default search action
41st SP 2020: San Francisco, CA, USA - Workshops
- 2020 IEEE Security and Privacy Workshops, SP Workshops, San Francisco, CA, USA, May 21, 2020. IEEE 2020, ISBN 978-1-7281-9346-5
- Adarsh Kyadige, Ethan M. Rudd, Konstantin Berlin:
Learning from Context: A Multi-View Deep Learning Architecture for Malware Detection. 1-7 - Matthew Joslin, Shuang Hao:
Attributing and Detecting Fake Images Generated by Known GANs. 8-14 - Mahir Jethanandani, Derek Tang:
Adversarial Attacks Against LipNet: End-to-End Sentence Level Lipreading. 15-19 - Mohammadreza Ebrahimi, Sagar Samtani, Yidong Chai, Hsinchun Chen:
Detecting Cyber Threats in Non-English Hacker Forums: An Adversarial Cross-Lingual Knowledge Transfer Approach. 20-26 - Christopher R. Serrano, Pape M. Sylla, Sicun Gao, Michael A. Warren:
RTA3: A Real Time Adversarial Attack on Recurrent Neural Networks. 27-33 - Chawin Sitawarin, David A. Wagner:
Minimum-Norm Adversarial Examples on KNN and KNN based Models. 34-40 - Erwin Quiring, Konrad Rieck:
Backdooring and Poisoning Neural Networks with Image-Scaling Attacks. 41-47 - Edward Chou, Florian Tramèr, Giancarlo Pellegrino:
SentiNet: Detecting Localized Universal Attacks Against Deep Learning Systems. 48-54 - Zhanyuan Zhang, Benson Yuan, Michael McCoyd, David A. Wagner:
Clipped BagNet: Defending Against Sticker Attacks with Clipped Bag-of-features. 55-61 - Jieyu Lin, Kristina Dzeparoska, Sai Qian Zhang, Alberto Leon-Garcia, Nicolas Papernot:
On the Robustness of Cooperative Multi-Agent Reinforcement Learning. 62-68 - Ram Shankar Siva Kumar, Magnus Nyström, John Lambert, Andrew Marshall, Mario Goertzel, Andi Comissoneru, Matt Swann, Sharon Xia:
Adversarial Machine Learning-Industry Perspectives. 69-75 - Hang Hu, Limin Yang, Shihan Lin, Gang Wang:
A Case Study of the Security Vetting Process of Smart-home Assistant Applications. 76-81 - Sam Hylamia, Wenqing Yan, André Teixeira, Noor Badariah Asan, Mauricio David Perez, Robin Augustine, Thiemo Voigt:
Privacy-preserving Continuous Tumour Relapse Monitoring Using In-body Radio Signals. 82-87 - Matt Wixey, Emiliano De Cristofaro, Shane D. Johnson:
On the Feasibility of Acoustic Attacks Using Commodity Smart Devices. 88-97 - Gökçen Yilmaz Dayanikli, Rees R. Hatch, Ryan M. Gerdes, Hongjie Wang, Regan Zane:
Electromagnetic Sensor and Actuator Attacks on Power Converters for Electric Vehicles. 98-103 - Blake Janes, Heather Crawford, T. J. OConnor:
Never Ending Story: Authentication and Access Control Design Flaws in Shared IoT Devices. 104-109 - Wen-Yi Chu, Ting-Guang Yu, Yu-Kai Lin, Shao-Chuan Lee, Hsu-Chun Hsiao:
On Using Camera-based Visible Light Communication for Security Protocols. 110-117 - Matthew McCormack, Sanjay Chandrasekaran, Guyue Liu, Tianlong Yu, Sandra DeVincent Wolf, Vyas Sekar:
Security Analysis of Networked 3D Printers. 118-125 - Shin-Ming Cheng, Tao Ban, Jr-Wei Huang, Bing-Kai Hong, Daisuke Inoue:
ELF Analyzer Demo: Online Identification for IoT Malwares with Multiple Hardware Architectures. 126 - Wenqing Yan, Thiemo Voigt, Christian Rohner:
Poster: Radiometric Signatures for Wireless Device Identification over Dynamic Channels. 127 - Theresa May Sobb, Benjamin P. Turnbull:
Assessment of Cyber Security Implications of New Technology Integrations into Military Supply Chains. 128-135 - Gabriel L. Somlo:
Toward a Trustable, Self-Hosting Computer System. 136-143 - Constantinos Kolias, Daniel Barbará, Craig Rieger, Jacob Ulrich:
EM Fingerprints: Towards Identifying Unauthorized Hardware Substitutions in the Supply Chain Jungle. 144-151 - Bryan Beckman, Jed Haile:
Binary Analysis with Architecture and Code Section Detection using Supervised Machine Learning. 152-156 - Jedediah Haile, Sage Havens:
Identifying Ubiquitious Third-Party Libraries in Compiled Executables Using Annotated and Translated Disassembled Code with Supervised Machine Learning. 157-162 - Timothy Kieras, Muhammad Junaid Farooq, Quanyan Zhu:
