


default search action
EuroS&P 2020: Genoa, Italy
- IEEE European Symposium on Security and Privacy, EuroS&P 2020, Genoa, Italy, September 7-11, 2020. IEEE 2020, ISBN 978-1-7281-5087-1

Session 1: Software Security
- Pei Wang, Jinquan Zhang, Shuai Wang, Dinghao Wu:

Quantitative Assessment on the Limitations of Code Randomization for Legacy Binaries. 1-16 - Shachee Mishra, Michalis Polychronakis:

Saffire: Context-sensitive Function Specialization against Code Reuse Attacks. 17-33 - Laurent Simon, Akash Verma:

Improving Fuzzing through Controlled Compilation. 34-52 - Benjamin Bowman, H. Howie Huang

:
VGRAPH: A Robust Vulnerable Code Clone Detection System Using Code Property Triplets. 53-69
Session 2: Human Factors in Security and Privacy
- Xuehui Hu

, Guillermo Suarez de Tangil
, Nishanth Sastry
:
Multi-country Study of Third Party Trackers from Real Browser Histories. 70-86 - Diego Sempreboni, Luca Viganò:

X-Men: A Mutation-Based Approach for the Formal Analysis of Security Ceremonies. 87-104 - Adam D. G. Jenkins

, Pieris Kalligeros, Kami Vaniea
, Maria K. Wolters:
"Anyone Else Seeing this Error?": Community, System Administrators, and Patch Information. 105-119 - Debjani Saha, Anna Chan, Brook Stacy, Kiran Javkar

, Sushant Patkar, Michelle L. Mazurek:
User Attitudes On Direct-to-Consumer Genetic Testing. 120-138
Session 3: Security of AI
- Neal Mangaokar, Jiameng Pu, Parantapa Bhattacharya, Chandan K. Reddy, Bimal Viswanath:

Jekyll: Attacking Medical Image Diagnostics using Deep Generative Models. 139-157 - Alexander Warnecke, Daniel Arp, Christian Wressnegger, Konrad Rieck:

Evaluating Explanation Methods for Deep Learning in Security. 158-174 - Te Juin Lester Tan, Reza Shokri

:
Bypassing Backdoor Detection Algorithms in Deep Learning. 175-183 - Giulio Lovisotto, Simon Eberz, Ivan Martinovic:

Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating. 184-197 - Philip Sperl

, Ching-Yu Kao, Peng Chen, Xiao Lei, Konstantin Böttinger:
DLA: Dense-Layer-Analysis for Adversarial Example Detection. 198-215
Session 4: Blockchain and Crypto Protocol Security
- Ralf Küsters, Julian Liedtke

, Johannes Müller
, Daniel Rausch, Andreas Vogt:
Ordinos: A Verifiable Tally-Hiding E-Voting System. 216-235 - Mike Graf, Ralf Küsters, Daniel Rausch:

Accountability in a Permissioned Blockchain: Formal Analysis of Hyperledger Fabric. 236-255 - Lars Brünjes, Aggelos Kiayias, Elias Koutsoupias, Aikaterini-Panagiota Stouka:

Reward Sharing Schemes for Stake Pools. 256-275 - Xinyu Li, Jing Xu, Zhenfeng Zhang, Xiao Lan, Yuchen Wang:

Modular Security Analysis of OAuth 2.0 in the Three-Party Setting. 276-293
Session 5: System Security
- Alberto Sonnino, Shehar Bano, Mustafa Al-Bassam, George Danezis:

Replay Attacks and Defenses Against Cross-shard Consensus in Sharded Distributed Ledgers. 294-308 - Jakob Koschel, Cristiano Giuffrida

, Herbert Bos
, Kaveh Razavi:
TagBleed: Breaking KASLR on the Isolated Kernel Address Space using Tagged TLBs. 309-321 - Ioannis Agadakos

, Nikolaos Agadakos, Jason Polakis, Mohamed R. Amer:
Chameleons' Oblivion: Complex-Valued Deep Neural Networks for Protocol-Agnostic RF Device Fingerprinting. 322-338 - Jairo Giraldo, Sahand Hadizadeh Kafash

