Overdrive LowGear 2.0: Reduced-Bandwidth MPC without Sacrifice
Pascal Reisert (University of Stuttgart, Germany), Marc Rivinius (University of Stuttgart, Germany), Toomas Krips (University of Tartu, Estonia), Ralf Kuesters (University of Stuttgart, Germany)
An Evaluation Framework for Intrusion Prevention Systems on Serial Data Bus Networks
Matthew Rogers (MITRE, University of Oxford, USA), Kasper Rasmussen (University of Oxford, United Kingdom)
On the Cryptographic Fragility of the Telegram Ecosystem
Theo von Arx (ETH Zurich, Switzerland), Kenneth G. Paterson (ETH Zurich, Switzerland)
Symbolic Modelling of Remote Attestation Protocols for Device and App Integrity on Android
Abdulla Aldoseri (University of Birmingham UK, University of Bahrain), Tom Chothia (University of Birmingham, UK), Jose Moreira (Valory AG, Switzerland), David Oswald (University of Birmingham, UK)
Arvin: Greybox Fuzzing Using Approximate Dynamic CFG Analysis
Sirus Shahini (University of Utah, USA), Robert Ricci (University of Utah, USA), Mu Zhang (University of Utah, USA), Mathias Payer (EPFL, Switzerland)
AbsIntIO: Towards Showing the Absence of Integer Overflows in Binaries using Abstract Interpretation
Alexander Küchler (Fraunhofer AISEC, Germany), Leon Wenning (TU Munich, Germany), Florian Wendland (Fraunhofer AISEC, Germany)
#DM-Me: Susceptibility to Direct Messaging-Based Scams
Jujutsu: A Two-stage Defense against Adversarial Patch Attacks on Deep Neural Networks
Zitao Chen (University of British Columbia, , Canada), Pritam Dash (University of British Columbia, Canada), Karthik Pattabiraman (University of British Columbia, Canada)
PSI with computation or Circuit-PSI for Unbalanced Sets from Homomorphic Encryption
Yongha Son (Samsung SDS, South Korea), Jinhyuck Jeong (Samsung SDS, South Korea)
Binary Function Clone Search in the Presence of Code Obfuscation and Optimization over Multi-CPU Architectures
Abdullah Qasem (Concordia University, Canada), Mourad Debbabi (Concordia University, Canada), Bernard Lebel (Thales Research Technologies, , Canada), Marthe Kassouf (Hydro-Québec Research Institute, Canada)
RecUP-FL: Reconciling Utility and Privacy in Federated learning via User-configurable Privacy Defense
Yue Cui (University of Tennessee, USA), Syed Irfan Ali Meerza (University of Tennessee, USA), Zhuohang Li (University of Tennessee, USA), Luyang Liu (Google Research, USA), Jiaxin Zhang (Intuit AI Research, USA), Jian Liu (University of Tennessee, USA)
Secure and Efficient Mobile DNN Using Trusted Execution Environments
Bin Hu (Rutgers University, USA), Yan Wang (Temple University, USA), Jerry Cheng (New York Institute of Technology, USA), Tianming Zhao (Dayton University, USA), Yucheng Xie (Indiana University-Purdue University Indianapolis, USA), Xiaonan Guo (George Mason University, USA), Yingying Chen (Rutgers University, USA)
LDL: A Defense for Label-Based Membership Inference Attacks
Arezoo Rajabi (University of Washington, USA), Dinuka Sahabandu (University of Washington, USA), Luyao Niu (University of Washington, USA), Bhaskar Ramasubramanian (Western Washington University, USA), Radha Poovendran (University of Washington, USA)
DHBE: Data-free Holistic Backdoor Erasing in Deep Neural Networks via Restricted Adversarial Distillation
A Transformer-based Function Symbol Name Inference Model from an Assembly Language for Binary Reversing
HyunJin Kim (Sungkyunkwan University, South Korea), JinYeong Bak (Sungkyunkwan University, South Korea), Kyunghyun Cho (New York University, USA), Hyungjoon Koo (Sungkyunkwan University, South Korea)
Mitigating Adversarial Attacks by Distributing Different Copies to Different Buyers
Communication-Efficient Inner Product Private Join and Compute with Cardinality
