Accepted Paper (1st)



Overdrive LowGear 2.0: Reduced-Bandwidth MPC without Sacrifice

Pascal Reisert (University of Stuttgart, Germany), Marc Rivinius (University of Stuttgart, Germany), Toomas Krips (University of Tartu, Estonia), Ralf Kuesters (University of Stuttgart, Germany)

An Evaluation Framework for Intrusion Prevention Systems on Serial Data Bus Networks

Matthew Rogers (MITRE, University of Oxford, USA), Kasper Rasmussen (University of Oxford, United Kingdom)

On the Cryptographic Fragility of the Telegram Ecosystem

Theo von Arx (ETH Zurich, Switzerland), Kenneth G. Paterson (ETH Zurich, Switzerland)

Symbolic Modelling of Remote Attestation Protocols for Device and App Integrity on Android

Abdulla Aldoseri (University of Birmingham UK), Tom Chothia (University of Birmingham, UK), Jose Moreira (Valory AG, Switzerland), David Oswald (University of Birmingham, UK)

Arvin: Greybox Fuzzing Using Approximate Dynamic CFG Analysis

Sirus Shahini (University of Utah, USA), Robert Ricci (University of Utah, USA), Mu Zhang (University of Utah, USA), Mathias Payer (EPFL, Switzerland)

AbsIntIO: Towards Showing the Absence of Integer Overflows in Binaries using Abstract Interpretation

Alexander Küchler (Fraunhofer AISEC, Germany), Leon Wenning (TU Munich, Germany), Florian Wendland (Fraunhofer AISEC, Germany)

#DM-Me: Susceptibility to Direct Messaging-Based Scams

Raj Vardhan (Texas A&M University, USA), Alok Chandrawal (Texas A&M University, USA), Phakpoom Chinprutthiwong (Sisaket Rajabhat University, Thailand), Yangyong Zhang (Texas A&M University, USA), Guofei Gu (Texas A&M University, USA)

Jujutsu: A Two-stage Defense against Adversarial Patch Attacks on Deep Neural Networks

Zitao Chen (University of British Columbia, , Canada), Pritam Dash (University of British Columbia, Canada), Karthik Pattabiraman (University of British Columbia, Canada)

PSI with computation or Circuit-PSI for Unbalanced Sets from Homomorphic Encryption

Yongha Son (Samsung SDS, South Korea), Jinhyuck Jeong (Samsung SDS, South Korea)

Binary Function Clone Search in the Presence of Code Obfuscation and Optimization over Multi-CPU Architectures

Abdullah Qasem (Concordia University, Canada), Mourad Debbabi (Concordia University, Canada), Bernard Lebel (Thales Research Technologies, , Canada), Marthe Kassouf (Hydro-Québec Research Institute, Canada)

RecUP-FL: Reconciling Utility and Privacy in Federated learning via User-configurable Privacy Defense

Yue Cui (University of Tennessee, USA), Syed Irfan Ali Meerza (University of Tennessee, USA), Zhuohang Li (University of Tennessee, USA), Luyang Liu (Google Research, USA), Jiaxin Zhang (Intuit AI Research, USA), Jian Liu (University of Tennessee, USA)

Secure and Efficient Mobile DNN Using Trusted Execution Environments

Bin Hu (Rutgers University, USA), Yan Wang (Temple University, USA), Jerry Cheng (New York Institute of Technology, USA), Tianming Zhao (Dayton University, USA), Yucheng Xie (Indiana University-Purdue University Indianapolis, USA), Xiaonan Guo (George Mason University, USA), Yingying Chen (Rutgers University, USA)

LDL: A Defense for Label-Based Membership Inference Attacks

Arezoo Rajabi (University of Washington, USA), Dinuka Sahabandu (University of Washington, USA), Luyao Niu (University of Washington, USA), Bhaskar Ramasubramanian (Western Washington University, USA),
Radha Poovendran (University of Washington, USA)

DHBE: Data-free Holistic Backdoor Erasing in Deep Neural Networks via Restricted Adversarial Distillation

Zhicong Yan (Shanghai Jiao Tong University, China), Shenghong Li (Shanghai Jiao Tong University, China), Ruijie Zhao (Shanghai Jiao Tong University, China), Yuan Tian (Shanghai Jiao Tong University, China), Yuanyuan Zhao (Hangzhou Normal University, China)

A Transformer-based Function Symbol Name Inference Model from an Assembly Language for Binary Reversing

HyunJin Kim (Sungkyunkwan University, South Korea), JinYeong Bak (Sungkyunkwan University, South Korea),
Kyunghyun Cho (New York University, USA), Hyungjoon Koo (Sungkyunkwan University, South Korea)

Mitigating Adversarial Attacks by Distributing Different Copies to Different Buyers

Jiyi Zhang (NUS, Singapore), Han Fang (NUS, Singapore), Wesley Joon-Wie Tann (NUS, Singapore), Ke Xu (Huawei International, Singapore), Chengfang Fang (Huawei Internationa, Singaporel), Ee-Chien Chang (NUS, Singapore)