, Justin Ruths, Alvaro A. Cárdenas
:
DARIA: Designing Actuators to Resist Arbitrary Attacks Against Cyber-Physical Systems. 339-353
Session 6: Privacy 1
- Rishabh Poddar, Stephanie Wang, Jianan Lu, Raluca Ada Popa:

Practical Volume-Based Attacks on Encrypted Databases. 354-369 - Mihaela Ion, Ben Kreuter, Ahmet Erhan Nergiz, Sarvar Patel, Shobhit Saxena, Karn Seth, Mariana Raykova, David Shanahan, Moti Yung:

On Deploying Secure Computing: Private Intersection-Sum-with-Cardinality. 370-389 - Bailey Kacsmar, Basit Khurram, Nils Lukas, Alexander Norton, Masoumeh Shafieinejad, Zhiwei Shang, Yaser Baseri

, Maryam Sepehri, Simon Oya, Florian Kerschbaum:
Differentially Private Two-Party Set Operations. 390-404 - Jan Camenisch, Manu Drijvers, Anja Lehmann, Gregory Neven, Patrick Towa:

Zone Encryption with Anonymous Authentication for V2V Communication. 405-424
Session 7: Security of Autonomous Vehicles and IoT
- Stephan Wesemeyer

, Ioana Boureanu
, Zach Smith, Helen Treharne
:
Extensive Security Verification of the LoRaWAN Key-Establishment: Insecurities & Patches. 425-444 - David Ke Hong, John Kloosterman, Yuqi Jin, Yulong Cao, Qi Alfred Chen, Scott A. Mahlke, Z. Morley Mao:

AVGuardian: Detecting and Mitigating Publish-Subscribe Overprivilege for Autonomous Vehicle Systems. 445-459 - Christopher Hicks, Flavio D. Garcia:

A Vehicular DAA Scheme for Unlinkable ECDSA Pseudonyms in V2X. 460-473 - Roberto Perdisci

, Thomas Papastergiou, Omar Alrawi, Manos Antonakakis:
IoTFinder: Efficient Large-Scale Identification of IoT Devices via Passive DNS Traffic Analysis. 474-489
Session 8: Privacy 2
- Ehab ElSalamouny, Catuscia Palamidessi

:
Generalized Iterative Bayesian Update and Applications to Mechanisms for Privacy Protection. 490-507 - Inken Hagestedt, Mathias Humbert, Pascal Berrang, Irina Lehmann, Roland Eils

, Michael Backes, Yang Zhang
:
Membership Inference Against DNA Methylation Databases. 509-520 - Yunhui Long, Lei Wang, Diyue Bu, Vincent Bindschaedler

, XiaoFeng Wang, Haixu Tang, Carl A. Gunter, Kai Chen:
A Pragmatic Approach to Membership Inferences on Machine Learning Models. 521-534 - Noah M. Johnson, Joseph P. Near, Joseph M. Hellerstein, Dawn Song:

Chorus: a Programming Framework for Building Scalable Differential Privacy Mechanisms. 535-551
Session 9: Web Security and Privacy
- Yixin Sun, Kangkook Jee, Suphannee Sivakorn, Zhichun Li, Cristian Lumezanu, Lauri Korts-Pärn, Zhenyu Wu, Junghwan Rhee, Chung Hwan Kim

, Mung Chiang, Prateek Mittal:
Detecting Malware Injection with Program-DNS Behavior. 552-568 - Radhesh Krishnan Konoth, Björn Fischer, Wan J. Fokkink

, Elias Athanasopoulos, Kaveh Razavi, Herbert Bos
:
SecurePay: Strengthening Two-Factor Authentication for Arbitrary Transactions. 569-586 - Carsten Baum, Tore Kasper Frederiksen, Julia Hesse

, Anja Lehmann, Avishay Yanai:
PESTO: Proactively Secure Distributed Single Sign-On, or How to Trust a Hacked Server. 587-606 - Sourena Maroofi, Maciej Korczynski, Cristian Hesselman, Benoît Ampeau

, Andrzej Duda
:
COMAR: Classification of Compromised versus Maliciously Registered Domains. 607-623 - Laurent Chuat, AbdelRahman Abdou, Ralf Sasse, Christoph Sprenger

, David A. Basin, Adrian Perrig
:
SoK: Delegation and Revocation, the Missing Links in the Web's Chain of Trust. 624-638

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














