网络空间安全领域顶级会议之SP 2021录取目录一览

2021年网络安全领域四大顶会的论文录用均已揭晓,InForSec特整理相关信息分享给网络安全学术社区。

IEEE Symposium on Security and Privacy,简称IEEE S&P , 始于1980年,每年在美国Oakland召开,至今已举办42届, 主要收录研究机构以及科技企业在计算机安全和隐私研究领域最前沿、最顶级的研究成果。

作为历史最为悠久的网络与信息安全学术会议,IEEE S&P 发表难度极高,录用率长期保持在12%,它被CCF认定为网络与信息安全领域A类国际学术会议。

过去42年里,中国大陆高校和研究机构在该会议上以第一完成单位发表的论文不超过30篇。 IEEE S&P 2021共录取论文115篇, 其中来自中国高校、科研院所和企业界的共有11篇,有华人学者参与的共有40篇。 (注:数据为人工统计,如有疏漏,还请指正。)

以下为 IEEE S&P 2021年录取论文列表:

论文标题作者信息第一作者单位一作单位所在国家
A Decentralized and Encrypted National Gun Registry Seny Kamara (Brown University), Tarik Moataz (Aroki Systems), Andrew Park (Brown University), Lucy Qin (Brown University)Brown University美国
A First Look at Zoombombing Chen Ling (Boston University), Utkucan Balcı (Binghamton University), Jeremy Blackburn (Binghamton University), Gianluca Stringhini (Boston University)Boston University美国
A Novel Dynamic Analysis Infrastructure to Instrument Untrusted Execution Flow Across User-Kernel Spaces Jiaqi Hong (Singapore Management University), Xuhua Ding (Singapore Management University)Singapore Management University新加坡
A Secure and Formally Verified Linux KVM Hypervisor Shih-Wei Li (Columbia University), Xupeng Li (Columbia University), John Hui (Columbia University), Jason Nieh (Columbia University), Ronghui Gu (Columbia University)Columbia University美国
A Security Model and Fully Verified Implementation for the IETF QUIC Record LayerAntoine Delignat-Lavaud (Microsoft Research), Cedric Fournet (Microsoft Research), Bryan Parno (Carnegie Mellon University), Jonathan Protzenko (Microsoft Research), Tahina Ramananandro (Microsoft Research), Jay Bosamiya (Carnegie Mellon University), Joseph Lallemand (Loria, Inria Nancy Grand Est), Itsaka Rakotonirina (Loria, Inria Nancy Grand Est), Yi Zhou (Carnegie Mellon University), Joseph Lallemand (ETH Zürich)Microsoft Research美国
A2L: Anonymous Atomic Locks for Scalability in Payment Channel HubsErkan Tairi (TU Wien), Pedro Moreno-Sanchez (IMDEA Software Institute), Matteo Maffei (TU Wien)TU Wien奥地利
ARBITRAR : User-Guided API Misuse DetectionZiyang Li (University of Pennsylvania), Aravind Machiry (Purdue University), Binghong Chen (Georgia Institute of Technology), Ke Wang (Visa Research), Mayur Naik (University of Pennsylvania), Le Song (Georgia Institute of Technology)University of Pennsylvania美国
Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data HidingSahar Abdelnabi (CISPA Helmholtz Center for Information Security), Mario Fritz (CISPA Helmholtz Center for Information Security)CISPA Helmholtz Center for Information Security德国
Adversary Instantiation: Lower bounds for differentially private machine learningMilad Nasr (University of Massachusetts Amherst), Shuang Song (Google), Abhradeep Guha Thakurta (Google), Nicolas Papernot (Google), Nicholas Carlini (Google)University of Massachusetts Amherst美国
An I/O Separation Model for Formal Verification of Kernel ImplementationsMiao Yu (Carnegie Mellon University), Virgil Gligor (Carnegie Mellon University), Limin Jia (Carnegie Mellon University)Carnegie Mellon University美国
An Interactive Prover for Protocol Verification in the Computational ModelDavid Baelde (LSV, CNRS, ENS Paris-Saclay, Université Paris-Saclay), Stéphanie Delaune (Univ Rennes, CNRS, IRISA), Charlie Jacomme (CISPA Helmholtz Center for Information Security), Adrien Koutsos (INRIA Paris), Solene Moreau (Univ Rennes, CNRS, IRISA), Charlie Jacomme (LSV & CNRS & ENS Paris-Saclay & INRIA & Université Paris-Saclay, Paris, France)LSV法国
Android Custom Permissions Demystified: From Privilege Escalation to Design Shortcomings Rui Li (Shandong University), Wenrui Diao (Shandong University), Zhou Li (University of California, Irvine), Jianqi Du (Shandong University), Shanqing Guo (Shandong University)Shandong University中国
