IEEESymposium 2019 May 16, 2019 to May 16, 2019, San Francisco, US

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Spectre Attacks: Exploiting Speculative Execution Paul Kocher , Daniel Genkin , Yuval Yarom , Anders Fogh , Daniel Gruss , Stefan Mangard , Moritz Lipp , Michael Schwarz , Mike Hamburg , Thomas Prescher , Werner Haas , Jann Horn Modern processors use branch prediction and speculative execution to maximize performance. For example, if the ...
SoK: The Challenges, Pitfalls, and Perils of Using Hardware Performance Counters for Security Fabian Monrose , Manos Antonakakis , Michalis Polychronakis , Jan Werner , Sanjeev Das Hardware Performance Counters (HPCs) have been available in processors for more than a decade. These ...
Theory and Practice of Finding Eviction Sets Boris Köpf , Pepe Vila , José F. Morales Many micro-architectural attacks rely on the capability of an attacker to efficiently find small eviction ...
Exploiting Correcting Codes: On the Effectiveness of ECC Memory Against Rowhammer Attacks Herbert Bos , Cristiano Giuffrida , Kaveh Razavi , Lucian Cojocar Given the increasing impact of Rowhammer, and the dearth of adequate other hardware defenses, many ...
Self-Encrypting Deception: Weaknesses in the Encryption of Solid State Drives Carlo Meijer , Bernard Van Gastel We have analyzed the hardware full-disk encryption of several solid state drives (SSDs) by reverse ...
RIDL: Rogue In-Flight Data Load Herbert Bos , Cristiano Giuffrida , Kaveh Razavi , Giorgi Maisuradze , Alyssa Milburn , Stephan Van Schaik , Pietro Frigo , Sebastian Österlund We present Rogue In-flight Data Load (RIDL), a new class of speculative unprivileged and constrained ...
Perun: Virtual Payment Hubs over Cryptocurrencies Sebastian Faust , Stefan Dziembowski , Lisa Eckey , Daniel Malinowski Payment channels emerged recently as an efficient method for performing cheap micropayments in cryptocurrencies. In ...
Redactable Blockchain in the Permissionless Setting Bernardo Magri , Dominic Deuber , Sri Thyagarajan Bitcoin is an immutable permissionless blockchain system that has been extensively used as a public ...
Proof-of-Stake Sidechains Aggelos Kiayias , Peter Gazi , Dionysis Zindros Sidechains have long been heralded as the key enabler of blockchain scalability and interoperability. However, ...
Ouroboros Crypsinous: Privacy-Preserving Proof-of-Stake Markulf Kohlweiss , Aggelos Kiayias , Vassilis Zikas , Thomas Kerber We present Ouroboros Crypsinous, the first formally analyzed privacy-preserving proof-of-stake blockchain protocol. To model its ...
Lay Down the Common Metrics: Evaluating Proof-of-Work Consensus Protocols' Security Bart Preneel , Ren Zhang Following Bitcoin's Nakamoto Consensus protocol (NC), hundreds of cryptocurrencies utilize proofs of work (PoW) to ...
XCLAIM: Trustless, Interoperable, Cryptocurrency-Backed Assets Arthur Gervais , Joshua Lind , Alexei Zamyatin , Dominik Harz , Panayiotis Panayiotou , William J. Knottenbelt Building trustless cross-blockchain trading protocols is challenging. Centralized exchanges thus remain the preferred route to ...
Does Certificate Transparency Break the Web? Measuring Adoption and Error Rate Parisa Tabriz , Adrienne porter Felt , Emily Stark , Ryan Sleevi , Rijad Muminovic , Devon O'brien , Eran Messeri , Brendan Mcmillion Certificate Transparency (CT) is an emerging system for enabling the rapid discovery of malicious or ...
EmPoWeb: Empowering Web Applications with Browser Extensions Dolière Francis Somé Browser extensions are third party programs, tightly integrated to browsers, where they execute with elevated ...
