default search action
EuroS&P 2021: Vienna, Austria
- IEEE European Symposium on Security and Privacy, EuroS&P 2021, Vienna, Austria, September 6-10, 2021. IEEE 2021, ISBN 978-1-6654-1491-3
- Daniel Votipka, Mary Nicole Dugay Punzalan, Seth M. Rabin, Yla R. Tausczik, Michelle L. Mazurek:
An Investigation of Online Reverse Engineering Community Discussions in the Context of Ghidra. 1-20 - Jay Prakash, Clarice Chua Qing Yu, Tanvi Ravindra Thombre, Andrei Bytes, Mohammed Jubur, Nitesh Saxena, Lucienne Blessing, Jianying Zhou, Tony Q. S. Quek:
Countering Concurrent Login Attacks in "Just Tap" Push-based Authentication: A Redesign and Usability Evaluations. 21-36 - Weijia He, Valerie Zhao, Olivia Morkved, Sabeeka Siddiqui, Earlence Fernandes, Josiah D. Hester, Blase Ur:
SoK: Context Sensing for Access Control in the Adversarial Home IoT. 37-53 - Benjamin Dowling, Britta Hale:
Secure Messaging Authentication against Active Man-in-the-Middle Attacks. 54-70 - Prakash Shrestha, Nitesh Saxena, Diksha Shukla, Vir V. Phoha:
Press @$@$ to Login: Strong Wearable Second Factor Authentication via Short Memorywise Effortless Typing Gestures. 71-87 - David Galindo, Jia Liu, Mihai Ordean, Jin-Mann Wong:
Fully Distributed Verifiable Random Functions and their Application to Decentralised Random Beacons. 88-102 - Christof Ferreira Torres, Antonio Ken Iannillo, Arthur Gervais, Radu State:
ConFuzzius: A Data Dependency-Aware Hybrid Fuzzer for Smart Contracts. 103-119 - Ege Tekiner, Abbas Acar, A. Selcuk Uluagac, Engin Kirda, Ali Aydin Selçuk:
SoK: Cryptojacking Malware. 120-139 - Florian Breuer, Vipul Goyal, Giulio Malavolta:
Cryptocurrencies with Security Policies and Two-Factor Authentication. 140-158 - Hojjat Aghakhani, Dongyu Meng, Yu-Xiang Wang, Christopher Kruegel, Giovanni Vigna:
Bullseye Polytope: A Scalable Clean-Label Poisoning Attack with Improved Transferability. 159-178 - Xinyang Zhang, Zheng Zhang, Shouling Ji, Ting Wang:
Trojaning Language Models for Fun and Profit. 179-197 - Luca Pajola, Mauro Conti:
Fall of Giants: How popular text-based MLaaS fall against a simple evasion attack. 198-211 - Ilia Shumailov, Yiren Zhao, Daniel Bates, Nicolas Papernot, Robert D. Mullins, Ross Anderson:
Sponge Examples: Energy-Latency Attacks on Neural Networks. 212-231 - Benjamin Zi Hao Zhao, Aviral Agrawal, Catisha Coburn, Hassan Jameel Asghar, Raghav Bhaskar, Mohamed Ali Kâafar, Darren Webb, Peter Dickinson:
On the (In)Feasibility of Attribute Inference Attacks on Machine Learning Models. 232-251 - Levente Csikor, Himanshu Singh, Min Suk Kang, Dinil Mon Divakaran:
Privacy of DNS-over-HTTPS: Requiem for a Dream? 252-271 - Xavier Boyen, Thomas Haines, Johannes Müller:
Epoque: Practical End-to-End Verifiable Post-Quantum-Secure E-Voting. 272-291 - Hongyan Chang, Reza Shokri:
On the Privacy Risks of Algorithmic Fairness. 292-303 - Raouf Kerkouche, Gergely Ács, Claude Castelluccia, Pierre Genevès:
Compression Boosts Differentially Private Federated Learning. 304-318 - Theodor Schnitzler, Christina Pöpper, Markus Dürmuth, Katharina Kohls:
We Built This Circuit: Exploring Threat Vectors in Circuit Establishment in Tor. 319-336 - Arman Noroozian, Elsa Turcios Rodriguez, Elmer Lastdrager, Takahiro Kasama, Michel van Eeten, Carlos Gañán:
Can ISPs Help Mitigate IoT Malware? A Longitudinal Study of Broadband ISP Security Efforts. 337-352 - Abhinav Gupta, Aditi Prakash, Nolen Scaife:
Prognosis Negative: Evaluating Real-Time Behavioral Ransomware Detectors. 353-368 - Prashant Hari Narayan Rajput, Esha Sarkar, Dimitrios Tychalas, Michail Maniatakos:
Remote Non-Intrusive Malware Detection for PLCs based on Chain of Trust Rooted in Hardware. 369-384 - Ruimin Sun, Alejandro Mera, Long Lu, David R. Choffnes:
SoK: Attacks on Industrial Control Logic and Formal Verification-Based Defenses. 385-402 - Tugrulcan Elmas, Rebekah Overdorf, Ahmed Furkan Özkalay, Karl Aberer:
Ephemeral Astroturfing Attacks: The Case of Fake Twitter Trends. 403-422 - Johannes Krupp, Christian Rossow:
BGPeek-a-Boo: Active BGP-based Traceback for Amplification DDoS Attacks. 423-439 - Mathew Vermeer, Jonathan West, Alejandro Cuevas, Shuonan Niu, Nicolas Christin, Michel van Eeten, Tobias Fiebig, Carlos Gañán, Tyler Moore:
SoK: A Framework for Asset Discovery: Systematizing Advances in Network Measurements for Protecting Organizations. 440-456 - Onur Zungur, Antonio Bianchi, Gianluca Stringhini, Manuel Egele:
AppJitsu: Investigating the Resiliency of Android Applications. 457-471 - Thomas Rokicki, Clémentine Maurice, Pierre Laperdrix:
SoK: In Search of Lost Time: A Review of JavaScript Timers in Browsers. 472-486 - Ghada Dessouky, Ahmad-Reza Sadeghi, Shaza Zeitouni:
SoK: Secure FPGA Multi-Tenancy in the Cloud: Challenges and Opportunities. 487-506 - Monjur Alam, Baki Berkay Yilmaz, Frank Werner, Niels Samwel, Alenka G. Zajic, Daniel Genkin, Yuval Yarom, Milos Prvulovic:
Nonce@Once: A Single-Trace EM Side Channel Attack on Several Constant-Time Elliptic Curve Implementations in Mobile Platforms. 507-522 - Karthikeyan Bhargavan, Abhishek Bichhawat, Quoc Huy Do, Pedram Hosseyni, Ralf Küsters, Guido Schmitz, Tim Würtele:
DY*: A Modular Symbolic Verification Framework for Executable Cryptographic Protocol Code. 523-542 - Mohammad M. Ahmadpanah, Aslan Askarov, Andrei Sabelfeld:
Nontransitive Policies Transpiled. 543-561 - Yun Shen, Gianluca Stringhini:
ANDRuspex: Leveraging Graph Representation Learning to Predict Harmful App Installations on Mobile Devices. 562-577 - Jehyun Lee, Farren Tang, Pingxiao Ye, Fahim Abbasi, Phil Hay, Dinil Mon Divakaran:
D-Fence: A Flexible, Efficient, and Comprehensive Phishing Email Detection System. 578-597 - Kiavash Satvat, Rigel Gjomemo, V. N. Venkatakrishnan:
Extractor: Extracting Attack Behavior from Threat Reports. 598-615 - M. Caner Tol, Berk Gülmezoglu, Koray Yurtseven, Berk Sunar:
FastSpec: Scalable Generation and Detection of Spectre Gadgets Using Neural Embeddings. 616-632 - Andrea Mambretti, Alexandra Sandulescu, Alessandro Sorniotti, William Robertson, Engin Kirda, Anil Kurmus:
Bypassing memory safety mechanisms through speculative control flow hijacks. 633-649 - Markus Bauer, Christian Rossow:
NoVT: Eliminating C++ Virtual Calls to Mitigate Vtable Hijacking. 650-666 - Hans Winderix, Jan Tobias Mühlberg, Frank Piessens:
Compiler-Assisted Hardening of Embedded Software Against Interrupt Latency Side-Channel Attacks. 667-682 - Samira Briongos, Ida Bruhns, Pedro Malagón, Thomas Eisenbarth, José Manuel Moya:
Aim, Wait, Shoot: How the CacheSniper Technique Improves Unprivileged Cache Attacks. 683-700 - Tolga Ünlü, Lynsay A. Shepherd, Natalie Coull, Colin McLean:
Poster: Angry Birding: Evaluating Application Exceptions as Attack Canaries. 701-703 - Matthew Hill, Carlos E. Rubio-Medrano, Luis Claramunt, Jaejong Baek, Gail-Joon Ahn:
Poster: DyPolDroid: User-Centered Counter-Policies Against Android Permission-Abuse Attacks. 704-706 - Arup Mondal, Yash More, Ruthu Hulikal Rooparaghunath, Debayan Gupta:
Poster: FLATEE: Federated Learning Across Trusted Execution Environments. 707-709 - Duy-Phuc Pham, Damien Marion, Annelie Heuser:
Poster: Obfuscation Revealed - Using Electromagnetic Emanation to Identify and Classify Malware. 710-712 - Luis Claramunt, Larissa Pokam Epse, Carlos E. Rubio-Medrano, Jaejong Baek, Gail-Joon Ahn:
Poster: Preventing Spatial and Privacy Attacks in Mobile Augmented Reality Technologies. 713-715 - Robin Carpentier, Iulian Sandu Popa, Nicolas Anciaux:
Poster: Reducing Data Leakage on Personal Data Management Systems. 716-718 - Gregor Langner, Jerry Andriessen, Gerald Quirchmayr, Steven Furnell, Vittorio Scarano, Teemu Tokola:
Poster: The Need for a Collaborative Approach to Cyber Security Education. 719-721 - Erik Daniel, Florian Tschorsch:
Poster: Towards Verifiable Mutability for Blockchains. 722-724
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.