BUFFing signature schemes beyond unforgeability and the case of post-quantum signaturesCas Cremers (CISPA Helmholtz Center for Information Security), Samed Düzlü (TU Darmstadt), Rune Fiedler (TU Darmstadt), Marc Fischlin (TU Darmstadt), Christian Janson (TU Darmstadt)CISPA Helmholtz Center for Information Security德国
Bitcoin-Compatible Virtual ChannelsLukas Aumayr (Technische Universität Wien), Oguzhan Ersoy (Delft University of Technology), Andreas Erwig (Technische Universität Darmstadt), Sebastian Faust (Technische Universität Darmstadt), Kristina Hostáková (ETH Zürich), Matteo Maffei (Technische Universität Wien), Pedro Moreno-Sanchez (Technische Universität Wien), Siavash Riahi (Technische Universität Darmstadt)Technische Universität Wien奥地利
Black Widow: Blackbox Data-driven Web Scanning Benjamin Eriksson (Chalmers University of Technology), Giancarlo Pellegrino (CISPA Helmholtz Center for Information Security), Andrei Sabelfeld (Chalmers University of Technology)Chalmers University of Technology瑞典
Bomberman: Defining and Defeating Hardware Ticking Timebombs at Design-time Timothy Trippel (University of Michigan), Kang G. Shin (University of Michigan), Kevin B. Bush (MIT Lincoln Laboratory), Matthew Hicks (Virginia Tech)University of Michigan美国
Bookworm Game: Automatic Discovery of LTE Vulnerabilities Through Documentation AnalysisYi Chen (Indiana University Bloomington), Yepeng Yao (Institute of Information Engineering, CAS), XiaoFeng Wang (Indiana University Bloomington), Dandan Xu (Institute of Information Engineering, CAS), Xiaozhong Liu (Indiana University Bloomington), Chang Yue (Institute of Information Engineering, CAS), Kai Chen (Institute of Information Engineering, CAS), Haixu Tang (Indiana University Bloomington), Baoxu Liu (Institute of Information Engineering, CAS)Indiana University Bloomington美国
Breaking the Specification: PDF CertificationSimon Rohlmann (Ruhr University Bochum), Vladislav Mladenov (Ruhr University Bochum), Christian Mainka (Ruhr University Bochum), Jörg Schwenk (Ruhr University Bochum)Ruhr University Bochum德国
CANnon: Reliable and Stealthy Remote Shutdown Attacks via Unaltered Automotive Microcontrollers Sekar Kulandaivel (Carnegie Mellon University), Shalabh Jain (Research and Technology Center, Robert Bosch LLC, USA), Jorge Guajardo (Research and Technology Center, Robert Bosch LLC, USA), Vyas Sekar (Carnegie Mellon University)Carnegie Mellon University美国
CRYLOGGER: Detecting Crypto Misuses Dynamically Luca Piccolboni (Columbia University), Giuseppe Di Guglielmo (Columbia University), Luca P. Carloni (Columbia University), Simha Sethumadhavan (Columbia University)Columbia University美国
CacheOut: Leaking Data on Intel CPUs via Cache EvictionsStephan van Schaik (University of Michigan), Marina Minkin (University of Michigan), Andrew Kwong (University of Michigan), Daniel Genkin (University of Michigan), Yuval Yarom (University of Adelaide and Data61)University of Michigan美国
CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and AccountabilitySai Krishna Deepak Maram (Cornell Tech), Fan Zhang (Cornell Tech), Harjasleen Malvai (Cornell), Ari Juels (Cornell Tech), Alexander Frolov (Cornell), Nerla Jean-Louis (University of Illinois at Urbana-Champaign), Andrew Miller (University of Illinois at Urbana-Champaign), Tyler Kell (Cornell Tech)Cornell Tech美国
Co-Inflow: Coarse-Grained Information Flow Control for Java-like Languages Jian Xiang (Harvard University), Stephen Chong (Harvard University)Harvard University美国
Compact Certificates of Collective KnowledgeSilvio Micali (Algorand and MIT), Leonid Reyzin (Algorand and Boston University), Georgios Vlachos (), Riad S. Wahby (Algorand and Stanford), Nickolai Zeldovich (Algorand and MIT)Algorand and MIT美国
Compositional Non-Interference for Fine-Grained Concurrent ProgramsDan Frumin (Radboud University), Robbert Krebbers (TU Delft), Lars Birkedal (Aarhus University)Radboud University荷兰