"If HTTPS Were Secure, I Wouldn't Need 2FA" - End User and Administrator Mental Models of HTTPS Matthew Smith , Katharina Krombholz , Karoline Busse , Katharina Pfeffer , Emanuel Von Zezschwitz HTTPS is one of the most important protocols used to secure communication and is, fortunately, ...
Fidelius: Protecting User Secrets from Compromised Browsers Dan Boneh , Michael Backes , Giancarlo Pellegrino , Saba Eskandarian , Jonathan Cogan , Peh Brandon , Dillon Franke , Forest Fraser , Gaspar Garcia , Eric Gong , Hung T. Nguyen , Taresh K. Sethi , Vishal Subbiah Users regularly enter sensitive data, such as passwords, credit card numbers, or tax information, into ...
Postcards from the Post-HTTP World: Amplification of HTTPS Vulnerabilities in the Web Ecosystem Stefano Calzavara , Riccardo Focardi , Marco Squarcina , Alvise Rabitti , Matúš Nemec HTTPS aims at securing communication over the Web by providing a cryptographic protection layer that ...
Towards Practical Differentially Private Convex Optimization Roger Iyengar , Joseph P. Near , Om Thakkar , Lun Wang , Dawn Song , Abhradeep Guha Thakurta Building useful predictive models often involves learning from sensitive data. Training models with differential privacy ...
PrivKV: Key-Value Data Collection with Local Differential Privacy Huadi Zheng , Qingqing Ye , Haibo Hu , Xiaofeng Meng Local differential privacy (LDP), where each user perturbs her data locally before sending to an ...
Differentially Private Model Publishing For Deep Learning Calton Pu , Ling Liu , Lei Yu , Mehmet Emre Gursoy , Stacey Truex Deep learning techniques based on neural networks have shown significant success in a wide range ...
KHyperLogLog: Estimating Reidentifiability and Joinability of Large Data at Scale Irippuge Milinda Perera , Miguel Angel Guevara , Pern Hui Chia , Damien Desfontaines , Daniel Simmons-marengo , Chao Li , Wei-yen Day , Qiushi Wang Understanding the privacy relevant characteristics of data sets, such as reidentifiability and joinability, is crucial ...
Characterizing Pixel Tracking through the Lens of Disposable Email Services Gang Wang , Hang Hu , Peng Peng Disposable email services provide temporary email addresses, which allows people to register online accounts without ...
Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search against Code Obfuscation and Compiler Optimization Benjamin Fung , Philippe Charland , Steven Ding Reverse engineering is a manually intensive but necessary technique for understanding the inner workings of ...
Iodine: Fast Dynamic Taint Tracking Using Rollback-free Optimistic Hybrid Analysis Peter M. Chen , David Devecsery , Subarno Banerjee , Satish Narayanasamy Dynamic information-flow tracking (DIFT) is useful for enforcing security policies, but rarely used in practice, ...
CaSym: Cache Aware Symbolic Execution for Side Channel Detection and Mitigation Gang Tan , Danfeng Zhang , Robert Brotzman , Shen Liu , Mahmut Kandemir Cache-based side channels are becoming an important attack vector through which secret information can be ...
Towards Automated Safety Vetting of PLC Code in Real-World Plants Z. Morley Mao , Elaine Shi , Mu Zhang , Yuru Shao , Sibin Mohan , Yikai Lin , Chien-ying Chen , Bin-chou Kao , Yassine Qamsane , Kira Barton , James Moyne Safety violations in programmable logic controllers (PLCs), caused either by faults or attacks, have recently ...
Using Safety Properties to Generate Vulnerability Patches Trent Jaeger , David Lie , Gang Tan , Zhen Huang Security vulnerabilities are among the most critical software defects in existence. When identified, programmers aim ...
Reasoning Analytically About Password-Cracking Software Alex X. Liu , David Cash , Blase Ur , Maximilian Golla , Amanda Nakanishi A rich literature has presented efficient techniques for estimating password strength by modeling password-cracking algorithms. ...
