25:25 Measuring Information Leakage in Website Fingerprinting Attacks and Defenses Association for Computing…
27:12 DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning Association for Computing…
23:43 Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning Association for Computing…
19:13 On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees Association for Computing…
19:13 PatternListener: Cracking Android Pattern Lock Using Acoustic Signals Association for Computing…
28:07 Lawful Device Access without Mass Surveillance Risk: A Technical Design Discussion Association for Computing…
25:09 No Training Hurdles: Fast Training-Agnostic Attacks to Infer Your Typing Association for Computing…
24:54 MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense Association for Computing…
24:32 An Exploratory Analysis of Microcode as a Building Block for System Defenses Association for Computing…
26:26 A Robust and Efficient Defense against Use-after-Free Exploits via Concurrent Pointer Sweeping Association for Computing…
19:49 HyperFlow: A Processor Architecture for Nonmalleable, Timing-Safe Information Flow Security Association for Computing…
22:48 Predicting Impending Exposure to Malicious Content from User Behavior Association for Computing…
23:18 Milkomeda: Safeguarding the Mobile GPU Interface Using WebGL Security Checks Association for Computing…
23:09 Lord of the x86 Rings: A Portable User Mode Privilege Separation Architecture on x86 Association for Computing…
20:51 The Multi-user Security of GCM, Revisited: Tight Bounds for Nonce Randomization Association for Computing…
21:04 Partially Specified Channels: The TLS 1.3 Record Layer without Elision Association for Computing…
25:38 When Good Components Go Bad: Formally Secure Compilation Despite Dynamic Compromise Association for Computing…
23:59 EviHunter: Identifying Digital Evidence in the Permanent Storage via Static Analysis Association for Computing…
23:04 NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis Association for Computing…
26:25 Peeling the Onion's User Experience Layer: Examining Naturalistic Use of the Tor Browser Association for Computing…
23:15 Investigating System Operators' Perspective on Security Misconfigurations Association for Computing…
26:55 Towards Usable Checksums: Automating the Integrity Verification of Web Downloads for the Masses Association for Computing…
23:07 Asking for a Friend: Evaluating Response Biases in Security User Studies Association for Computing…
19:26 Labeled PSI from Fully Homomorphic Encryption with Malicious Security Association for Computing…
21:32 Secure Outsourced Matrix Computation and Application to Neural Networks Association for Computing…
23:20 ClickShield: Are You Hiding Something? Towards Eradicating Clickjacking on Android Association for Computing…
24:28 New Constructions for Forward and Backward Private Symmetric Searchable Encryption Association for Computing…
22:47 Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability Association for Computing…
20:03 HyCC: Compilation of Hybrid Protocols for Practical Secure Computation Association for Computing…
25:28 Truth Will Out: Departure-Based Process-Level Detection of Stealthy Attacks on Control Systems Association for Computing…
24:45 Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach Association for Computing…
28:35 Machine Learning with Membership Privacy using Adversarial Regularization Association for Computing…
25:58 DeepMem: Learning Graph Neural Network Models for Fast and Robust Memory Forensic Analysis Association for Computing…
20:06 Lattice-Based Group Signatures and Zero-Knowledge Proofs of Automorphism Stability Association for Computing…
22:40 Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum Signatures Association for Computing…
26:19 DP-Finder: Finding Differential Privacy Violations by Sampling and Optimization Association for Computing…