Compositional Security for Reentrant ApplicationsEthan Cecchetti (Cornell University), Siqiu Yao (Cornell University), Haobin Ni (Cornell University), Andrew C. Myers (Cornell University)Cornell University美国
ConDySTA: Context-Aware Dynamic Supplement to Static Taint Analysis Xueling Zhang (University of Texas at San Antonio), Xiaoyin Wang (University of Texas at San Antonio), Rocky Slavin (University of Texas at San Antonio), Jianwei Niu (University of Texas at San Antonio)University of Texas at San Antonio美国
CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing Penghui Zhang (Arizona State University), Adam Oest (Arizona State University), Haehyun Cho (Arizona State University), Zhibo Sun (Arizona State University), RC Johnson (PayPal), Brad Wardman (PayPal), Shaown Sarker (North Carolina State University), Alexandros Kapravelos (North Carolina State University), Tiffany Bao (Arizona State University), Ruoyu Wang (Arizona State University), Yan Shoshitaishvili (Arizona State University), Adam Doupé (Arizona State University), Gail-Joon Ahn (Arizona State University and Samsung Research)Arizona State University美国
Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More) Amit Klein (Bar Ilan University)Bar Ilan University以色列
Cross-Domain Access Control Encryption — Arbitrary-policy, Constant-size, Efficient Xiuhua Wang (The Chinese University of Hong Kong), Sherman S. M. Chow (The Chinese University of Hong Kong)The Chinese University of Hong Kong中国
CrossTalk: Speculative Data Leaks Across Cores Are Real Hany Ragab (Vrije Universiteit Amsterdam), Alyssa Milburn (Vrije Universiteit Amsterdam), Kaveh Razavi (Vrije Universiteit Amsterdam), Herbert Bos (Vrije Universiteit Amsterdam), Cristiano Giuffrida (Vrije Universiteit Amsterdam), Kaveh Razavi (ETH Zurich)Vrije Universiteit Amsterdam荷兰
CryptGPU: Fast Privacy-Preserving Machine Learning on the GPUSijun Tan (University of Virginia), Brian Knott (Facebook AI Research), Yuan Tian (University of Virginia), David J. Wu (University of Virginia)University of Virginia美国
DIANE: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT DevicesNilo Redini (UC Santa Barbara), Andrea Continella (University of Twente), Dipanjan Das (UC Santa Barbara), Giulio De Pasquale (UC Santa Barbara), Noah Spahn (UC Santa Barbara), Aravind Machiry (UC Santa Barbara), Antonio Bianchi (Purdue University), Christopher Kruegel (UC Santa Barbara), Giovanni Vigna (UC Santa Barbara)UC Santa Barbara美国
DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware AnalysisAlejandro Mera (Northeastern University), Bo Feng (Northeastern University), Long Lu (Northeastern University), Engin Kirda (Northeastern University)Northeastern University美国
DIFUZZRTL: Differential Fuzz Testing to Find CPU BugsJaewon Hur (Seoul National University), Suhwan Song (Seoul National University), Dongup Kwon (Seoul National University), Eunjin Baek (Seoul National University), Jangwoo Kim (Seoul National University), Byoungyoung Lee (Seoul National University)Seoul National University韩国
DP-Sniper: Black-Box Discovery of Differential Privacy Violations using ClassifiersBenjamin Bichsel (ETH Zurich), Samuel Steffen (ETH Zurich), Ilija Bogunovic (ETH Zurich), Martin Vechev (ETH Zurich)ETH Zurich瑞士
Data Privacy in Trigger-Action SystemsYunang Chen (University of Wisconsin-Madison), Amrita Roy Chowdhury (University of Wisconsin-Madison), Ruizhe Wang (University of Wisconsin-Madison), Andrei Sabelfeld (Chalmers University of Technology), Rahul Chatterjee (University of Wisconsin-Madison), Earlence Fernandes (University of Wisconsin-Madison)University of Wisconsin-Madison美国
Defensive Technology Use by Political Activists During the Sudanese Revolution Alaa Daffalla (University of Kansas), Lucy Simko (University of Washington), Tadayoshi Kohno (University of Washington), Alexandru G. Bardas (University of Kansas)University of Kansas美国