Koji Chida (Gunma University, Japan), Koki Hamada (NTT Social Informatics Laboratories, Japan), Atsunori Ichikawa (NTT Social Informatics Laboratories, Japan), Masanobu Kii (NTT Social Informatics Laboratories, Japan), Junichi Tomida (NTT Social Informatics Laboratories, Japan)
EMShepherd: Detecting Adversarial Samples via Side-channel Leakage
Ruyi Ding (Northeastern University, USA), Cheng Gongye (Northeastern University, USA), Siyue Wang (Northeastern University, USA), A. Adam Ding (Northeastern University, USA), Yunsi Fei (Northeastern University, USA)
Invasion of location privacy using online map services and smartphone sensors
Hyunsoo Kim (NCSOFT, Republic of Korea), Youngbae Jeon (Samsung Research, Republic of Korea), Ji Won Yoon (Korea University, Republic of Korea)
CASSOCK: Viable Backdoor Attacks against DNN in the Wall of Source-Specific Backdoor Defenses
Shang Wang (Nanjing University of Science and Technology, China), Yansong Gao (Nanjing University of Science and Technology, China), Anmin Fu (Nanjing University of Science and Technology, China), Zhi Zhang (University of Western Australia), Yuqing Zhang (University of Chinese Academy of Sciences, China), Willy Susilo ( University of Wollongong, Australia), Dongxi Liu (CSIRO’s Data61, Australia)
Benchmarking the Benchmarks
Marc Miltenberger (Fraunhofer SIT, Germany), Steven Arzt (Fraunhofer SIT, Germany), Philipp Holzinger (Fraunhofer SIT, Germany), Julius Näumann (Fraunhofer SIT, Germany)
An End-to-End Analysis of Covid-Themed Scams in the Wild
Behzad Ousat (Florida International University, USA), Mohammad Ali Tofighi (Florida International University, USA), Amin Kharraz (Florida International University, USA)
CryptoShield – Automatic On-Device Mitigation for Crypto API Misuse in Android Applications
Florian Draschbacher (Graz University of Technology, Austria), Johannes Feichtner (Dynatrace Austria GmbH, Austria)
ZEKRA: Zero-Knowledge Control-Flow Attestation
Heini Bergsson Debes (Technical University of Denmark, Denmark), Edlira Dushku (Aalborg University, Denmark), Thanassis Giannetsos (Ubitech Ltd), Ali Marandi (Technical University of Denmark, Denmark)
Security Properties of Virtual Remotes and SPOOKing their Violations
Joshua Majors (Purdue University, USA), Edgardo Barsallo Yi (Purdue University, USA), Amiya Maji (Purdue University, USA), Darren Wu (Purdue University, USA), Saurabh Bagchi (Purdue University, USA), Aravind Machiry (Purdue University, USA)
Securing Container-based Clouds with Syscall-aware Scheduling
Michael V. Le (IBM Research, USA), Salman Ahmed (IBM Research, USA), Dan Williams (Virginia Tech, USA), Hani Jamjoom (IBM Research, USA)
FLAIR: Defense against Model Poisoning Attack in Federated Learning
T-TER: Defeating A2 Trojans with Targeted Tamper-Evident Routing
Timothy Trippel (University of Michigan, USA), Kang G. Shin (University of Michigan, USA), Kevin B. Bush (MIT Lincoln Laboratory, USA), Matthew Hicks (Virginia Tech, USA)
IOTLB-SC: An Accelerator-Independent Leakage Source in Modern Cloud Systems
Thore Tiemann (University of Lübeck, Germany), Zane Weissman (Worcester Polytechnic Institute, USA), Thomas Eisenbarth (University of Lübeck, Germany), Berk Sunar (Worcester Polytechnic Institute, USA)
MASCARA: Systematically Generating Memorable And Secure Passphrases
Avirup Mukherjee (Indian Institute of Technology, Kharagpur, India), Kousshik Murali (Indian Institute of Technology, Kharagpur, India), Shivam Kumar Jha (Indian Institute of Technology, Kharagpur, India), Niloy Ganguly (Indian Institute of Technology, Kharagpur, India), Rahul Chatterjee (University of Wisconsin–Madison, USA), Mainack Mondal (Indian Institute of Technology, Kharagpur, India)
Ember-IO: Effective Firmware Fuzzing with Model-Free Memory Mapped IO
Guy Farrelly (The University of Adelaide, Australia), Michael Chesser (The University of Adelaide, Australia), Damith C. Ranasinghe (University of Adelaide, Australia)