The following papers have been accepted to the 24th ACM Conference on Computer and Communications Security (151 papers accepted out of 836 submissions). All papers are available using the [PDF] link. (If the author also posted an open version of the paper, it is available using the [Paper] link.)

List By Authors · Institutions · Papers by Session · Papers by Topic · Award Finalists · Available Papers · Artifacts

(Ordered by Conference Session)

DUPLO: Unifying Cut-and-Choose for Garbled Circuits [PDF] [Paper] [Artifact] (A1) Vladimir Kolesnikov, Jesper Buus Nielsen, Mike Rosulek, Ni Trieu, Roberto Trifiletti

Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation [PDF] [Paper] [Artifact] (A1) ★ Xiao Wang, Samuel Ranellucci, Jonathan Katz

Global-Scale Secure Multiparty Computation [PDF] [Paper] [Artifact] (A1) Xiao Wang, Samuel Ranellucci, Jonathan Katz

Hearing Your Voice Is Not Enough: An Articulatory Gesture Based Liveness Detection for Voice Authentication [PDF] (A2) Linghan Zhang, Sheng Tan, Jie Yang

VibWrite: Towards Finger-input Authentication on Ubiquitous Surfaces via Physical Vibration [PDF] (A2) Jian Liu, Chen Wang, Yingying Chen, Nitesh Saxena

Presence Attestation: The Missing Link In Dynamic Trust Bootstrapping [PDF] (A2) Zhangkai Zhang, Xuhua Ding, Gene Tsudik, Jinhua Cui, Zhoujun Li

DolphinAttack: Inaudible Voice Commands [PDF] [Paper] (A3) ★ Guoming Zhang, Chen Yan, Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, Wenyuan Xu

Evading Classifiers by Morphing in the Dark [PDF] (A3) Hung Dang, Yue Huang, Ee-Chien Chang

MagNet: a Two-Pronged Defense against Adversarial Examples [PDF] [Paper] (A3) Dongyu Meng, Hao Chen

Hindsight: Understanding the Evolution of UI Vulnerabilities in Mobile Browsers [PDF] (A4) Meng Luo, Oleksii Starov, Nima Honarmand, Nick Nikiforakis

Deterministic Browser [PDF] [Paper] [Artifact] (A4) Yinzhi Cao, Zhanhao Chen, Song Li, Shujiang Wu

Most Websites Don’t Need to Vibrate: A Cost-Benefit Approach to Improving Browser Security [PDF] [Paper] (A4) Peter Snyder, Cynthia Taylor, Chris Kanich

Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin [PDF] [Paper] (A5) Yujin Kwon, Dohyun Kim, Yunmok Son, Eugene Vasserman, Yongdae Kim

Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing [PDF] [Paper] [Artifact] (A5) Changyu Dong, Yilei Wang, Amjad Aldweesh, Patrick McCorry, Aad van Moorsel

Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services [PDF] [Paper] [Artifact] (A5) Matteo Campanelli, Rosario Gennaro, Steven Goldfeder, Luca Nizzardo

Pool: Scalable On-Demand Secure Computation Service Against Malicious Adversaries [PDF] [Paper] [Artifact] (B1) Ruiyu Zhu, Yan Huang, Darion Cassel

A Framework for Constructing Fast MPC over Arithmetic Circuits with Malicious Adversaries and an Honest-Majority [PDF] [Paper] (B1) Yehuda Lindell, Ariel Nof

Efficient, Constant-Round and Actively Secure MPC: Beyond the Three-Party Case [PDF] [Paper] (B1) Nishanth Chandran, Juan Garay, Payman Mohassel, Satyanarayana Vusirikala

Let’s go in for a closer look: Observing passwords in their natural habitat [PDF] (B2) Sarah Pearman, Jeremy Thomas, Pardis Emami Naeini, Hana Habib, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Serge Egelman, Alain Forget

Why Do Developers Get Password Storage Wrong? A Qualitative Usability Study [PDF] [Paper] (B2) Alena Naiakshina, Anastasia Danilova, Christian Tiefenau, Marco Herzog, Sergej Dechand, Matthew Smith