Detecting AI Trojans Using Meta Neural Analysis Xiaojun Xu (University of Illinois at Urbana-Champaign), Qi Wang (University of Illinois at Urbana-Champaign), Huichen Li (University of Illinois at Urbana-Champaign), Nikita Borisov (University of Illinois at Urbana-Champaign), Carl A. Gunter (University of Illinois at Urbana-Champaign), Bo Li (University of Illinois at Urbana-Champaign)University of Illinois at Urbana-Champaign美国
Detecting Filter List Evasion with Event-Loop-Turn Granularity JavaScript Signatures Quan Chen (North Carolina State University), Peter Snyder (Brave Software), Ben Livshits (Brave Software), Alexandros Kapravelos (North Carolina State University)North Carolina State University美国
Did you mix me? Formally Verifying Verifiable Mix Nets in Electronic Voting Thomas Haines (Norwegian University of Science and Technology), Rajeev Gore (Australian National University), Bhavesh Sharma (Australian National University), Thomas Haines (Norwegian University of Science and Technology)Norwegian University of Science and Technology挪威
Diogenes: Lightweight Scalable RSA Modulus Generation with a Dishonest Majority Carmit Hazay (Bar-Ilan University), Megan Chen (Northeastern U.), Yuval Ishai (Technion), Yuriy Kashnikov (Ligero Inc.), Daniele Micciancio (UC San Diego), Tarik Riviere (Ligero Inc.), abhi shelat (Northeastern U.), Ruihan Wang (Ligero Inc.), Muthu Venkitasubramaniam (U. of Rochester)Bar-Ilan University以色列
Doing good by fighting fraud: Ethical anti-fraudsystems for mobile paymentsZainul Abi Din (UC Davis), Hari Venugopalan (UC Davis), Henry Lin (Bouncer Technologies), Adam Wushensky (Bouncer Technologies), Steven Liu (Bouncer Technologies), Samuel T. King (UC Davis and Bouncer Technologies)UC Davis美国
DynPTA: Combining Static and Dynamic Analysis for Practical Selective Data ProtectionTapti Palit (Stony Brook University), Jarin Firose Moon (Stony Brook University), Fabian Monrose (University of North Carolina, Chapel Hill), Michalis Polychronakis (Stony Brook University)Stony Brook University美国
Ebb-and-Flow Protocols: A Resolution of the Availability-Finality Dilemma Joachim Neu (Stanford University), Ertem Nusret Tas (Stanford University), David Tse (Stanford University)Stanford University美国
Electromagnetic Covert Channels Can Be Super ResilientCheng Shen (Peking University), Tian Liu (Peking University), Jun Huang (MIT), Rui Tan (Nanyang Technological University)Peking University中国
Epochal Signatures for Deniable Group ChatsFlorian Weber (TU Eindhoven), Andreas Hülsing (TU Eindhoven)TU Eindhoven荷兰
Fingerprinting the Fingerprinters: Learning to Detect Browser Fingerprinting Behaviors Umar Iqbal (The University of Iowa), Steven Englehardt (Mozilla Corporation ), Zubair Shafiq (University of California, Davis)The University of Iowa美国
Good Bot, Bad Bot: Characterizing Automated Browsing ActivityXigao Li (Stony Brook University), Babak Amin Azad (Stony Brook University), Amir Rahmati (Stony Brook University), Nick Nikiforakis (Stony Brook University)Stony Brook University美国
HackEd: A Pedagogical Analysis of Online Vulnerability Discovery ExercisesDaniel Votipka (Tufts University), Eric Zhang (University of Maryland), Michelle Mazurek (University of Maryland)Tufts University美国
Happer: Unpacking Android Apps via a Hardware-Assisted ApproachLei Xue (The Hong Kong Polytechnic University), Hao Zhou (The Hong Kong Polytechnic University), Xiapu Luo (The Hong Kong Polytechnic University), Yajin Zhou (Zhejiang University), Yang Shi (Tongji University), Guofei Gu (Texas A&M University), Fengwei Zhang (Southern University of Science and Technology (SUSTech)), Man Ho Au (The University of Hong Kong)The Hong Kong Polytechnic University中国
