default search action
EuroS&P 2019: Stockholm, Sweden
- IEEE European Symposium on Security and Privacy, EuroS&P 2019, Stockholm, Sweden, June 17-19, 2019. IEEE 2019, ISBN 978-1-7281-1148-3
Smartphones and Embedded Systems
- Ansgar Kellner, Micha Horlboge, Konrad Rieck, Christian Wressnegger:
False Sense of Security: A Study on the Effectivity of Jailbreak Detection in Banking Apps. 1-14 - Jie Huang, Nataniel P. Borges Jr., Sven Bugiel, Michael Backes:
Up-To-Crash: Evaluating Third-Party Library Updatability on Android. 15-30 - Ali Abbasi, Jos Wetzels, Thorsten Holz, Sandro Etalle:
Challenges in Designing Exploit Mitigations for Deeply Embedded Systems. 31-46 - Ke Xu, Yingjiu Li, Robert H. Deng, Kai Chen, Jiayun Xu:
DroidEvolver: Self-Evolving Android Malware Detection System. 47-62
Programming Languages and Flow Control
- Mathias Vorreiter Pedersen, Stephen Chong:
Programming with Flow-Limited Authorization: Coarser is Better. 63-78 - Marco Guarnieri, Musard Balliu, Daniel Schoepe, David A. Basin, Andrei Sabelfeld:
Information-Flow Control for Database-Backed Applications. 79-94 - Mustakimur Khandaker, Abu Naser, Wenqing Liu, Zhi Wang, Yajin Zhou, Yueqiang Cheng:
Adaptive Call-Site Sensitive Control Flow Integrity. 95-110 - Jannik Pewny, Philipp Koppe, Thorsten Holz:
STEROIDS for DOPed Applications: A Compiler for Automated Data-Oriented Programming. 111-126
Trusted Systems
- Jorden Whitefield, Liqun Chen, Ralf Sasse, Steve A. Schneider, Helen Treharne, Stephan Wesemeyer:
A Symbolic Analysis of ECC-Based Direct Anonymous Attestation. 127-141 - Guoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, Ten-Hwang Lai:
SgxPectre: Stealing Intel Secrets from SGX Enclaves Via Speculative Execution. 142-157 - Claudio Soriente, Ghassan Karame, Wenting Li, Sergey Fedorov:
ReplicaTEE: Enabling Seamless Replication of SGX Enclaves in the Cloud. 158-171
Cryptocurrency, Blockchain and Cybercrime
- Alex Biryukov, Sergei Tikhomirov:
Deanonymization and Linkability of Cryptocurrency Transactions Based on Network Analysis. 172-184 - Raymond Cheng, Fan Zhang, Jernej Kos, Warren He, Nicholas Hynes, Noah M. Johnson, Ari Juels, Andrew Miller, Dawn Song:
Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts. 185-200 - Alice Hutchings, Sergio Pastrana:
Understanding eWhoring. 201-214
Crypto 1: Schemes and Protocols
- Zhen Liu, Guomin Yang, Duncan S. Wong, Khoa Nguyen, Huaxiong Wang:
Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key. 215-230 - Benjamin Lipp, Bruno Blanchet, Karthikeyan Bhargavan:
A Mechanised Cryptographic Proof of the WireGuard Virtual Private Network Protocol. 231-246
More Protocols
- Evgenios M. Kornaropoulos, Petros Efstathopoulos:
The Case of Adversarial Inputs for Secure Similarity Approximation Protocols. 247-262 - Florian Kohnhäuser, Niklas Büscher, Stefan Katzenbeisser:
A Practical Attestation Protocol for Autonomous Embedded Systems. 263-278 - Eric R. Verheul, Christopher Hicks, Flavio D. Garcia:
IFAL: Issue First Activate Later Certificates for V2X. 279-293 - Olivier Blazy, Angèle Bossuat, Xavier Bultel, Pierre-Alain Fouque, Cristina Onete, Elena Pagnin:
SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting. 294-309
Benchmarking and Modelling