The TypTop System: Personalized Typo-tolerant Password Checking [PDF] [Paper] [Artifact] (B2) Rahul Chatterjee, Joanne Woodage, Yuval Pnueli, Anusha Chowdhury, Thomas Ristenpart

Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance [PDF] (B3) Yan Shoshitaishvili, Michael Weissbacher, Lukas Dresel, Christopher Salls, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna

Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection [PDF] [Paper] (B3) Xiaojun Xu, Chang Liu, Qian Feng, Heng Yin, Le Song, Dawn Song

RAIN: Refinable Attack Investigation with On-demand Inter-Process Information Flow Tracking [PDF] (B3) Yang Ji, Sangho Lee, Evan Downing, Weiren Wang, Mattia Fazzini, Taesoo Kim, Alessandro Orso, Wenke Lee

Synthesis of Probabilistic Privacy Enforcement [PDF] [Artifact] (B4) Martin Kucera, Petar Tsankov, Timon Gehr, Marco Guarnieri, Martin Vechev

A Type System for Privacy Properties [PDF] [Paper] [Artifact] (B4) Véronique Cortier, Niklas Grimm, Joseph Lallemand, Matteo Maffei

Generating Synthetic Decentralized Social Graphs with Local Differential Privacy [PDF] (B4) Zhan Qin, Yin Yang, Ting Yu, Xiaokui Xiao, Issa Khalil, Kui Ren

Revive: Rebalancing Off-Blockchain Payment Networks [PDF] [Artifact] (B5) Rami Khalil, Arthur Gervais

Concurrency and Privacy with Payment-Channel Networks [PDF] [Paper] (B5) Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, Srivatsan Ravi

Bolt: Anonymous Payment Channels for Decentralized Currencies [PDF] (B5) Matthew Green, Ian Miers

S3ORAM: A Computation-Efficient and Constant Client Bandwidth Blowup ORAM with Shamir Secret Sharing [PDF] [Paper] [Artifact] (C1) Thang Hoang, Ceyhun D. Ozkaptan, Attila A. Yavuz, Jorge Guajardo, Tam Nguyen

Deterministic, Stash-Free Write-Only ORAM [PDF] [Paper] [Artifact] (C1) Daniel S. Roche, Adam J. Aviv, Seung Geol Choi, Travis Mayberry

Scaling ORAM for Secure Computation [PDF] [Paper] [Artifact] (C1) ★ Jack Doerner, abhi shelat

Don’t Let One Rotten Apple Spoil the Whole Barrel: Towards Automated Detection of Shadowed Domains [PDF] (C2) Daiping Liu, Zhou Li, Kun Du, Haining Wang, Baojun Liu, Haixin Duan

Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting [PDF] [Paper] (C2) Samaneh Tajalizadehkhoob, Tom van Goethem, Maciej Korczyński, Arman Noroozian, Rainer Böhme, Tyler Moore, Wouter Joosen, Michel van Eeten

Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse [PDF] [Paper] (C2) Panagiotis Kintis, Najmeh Miramirkhani, Charles Lever, Yizheng Chen, Rosa Romero-Gómez, Nikolaos Pitropakis, Nick Nikiforakis, Manos Antonakakis

Machine Learning Models that Remember Too Much [PDF] (C3) Congzheng Song, Thomas Ristenpart, Vitaly Shmatikov

Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning [PDF] [Paper] (C3) Briland Hitaj, Giuseppe Ateniese, Fernando Perez-Cruz

Oblivious Neural Network Predictions via MiniONN transformations [PDF] [Paper] (C3) Jian Liu, Mika Juuti, Yao Lu, N. Asokan

Verifying Security Policies in Multi-agent Workflows with Loops [PDF] [Paper] [Artifact] (C4) Bernd Finkbeiner, Christian Müller, Helmut Seidl, Eugen Zalinescu

Attribute-Based Encryption in the Generic Group Model: Automated Proofs and New Constructions [PDF] (C4) Miguel Ambrona, Gilles Barthe, Romain Gay, Hoeteck Wee

FAME: Fast Attribute-based Message Encryption [PDF] [Paper] [Artifact] (C4) Shashank Agrawal, Melissa Chase

Practical UC-Secure Delegatable Credentials with Attributes and Their Application to Blockchain [PDF] (C5) Jan Camenisch, Manu Drijvers, Maria Dubovitskaya