Hardware-Software Contracts for Secure Speculation Marco Guarnieri (IMDEA Software Institute), Boris Köpf (Microsoft Research), Jan Reineke (Saarland University), Pepe Vila (IMDEA Software Institute)IMDEA Software Institute西班牙
Hear “No Evil”, See “Kenansville”: Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems Hadi Abdullah (University of Florida), Muhammad Sajidur Rahman (University of Florida), Washington Garcia (University of Florida), Kevin Warren (University of Florida), Anurag Swarnim Yadav (University of Florida), Tom Shrimpton (University of Florida), Patrick Traynor (University of Florida)University of Florida美国
High-Assurance Cryptography in the Spectre Era Gilles Barthe (Max Planck Institute for Security and Privacy and IMDEA Software Institute), Sunjay Cauligi (University of California San Diego), Benjamin Gregoire (INRIA Sophia Antipolis), Adrien Koutsos (Inria Paris, Max Planck Institute for Security and Privacy), Kevin Liao (Max Planck Institute for Security and Privacy and Massachusetts Institute of Technology), Tiago Oliveira (University of Porto (FCUP) and INESC TEC), Swarn Priya (Purdue University), Tamara Rezk (INRIA Sophia Antipolis), Peter Schwabe (Max Planck Institute for Security and Privacy)Max Planck Institute for Security and Privacy and IMDEA Software Institute德国
High-Frequency Trading on Decentralized On-Chain Exchanges Liyi Zhou (Imperial College London), Kaihua Qin (Imperial College London), Christof Ferreira Torres (University of Luxembourg), Duc V Le (Purdue University), Arthur Gervais (Imperial College London)Imperial College London英国
How Did That Get In My Phone? Unwanted App Distribution on Android Devices Platon Kotzias (NortonLifelock Research Group), Juan Caballero (IMDEA Software Institute), Leyla Bilge (NortonLifelock Research Group)NortonLifelock Research Group美国
Improving Password Guessing via Representation Learning Dario Pasquini (Sapienza University of Rome; Stevens Institute of Technology; Institute of Applied Computing CNR), Ankit Gangwal (University of Padua; Stevens Institute of Technology), Giuseppe Ateniese (Stevens Institute of Technology), Massimo Bernaschi (Institute of Applied Computing CNR), Mauro Conti (University of Padua)Sapienza University of Rome; Stevens Institute of Technology; Institute of Applied Computing CNR意大利
Invisible Probe: Timing Attacks with PCIe Congestion Side-channelMingtian Tan (Fudan University), Junpeng Wan (Fudan University), Zhe Zhou (Fudan University), Zhou Li (University of California, Irvine)Fudan University中国
Invisible for both Camera and LiDAR: Security of Multi-Sensor Fusion based Perception in Autonomous Driving Under Physical-World AttacksYulong Cao* (University of Michigan), Ningfei Wang* (University of California, Irvine), Chaowei Xiao* (NVIDIA Research and Arizona State University), Dawei Yang* (University of Michigan), Jin Fang (Baidu Research and National Engineering Laboratory of Deep Learning Technology and Application, China), Ruigang Yang (Inceptio), Qi Alfred Chen (University of California, Irvine), Mingyan Liu (University of Michigan), Bo Li (University of Illinois at Urbana-Champaign), (*co-first authors)University of Michigan美国
Is Private Learning Possible with Instance Encoding?Nicholas Carlini (Google), Samuel Deng (Columbia), Sanjam Garg (UC Berkeley), Somesh Jha (UW-Madison), Saeed Mahloujifar (Princeton), Mohammad Mahmoody (University of Virginia), Abhradeep Thakurta (Google), Florian Tramer (Stanford University)Google美国
Journey to the Center of the Cookie Ecosystem: Unraveling Actors’ Roles and Relationships Iskander Sanchez-Rola (NortonLifeLock Research Group), Matteo Dell’Amico (NortonLifeLock Research Group), Davide Balzarotti (EURECOM), Pierre-Antoine Vervier (NortonLifeLock Research Group), Leyla Bilge (NortonLifeLock Research Group), Iskander ()NortonLifeLock Research Group美国
