default search action
42nd SP 2021: San Francisco, CA, USA
- 42nd IEEE Symposium on Security and Privacy, SP 2021, San Francisco, CA, USA, 24-27 May 2021. IEEE 2021, ISBN 978-1-7281-8935-2
- James C. Davis, Francisco Servant, Dongyoon Lee:
Using Selective Memoization to Defeat Regular Expression Denial of Service (ReDoS). 1-17 - Jian Xiang, Stephen Chong:
Co-Inflow: Coarse-grained Information Flow Control for Java-like Languages. 18-35 - Yan Lin, Debin Gao:
When Function Signature Recovery Meets Compiler Optimization. 36-52 - Platon Kotzias, Juan Caballero, Leyla Bilge:
How Did That Get In My Phone? Unwanted App Distribution on Android Devices. 53-69 - Rui Li, Wenrui Diao, Zhou Li, Jianqi Du, Shanqing Guo:
Android Custom Permissions Demystified: From Privilege Escalation to Design Shortcomings. 70-86 - Andrea Possemato, Simone Aonzo, Davide Balzarotti, Yanick Fratantonio:
Trust, But Verify: A Longitudinal Analysis Of Android OEM Compliance and Customization. 87-102 - Xiaojun Xu, Qi Wang, Huichen Li, Nikita Borisov, Carl A. Gunter, Bo Li:
Detecting AI Trojans Using Meta Neural Analysis. 103-120 - Sahar Abdelnabi, Mario Fritz:
Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding. 121-140 - Lucas Bourtoule, Varun Chandrasekaran, Christopher A. Choquette-Choo, Hengrui Jia, Adelin Travers, Baiwu Zhang, David Lie, Nicolas Papernot:
Machine Unlearning. 141-159 - Xiaoyu Ji, Yushi Cheng, Yuepeng Zhang, Kai Wang, Chen Yan, Wenyuan Xu, Kevin Fu:
Poltergeist: Acoustic Adversarial Machine Learning against Cameras and Computer Vision. 160-175 - Yulong Cao, Ningfei Wang, Chaowei Xiao, Dawei Yang, Jin Fang, Ruigang Yang, Qi Alfred Chen, Mingyan Liu, Bo Li:
Invisible for both Camera and LiDAR: Security of Multi-Sensor Fusion based Perception in Autonomous Driving Under Physical-World Attacks. 176-194 - Sekar Kulandaivel, Shalabh Jain, Jorge Guajardo, Vyas Sekar:
CANNON: Reliable and Stealthy Remote Shutdown Attacks via Unaltered Automotive Microcontrollers. 195-210 - Daniel W. Woods, Rainer Böhme:
SoK: Quantifying Cyber Risk. 211-228 - Wanzheng Zhu, Hongyu Gong, Rohan Bansal, Zachary Weinberg, Nicolas Christin, Giulia Fanti, Suma Bhat:
Self-Supervised Euphemism Detection and Identification for Content Moderation. 229-246 - Kurt Thomas, Devdatta Akhawe, Michael D. Bailey, Dan Boneh, Elie Bursztein, Sunny Consolvo, Nicola Dell, Zakir Durumeric, Patrick Gage Kelley, Deepak Kumar, Damon McCoy, Sarah Meiklejohn, Thomas Ristenpart, Gianluca Stringhini:
SoK: Hate, Harassment, and the Changing Landscape of Online Abuse. 247-267 - Karen Klein, Guillermo Pascual-Perez, Michael Walter, Chethan Kamath, Margarita Capretto, Miguel Cueto, Ilia Markov, Michelle Yeo, Joël Alwen, Krzysztof Pietrzak:
Keep the Dirt: Tainted TreeKEM, Adaptively and Actively Secure Continuous Group Key Agreement. 268-284 - Yuncong Hu, Kian Hooshmand, Harika Kalidhindi, Seung Jin Yang, Raluca Ada Popa:
Merkle2: A Low-Latency Transparency Log System. 285-303 - Andreas Hülsing, Kai-Chun Ning, Peter Schwabe, Florian Weber, Philip R. Zimmermann:
Post-quantum WireGuard. 304-321 - Mingtian Tan, Junpeng Wan, Zhe Zhou, Zhou Li:
Invisible Probe: Timing Attacks with PCIe Congestion Side-channel. 322-338 - Stephan van Schaik, Marina Minkin, Andrew Kwong, Daniel Genkin, Yuval Yarom:
CacheOut: Leaking Data on Intel CPUs via Cache Evictions. 339-354 - Moritz Lipp, Andreas Kogler, David F. Oswald, Michael Schwarz, Catherine Easdon, Claudio Canella, Daniel Gruss:
PLATYPUS: Software-based Power Side-Channel Attacks on x86. 355-371 - Alaa Daffalla, Lucy Simko, Tadayoshi Kohno, Alexandru G. Bardas:
Defensive Technology Use by Political Activists During the Sudanese Revolution. 372-390 - Benjamin Bichsel, Samuel Steffen, Ilija Bogunovic, Martin T. Vechev:
DP-Sniper: Black-Box Discovery of Differential Privacy Violations using Classifiers. 391-409 - Nicholas Carlini, Samuel Deng, Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Abhradeep Thakurta, Florian Tramèr:
Is Private Learning Possible with Instance Encoding? 410-427 - Liyi Zhou, Kaihua Qin, Christof Ferreira Torres, Duc Viet Le, Arthur Gervais:
High-Frequency Trading on Decentralized On-Chain Exchanges. 428-445 - Joachim Neu, Ertem Nusret Tas, David Tse:
Ebb-and-Flow Protocols: A Resolution of the Availability-Finality Dilemma. 446-465 - Tyler Crain, Christopher Natoli, Vincent Gramoli:
Red Belly: A Secure, Fair and Scalable Open Blockchain. 466-483 - Nilo Redini, Andrea Continella, Dipanjan Das, Giulio De Pasquale, Noah Spahn, Aravind Machiry, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna:
Diane: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices. 484-500 - Yunang Chen, Amrita Roy Chowdhury, Ruizhe Wang, Andrei Sabelfeld, Rahul Chatterjee, Earlence Fernandes:
Data Privacy in Trigger-Action Systems. 501-518 - Pardis Emami Naeini, Janarth Dheenadhayalan, Yuvraj Agarwal, Lorrie Faith Cranor:
Which Privacy and Security Attributes Most Impact Consumers' Risk Perception and Willingness to Purchase IoT Devices? 519-536 - David Baelde, Stéphanie Delaune, Charlie Jacomme, Adrien Koutsos, Solène Moreau:
An Interactive Prover for Protocol Verification in the Computational Model. 537-554 - Jon Stephens, Kostas Ferles, Benjamin Mariano, Shuvendu K. Lahiri, Isil Dillig:
SmartPulse: Automated Checking of Temporal Properties in Smart Contracts. 555-571 - Miao Yu, Virgil D. Gligor, Limin Jia:
An I/O Separation Model for Formal Verification of Kernel Implementations. 572-589 - Megan Chen, Carmit Hazay, Yuval Ishai, Yuriy Kashnikov, Daniele Micciancio, Tarik Riviere, Abhi Shelat, Muthuramakrishnan Venkitasubramaniam, Ruihan Wang:
Diogenes: Lightweight Scalable RSA Modulus Generation with a Dishonest Majority. 590-607 - Yashvanth Kondi, Bernardo Magri, Claudio Orlandi, Omer Shlomovits:
Refresh When You Wake Up: Proactive Threshold Wallets with Offline Devices. 608-625 - Silvio Micali, Leonid Reyzin, Georgios Vlachos, Riad S. Wahby, Nickolai Zeldovich:
Compact Certificates of Collective Knowledge. 626-641 - Yongheng Chen, Rui Zhong, Hong Hu, Hangfan Zhang, Yupeng Yang, Dinghao Wu, Wenke Lee:
One Engine to Fuzz 'em All: Generic Language Processor Testing with Semantic Validation. 642-658 - Zhuo Zhang, Wei You, Guanhong Tao, Yousra Aafer, Xuwei Liu, Xiangyu Zhang:
StochFuzz: Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting. 659-676 - Jaeseung Choi, Kangsu Kim, Daejin Lee, Sang Kil Cha:
NtFuzz: Enabling Type-Aware Kernel Fuzzing on Windows with Static Binary Analysis. 677-693 - Guangke Chen, Sen Chen, Lingling Fan, Xiaoning Du, Zhe Zhao, Fu Song, Yang Liu:
Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. 694-711 - Hadi Abdullah, Muhammad Sajidur Rahman, Washington Garcia, Kevin Warren, Anurag Swarnim Yadav, Tom Shrimpton, Patrick Traynor:
Hear "No Evil", See "Kenansville"*: Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems. 712-729 - Hadi Abdullah, Kevin Warren, Vincent Bindschaedler, Nicolas Papernot, Patrick Traynor:
SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems. 730-747 - Xiuhua Wang, Sherman S. M. Chow:
Cross-Domain Access Control Encryption: Arbitrary-policy, Constant-size, Efficient. 748-761 - Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai:
Lightweight Techniques for Private Heavy Hitters. 762-776 - Manuel Barbosa, Gilles Barthe, Karthik Bhargavan, Bruno Blanchet, Cas Cremers, Kevin Liao, Bryan Parno:
SoK: Computer-Aided Cryptography. 777-795 - Xueling Zhang, Xiaoyin Wang, Rocky Slavin, Jianwei Niu:
ConDySTA: Context-Aware Dynamic Supplement to Static Taint Analysis. 796-812 - Zhuo Zhang, Yapeng Ye, Wei You, Guanhong Tao, Wen-Chuan Lee, Yonghwi Kwon, Yousra Aafer, Xiangyu Zhang:
OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary. 813-832 - Chengbin Pang, Ruotong Yu, Yaohui Chen, Eric Koskinen, Georgios Portokalidis, Bing Mao, Jun Xu:
SoK: All You Ever Wanted to Know About x86/x64 Binary Disassembly But Were Afraid to Ask. 833-851 - Subhajit Roy, Justin Hsu, Aws Albarghouthi:
Learning Differentially Private Mechanisms. 852-865 - Milad Nasr, Shuang Song, Abhradeep Thakurta, Nicolas Papernot, Nicholas Carlini:
Adversary Instantiation: Lower Bounds for Differentially Private Machine Learning. 866-882 - Albert Cheu, Adam D. Smith, Jonathan R. Ullman:
Manipulation Attacks in Local Differential Privacy. 883-900 - Lukas Aumayr, Matteo Maffei, Oguzhan Ersoy, Andreas Erwig, Sebastian Faust, Siavash Riahi, Kristina Hostáková, Pedro Moreno-Sanchez:
Bitcoin-Compatible Virtual Channels. 901-918 - Liyi Zhou, Kaihua Qin, Antoine Cully, Benjamin Livshits, Arthur Gervais:
On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols. 919-936 - Sri Aravinda Krishnan Thyagarajan, Giulio Malavolta:
Lockable Signatures for Blockchains: Scriptless Scripts for All Signatures. 937-954 - Wei Song, Boya Li, Zihan Xue, Zhenzhen Li, Wenhao Wang, Peng Liu:
Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks! But We Can Fix It. 955-969 - Timothy Trippel, Kang G. Shin, Kevin B. Bush, Matthew Hicks:
Bomberman: Defining and Defeating Hardware Ticking Timebombs at Design-time. 970-986 - Antoon Purnal, Lukas Giner, Daniel Gruss, Ingrid Verbauwhede:
Systematic Analysis of Randomization-based Protected Cache Architectures. 987-1002 - Deevashwer Rathee, Mayank Rathee, Rahul Kranti Kiran Goli, Divya Gupta, Rahul Sharma, Nishanth Chandran, Aseem Rastogi:
SiRnn: A Math Library for Secure RNN Inference. 1003-1020 - Sijun Tan, Brian Knott, Yuan Tian, David J. Wu:
CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU. 1021-1038 - Hengrui Jia, Mohammad Yaghini, Christopher A. Choquette-Choo, Natalie Dullerud, Anvith Thudi, Varun Chandrasekaran, Nicolas Papernot:
Proof-of-Learning: Definitions and Practice. 1039-1056 - Wen-jie Lu, Zhicong Huang, Cheng Hong, Yiping Ma, Hunter Qu:
PEGASUS: Bridging Polynomial and Non-polynomial Evaluations in Homomorphic Encryption. 1057-1073 - Chenkai Weng, Kang Yang, Jonathan Katz, Xiao Wang:
Wolverine: Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits. 1074-1091 - Alexander Viand, Patrick Jattke, Anwar Hithnawi:
SoK: Fully Homomorphic Encryption Compilers. 1092-1108 - Penghui Zhang, Adam Oest, Haehyun Cho, Zhibo Sun, RC Johnson, Brad Wardman, Shaown Sarker, Alexandros Kapravelos, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing. 1109-1124 - Benjamin Eriksson, Giancarlo Pellegrino, Andrei Sabelfeld:
Black Widow: Blackbox Data-driven Web Scanning. 1125-1142 - Umar Iqbal, Steven Englehardt, Zubair Shafiq:
Fingerprinting the Fingerprinters: Learning to Detect Browser Fingerprinting Behaviors. 1143-1161 - Antoine Delignat-Lavaud, Cédric Fournet, Bryan Parno, Jonathan Protzenko, Tahina Ramananandro, Jay Bosamiya, Joseph Lallemand, Itsaka Rakotonirina, Yi Zhou:
A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer. 1162-1178 - Amit Klein:
Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More). 1179-1196 - Yi Chen, Yepeng Yao, XiaoFeng Wang, Dandan Xu, Chang Yue, Xiaozhong Liu, Kai Chen, Haixu Tang, Baoxu Liu:
Bookworm Game: Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis. 1197-1214 - Tai D. Nguyen, Long H. Pham, Jun Sun:
SGUARD: Towards Fixing Vulnerable Smart Contracts Automatically. 1215-1229 - Itay Tsabary, Matan Yechieli, Alex Manuskin, Ittay Eyal:
MAD-HTLC: Because HTLC is Crazy-Cheap to Attack. 1230-1248 - Ethan Cecchetti, Siqiu Yao, Haobin Ni, Andrew C. Myers:
Compositional Security for Reentrant Applications. 1249-1267 - Daniel Votipka, Eric Zhang, Michelle L. Mazurek:
HackEd: A Pedagogical Analysis of Online Vulnerability Discovery Exercises. 1268-1285 - Jaewon Hur, Suhwan Song, Dongup Kwon, Eunjin Baek, Jangwoo Kim, Byoungyoung Lee:
DifuzzRTL: Differential Fuzz Testing to Find CPU Bugs. 1286-1303 - Cheng Shen, Tian Liu, Jun Huang, Rui Tan:
When LoRa Meets EMR: Electromagnetic Covert Channels Can Be Super Resilient. 1304-1317 - Norbert Ludant, Tien Dang Vo-Huu, Sashank Narain, Guevara Noubir:
Linking Bluetooth LE & Classic and Implications for Privacy-Preserving Bluetooth-Based Protocols. 1318-1331 - Maximilian von Tschirschnitz, Ludwig Peuckert, Fabian Franzen, Jens Grossklags:
Method Confusion Attack on Bluetooth Pairing. 1332-1347 - Deepak Maram, Harjasleen Malvai, Fan Zhang, Nerla Jean-Louis, Alexander Frolov, Tyler Kell, Tyrone Lobban, Christine Moy, Ari Juels, Andrew Miller:
CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability. 1348-1366 - Nicolas Huaman, Sabrina Amft, Marten Oltrogge, Yasemin Acar, Sascha Fahl:
They Would do Better if They Worked Together: The Case of Interaction Problems Between Password Managers and Websites. 1367-1381 - Dario Pasquini, Ankit Gangwal, Giuseppe Ateniese, Massimo Bernaschi, Mauro Conti:
Improving Password Guessing via Representation Learning. 1382-1399 - Ziyang Li, Aravind Machiry, Binghong Chen, Mayur Naik, Ke Wang, Le Song:
ARBITRAR: User-Guided API Misuse Detection. 1400-1415 - Dan Frumin, Robbert Krebbers, Lars Birkedal:
Compositional Non-Interference for Fine-Grained Concurrent Programs. 1416-1433 - Ben Nassi, Ron Bitton, Ryusuke Masuoka, Asaf Shabtai, Yuval Elovici:
SoK: Security and Privacy in the Age of Commercial Drones. 1434-1451 - Chen Ling, Utkucan Balci, Jeremy Blackburn, Gianluca Stringhini:
A First Look at Zoombombing. 1452-1467 - Yinxi Liu, Mingxue Zhang, Wei Meng:
Revealer: Detecting and Exploiting Regular Expression Denial-of-Service Vulnerabilities. 1468-1484 - Simon Rohlmann, Vladislav Mladenov, Christian Mainka, Jörg Schwenk:
Breaking the Specification: PDF Certification. 1485-1501 - Evgenios M. Kornaropoulos, Charalampos Papamanthou, Roberto Tamassia:
Response-Hiding Encrypted Ranges: Revisiting Security via Parametrized Leakage-Abuse Attacks. 1502-1519 - Seny Kamara, Tarik Moataz, Andrew Park, Lucy Qin:
A Decentralized and Encrypted National Gun Registry. 1520-1537 - David Heath, Yibin Yang, David Devecsery, Vladimir Kolesnikov:
Zero Knowledge for Everything and Everyone: Fast ZK Processor with Cached ORAM for ANSI C Programs. 1538-1556 - Frederick Barr-Smith, Xabier Ugarte-Pedrero, Mariano Graziano, Riccardo Spolaor, Ivan Martinovic:
Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land. 1557-1574 - Zhihao Bai, Ke Wang, Hang Zhu, Yinzhi Cao, Xin Jin:
Runtime Recovery of Web Applications under Zero-Day ReDoS Attacks. 1575-1588 - Xigao Li, Babak Amin Azad, Amir Rahmati, Nick Nikiforakis:
Good Bot, Bad Bot: Characterizing Automated Browsing Activity. 1589-1605 - Eduardo Blázquez, Sergio Pastrana, Álvaro Feal, Julien Gamba, Platon Kotzias, Narseo Vallina-Rodriguez, Juan Tapiador:
Trouble Over-The-Air: An Analysis of FOTA Apps in the Android Ecosystem. 1606-1622 - Zain ul Abi Din, Hari Venugopalan, Henry Lin, Adam Wushensky, Steven Liu, Samuel T. King:
Doing good by fighting fraud: Ethical anti-fraud systems for mobile payments. 1623-1640 - Lei Xue, Hao Zhou, Xiapu Luo, Yajin Zhou, Yang Shi, Guofei Gu, Fengwei Zhang, Man Ho Au:
Happer: Unpacking Android Apps via a Hardware-Assisted Approach. 1641-1658 - Jacqueline Brendel, Cas Cremers, Dennis Jackson, Mang Zhao:
The Provable Security of Ed25519: Theory and Practice. 1659-1676 - Andreas Hülsing, Florian Weber:
Epochal Signatures for Deniable Group Chats. 1677-1695 - Cas Cremers, Samed Düzlü, Rune Fiedler, Marc Fischlin, Christian Janson:
BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures. 1696-1714 - Quan Chen, Peter Snyder, Ben Livshits, Alexandros Kapravelos:
Detecting Filter List Evasion with Event-Loop-Turn Granularity JavaScript Signatures. 1715-1729 - Gertjan Franken, Tom van Goethem, Wouter Joosen:
Reading Between the Lines: An Extensive Evaluation of the Security and Privacy Implications of EPUB Reading Systems. 1730-1747 - Thomas Haines, Rajeev Goré, Bhavesh Sharma:
Did you mix me? Formally Verifying Verifiable Mix Nets in Electronic Voting. 1748-1765 - David A. Basin, Ralf Sasse, Jorge Toro-Pozo:
The EMV Standard: Break, Fix, Verify. 1766-1781 - Shih-Wei Li, Xupeng Li, Ronghui Gu, Jason Nieh, John Zhuang Hui:
A Secure and Formally Verified Linux KVM Hypervisor. 1782-1799 - Benjamin E. Diamond:
Many-out-of-Many Proofs and Applications to Anonymous Zether. 1800-1817 - Markulf Kohlweiss, Varun Madathil, Kartik Nayak, Alessandra Scafuro:
On the Anonymity Guarantees of Anonymous Proof-of-Stake Protocols. 1818-1833 - Erkan Tairi, Pedro Moreno-Sanchez, Matteo Maffei:
A2L: Anonymous Atomic Locks for Scalability in Payment Channel Hubs. 1834-1851 - Hany Ragab, Alyssa Milburn, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida:
CrossTalk: Speculative Data Leaks Across Cores Are Real. 1852-1867 - Marco Guarnieri, Boris Köpf, Jan Reineke, Pepe Vila:
Hardware-Software Contracts for Secure Speculation. 1868-1883 - Gilles Barthe, Sunjay Cauligi, Benjamin Grégoire, Adrien Koutsos, Kevin Liao, Tiago Oliveira, Swarn Priya, Tamara Rezk, Peter Schwabe:
High-Assurance Cryptography in the Spectre Era. 1884-1901 - Jiaqi Hong, Xuhua Ding:
A Novel Dynamic Analysis Infrastructure to Instrument Untrusted Execution Flow Across User-Kernel Spaces. 1902-1918 - Tapti Palit, Jarin Firose Moon, Fabian Monrose, Michalis Polychronakis:
DynPTA: Combining Static and Dynamic Analysis for Practical Selective Data Protection. 1919-1937 - Alejandro Mera, Bo Feng, Long Lu, Engin Kirda:
DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis. 1938-1954 - Thilo Krachenfels, Fatemeh Ganji, Amir Moradi, Shahin Tajik, Jean-Pierre Seifert:
Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model. 1955-1971 - Luca Piccolboni, Giuseppe Di Guglielmo, Luca P. Carloni, Simha Sethumadhavan:
CRYLOGGER: Detecting Crypto Misuses Dynamically. 1972-1989
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.