Modeling and Assessment of IoT Supply Chain Security Risks: The Role of Structural and Parametric Uncertainties. 163-170 - Brett Meadows, Nathan Edwards, Sang-Yoon Chang:
On-Chip Randomization for Memory Protection Against Hardware Supply Chain Attacks to DRAM. 171-180 - Damian M. Lyons, Saba B. Zahra:
Using Taint Analysis and Reinforcement Learning (TARL) to Repair Autonomous Robot Software. 181-184 - Mohamadreza Ahmadi, Arun Viswanathan, Michel D. Ingham, Kymie Tan, Aaron D. Ames:
Partially Observable Games for Secure Autonomy. 185-188 - Diego Manzanas Lopez, Patrick Musau, Nathaniel Hamilton, Hoang-Dung Tran, Taylor T. Johnson:
Case Study: Safety Verification of an Unmanned Underwater Vehicle. 189-195 - Luanne Burns Chamberlain, Lauren Eisenberg Davis, Martin Stanley, Brian R. Gattoni:
Automated Decision Systems for Cybersecurity and Infrastructure Security. 196-201 - Farha Jahan, Weiqing Sun, Quamar Niyaz:
A Non-Cooperative Game based Model for the Cybersecurity of Autonomous Systems. 202-207 - Feiyang Cai, Jiani Li, Xenofon D. Koutsoukos:
Detecting Adversarial Examples in Learning-Enabled Cyber-Physical Systems using Variational Autoencoder for Regression. 208-214 - Gregory Falco:
A Smart City Internet for Autonomous Systems. 215-220 - Honghao Guo, Zuo Wang, Benfang Wang, Xiangyang Li, Devu M. Shila:
Fooling A Deep-Learning Based Gait Behavioral Biometric System. 221-227 - Dimitrios Boursinos, Xenofon D. Koutsoukos:
Trusted Confidence Bounds for Learning Enabled Cyber-Physical Systems. 228-233 - Yuning He, Johann Schumann:
A Framework for the Analysis of Deep Neural Networks in Autonomous Aerospace Applications using Bayesian Statistics. 234-239 - Prinkle Sharma, Umesh Siddanagaiah, Gökhan Kul:
Towards an AI-Based After-Collision Forensic Analysis Protocol for Autonomous Vehicles. 240-243 - Karl Siil, Aviel D. Rubin, Matthew Elder, Anton Dahbura, Matthew Green, Lanier A. Watkins:
Mission Assurance for Autonomous Undersea Vehicles. 244-249 - Vijaya Kumar Sundar, Shreyas Ramakrishna, Zahra RahimiNasab, Arvind Easwaran, Abhishek Dubey:
Out-of-Distribution Detection in Multi-Label Datasets using Latent Space of β-VAE. 250-255 - Jeffrey S. Chavis, Anna L. Buczak, Aaron Kunz, Aviel D. Rubin, Lanier A. Watkins:
A Capability for Autonomous IoT System Security: Pushing IoT Assurance to the Edge. 256-261 - Zahir Alsulaimawi:
A Privacy Filter Framework for Internet of Robotic Things Applications. 262-267 - Lars Hermerschmidt, Andreas Straub, Goran Piskachev:
Language-agnostic Injection Detection. 268-275 - Carson Harmon, Bradford Larsen, Evan A. Sultanik:
Toward Automated Grammar Extraction via Semantic Labeling of Parser Implementations. 276-283 - Steve Huntsman, Michael Robinson:
The Geometry of Syntax and Semantics for Directed File Transformations. 284-290 - Sameed Ali, Prashant Anantharaman, Sean W. Smith:
Armor Within: Defending Against Vulnerabilities in Third-Party Libraries. 291-299 - Prashanth Mundkur, Linda Briesemeister, Natarajan Shankar, Prashant Anantharaman, Sameed Ali, Zephyr Lucas, Sean W. Smith:
Research Report: The Parsley Data Format Definition Language. 300-307 - Nika Pona, Vadim Zaliva:
Research Report: Formally-Verified ASN.1 Protocol C-language Stack. 308-317 - Tim Allison, Wayne Burke, Valentino Constantinou, Edwin Goh, Chris Mattmann, Anastasija Mensikova, Philip Southam, Ryan Stonebraker, Virisha Timmaraju:
Research Report: Building a Wide Reach Corpus for Secure Parser Development. 318-326 - Sam Cowger, Yerim Lee, Nichole Schimanski, Mark Tullsen, Walter Woods, Richard Jones, E. W. Davis, William Harris, Trent Brunson, Carson Harmon, Bradford Larsen, Evan Sultanik:
Research Report: ICARUS: Understanding De Facto Formats by Way of Feathers and Wax. 327-334
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.