True2F: Backdoor-Resistant Authentication Tokens Dan Boneh , David Maziëres , Henry Corrigan-gibbs , Emma Dauterman , Dominic Rizzo We present True2F, a system for second-factor authentication that provides the benefits of conventional authentication ...
Beyond Credential Stuffing: Password Similarity Models using Neural Networks Thomas Ristenpart , Bijeeta Pal , Tal Daniel , Rahul Chatterjee Attackers increasingly use passwords leaked from one website to compromise associated accounts on other websites. ...
The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations Adi Shamir , Daniel Genkin , Yuval Yarom , Eyal Ronen , David Wong , Robert Gillham At CRYPTO'98, Bleichenbacher published his seminal paper which described a padding oracle attack against RSA ...
An Extensive Formal Security Analysis of the OpenID Financial-grade API Ralf Kuesters , Daniel Fett , Pedram Hosseyni Forced by regulations and industry demand, banks worldwide are working to open their customers' online ...
NSF Secure and Trustworthy Cyberspace (SaTC) Overview Dr. Shannon Beck N/A
Fallout: Reading Kernel Writes From User Space Marina Minkin N/A
A Framework for Designing Usable and Secure Protocols Jay Prakash N/A
Machine Learning with Membership Privacy using Adversarial Regularization Milad Nasr N/A
Verifiably Robust Machine Learning for Security Yizheng Chen N/A
Network Traffic Fingerprinting using Machine Learning and Evolutionary Computing Ahmet Aksoy N/A
IoT Inspector: Analyzing Smart Home Traffic in the Wild Danny Yuxing Huang N/A
Can we reach full decentralization in permissionless blockchains? Yujin Kwon N/A
Pili: Simplest-Ever Distributed Consensus Protocols Elaine Shi N/A
4th Interdisciplinary Summerschool on Privacy (ISP 2019) Jaap-henk Hoepman N/A
Short Text, Large Effect: Measuring the Impact of User Reviews on Android App Security & Privacy Michael Backes , Sven Bugiel , Erik Derr , Duc Cuong Nguyen Application markets streamline the end-users’ task of finding and installing applications. They also form an ...
Demystifying Hidden Privacy Settings in Mobile Apps Xiaofeng Wang , Kai Chen , Nan Zhang , Yuan Tian , Kan Yuan , Wei Zou , Xuan Feng , Yi Chen , Mingming Zha , Dandan Xu , Qianqian Zhao , Fnu Suya Mobile apps include privacy settings that allow their users to configure how their data should ...
Security of GPS/INS based On-road Location Tracking Systems Sashank Narain , Guevara Noubir , Aanjhan Ranganathan Location information is critical to a wide variety of navigation and tracking applications. GPS, today's ...
Understanding the Security of ARM Debugging Features Fengwei Zhang , Zhenyu Ning Processors nowadays are consistently equipped with debugging features to facilitate the program analysis. Specifically, the ...
Tap 'n Ghost: A Compilation of Novel Attack Techniques against Smartphone Touchscreens Tatsuya Mori , Seita Maruyama , Satohiro Wakabayashi We present a novel attack named "Tap 'n Ghost", which aims to attack the touchscreens ...
SensorID: Sensor Calibration Fingerprinting for Smartphones Alastair r. Beresford , Jiexin Zhang , Ian Sheret Sensors are an essential component of many com- puter systems today. Mobile devices are a ...
Certified Robustness to Adversarial Examples with Differential Privacy Roxana Geambasu , Suman Jana , Mathias Lécuyer , Vaggelis Atlidakis , Daniel Hsu Adversarial examples that fool machine learning models, particularly deep neural networks, have been a topic ...
DeepSec: A Uniform Platform for Security Analysis of Deep Learning Models Ting Wang , Shouling Ji , Bo Li , Xiang Ling , Jiaxu Zou , Jiannan Wang , Chunming Wu Deep learning (DL) models are inherently vulnerable to adversarial examples – maliciously crafted inputs to ...