- Erik van der Kouwe, Gernot Heiser, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida:
SoK: Benchmarking Flaws in Systems Security. 310-325 - Orçun Çetin, Carlos Gañán, Lisette Altena, Samaneh Tajalizadehkhoob, Michel van Eeten:
Tell Me You Fixed It: Evaluating Vulnerability Notifications via Quarantine Networks. 326-339 - Nadim Kobeissi, Georgio Nicolas, Karthikeyan Bhargavan:
Noise Explorer: Fully Automated Modeling and Verification for Arbitrary Noise Protocols. 356-370
Crypto 2: Side Channels and Users
- Akira Takahashi, Mehdi Tibouchi:
Degenerate Fault Attacks on Elliptic Curve Parameters in OpenSSL. 371-386 - Itsaka Rakotonirina, Boris Köpf:
On Aggregation of Information in Timing Attacks. 387-400 - Sergej Dechand, Alena Naiakshina, Anastasia Danilova, Matthew Smith:
In Encryption We Don't Trust: The Effect of End-to-End Encryption to the Masses on User Perception. 401-415
Privacy
- Simon Oya, Carmela Troncoso, Fernando Pérez-González:
Rethinking Location Privacy for Unknown Mobility Behaviors. 416-431 - Daniel Kales, Olamide Omolola, Sebastian Ramacher:
Revisiting User Privacy for Certificate Transparency. 432-447 - Kimmo Järvinen, Helena Leppäkoski, Elena Simona Lohan, Philipp Richter, Thomas Schneider, Oleksandr Tkachenko, Zheng Yang:
PILOT: Practical Privacy-Preserving Indoor Localization Using OuTsourcing. 448-463 - Adrien Koutsos:
The 5G-AKA Authentication Protocol Privacy. 464-479
Machine Learning
- Jiefeng Chen, Xi Wu, Vaibhav Rastogi, Yingyu Liang, Somesh Jha:
Towards Understanding Limitations of Pixel Discretization Against Adversarial Attacks. 480-495 - Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma, Shardul Tripathi:
EzPC: Programmable and Efficient Secure Two-Party Computation for Machine Learning. 496-511 - Mika Juuti, Sebastian Szyller, Samuel Marchal, N. Asokan:
PRADA: Protecting Against DNN Model Stealing Attacks. 512-527 - Stefano Calzavara, Mauro Conti, Riccardo Focardi, Alvise Rabitti, Gabriele Tolomei:
Mitch: A Machine Learning Approach to the Black-Box Detection of CSRF Vulnerabilities. 528-543
Internet, Passwords and Malware
- Lorenz Schwittmann, Matthäus Wander, Torben Weis:
Domain Impersonation is Feasible: A Study of CA Domain Validation Vulnerabilities. 544-559 - Baojun Liu, Zhou Li, Peiyuan Zong, Chaoyi Lu, Hai-Xin Duan, Ying Liu, Sumayah A. Alrwais, XiaoFeng Wang, Shuang Hao, Yaoqi Jia, Yiming Zhang, Kai Chen, Zaifeng Zhang:
TraffickStop: Detecting and Measuring Illicit Traffic Monetization Through Large-Scale DNS Analysis. 560-575 - Stuart E. Schechter, Yuan Tian, Cormac Herley:
StopGuessing: Using Guessed Passwords to Thwart Online Guessing. 576-589 - Walla Sebastian, Christian Rossow:
MALPITY: Automatic Identification and Exploitation of Tarpit Vulnerabilities in Malware. 590-605
Voting
- Sergiu Bursuc, Constantin Catalin Dragan, Steve Kremer:
Private Votes on Untrusted Platforms: Models, Attacks and Provable Scheme. 606-620 - Kristjan Krips, Jan Willemson, Sebastian Värv:
Is Your Vote Overheard? A New Scalable Side-Channel Attack Against Paper Voting. 621-634 - Lucca Hirschi, Cas Cremers:
Improving Automated Symbolic Analysis of Ballot Secrecy for E-Voting Protocols: A Method Based on Sufficient Conditions. 635-650
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.