Solidus: Confidential Distributed Ledger Transactions via PVORM [PDF] [Paper] (C5) Ethan Cecchetti, Fan Zhang, Yan Ji, Ahmed Kosba, Ari Juels, Elaine Shi

Fairness in an Unfair World: Fair Multiparty Computation from Public Bulletin Boards [PDF] (C5) Arka Rai Choudhuri, Matthew Green, Abhishek Jain, Gabriel Kaptchuk, Ian Miers

5Gen-C: Multi-input Functional Encryption and Program Obfuscation for Arithmetic Circuits [PDF] [Artifact] (D1) Brent Carmer, Alex J. Malozemoff, Mariana Raykova

Iron: Functional Encryption using Intel SGX [PDF] [Paper] (D1) ★ Ben Fisch, Dhinakaran Vinayagamurthy, Dan Boneh, Sergey Gorbunov

Implementing BP-Obfuscation Using Graph-Induced Encoding [PDF] [Paper] (D1) Shai Halevi, Tzipora Halevi, Victor Shoup, Noah Stephens-Davidowitz

AUTHSCOPE: Towards Automatic Discovery of Vulnerable Access Control in Online Services [PDF] (D2) Chaoshun Zuo, Qingchuan Zhao, Zhiqiang Lin

Mass Discovery of Android Traffic Imprints through Instantiated Partial Execution [PDF] (D2) Yi Chen, Wei You, Yeonjoon Lee, Kai Chen, XiaoFeng Wang, Wei Zou

Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews [PDF] (D2) Tongxin Li, Xueqiang Wang, Mingming Zha, Kai Chen, XiaoFeng Wang, Luyi Xing, Xiaolong Bai, Nan Zhang, Xinhui Han

May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519 [PDF] [Paper] (D3) Daniel Genkin, Luke Valenta, Yuval Yarom

Stacco: Differentially Analyzing Side-Channel Traces for Detecting SSL/TLS Vulnerabilities in Secure Enclaves [PDF] [Paper] (D3) Yuan Xiao, Mengyuan Li, Sanchuan Chen, Yinqian Zhang

Precise Detection of Side-Channel Vulnerabilities using Quantitative Cartesian Hoare Logic [PDF] (D3) Jia Chen, Yu Feng, Isil Dillig

Better Than Advertised: Improved Collision-Resistance Guarantees for MD-Based Hash Functions [PDF] (D4) Mihir Bellare, Joseph Jaeger, Julia Len

Generic Semantic Security against a Kleptographic Adversary [PDF] (D4) Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou

Defending Against Key Exfiltration: Efficiency Improvements for Big-Key Cryptography via Large-Alphabet Subkey Prediction [PDF] (D4) Mihir Bellare, Wei Dai

Client-side Name Collision Vulnerability in the New gTLD Era: A Systematic Study [PDF] [Paper] (D5) Qi Alfred Chen, Matthew Thomas, Eric Osterweil, Yulong Cao, Jie You, Z. Morley Mao

The Wolf of Name Street: Hijacking Domains Through Their Nameservers [PDF] [Paper] (D5) Thomas Vissers, Timothy Barron, Tom Van Goethem, Wouter Joosen, Nick Nikiforakis

Faulds: A Non-Parametric Iterative Classifier for Internet-Wide OS Fingerprinting [PDF] [Paper] (D5) Zain Shamsi, Daren B.H. Cline, Dmitri Loguinov

T/Key: Second-Factor Authentication From Secure Hash Chains [PDF] [Paper] (E1) Dmitry Kogan, Nathan Manohar, Dan Boneh

Practical Graphs for Optimal Side-Channel Resistant Memory-Hard Functions [PDF] [Paper] [Artifact] (E1) Joel Alwen, Jeremiah Blocki, Ben Harsha

Better Bounds for Block Cipher Modes of Operation via Nonce-Based Key Derivation [PDF] [Paper] (E1) ★ Shay Gueron, Yehuda Lindell

The ART of App Compartmentalization: Compiler-based Library Privilege Separation on Stock Android [PDF] (E2) Jie Huang, Oliver Schranz, Sven Bugiel, Michael Backes