Exploiting Unintended Feature Leakage in Collaborative Learning Vitaly Shmatikov , Emiliano de Cristofaro , Luca Melis , Congzheng Song Collaborative machine learning and related techniques such as federated learning allow multiple participants, each with ...
Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks Haitao Zheng , Ben Y. Zhao , Bimal Viswanath , Bolun Wang , Yuanshun Yao , Shawn Shan , Huiying Li Lack of transparency in deep neural networks (DNNs) make them susceptible to backdoor attacks, where ...
Helen: Maliciously Secure Coopetitive Learning for Linear Models Raluca Ada Popa , Ion Stoica , Wenting Zheng , Joseph E. Gonzalez Many organizations wish to collaboratively train machine learning models on their combined datasets for a ...
Comprehensive Privacy Analysis of Deep Learning Amir Houmansadr , Reza Shokri , Milad Nasr Deep neural networks are susceptible to various inference attacks as they remember information about their ...
Razzer: Finding Kernel Race Bugs through Fuzzing Byoungyoung Lee , Kyungtae Kim , Insik Shin , Dae R. Jeong , Basavesh Shivakumar A data race in a kernel is an important class of bugs, criticallyimpacting the reliability ...
ProFuzzer: On-the-fly Input Type Probing for Better Zero-day Vulnerability Discovery Xiaofeng Wang , Wei You , Xiangyu Zhang , Bin Liang , Xueqiang Wang , Jianjun Huang , Shiqing Ma Existing mutation based fuzzers tend to randomly mutate the input of a program without understanding ...
Full-speed Fuzzing: Reducing Fuzzing Overhead through Coverage-guided Tracing Stefan Nagy , Matthew Hicks Coverage-guided fuzzing is one of the most successful approaches for discovering software bugs and security ...
NEUZZ: Efficient Fuzzing with Neural Program Smoothing Suman Jana , Junfeng Yang , Baishakhi Ray , Kexin Pei , Dongdong She , Dave Epstein Fuzzing has become the de facto standard technique for finding software vulnerabilities. However, even state-of-the-art ...
Fuzzing File Systems via Two-Dimensional Input Space Exploration Taesoo Kim , Hyungon Moon , Wen Xu , Sanidhya Kashyap , Po-ning Tseng File systems, a basic building block of an OS, are too big and too complex ...
F-BLEAU: Fast Black-box Leakage Estimation Kostas Chatzikokolakis , Catuscia Palamidessi , Giovanni Cherubin We consider the problem of measuring how much a system reveals about its secret inputs. ...
Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels Daniel Genkin , Eran Tromer , Roei Schuster , Mihir Pattani We show that subtle acoustic noises emanating from within computer screens can be used to ...
Port Contention for Fun and Profit Cesar Pereida García , Billy Bob Brumley , Alejandro Cabrera Aldaya , Sohaib Ul Hassan , Nicola Tuveri Simultaneous Multithreading (SMT) architectures are attractive targets for side-channel enabled attackers, with their inherently broader ...
Attack Directories, Not Caches: Side Channel Attacks in a Non-Inclusive World Christopher Fletcher , Roy Campbell , Mengjia Yan , Read Sprabery , Bhargava Gopireddy , Josep Torrellas Although clouds have strong virtual memory isolation guarantees, cache attacks stemming from shared caches have ...
Hard Drive of Hearing: Disks that Eavesdrop with a Synthesized Microphone Kevin Fu , Wenyuan Xu , Andrew Kwong Security conscious individuals may take considerable measures to disable sensors in order to protect their ...
"Should I Worry?" A Cross-Cultural Examination of Account Security Incident Response Elissa M. Redmiles Digital security technology is able to identify and prevent many threats to users accounts. However, ...
Bitcoin vs. Bitcoin Cash: Coexistence or Downfall of Bitcoin Cash? Hyoungshick Kim , Yongdae Kim , Yujin Kwon , Jinwoo Shin Bitcoin has become the most popular cryptocurrency based on a peer-to-peer network. In Aug. 2017, ...
