick Tague:
Do You Feel What I Hear? Enabling Autonomous IoT Device Pairing Using Different Sensor Types. 836-852 - Jeremiah Blocki

, Benjamin Harsha, Samson Zhou:
On the Economics of Offline Password Cracking. 853-871 - Joshua Reynolds, Trevor Smith, Ken Reese, Luke Dickinson, Scott Ruoti

, Kent E. Seamons
:
A Tale of Two Studies: The Best and Worst of YubiKey Usability. 872-888 - Simon Eberz, Giulio Lovisotto, Andrea Patane, Marta Kwiatkowska, Vincent Lenders

, Ivan Martinovic:
When Your Fitness Tracker Betrays You: Quantifying the Predictability of Biometric Features Across Contexts. 889-905
Cryptography
- Yupeng Zhang, Daniel Genkin, Jonathan Katz, Dimitrios Papadopoulos, Charalampos Papamanthou:

vRAM: Faster Verifiable RAM with Program-Independent Preprocessing. 908-925 - Riad S. Wahby, Ioanna Tzialla, Abhi Shelat, Justin Thaler, Michael Walfish:

Doubly-Efficient zkSNARKs Without Trusted Setup. 926-943 - Ahmed E. Kosba, Charalampos Papamanthou, Elaine Shi:

xJsnark: A Framework for Efficient Verifiable Computation. 944-961 - Sebastian Angel, Hao Chen, Kim Laine, Srinath T. V. Setty:

PIR with Compressed Queries and Amortized Query Processing. 962-979 - Jack Doerner, Yashvanth Kondi

, Eysa Lee, Abhi Shelat:
Secure Two-party Threshold ECDSA from ECDSA Assumptions. 980-997
Devices
- S. Abhishek Anand, Nitesh Saxena:

Speechless: Analyzing the Threat to Speech Privacy from Smartphone Motion Sensors. 1000-1017 - Kai Jansen, Matthias Schäfer, Daniel Moser, Vincent Lenders

, Christina Pöpper
, Jens B. Schmitt:
Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks. 1018-1031 - Jing (Dave) Tian, Nolen Scaife

, Deepak Kumar, Michael D. Bailey, Adam Bates
, Kevin R. B. Butler
:
SoK: "Plug & Pray" Today - Understanding USB Insecurity in Versions 1 Through C. 1032-1047 - Connor Bolton, Sara Rampazzi, Chaohao Li, Andrew Kwong, Wenyuan Xu, Kevin Fu:

Blue Note: How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems. 1048-1062 - Nolen Scaife

, Christian Peeters, Camilo Velez
, Hanqing Zhao, Patrick Traynor, David Arnold:
The Cards Aren't Alright: Detecting Counterfeit Gift Cards Using Encoding Jitter. 1063-1076

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