Vulnerable Implicit Service: A Revisit [PDF] (E2) Lingguang Lei, Yi He, Kun Sun, Jiwu Jing, Yuewu Wang, Qi Li, Jian Weng

A Stitch in Time: Supporting Android Developers in Writing Secure Code [PDF] (E2) Duc Cuong Nguyen, Dominik Wermke, Yasemin Acar, Michael Backes, Charles Weir, Sascha Fahl

Exploiting a Thermal Side Channel for Power Attacks in Multi-Tenant Data Centers [PDF] (E3) Mohammad A. Islam, Shaolei Ren, Adam Wierman

Watch Me, but Don’t Touch Me! Contactless Control Flow Monitoring via Electromagnetic Emanations [PDF] [Paper] (E3) Yi Han, Sriharsha Etigowni, Hua Liu, Saman Zonouz, Athina Petropulu

Viden: Attacker Identification on In-Vehicle Networks [PDF] [Paper] (E3) Kyong-Tak Cho, Kang G. Shin

Practical Attacks Against Graph-based Clustering [PDF] [Paper] (E4) Yizheng Chen, Yacin Nadji, Athanasios Kountouras, Fabian Monrose, Roberto Perdisci, Manos Antonakakis, Nikolaos Vasiloglou

Automated Crowdturfing Attacks and Defenses in Online Review Systems [PDF] [Paper] (E4) Yuanshun Yao, Bimal Viswanath, Jenna Cryan, Haitao Zheng, Ben Y. Zhao

POISED: Spotting Twitter Spam Off the Beaten Paths [PDF] [Paper] (E4) Shirin Nilizadeh, François Labrèche, Alireza Sadighian, Ali Zand, José Fernandez, Christopher Kruegel, Gianluca Stringhini, Giovanni Vigna

Practical Secure Aggregation for Privacy-Preserving Machine Learning [PDF] [Paper] (E5) Keith Bonawitz, Vladimir Ivanov, Ben Kreuter, Antonio Marcedone, H. Brendan McMahan, Sarvar Patel, Daniel Ramage, Aaron Segal, Karn Seth

Use Privacy in Data-Driven Systems: Theory and Experiments with Machine Learnt Programs [PDF] [Paper] [Artifact] (E5) Anupam Datta, Matthew Fredrikson, Gihyuk Ko, Piotr Mardziel, Shayak Sen

SGX-BigMatrix: A Practical Encrypted Data Analytic Framework With Trusted Processors [PDF] (E5) Fahad Shaon, Murat Kantarcioglu, Zhiqiang Lin, Latifur Khan

Malicious-Secure Private Set Intersection via Dual Execution [PDF] [Paper] [Artifact] (F1) Peter Rindal, Mike Rosulek

Fast Private Set Intersection from Homomorphic Encryption [PDF] [Paper] (F1) Hao Chen, Kim Laine, Peter Rindal

Practical Multi-party Private Set Intersection from Symmetric-Key Techniques [PDF] [Paper] [Artifact] (F1) Vladimir Kolesnikov, Naor Matania, Benny Pinkas, Mike Rosulek, Ni Trieu

Detecting Structurally Anomalous Logins Within Enterprise Networks [PDF] (F2) Hossein Siadati, Nasir Memon

DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning [PDF] (F2) Min Du, Feifei Li, Guineng Zheng, Vivek Srikumar

Predicting the Risk of Cyber Incidents [PDF] (F2) Leyla Bilge, Yufei Han, Matteo Dell’Amico

Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2 [PDF] [Paper] (F3) ★ Mathy Vanhoef, Frank Piessens

CCCP: Closed Caption Crypto Phones to Resist MITM Attacks, Human Errors and Click-Through [PDF] (F3) Maliheh Shirvanian, Nitesh Saxena

No-Match Attacks and Robust Partnering Definitions — Defining Trivial Attacks for Security Protocols is Not Trivial [PDF] [Paper] (F3) Yong Li, Sven Schäge

Querying for Queries: Indexes of Queries for Efficient and Expressive IT-PIR [PDF] [Paper] (F4) Syed Mahbub Hafiz, Ryan Henry