Stealthy Porn: Understanding Real-World Adversarial Images for Illicit Online Promotion Kehuan Zhang , Xiaofeng Wang , Kan Yuan , Menghan Sun , Di Tang , Xiaojing Liao , Xuan Feng , Haoran Lu , Yi Chen Recent years have witnessed the rapid progress in deep learning (DP), which also brings their ...
LBM: A Security Framework for Peripherals within the Linux Kernel Kevin Butler , Grant Hernandez , Dave (jing) Tian , Joseph I. Choi , Vanessa Frost , Peter Johnson Modern computer peripherals are diverse in their capabilities and functionality, ranging from keyboards and print- ...
SoK: Shining Light on Shadow Stacks Mathias Payer , Nathan Burow , Xinping Zhang Control-Flow Hijacking attacks are the dominantattack vector against C/C++ programs. Control-Flow Integrity(CFI) solutions mitigate these ...
Kiss from a Rogue: Evaluating Detectability of Pay-at-the-Pump Card Skimmers Patrick Traynor , Grant Hernandez , Nolen Scaife , Jasmine Bowers , Imani N. Sherman , Christian Peeters , Lisa Anthony Credit and debit cards enable financial transactions at unattended "pay-at-the-pump" gas station terminals across North ...
Blind Certificate Authorities Thomas Ristenpart , Gilad Asharov , Rafael Pass , Abhi Shelat , Liang Wang We explore how to build a blind certificate authority (CA). Unlike conventional CAs, which learn ...
Data Recovery on Encrypted Databases With k-Nearest Neighbor Query Leakage Charalampos Papamanthou , Roberto Tamassia , Evgenios Kornaropoulos Recent works by Kellaris et al. (CCS’16) and Lacharite et al. (SP’18) demonstrated attacks of ...
Threshold ECDSA from ECDSA Assumptions: The Multiparty Case Abhi Shelat , Yashvanth Kondi , Jack Doerner , Eysa Lee Cryptocurrency applications have spurred a resurgence of interest in the computation of ECDSA signatures using ...
Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks Kenneth g. Paterson , Paul Grubbs , Brice Minaud , Marie-sarah Lacharité We show that the problem of reconstructing encrypted databases from access pattern leakage is closely ...
On the Security of Two-Round Multi-Signatures Bryan Ford , Gregory Neven , Eike Kiltz , Igors Stepanovs , Manu Drijvers , Julian Loss , Kasra Edalatnejad A multi-signature scheme allows a group of signers to collaboratively sign a message, creating a ...
New Primitives for Actively-Secure MPC mod $2^k$ with Applications to Private Machine Learning Ivan Damgård , Tore Kasper Frederiksen , Peter Scholl , Marcel Keller , Daniel Escudero , Nikolaj Volgushev At CRYPTO 2018 Cramer et al. presented SPDZ2k , a new secret-sharing based protocol for ...
Breaking LTE on Layer Two Thorsten Holz , David Rupprecht , Christina Pöpper , Katharina Kohls Long Term Evolution (LTE) is the latest mobile communication standard and has a pivotal role ...
HOLMES: Real-time APT Detection through Correlation of Suspicious Information Flows R. Sekar , Venkat Venkatakrishnan , Birhanu Eshete , Rigel Gjomemo , Sadegh M. Milajerdi In this paper, we present HOLMES, a system that implements a new approach to the ...
Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane Yongdae Kim , Hongil Kim , Jiho Lee , Eunkyu Lee This paper presents our extensive investigation of the security aspects of control plane procedures based ...
On the Feasibility of Rerouting-Based DDoS Defenses Hsu-chun Hsiao , Min Suk Kang , Muoi Tran , Wei-hsuan Chiang , Shu-po Tung , Yu-su Wang Large botnet-based flooding attacks have recently demonstrated unprecedented damage. However, the best-known end-to-end availability guarantees ...
