default search action
EuroS&P 2020: Genoa, Italy
- IEEE European Symposium on Security and Privacy, EuroS&P 2020, Genoa, Italy, September 7-11, 2020. IEEE 2020, ISBN 978-1-7281-5087-1
Session 1: Software Security
- Pei Wang, Jinquan Zhang, Shuai Wang, Dinghao Wu:
Quantitative Assessment on the Limitations of Code Randomization for Legacy Binaries. 1-16 - Shachee Mishra, Michalis Polychronakis:
Saffire: Context-sensitive Function Specialization against Code Reuse Attacks. 17-33 - Laurent Simon, Akash Verma:
Improving Fuzzing through Controlled Compilation. 34-52 - Benjamin Bowman, H. Howie Huang:
VGRAPH: A Robust Vulnerable Code Clone Detection System Using Code Property Triplets. 53-69
Session 2: Human Factors in Security and Privacy
- Xuehui Hu, Guillermo Suarez de Tangil, Nishanth Sastry:
Multi-country Study of Third Party Trackers from Real Browser Histories. 70-86 - Diego Sempreboni, Luca Viganò:
X-Men: A Mutation-Based Approach for the Formal Analysis of Security Ceremonies. 87-104 - Adam D. G. Jenkins, Pieris Kalligeros, Kami Vaniea, Maria K. Wolters:
"Anyone Else Seeing this Error?": Community, System Administrators, and Patch Information. 105-119 - Debjani Saha, Anna Chan, Brook Stacy, Kiran Javkar, Sushant Patkar, Michelle L. Mazurek:
User Attitudes On Direct-to-Consumer Genetic Testing. 120-138
Session 3: Security of AI
- Neal Mangaokar, Jiameng Pu, Parantapa Bhattacharya, Chandan K. Reddy, Bimal Viswanath:
Jekyll: Attacking Medical Image Diagnostics using Deep Generative Models. 139-157 - Alexander Warnecke, Daniel Arp, Christian Wressnegger, Konrad Rieck:
Evaluating Explanation Methods for Deep Learning in Security. 158-174 - Te Juin Lester Tan, Reza Shokri:
Bypassing Backdoor Detection Algorithms in Deep Learning. 175-183 - Giulio Lovisotto, Simon Eberz, Ivan Martinovic:
Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating. 184-197 - Philip Sperl, Ching-Yu Kao, Peng Chen, Xiao Lei, Konstantin Böttinger:
DLA: Dense-Layer-Analysis for Adversarial Example Detection. 198-215
Session 4: Blockchain and Crypto Protocol Security
- Ralf Küsters, Julian Liedtke, Johannes Müller, Daniel Rausch, Andreas Vogt:
Ordinos: A Verifiable Tally-Hiding E-Voting System. 216-235 - Mike Graf, Ralf Küsters, Daniel Rausch:
Accountability in a Permissioned Blockchain: Formal Analysis of Hyperledger Fabric. 236-255 - Lars Brünjes, Aggelos Kiayias, Elias Koutsoupias, Aikaterini-Panagiota Stouka:
Reward Sharing Schemes for Stake Pools. 256-275 - Xinyu Li, Jing Xu, Zhenfeng Zhang, Xiao Lan, Yuchen Wang:
Modular Security Analysis of OAuth 2.0 in the Three-Party Setting. 276-293
Session 5: System Security
- Alberto Sonnino, Shehar Bano, Mustafa Al-Bassam, George Danezis:
Replay Attacks and Defenses Against Cross-shard Consensus in Sharded Distributed Ledgers. 294-308 - Jakob Koschel, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi:
TagBleed: Breaking KASLR on the Isolated Kernel Address Space using Tagged TLBs. 309-321 - Ioannis Agadakos, Nikolaos Agadakos, Jason Polakis, Mohamed R. Amer:
Chameleons' Oblivion: Complex-Valued Deep Neural Networks for Protocol-Agnostic RF Device Fingerprinting. 322-338 - Jairo Giraldo, Sahand Hadizadeh Kafash, Justin Ruths, Alvaro A. Cárdenas:
DARIA: Designing Actuators to Resist Arbitrary Attacks Against Cyber-Physical Systems. 339-353
Session 6: Privacy 1
- Rishabh Poddar, Stephanie Wang, Jianan Lu, Raluca Ada Popa:
Practical Volume-Based Attacks on Encrypted Databases. 354-369 - Mihaela Ion, Ben Kreuter, Ahmet Erhan Nergiz, Sarvar Patel, Shobhit Saxena, Karn Seth, Mariana Raykova, David Shanahan, Moti Yung:
On Deploying Secure Computing: Private Intersection-Sum-with-Cardinality. 370-389 - Bailey Kacsmar, Basit Khurram, Nils Lukas, Alexander Norton, Masoumeh Shafieinejad, Zhiwei Shang, Yaser Baseri, Maryam Sepehri, Simon Oya, Florian Kerschbaum:
Differentially Private Two-Party Set Operations. 390-404 - Jan Camenisch, Manu Drijvers, Anja Lehmann, Gregory Neven, Patrick Towa:
Zone Encryption with Anonymous Authentication for V2V Communication. 405-424
Session 7: Security of Autonomous Vehicles and IoT
- Stephan Wesemeyer, Ioana Boureanu, Zach Smith, Helen Treharne:
Extensive Security Verification of the LoRaWAN Key-Establishment: Insecurities & Patches. 425-444 - David Ke Hong, John Kloosterman, Yuqi Jin, Yulong Cao, Qi Alfred Chen, Scott A. Mahlke, Z. Morley Mao:
AVGuardian: Detecting and Mitigating Publish-Subscribe Overprivilege for Autonomous Vehicle Systems. 445-459 - Christopher Hicks, Flavio D. Garcia:
A Vehicular DAA Scheme for Unlinkable ECDSA Pseudonyms in V2X. 460-473 - Roberto Perdisci, Thomas Papastergiou, Omar Alrawi, Manos Antonakakis:
IoTFinder: Efficient Large-Scale Identification of IoT Devices via Passive DNS Traffic Analysis. 474-489
Session 8: Privacy 2
- Ehab ElSalamouny, Catuscia Palamidessi:
Generalized Iterative Bayesian Update and Applications to Mechanisms for Privacy Protection. 490-507 - Inken Hagestedt, Mathias Humbert, Pascal Berrang, Irina Lehmann, Roland Eils, Michael Backes, Yang Zhang:
Membership Inference Against DNA Methylation Databases. 509-520 - Yunhui Long, Lei Wang, Diyue Bu, Vincent Bindschaedler, XiaoFeng Wang, Haixu Tang, Carl A. Gunter, Kai Chen:
A Pragmatic Approach to Membership Inferences on Machine Learning Models. 521-534 - Noah M. Johnson, Joseph P. Near, Joseph M. Hellerstein, Dawn Song:
Chorus: a Programming Framework for Building Scalable Differential Privacy Mechanisms. 535-551
Session 9: Web Security and Privacy
- Yixin Sun, Kangkook Jee, Suphannee Sivakorn, Zhichun Li, Cristian Lumezanu, Lauri Korts-Pärn, Zhenyu Wu, Junghwan Rhee, Chung Hwan Kim, Mung Chiang, Prateek Mittal:
Detecting Malware Injection with Program-DNS Behavior. 552-568 - Radhesh Krishnan Konoth, Björn Fischer, Wan J. Fokkink, Elias Athanasopoulos, Kaveh Razavi, Herbert Bos:
SecurePay: Strengthening Two-Factor Authentication for Arbitrary Transactions. 569-586 - Carsten Baum, Tore Kasper Frederiksen, Julia Hesse, Anja Lehmann, Avishay Yanai:
PESTO: Proactively Secure Distributed Single Sign-On, or How to Trust a Hacked Server. 587-606 - Sourena Maroofi, Maciej Korczynski, Cristian Hesselman, Benoît Ampeau, Andrzej Duda:
COMAR: Classification of Compromised versus Maliciously Registered Domains. 607-623 - Laurent Chuat, AbdelRahman Abdou, Ralf Sasse, Christoph Sprenger, David A. Basin, Adrian Perrig:
SoK: Delegation and Revocation, the Missing Links in the Web's Chain of Trust. 624-638
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.