PeGaSus: Data-Adaptive Differentially Private Stream Processing [PDF] (F4) Yan Chen, Ashwin Machanavajjhala, Michael Hay, Gerome Miklau

Composing Differential Privacy and Secure Computation: A case study on scaling private record linkage [PDF] [Paper] (F4) Xi He, Ashwin Machanavajjhala, Cheryl Flynn, Divesh Srivastava

Where the Wild Warnings Are: Root Causes of Chrome HTTPS Certificate Errors [PDF] (F5) Mustafa Emre Acer, Emily Stark, Adrienne Porter Felt, Sascha Fahl, Radhika Bhargava, Bhanu Dev, Matt Braithwaite, Ryan Sleevi, Parisa Tabriz

Data breaches, phishing, or malware? Understanding the risks of stolen credentials [PDF] (F5) Kurt Thomas, Frank Li, Ali Zand, Jake Barrett, Juri Ranieri, Luca Invernizzi, Yarik Markov, Oxana Comanescu, Vijay Eranti, Angelika Moscicki, Dan Margolis, Vern Paxson, Elie Bursztein

Certified Malware: Measuring Breaches of Trust in the Windows Code-Signing PKI [PDF] (F5) Doowon Kim, Bum Jun Kwon, Tudor Dumitraş

Forward Secure Dynamic Searchable Symmetric Encryption with Efficient Updates [PDF] (G1) Kee Sung Kim, Minkyu Kim, Dongsoo Lee, Je Hong Park, Woo-Hwan Kim

Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives [PDF] [Paper] [Artifact] (G1) Raphael Bost, Brice Minaud, Olga Ohrimenko

Economic Factors of Vulnerability Trade and Exploitation: Empirical evidence from a prominent Russian cybercrime market [PDF] [Paper] (G2) Luca Allodi

Quantifying the Pressure of Legal Risks on Third-party Vulnerability Research [PDF] [Paper] [Artifact] (G2) Alexander Gamero-Garrido, Stefan Savage, Kirill Levchenko, Alex C. Snoeren

Identity-Based Format-Preserving Encryption [PDF] (G3) Mihir Bellare, Viet Tung Hoang

Standardizing Bad Cryptographic Practice - A teardown of the IEEE standard for protecting electronic-design intellectual property [PDF] (G3) Animesh Chhotaray, Adib Nahiyan, Thomas Shrimpton, Domenic J Forte, Mark Tehranipoor

New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs [PDF] [Paper] (G4) Gottfried Herold, Max Hoffmann, Michael Klooß , Carla Ràfols, Andy Rupp

Practical Quantum-Safe Voting from Lattices [PDF] (G4) Rafael del Pino, Vadim Lyubashevsky, Gregory Neven, Gregor Seiler

A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components [PDF] [Paper] [Artifact] (G5) Vasilios Mavroudis, Andrea Cerulli, Petr Svenda, Dan Cvrcek, Dusan Klinec, George Danezis

Provably-Secure Logic Locking: From Theory To Practice [PDF] (G5) Muhammad Yasin, Abhrajit Sengupta, Mohammed Thari Nabeel, Mohammed Ashraf, Jeyavijayan (JV) Rajendran, Ozgur Sinanoglu

The Return of Coppersmith’s Attack: Practical Factorization of Widely Used RSA Moduli [PDF] [Artifact] (H1) ★ Matus Nemec, Marek Sys, Petr Svenda, Dusan Klinec, Vashek Matyas

Algorithm Substitution Attacks from a Steganographic Perspective [PDF] [Paper] (H1) Sebastian Berndt, Maciej Liskiewicz

On the Power of Optical Contactless Probing: Attacking Bitstream Encryption of FPGAs [PDF] [Paper] (H1) ★ Shahin Tajik, Heiko Lohrke, Jean-Pierre Seifert, Christian Boit

The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years Later [PDF] [Paper] [Artifact] (H2) Victor van der Veen, Dennis Andriesse, Manolis Stamatogiannakis, Xi Chen, Herbert Bos, Cristiano Giuffrida

Capturing Malware Propagations with Code Injections and Code-Reuse attacks [PDF] (H2) David Korczynski, Heng Yin