Resident Evil: Understanding Residential IP Proxy as a Dark Service Xiaofeng Wang , Sumayah Alrwais , Zhou Li , Ying Liu , Limin Sun , Xianghang Mi , Xiaojing Liao , Feng Qian , Xuan Feng , Baojun Liu An emerging Internet business is residential proxy (RESIP) as a service, in which a provider ...
Simple High-Level Code For Cryptographic Arithmetic -- With Proofs, Without Compromises Adam Chlipala , Andres Erbsen , Jade Philipoom , Jason Gross , Robert Sloan We introduce a new approach for implementing cryptographic arithmetic in short high-level code with machine-checked ...
SoK: General Purpose Compilers for Secure Multi-Party Computation Steve Zdancewic , Brett Hemenway , Marcella Hastings , Daniel Noble Secure multi-party computation (MPC) allows a group of mutually distrustful parties to compute a joint ...
The Code That Never Ran: Modeling Attacks on Speculative Evaluation Craig Disselkoen , Radha Jagadeesan , Alan Jeffrey , James Riely This paper studies information flow caused by speculation mechanisms in hardware and software. The Spectre ...
Formally Verified Cryptographic Web Applications in WebAssembly Karthikeyan Bhargavan , Benjamin Beurdouche , Jonathan Protzenko , Denis Merigoux After suffering decades of high-profile attacks, the need for formal verification of security-critical software has ...
SoK: Sanitizing for Security Per Larsen , Michael Franz , Prabhu Rajasekaran , Stijn Volckaert , Yeoul Na , Julian Lettner , Dokyung Song The C and C++ programming languages are notoriously insecure yet remain indispensable. Developers therefore resort ...
Why Does Your Data Leak? Uncovering the Data Leakage in Cloud from Mobile Apps Zhiqiang Lin , Yinqian Zhang , Chaoshun Zuo Increasingly, more and more mobile applications (apps for short) are using the cloud as the ...
Measuring and Analyzing Search Engine Poisoning of Linguistic Collisions Shuang Hao , Minhui Xue , Haojin Zhu , Matthew Joslin , Neng Li Misspelled keywords have become an appealing target in search poisoning, since they are less competitive ...
How Well Do My Results Generalize? Comparing Security and Privacy Survey Results from MTurk, Web, and Telephone Samples Michelle l. Mazurek , Elissa M. Redmiles , Sean Kross Security and privacy researchers often rely on data collected from Amazon Mechanical Turk (MTurk) to ...
PhishFarm: A Scalable Framework for Measuring the Effectiveness of Evasion Techniques Against Browser Phishing Blacklists Adam Doupe , Brad Wardman , Gail-joon Ahn , Kevin Tyers , Yeganeh Safaei , Adam Oest Phishing attacks have reached record volumes in recent years. Simultaneously, modern phishing websites are growing ...
SoK: Security Evaluation of Home-Based IoT Deployment Fabian Monrose , Manos Antonakakis , Omar Alrawi , Chaz Lever Home-based IoT devices have a bleak reputation regarding their security practices. On the surface, the ...
Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems Xiaofeng Wang , Nan Zhang , Yuan Tian , Xianghang Mi , Feng Qian , Xuan Feng Virtual personal assistants (VPA) (e.g., Amazon Alexa and Google Assistant) today mostly rely on the ...
Drones' Cryptanalysis - Smashing Cryptography with a Flicker Yuval Elovici , Adi Shamir , Ben Nassi , Raz Ben-netanel In an "open skies" era in which drones fly among us, a new question arises: ...
Dominance as a New Trusted Computing Primitive for the Internet of Things Marcus Peinado , Paul England , Sangho Lee , Dennis Mattoon , Rob Spiger , Stefan Thom , Meng Xu , Manuel Huber , Zhichuang Sun , Andrey Marochko The Internet of Things (IoT) is rapidly emerging as one of the dominant computing paradigms ...