default search action
42nd SP 2021: San Francisco, CA, USA - Workshops
- IEEE Security and Privacy Workshops, SP Workshops 2021, San Francisco, CA, USA, May 27, 2021. IEEE 2021, ISBN 978-1-6654-3732-5
6th International Workshop on Traffic Measurements for Cybersecurity (WTMC 2021)
- Alvaro A. Cárdenas:
Message from the General Chair. xi-xiv - Zhouhan Chen, Juliana Freire:
Discovering and Measuring Malicious URL Redirection Campaigns from Fake News Domains. 1-6 - Gints Engelen, Vera Rimmer, Wouter Joosen:
Troubleshooting an Intrusion Detection Dataset: the CICIDS2017 Case Study. 7-12 - Duc C. Le, Nur Zincir-Heywood, Malcolm I. Heywood:
Training regime influences to semi-supervised learning for insider threat detection. 13-18 - Henry Clausen, David Aspinall:
Examining traffic microstructures to improve model development. 19-24 - Tobias Höller, Thomas Raab, Michael Roland, René Mayrhofer:
On the feasibility of short-lived dynamic onion services. 25-30 - José Antonio Gómez-Hernández, Pedro García-Teodoro, Juan Antonio Holgado Terriza, Gabriel Maciá-Fernández, José Camacho-Páez, M. Robles-Carrillo:
AMon: A Monitoring Multidimensional Feature Application to Secure Android Environments. 31-36 - Tommaso Rescio, Thomas Favale, Francesca Soro, Marco Mellia, Idilio Drago:
DPI Solutions in Practice: Benchmark and Comparison. 37-42 - Philippe Elbaz-Vincent, Mohamed Traoré:
Revisiting the Pervasiveness of Weak Keys in Network Devices. 43-48
DLS 2021: 4th Deep Learning and Security Workshop
- Brody Kutt, William Hewlett, Oleksii Starov, Yuchen Zhou:
Innocent Until Proven Guilty (IUPG): Building Deep Learning Models with Embedded Robustness to Out-Of-Distribution Content. 49-55 - Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Helen Möllering, Thien Duc Nguyen, Phillip Rieger, Ahmad-Reza Sadeghi, Thomas Schneider, Hossein Yalame, Shaza Zeitouni:
SAFELearn: Secure Aggregation for private FEderated Learning. 56-62 - Sharbani Pandit, Jienan Liu, Roberto Perdisci, Mustaque Ahamad:
Applying Deep Learning to Combat Mass Robocalls. 63-70 - Jiayi Hua, Yuanchun Li, Haoyu Wang:
MMGuard: Automatically Protecting On-Device Deep Learning Models in Android Apps. 71-77 - Limin Yang, Arridhana Ciptadi, Ihar Laziuk, Ali Ahmadzadeh, Gang Wang:
BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. 78-84 - Mohammadreza Ebrahimi, Jason Pacheco, Weifeng Li, James Lee Hu, Hsinchun Chen:
Binary Black-Box Attacks Against Static Malware Detectors with Reinforcement Learning in Discrete Action Spaces. 85-91
LangSec 2021: Seventh Workshop on Language-Theoretic Security
- Derek Egolf, Sam Lasser, Kathleen Fisher:
Verbatim: A Verified Lexer Generator. 92-100 - Andreas Jakoby, Jannis Leuther, Stefan Lucks:
Formal Language Theory for Practical Security - Extended Abstract -. 101-110 - David S. Hardin, Konrad L. Slind:
Formal Synthesis of Filter Components for Use in Security-Enhancing Architectural Transformations. 111-120 - Tim Allison, Wayne Burke, Chris Mattmann, Anastasija Mensikova, Philip Southam, Ryan Stonebraker:
Research Report: Building a File Observatory for Secure Parser Development. 121-127 - Zephyr S. Lucas, Joanna Y. Liu, Prashant Anantharaman, Sean W. Smith:
Research Report: Parsing PEGs with Length Fields in Software and Hardware. 128-133 - Joshua Ackerman, George Cybenko:
Formal Languages, Deep Learning, Topology and AlgebraicWord Problems. 134-141 - Letitia W. Li, Greg Eakman, Elias J. M. Garcia, Sam Atman:
Accessible Formal Methods for Verified Parser Development. 142-151 - William Woodruff, Niki Carroll, Sebastiaan Peters:
Differential analysis of x86-64 instruction decoders. 152-161 - Anish Paranjpe, Gang Tan:
Bohemia - A Validator for Parser Frameworks. 162-170 - Walt Woods:
RL-GRIT: Reinforcement Learning for Grammar Inference. 171-183 - Michael Robinson:
Looking for non-compliant documents using error messages from multiple parsers. 184-193 - Tianyu Chen, Jeremy G. Siek:
Mechanized Type Safety for Gradual Information Flow. 194-206
SafeThings 2021: IEEE Workshop on the Internet of Safe Things
- Muhammed Ali Yurdagul, Husrev Taha Sencar:
BLEKeeper: Response Time Behavior Based Man-In-The-Middle Attack Detection. 214-220 - Carlton Shepherd, Konstantinos Markantonakis, Georges-Axel Jaloyan:
LIRA-V: Lightweight Remote Attestation for Constrained RISC-V Devices. 221-227 - Abhinav Mohanty, Meera Sridhar:
HybriDiagnostics: Evaluating Security Issues in Hybrid SmartHome Companion Apps. 228-234 - Furkan Göksel, Muslum Ozgur Ozmen, Michael Reeves, Basavesh Shivakumar, Z. Berkay Celik:
On the Safety Implications of Misordered Events and Commands in IoT Systems. 235-241 - Junjie Shen, Jun Yeon Won, Zeyuan Chen, Qi Alfred Chen:
Demo: Attacking Multi-Sensor Fusion based Localization in High-Level Autonomous Driving. 242 - Christopher DiPalma, Ningfei Wang, Takami Sato, Qi Alfred Chen:
Demo: Security of Camera-based Perception for Autonomous Driving under Adversarial Attack. 243 - Takami Sato, Junjie Shen, Ningfei Wang, Yunhan Jack Jia, Xue Lin, Qi Alfred Chen:
Demo: Security of Deep Learning based Automated Lane Centering under Physical-World Attack. 244 - Kanglan Tang, Junjie Shen, Qi Alfred Chen:
Demo: ROI Attacks on Traffic Light Detection in High-Level Autonomous Driving. 245 - James Schaffter, Aviel Rubin, Lanier A. Watkins:
A Containerization-Based Backfit Approach for Industrial Control System Resiliency. 246-252 - Mustafa Abdallah, Sayan Mitra, Shreyas Sundaram, Saurabh Bagchi:
HIOA-CPS: Combining Hybrid Input-Output Automaton and Game Theory for Security Modeling of Cyber-Physical Systems. 253-259 - DongInn Kim, Vafa Andalibi, Linda Jean Camp:
Protecting IoT Devices through Localized Detection of BGP Hijacks for Individual Things. 260-267 - Sung Woo Jeon, Sayan Mitra:
Egocentric abstractions for modeling and safety verification of distributed cyber-physical systems. 268-276
SADFE 2021: Systematic Approaches to Digital Forensic Engineering
- Yuezun Li, Cong Zhang, Pu Sun, Lipeng Ke, Yan Ju, Honggang Qi, Siwei Lyu:
DeepFake-o-meter: An Open Platform for DeepFake Detection. 277-281 - Jihye Kim, John V. Monaco:
User Identification in Dynamic Web Traffic via Deep Temporal Features. 282-290 - Sudarshan Srinivasan, Edmon Begoli, Maria Mahbub, Kathryn Knight:
Nomen est Omen - The Role of Signatures in Ascribing Email Author Identity with Transformer Neural Networks. 291-297 - Igor Korkin:
Protected Process Light is not Protected: MemoryRanger Fills The Gap Again. 298-308 - Yosra Lakhdhar, Slim Rekhis:
Machine Learning Based Approach for the Automated Mapping of Discovered Vulnerabilities to Adversial Tactics. 309-317 - Joseph Williams, Áine MacDermott, Kellyann Stamp, Farkhund Iqbal:
Forensic Analysis of Fitbit Versa: Android vs iOS. 318-326
WOOT 2021: 15th IEEE Workshop on Offensive Technologies
- Hongyi Lu, Yechang Wu, Shuqing Li, You Lin, Chaozu Zhang, Fengwei Zhang:
BADUSB-C: Revisiting BadUSB with Type-C. 327-338 - Tristan Claverie, José Lopes-Esteves:
BlueMirror: Reflections on Bluetooth Pairing and Provisioning Protocols. 339-351 - Ateeq Sharfuddin, Brian Chapman, Chris Balles:
An In-memory Embedding of CPython for Offensive Use. 352-360 - Daniel Uroz, Ricardo J. Rodríguez:
Evaluation of the Executional Power in Windows using Return Oriented Programming. 361-372 - James P. Roney, Troy Appel, Prateek Pinisetti, James Mickens:
Identifying Valuable Pointers in Heap Data. 373-382 - Adeen Ayub, Hyunguk Yoo, Irfan Ahmed:
Empirical Study of PLC Authentication Protocols in Industrial Control Systems. 383-397 - Kevin Bock, Pranav Bharadwaj, Jasraj Singh, Dave Levin:
Your Censor is My Censor: Weaponizing Censorship Infrastructure for Availability Attacks. 398-409 - Dhia Farrah, Marc Dacier:
Zero Conf Protocols and their numerous Man in the Middle (MITM) Attacks. 410-421 - Md. Imran Hossen, Xiali Hei:
A Low-Cost Attack against the hCaptcha System. 422-431 - Marco Squarcina, Stefano Calzavara, Matteo Maffei:
The Remote on the Local: Exacerbating Web Attacks Via Service Workers Caches. 432-443 - Mathias Morbitzer, Sergej Proskurin, Martin Radev, Marko Dorfhuber, Erick Quintanar Salas:
SEVerity: Code Injection Attacks against Encrypted Virtual Machines. 444-455 - Luca Wilke, Jan Wichelmann, Florian Sieck, Thomas Eisenbarth:
undeSErVed trust: Exploiting Permutation-Agnostic Remote Attestation. 456-466
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.