default search action
38th SP 2017: San Jose, CA, USA
- 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017. IEEE Computer Society 2017, ISBN 978-1-5090-5533-3
Session #1: Privacy and Learning
- Reza Shokri, Marco Stronati, Congzheng Song, Vitaly Shmatikov:
Membership Inference Attacks Against Machine Learning Models. 3-18 - Payman Mohassel, Yupeng Zhang:
SecureML: A System for Scalable Privacy-Preserving Machine Learning. 19-38 - Nicholas Carlini, David A. Wagner:
Towards Evaluating the Robustness of Neural Networks. 39-57 - Adam D. Smith, Abhradeep Thakurta, Jalaj Upadhyay:
Is Interaction Necessary for Distributed Private Learning? 58-77 - Mathias Lécuyer, Riley Spahn, Roxana Geambasu, Tzu-Kuo Huang, Siddhartha Sen:
Pyramid: Enhancing Selectivity in Big Data Protection with Count Featurization. 78-95
Session #2: Getting Security Right
- Cormac Herley, Paul C. van Oorschot:
SoK: Science, Security and the Elusive Goal of Security as a Scientific Pursuit. 99-120 - Felix Fischer, Konstantin Böttinger, Huang Xiao, Christian Stransky, Yasemin Acar, Michael Backes, Sascha Fahl:
Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security. 121-136 - Ruba Abu-Salma, M. Angela Sasse, Joseph Bonneau, Anastasia Danilova, Alena Naiakshina, Matthew Smith:
Obstacles to the Adoption of Secure Communication Tools. 137-153 - Yasemin Acar, Michael Backes, Sascha Fahl, Simson L. Garfinkel, Doowon Kim, Michelle L. Mazurek, Christian Stransky:
Comparing the Usability of Cryptographic APIs. 154-171 - Benjamin Fuller, Mayank Varia, Arkady Yerukhimovich, Emily Shen, Ariel Hamlin, Vijay Gadepally, Richard Shay, John Darby Mitchell, Robert K. Cunningham:
SoK: Cryptographically Protected Database Search. 172-191
Session #3: Attacks
- Eyal Ronen, Adi Shamir, Achi-Or Weingarten, Colin O'Flynn:
IoT Goes Nuclear: Creating a ZigBee Chain Reaction. 195-212 - Jens Müller, Vladislav Mladenov, Juraj Somorovsky, Jörg Schwenk:
SoK: Exploiting Network Printers. 213-230 - Moritz Contag, Vector Guo Li, Andre Pawlowski, Felix Domke, Kirill Levchenko, Thorsten Holz, Stefan Savage:
How They Did It: An Analysis of Emission Defeat Devices in Modern Automobiles. 231-250 - Nethanel Gelernter, Senia Kalma, Bar Magnezi, Hen Porcilan:
The Password Reset MitM Attack. 251-267 - Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, Andrea Maria Zanchettin, Stefano Zanero:
An Experimental Security Analysis of an Industrial Robot Controller. 268-286
Session #4: Systems Security and Authentication
- Abraham A. Clements, Naif Saleh Almakhdhub, Khaled Saab, Prashast Srivastava, Jinkyu Koo, Saurabh Bagchi, Mathias Payer:
Protecting Bare-Metal Embedded Systems with Privilege Overlays. 289-303 - Yaohui Chen, Dongli Zhang, Ruowen Wang, Rui Qiao, Ahmed M. Azab, Long Lu, Hayawardh Vijayakumar, Wenbo Shen:
NORAX: Enabling Execute-Only Memory for COTS Binaries on AArch64. 304-319 - Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner:
Securing Augmented Reality Output. 320-337 - Geumhwan Cho, Jun Ho Huh, Junsung Cho, Seongyeol Oh, Youngbae Song, Hyoungshick Kim:
SysPal: System-Guided Pattern Locks for Android. 338-356 - Yunpeng Song, Zhongmin Cai, Zhi-Li Zhang:
Multi-touch Authentication Using Hand Geometry and Behavioral Information. 357-372
Session #5: Bitcoin and Distributed Systems
- Maria Apostolaki, Aviv Zohar, Laurent Vanbever:
Hijacking Bitcoin: Routing Attacks on Cryptocurrencies. 375-392 - Alin Tomescu, Srinivas Devadas:
Catena: Efficient Non-equivocation via Bitcoin. 393-409 - Stephanos Matsumoto, Raphael M. Reischuk:
IKP: Turning a PKI Around with Decentralized Automated Incentives. 410-426 - Paul Pearce, Roya Ensafi, Frank Li, Nick Feamster, Vern Paxson:
Augur: Internet-Wide Detection of Connectivity Disruptions. 427-443 - Ewa Syta, Philipp Jovanovic, Eleftherios Kokoris-Kogias, Nicolas Gailly, Linus Gasser, Ismail Khoffi, Michael J. Fischer, Bryan Ford:
Scalable Bias-Resistant Distributed Randomness. 444-460
Session #6: TLS Session Security
- Antoine Delignat-Lavaud, Cédric Fournet, Markulf Kohlweiss, Jonathan Protzenko, Aseem Rastogi, Nikhil Swamy, Santiago Zanella Béguelin, Karthikeyan Bhargavan, Jianyang Pan, Jean Karim Zinzindohoue:
Implementing and Proving the TLS 1.3 Record Layer. 463-482 - Karthikeyan Bhargavan, Bruno Blanchet, Nadim Kobeissi:
Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate. 483-502 - Sze Yiu Chau, Omar Chowdhury, Md. Endadul Hoque, Huangyi Ge, Aniket Kate, Cristina Nita-Rotaru, Ninghui Li:
SymCerts: Practical Symbolic Execution for Exposing Noncompliance in X.509 Certificate Validation Implementations. 503-520 - Suphannee Sivakorn, George Argyros, Kexin Pei, Angelos D. Keromytis, Suman Jana:
HVLearn: Automated Black-Box Analysis of Hostname Verification in SSL/TLS Implementations. 521-538 - James Larisch, David R. Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo Wilson:
CRLite: A Scalable System for Pushing All TLS Revocations to All Browsers. 539-556
Session #7: Software Security
- Fraser Brown, Shravan Narayan, Riad S. Wahby, Dawson R. Engler, Ranjit Jhala, Deian Stefan:
Finding and Preventing Bugs in JavaScript Bindings. 559-578 - Junjie Wang, Bihuan Chen, Lei Wei, Yang Liu:
Skyfire: Data-Driven Seed Generation for Fuzzing. 579-594 - Seulbae Kim, Seunghoon Woo, Heejo Lee, Hakjoo Oh:
VUDDY: A Scalable Approach for Vulnerable Code Clone Discovery. 595-614 - Theofilos Petsios, Adrian Tang, Salvatore J. Stolfo, Angelos D. Keromytis, Suman Jana:
NEZHA: Efficient Domain-Independent Differential Testing. 615-632 - Sébastien Bardin, Robin David, Jean-Yves Marion:
Backward-Bounded DSE: Targeting Infeasibility Questions on Obfuscated Codes. 633-651
Session #8: Information-Flow Channel Security
- Paul Grubbs, Kevin Sekniqi, Vincent Bindschaedler, Muhammad Naveed, Thomas Ristenpart:
Leakage-Abuse Attacks against Order-Revealing Encryption. 655-672 - Liang Wang, Paul Grubbs, Jiahui Lu, Vincent Bindschaedler, David Cash, Thomas Ristenpart:
Side-Channel Attacks on Shared Search Indexes. 673-692 - Mathias V. Pedersen, Aslan Askarov:
From Trash to Treasure: Timing-Sensitive Garbage Collection. 693-709 - Van Chan Ngo, Mario Dehesa-Azuara, Matthew Fredrikson, Jan Hoffmann:
Verifying and Synthesizing Constant-Resource Implementations with Types. 710-728 - Thomas Bauereiß, Armando Pesenti Gritti, Andrei Popescu, Franco Raimondi:
CoSMeDis: A Distributed Social Media Platform with Formally Verified Confidentiality Guarantees. 729-748
Session #9: Underground Economics
- Hao Yang, Xiulin Ma, Kun Du, Zhou Li, Hai-Xin Duan, XiaoDong Su, Guang Liu, Zhifeng Geng, Jianping Wu:
How to Learn Klingon without a Dictionary: Detection and Measurement of Black Keywords Used by the Underground Economy. 751-769 - Brown Farinholt, Mohammad Rezaeirad, Paul Pearce, Hitesh Dharmdasani, Haikuo Yin, Stevens Le Blond, Damon McCoy, Kirill Levchenko:
To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild. 770-787 - Chaz Lever, Platon Kotzias, Davide Balzarotti, Juan Caballero, Manos Antonakakis:
A Lustrum of Malware Network Communication: Evolution and Insights. 788-804 - Sumayah A. Alrwais, Xiaojing Liao, Xianghang Mi, Peng Wang, Xiaofeng Wang, Feng Qian, Raheem A. Beyah, Damon McCoy:
Under the Shadow of Sunshine: Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider Networks. 805-823 - Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, David Brumley:
Your Exploit is Mine: Automatic Shellcode Transplant for Remote Exploits. 824-839
Session #10: Cryptography
- Toshinori Araki, Assi Barak, Jun Furukawa, Tamar Lichter, Yehuda Lindell, Ariel Nof, Kazuma Ohara, Adi Watzman, Or Weinstein:
Optimized Honest-Majority MPC for Malicious Adversaries - Breaking the 1 Billion-Gate Per Second Barrier. 843-862 - Yupeng Zhang, Daniel Genkin, Jonathan Katz, Dimitrios Papadopoulos, Charalampos Papamanthou:
vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases. 863-880 - Ralf Küsters, Daniel Rausch:
A Framework for Universally Composable Diffie-Hellman Key Exchange. 881-900 - Jan Camenisch, Liqun Chen, Manu Drijvers, Anja Lehmann, David Novick, Rainer Urian:
One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation. 901-920 - Dongpeng Xu, Jiang Ming, Dinghao Wu:
Cryptographic Function Detection in Obfuscated Binaries via Bit-Precise Symbolic Loop Mapping. 921-937
Session #11: Privacy
- Oleksii Starov, Nick Nikiforakis:
XHOUND: Quantifying the Fingerprintability of Browser Extensions. 941-956 - Michael Backes, Pascal Berrang, Matthias Bieg, Roland Eils, Carl Herrmann, Mathias Humbert, Irina Lehmann:
Identifying Personal DNA Methylation Profiles by Genotype Inference. 957-976 - Yixin Sun, Anne Edmundson, Nick Feamster, Mung Chiang, Prateek Mittal:
Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks. 977-992 - Véronique Cortier, Constantin Catalin Dragan, François Dupressoir, Benedikt Schmidt, Pierre-Yves Strub, Bogdan Warinschi:
Machine-Checked Proofs of Privacy for Electronic Voting Protocols. 993-1008 - Najmeh Miramirkhani, Mahathi Priya Appini, Nick Nikiforakis, Michalis Polychronakis:
Spotless Sandboxes: Evading Malware Analysis Systems Using Wear-and-Tear Artifacts. 1009-1024
Session #12: Authorization
- Philipp Holzinger, Ben Hermann, Johannes Lerch, Eric Bodden, Mira Mezini:
Hardening Java's Access Control by Abolishing Implicit Privilege Elevation. 1027-1040 - Yanick Fratantonio, Chenxiong Qian, Simon P. Chung, Wenke Lee:
Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop. 1041-1057 - Katarzyna Olejnik, Italo Dacosta, Joana Soares Machado, Kévin Huguenin, Mohammad Emtiyaz Khan, Jean-Pierre Hubaux:
SmarPer: Context-Aware and Automatic Runtime-Permissions for Mobile Devices. 1058-1076 - Primal Wijesekera, Arjun Baokar, Lynn Tsai, Joel Reardon, Serge Egelman, David A. Wagner, Konstantin Beznosov:
The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences. 1077-1093 - Paul Marinescu, Chad Parry, Marjori Pomarole, Yuan Tian, Patrick Tague, Ioannis Papagiannis:
IVD: Automatic Learning and Enforcement of Authorization Rules in Online Social Networks. 1094-1109
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.