Code-reuse attacks for the Web: Breaking Cross-Site Scripting Mitigations via Script Gadgets [PDF] (H2) Sebastian Lekies, Krzysztof Kotowicz, Samuel Groß , Eduardo Vela, Martin Johns

Tail Attacks on Web Applications [PDF] (H3) Huasong Shan, Qingyang Wang, Calton Pu

Rewriting History: Changing the Archived Web from the Present [PDF] [Paper] [Artifact] (H3) Ada Lerner, Tadayoshi Kohno, Franziska Roesner

Deemon: Detecting CSRF with Dynamic Analysis and Property Graphs [PDF] [Paper] (H3) Giancarlo Pellegrino, Martin Johns, Simon Koch, Michael Backes, Christian Rossow

A Comprehensive Symbolic Analysis of TLS 1.3 [PDF] [Paper] [Artifact] (H4) Cas Cremers, Marko Horvat, Jonathan Hoyland, Sam Scott, Thyla van der Merwe

HACL*: A Verified Modern Cryptographic Library [PDF] [Paper] [Artifact] (H4) Jean-Karim Zinzindohoué, Karthikeyan Bhargavan, Jonathan Protzenko, Benjamin Beurdouche

Jasmin: High-Assurance and High-Speed Cryptography [PDF] [Artifact] (H4) José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Arthur Blot, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Hugo Pacheco, Benedikt Schmidt, Pierre-Yves Strub

Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives [PDF] (I1) Melissa Chase, David Derler, Steven Goldfeder, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig, Greg Zaverucha

To BLISS-B or not to be - Attacking strongSwan’s Implementation of Post-Quantum Signatures [PDF] [Paper] (I1) Peter Pessl, Leon Groot Bruinderink, Yuval Yarom

Side-Channel Attacks on BLISS Lattice-Based Signatures: Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers [PDF] [Paper] [Artifact] (I1) Thomas Espitau, Pierre-Alain Fouque, Benoït Gérard, Mehdi Tibouchi

Nonmalleable Information Flow Control [PDF] [Paper] (I2) ★ Ethan Cecchetti, Andrew Myers, Owen Arden

Cryptographically Secure Information Flow Control on Key-Value Stores [PDF] [Paper] (I2) Lucas Waye, Pablo Buiras, Owen Arden, Alejandro Russo, Stephen Chong

Object Flow Integrity [PDF] (I2) Wenhao Wang, Xiaoyang Xu, Kevin Hamlen

BBA+: Improving the Security and Applicability of Privacy-Preserving Point Collection [PDF] (I3) Gunnar Hartung, Max Hoffmann, Matthias Nagel, Andy Rupp

walk2friends: Inferring Social Links from Mobility Profiles [PDF] [Paper] [Artifact] (I3) Michael Backes, Mathias Humbert, Jun Pang, Yang Zhang

Back to the drawing board: Revisiting the design of optimal location privacy-preserving mechanisms [PDF] [Paper] (I3) Simon Oya, Carmela Troncoso, Fernando Pérez-González

Certified Verification of Algebraic Properties on Low-Level Mathematical Constructs in Cryptographic Programs [PDF] (I4) Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang

A Fast and Verified Software Stack for Secure Function Evaluation [PDF] [Paper] [Artifact] (I4) José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Vitor Pereira

Verified Correctness and Security of mbedTLS HMAC-DRBG [PDF] [Paper] [Artifact] (I4) Katherine Q. Ye, Matthew Green, Naphat Sanguansin, Lennart Beringer, Adam Petcher, Andrew W. Appel

How Unique is Your .onion? An Analysis of the Fingerprintability of Tor Onion Services [PDF] [Paper] [Artifact] (I5) ★ Rebekah Overdorf, Marc Juarez, Gunes Acar, Rachel Greenstadt, Claudia Diaz

The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing Attacks [PDF] [Artifact] (I5) Milad Nasr, Hadi Zolfaghari, Amir Houmansadr

Compressive Traffic Analysis: A New Paradigm for Scalable Traffic Analysis [PDF] [Paper] (I5) Milad Nasr, Amir Houmansadr, Arya Mazumdar

Full accounting for verifiable outsourcing [PDF] [Paper] (J1) Riad S. Wahby, Ye Ji, Andrew J. Blumberg, abhi shelat, Justin Thaler, Michael Walfish, Thomas Wies

