


default search action
41st SP 2020: San Francisco, CA, USA - Workshops
- 2020 IEEE Security and Privacy Workshops, SP Workshops, San Francisco, CA, USA, May 21, 2020. IEEE 2020, ISBN 978-1-7281-9346-5

- Adarsh Kyadige, Ethan M. Rudd, Konstantin Berlin:

Learning from Context: A Multi-View Deep Learning Architecture for Malware Detection. 1-7 - Matthew Joslin, Shuang Hao:

Attributing and Detecting Fake Images Generated by Known GANs. 8-14 - Mahir Jethanandani, Derek Tang:

Adversarial Attacks Against LipNet: End-to-End Sentence Level Lipreading. 15-19 - Mohammadreza Ebrahimi, Sagar Samtani

, Yidong Chai
, Hsinchun Chen:
Detecting Cyber Threats in Non-English Hacker Forums: An Adversarial Cross-Lingual Knowledge Transfer Approach. 20-26 - Christopher R. Serrano, Pape M. Sylla, Sicun Gao, Michael A. Warren:

RTA3: A Real Time Adversarial Attack on Recurrent Neural Networks. 27-33 - Chawin Sitawarin

, David A. Wagner:
Minimum-Norm Adversarial Examples on KNN and KNN based Models. 34-40 - Erwin Quiring

, Konrad Rieck:
Backdooring and Poisoning Neural Networks with Image-Scaling Attacks. 41-47 - Edward Chou, Florian Tramèr

, Giancarlo Pellegrino:
SentiNet: Detecting Localized Universal Attacks Against Deep Learning Systems. 48-54 - Zhanyuan Zhang, Benson Yuan, Michael McCoyd, David A. Wagner:

Clipped BagNet: Defending Against Sticker Attacks with Clipped Bag-of-features. 55-61 - Jieyu Lin, Kristina Dzeparoska, Sai Qian Zhang, Alberto Leon-Garcia, Nicolas Papernot:

On the Robustness of Cooperative Multi-Agent Reinforcement Learning. 62-68 - Ram Shankar Siva Kumar, Magnus Nyström, John Lambert, Andrew Marshall, Mario Goertzel, Andi Comissoneru, Matt Swann, Sharon Xia:

Adversarial Machine Learning-Industry Perspectives. 69-75 - Hang Hu, Limin Yang, Shihan Lin, Gang Wang:

A Case Study of the Security Vetting Process of Smart-home Assistant Applications. 76-81 - Sam Hylamia, Wenqing Yan, André Teixeira, Noor Badariah Asan, Mauricio David Perez, Robin Augustine, Thiemo Voigt:

Privacy-preserving Continuous Tumour Relapse Monitoring Using In-body Radio Signals. 82-87 - Matt Wixey, Emiliano De Cristofaro, Shane D. Johnson:

On the Feasibility of Acoustic Attacks Using Commodity Smart Devices. 88-97 - Gökçen Yilmaz Dayanikli, Rees R. Hatch, Ryan M. Gerdes, Hongjie Wang

, Regan Zane:
Electromagnetic Sensor and Actuator Attacks on Power Converters for Electric Vehicles. 98-103 - Blake Janes, Heather Crawford, T. J. OConnor:

Never Ending Story: Authentication and Access Control Design Flaws in Shared IoT Devices. 104-109 - Wen-Yi Chu, Ting-Guang Yu, Yu-Kai Lin, Shao-Chuan Lee, Hsu-Chun Hsiao:

On Using Camera-based Visible Light Communication for Security Protocols. 110-117 - Matthew McCormack, Sanjay Chandrasekaran, Guyue Liu, Tianlong Yu, Sandra DeVincent Wolf, Vyas Sekar:

Security Analysis of Networked 3D Printers. 118-125 - Shin-Ming Cheng

, Tao Ban, Jr-Wei Huang, Bing-Kai Hong, Daisuke Inoue:
ELF Analyzer Demo: Online Identification for IoT Malwares with Multiple Hardware Architectures. 126 - Wenqing Yan, Thiemo Voigt, Christian Rohner:

Poster: Radiometric Signatures for Wireless Device Identification over Dynamic Channels. 127 - Theresa May Sobb, Benjamin P. Turnbull

:
Assessment of Cyber Security Implications of New Technology Integrations into Military Supply Chains. 128-135 - Gabriel L. Somlo:

Toward a Trustable, Self-Hosting Computer System. 136-143 - Constantinos Kolias, Daniel Barbará, Craig Rieger, Jacob Ulrich:

EM Fingerprints: Towards Identifying Unauthorized Hardware Substitutions in the Supply Chain Jungle. 144-151 - Bryan Beckman, Jed Haile:

Binary Analysis with Architecture and Code Section Detection using Supervised Machine Learning. 152-156 - Jedediah Haile, Sage Havens:

Identifying Ubiquitious Third-Party Libraries in Compiled Executables Using Annotated and Translated Disassembled Code with Supervised Machine Learning. 157-162 - Timothy Kieras, Muhammad Junaid Farooq, Quanyan Zhu:

Modeling and Assessment of IoT Supply Chain Security Risks: The Role of Structural and Parametric Uncertainties. 163-170 - Brett Meadows, Nathan Edwards, Sang-Yoon Chang:

On-Chip Randomization for Memory Protection Against Hardware Supply Chain Attacks to DRAM. 171-180 - Damian M. Lyons, Saba B. Zahra:

Using Taint Analysis and Reinforcement Learning (TARL) to Repair Autonomous Robot Software. 181-184 - Mohamadreza Ahmadi, Arun Viswanathan, Michel D. Ingham, Kymie Tan, Aaron D. Ames:

Partially Observable Games for Secure Autonomy. 185-188 - Diego Manzanas Lopez, Patrick Musau, Nathaniel Hamilton, Hoang-Dung Tran, Taylor T. Johnson:

Case Study: Safety Verification of an Unmanned Underwater Vehicle. 189-195 - Luanne Burns Chamberlain, Lauren Eisenberg Davis, Martin Stanley, Brian R. Gattoni:

Automated Decision Systems for Cybersecurity and Infrastructure Security. 196-201 - Farha Jahan, Weiqing Sun, Quamar Niyaz:

A Non-Cooperative Game based Model for the Cybersecurity of Autonomous Systems. 202-207 - Feiyang Cai, Jiani Li, Xenofon D. Koutsoukos:

Detecting Adversarial Examples in Learning-Enabled Cyber-Physical Systems using Variational Autoencoder for Regression. 208-214 - Gregory Falco:

A Smart City Internet for Autonomous Systems. 215-220 - Honghao Guo, Zuo Wang, Benfang Wang, Xiangyang Li, Devu M. Shila:

Fooling A Deep-Learning Based Gait Behavioral Biometric System. 221-227 - Dimitrios Boursinos, Xenofon D. Koutsoukos:

Trusted Confidence Bounds for Learning Enabled Cyber-Physical Systems. 228-233 - Yuning He, Johann Schumann:

A Framework for the Analysis of Deep Neural Networks in Autonomous Aerospace Applications using Bayesian Statistics. 234-239 - Prinkle Sharma, Umesh Siddanagaiah, Gökhan Kul:

Towards an AI-Based After-Collision Forensic Analysis Protocol for Autonomous Vehicles. 240-243 - Karl Siil, Aviel D. Rubin, Matthew Elder, Anton Dahbura, Matthew Green, Lanier A. Watkins:

Mission Assurance for Autonomous Undersea Vehicles. 244-249 - Vijaya Kumar Sundar

, Shreyas Ramakrishna
, Zahra RahimiNasab, Arvind Easwaran
, Abhishek Dubey:
Out-of-Distribution Detection in Multi-Label Datasets using Latent Space of β-VAE. 250-255 - Jeffrey S. Chavis, Anna L. Buczak, Aaron Kunz, Aviel D. Rubin, Lanier A. Watkins:

A Capability for Autonomous IoT System Security: Pushing IoT Assurance to the Edge. 256-261 - Zahir Alsulaimawi

:
A Privacy Filter Framework for Internet of Robotic Things Applications. 262-267 - Lars Hermerschmidt, Andreas Straub, Goran Piskachev:

Language-agnostic Injection Detection. 268-275 - Carson Harmon, Bradford Larsen, Evan A. Sultanik:

Toward Automated Grammar Extraction via Semantic Labeling of Parser Implementations. 276-283 - Steve Huntsman, Michael Robinson

:
The Geometry of Syntax and Semantics for Directed File Transformations. 284-290 - Sameed Ali, Prashant Anantharaman, Sean W. Smith:

Armor Within: Defending Against Vulnerabilities in Third-Party Libraries. 291-299 - Prashanth Mundkur, Linda Briesemeister, Natarajan Shankar, Prashant Anantharaman, Sameed Ali, Zephyr Lucas, Sean W. Smith:

Research Report: The Parsley Data Format Definition Language. 300-307 - Nika Pona, Vadim Zaliva

:
Research Report: Formally-Verified ASN.1 Protocol C-language Stack. 308-317 - Tim Allison, Wayne Burke, Valentino Constantinou, Edwin Goh, Chris Mattmann, Anastasija Mensikova, Philip Southam, Ryan Stonebraker

, Virisha Timmaraju:
Research Report: Building a Wide Reach Corpus for Secure Parser Development. 318-326 - Sam Cowger, Yerim Lee, Nichole Schimanski, Mark Tullsen, Walter Woods, Richard Jones, E. W. Davis, William Harris, Trent Brunson, Carson Harmon, Bradford Larsen, Evan Sultanik:

Research Report: ICARUS: Understanding De Facto Formats by Way of Feathers and Wax. 327-334

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