Stairway To Rainbow

Gildas Avoine (INSA, CNRS, IRISA, France), Xavier Carpent (University of Nottingham, UK), Diane Leblanc-Albarel (INSA, CNRS, IRISA, France)

Communication-Efficient Inner Product Private Join and Compute with Cardinality

Koji Chida (Gunma University, Japan), Koki Hamada (NTT Social Informatics Laboratories, Japan), Atsunori Ichikawa (NTT Social Informatics Laboratories, Japan), Masanobu Kii (NTT Social Informatics Laboratories, Japan), Junichi Tomida (NTT Social Informatics Laboratories, Japan)

EMShepherd: Detecting Adversarial Samples via Side-channel Leakage

Ruyi Ding (Northeastern University, USA), Cheng Gongye (Northeastern University, USA), Siyue Wang (Northeastern University, USA), A. Adam Ding (Northeastern University, USA), Yunsi Fei (Northeastern University, USA)

Invasion of location privacy using online map services and smartphone sensors

Hyunsoo Kim (NCSOFT, Republic of Korea), Youngbae Jeon (Samsung Research, Republic of Korea), Ji Won Yoon (Korea University, Republic of Korea)

CASSOCK: Viable Backdoor Attacks against DNN in the Wall of Source-Specific Backdoor Defenses

Shang Wang (Nanjing University of Science and Technology, China), Yansong Gao (Nanjing University of Science and Technology, China), Anmin Fu (Nanjing University of Science and Technology, China), Zhi Zhang (University of Western Australia), Yuqing Zhang (University of Chinese Academy of Sciences, China), Willy Susilo ( University of Wollongong, Australia), Dongxi Liu (CSIRO’s Data61, Australia)

Benchmarking the Benchmarks

Marc Miltenberger (Fraunhofer SIT, Germany), Steven Arzt (Fraunhofer SIT, Germany), Philipp Holzinger (Fraunhofer SIT, Germany), Julius Näumann (Fraunhofer SIT, Germany)

An End-to-End Analysis of Covid-Themed Scams in the Wild

Behzad Ousat (Florida International University, USA), Mohammad Ali Tofighi (Florida International University, USA), Amin Kharraz (Florida International University, USA)

CryptoShield – Automatic On-Device Mitigation for Crypto API Misuse in Android Applications

Florian Draschbacher (Graz University of Technology, Austria), Johannes Feichtner (Dynatrace Austria GmbH, Austria)

ZEKRA: Zero-Knowledge Control-Flow Attestation

Heini Bergsson Debes (Technical University of Denmark, Denmark), Edlira Dushku (Aalborg University, Denmark), Thanassis Giannetsos (Ubitech Ltd), Ali Marandi (Technical University of Denmark, Denmark)

Security Properties of Virtual Remotes and SPOOKing their Violations

Joshua Majors (Purdue University, USA), Edgardo Barsallo Yi (Purdue University, USA), Amiya Maji (Purdue University, USA), Darren Wu (Purdue University, USA), Saurabh Bagchi (Purdue University, USA), Aravind Machiry (Purdue University, USA)

Securing Container-based Clouds with Syscall-aware Scheduling

Michael V. Le (IBM Research, USA), Salman Ahmed (IBM Research, USA), Dan Williams (Virginia Tech, USA), Hani Jamjoom (IBM Research, USA)

FLAIR: Defense against Model Poisoning Attack in Federated Learning

Atul Sharma (Purdue University, USA), Wei Chen (Purdue University, USA), Joshua Zhao (Purdue University, USA), Qiang Qiu (Purdue University, USA), Saurabh Bagchi (Purdue University, USA), Somali Chaterji (Purdue University, USA)

T-TER: Defeating A2 Trojans with Targeted Tamper-Evident Routing

Timothy Trippel (University of Michigan, USA), Kang G. Shin (University of Michigan, USA), Kevin B. Bush (MIT Lincoln Laboratory, USA), Matthew Hicks (Virginia Tech, USA)

IOTLB-SC: An Accelerator-Independent Leakage Source in Modern Cloud Systems

Thore Tiemann (University of Lübeck, Germany), Zane Weissman (Worcester Polytechnic Institute, Germany), Thomas Eisenbarth (University of Lübeck, Germany), Berk Sunar (Worcester Polytechnic Institute, Germany)

MASCARA: Systematically Generating Memorable And Secure Passphrases

Avirup Mukherjee (Indian Institute of Technology, Kharagpur, India), Kousshik Murali (Indian Institute of Technology, Kharagpur, India), Shivam Kumar Jha (Indian Institute of Technology, Kharagpur, India), Niloy Ganguly (Indian Institute of Technology, Kharagpur, India), Rahul Chatterjee (University of Wisconsin–Madison, USA), Mainack Mondal (Indian Institute of Technology, Kharagpur, India)

Ember-IO: Effective Firmware Fuzzing with Model-Free Memory Mapped IO

Guy Farrelly (The University of Adelaide, Australia), Michael Chesser (The University of Adelaide, Australia), Damith C. Ranasinghe (University of Adelaide, Australia)