Ligero: Lightweight Sublinear Arguments Without a Trusted Setup [PDF] (J1) Scott Ames, Carmit Hazay, Yuval Ishai, Muthuramakrishnan Venkitasubramaniam

Homomorphic Secret Sharing: Optimizations and Applications [PDF] [Artifact] (J1) Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Michele Orru

DIFUZE: Interface Aware Fuzzing for Kernel Drivers [PDF] [Artifact] (J2) Jake Corina, Aravind Machiry, Christopher Salls, Yan Shoshitaishvili, Shuang Hao, Christopher Kruegel, Giovanni Vigna

SemFuzz: Semantics-based Automatic Generation of Proof-of-Concept Exploits [PDF] (J2) Wei You, Peiyuan Zong, Kai Chen, XiaoFeng Wang, Xiaojing Liao, Pan Bian, Bin Liang

SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities [PDF] [Paper] (J2) Theofilos Petsios, Jason Zhao, Angelos D. Keromytis, Suman Jana

Checking Open-Source License Violation and 1-day Security Risk at Large Scale [PDF] (J3) Ruian Duan, Ashish Bijlani, Meng Xu, Taesoo Kim, Wenke Lee

Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android [PDF] [Paper] [Artifact] (J3) Erik Derr, Sven Bugiel, Sascha Fahl, Yasemin Acar, Michael Backes

A Large-Scale Empirical Study of Security Patches [PDF] (J3) Frank Li, Vern Paxson

DEFTL: Implementing Plausibly Deniable Encryption in Flash Translation Layer [PDF] (J4) Shijie Jia, Luning Xia, Bo Chen, Peng Liu

FlashGuard: Leveraging Intrinsic Flash Properties to Defend Against Encryption Ransomware [PDF] (J4) Jian Huang, Jun Xu, Xinyu Xing, Peng Liu, Moinuddin K. Qureshi

FirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution [PDF] [Paper] (J4) Grant Hernandez, Farhaan Fowze, Dave (Jing) Tian, Tuba Yavuz, Kevin Butler

TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious Linear Function Evaluation [PDF] (K1) Nico Döttling, Satrajit Ghosh, Jesper Buus Nielsen, Tobias Nilges, Roberto Trifiletti

Distributed Measurement with Private Set-Union Cardinality [PDF] (K1) Ellis Fenske, Akshaya Mani, Aaron Johnson, Micah Sherr

Efficient Public Trace-and-Revoke from Standard Assumptions [PDF] [Paper] (K1) Shweta Agrawal, Sanjay Bhattacherjee, Duong Hieu Phan, Damien Stehle, Shota Yamada

Designing New Operating Primitives to Improve Fuzzing Performance [PDF] (K2) Wen Xu, Sanidhya Kashyap, Changwoo Min, Taesoo Kim

Directed Greybox Fuzzing [PDF] [Paper] [Artifact] (K2) Marcel Böhme, Van-Thuan Pham, Manh-Dung Nguyen, Abhik Roychoudhury

IMF: Inferred Model-based Fuzzer [PDF] [Artifact] (K2) HyungSeok Han, Sang Kil Cha

PtrSplit: Supporting general pointers in automatic program partitioning [PDF] (K3) Shen Liu, Gang Tan, Trent Jaeger

HexType: Efficient Detection of Type Confusion Errors for C++ [PDF] (K3) Yuseok Jeon, Priyam Biswas, Scott Carr, Byoungyoung Lee, Mathias Payer

FreeGuard: A Faster Secure Heap Allocator [PDF] [Artifact] (K3) Sam Silvestro, Hongyu Liu, Corey Crosser, Zhiqiang Lin, Tongping Liu

JITGuard: Hardening Just-in-time Compilers with SGX [PDF] [Paper] (K4) Tommaso Frassetto, David Gens, Christopher Liebchen, Ahmad-Reza Sadeghi

Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX [PDF] (K4) Wenhao Wang, Guoxing Chen, Xiaorui Pan, Yinqian Zhang, XiaoFeng Wang, Vincent Bindschaedler, Haixu Tang, Carl A. Gunter