Keep the Dirt: Tainted TreeKEM, Adaptively and Actively Secure Continuous Group Key Agreement Joel Alwen (Wickr Inc.), Margarita Capretto (Universidad Nacional de Rosario), Miguel Cueto (ENS Lyon), Chethan Kamath (Northeastern University), Karen Klein (IST Austria), Ilia Markov (IST Austria), Guillermo Pascual-Perez (IST Austria), Krzysztof Pietrzak (IST Austria), Michael Walter (IST Austria), Michelle Yeo (IST Austria)Wickr Inc.美国
Learning Differentially Private Mechanisms Subhajit Roy (IIT Kanpur), Justin Hsu (University of Wisconsin–Madison), Aws Albarghouthi (University of Wisconsin–Madison)IIT Kanpur印度
Lightweight Techniques for Private Heavy Hitters Dan Boneh (Stanford), Elette Boyle (IDC Herzliya), Henry Corrigan-Gibbs (MIT CSAIL), Niv Gilboa (Ben-Gurion University), Yuval Ishai (Technion)Stanford美国
Linking Bluetooth LE & Classic and Implications for Privacy-Preserving Bluetooth-Based ProtocolsNorbert Ludant (Northeastern University), Tien D. Vo-Huu (Northeastern University), Sashank Narain (University of Massachusetts Lowell), Guevara Noubir (Northeastern University)Northeastern University美国
Lockable Signatures for Blockchains: Scriptless Scripts for all Signatures Sri AravindaKrishnan Thyagarajan (Friedrich Alexander Universität Erlangen-Nürnberg), Giulio Malavolta (Max Planck Institute for Security and Privacy)Friedrich Alexander Universität Erlangen-Nürnberg德国
MAD-HTLC: Because HTLC is Crazy-Cheap to AttackItay Tsabary (Technion), Matan Yechieli (Technion), Alex Manuskin (ZenGo), Ittay Eyal (Technion, VMware)Technion以色列
Machine Unlearning Lucas Bourtoule (University of Toronto; Vector Institute), Varun Chandrasekaran (University of Wisconsin-Madison), Christopher A. Choquette-Choo (University of Toronto; Vector Institute), Hengrui Jia (University of Toronto; Vector Institute), Adelin Travers (University of Toronto; Vector Institute), Baiwu Zhang (University of Toronto; Vector Institute), David Lie (University of Toronto), Nicolas Papernot (University of Toronto; Vector Institute)University of Toronto; Vector Institute加拿大
Manipulation Attacks in Local Differential Privacy Albert Cheu (Northeastern University), Adam Smith (Boston University), Jonathan Ullman (Northeastern University)Northeastern University美国
Many-out-of-Many Proofs and Applications to Anonymous Zether Benjamin E. Diamond (J.P. Morgan)J.P. Morgan美国
Merkle^2: A Low-Latency Transparency Log SystemYuncong Hu (UC Berkeley), Kian Hooshmand (UC Berkeley), Rajeswari Harika Kalidhindi (UC Berkeley), Seung Jin Yang (UC Berkeley), Raluca Popa (UC Berkeley)UC Berkeley美国
Method Confusion Attack on Bluetooth Pairing Maximilian von Tschirschnitz (Technical University Munich), Ludwig Peuckert (Technical University Munich), Fabian Franzen (Technical University Munich), Jens Grossklags (Technical University Munich)Technical University Munich德国
NTFUZZ: Enabling Type-Aware Kernel Fuzzing on Windows with Static Binary AnalysisJaeseung Choi (KAIST), Kangsu Kim (KAIST), Daejin Lee (KAIST), Sang Kil Cha (KAIST)KAIST韩国
OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary Zhuo Zhang (Purdue University), Yapeng Ye (Purdue University), Wei You (Renmin University of China), Guanhong Tao (Purdue University), Wen-chuan Lee (Purdue University), Yonghwi Kwon (University of Virginia), Yousra Aafer (University of Waterloo), Xiangyu Zhang (Purdue University)Purdue University美国
On the Anonymity Guarantees of Anonymous Proof-of-Stake ProtocolsVarun Madathil (North Carolina State University), Alessandra Scafuro (North Carolina State University), Kartik Nayak (Duke University), Markulf Kohlweiss (University of Edinburgh)North Carolina State University美国
On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi ProtocolsLiyi Zhou (Imperial College London), Kaihua Qin (Imperial College London), Antoine Cully (Imperial College London), Benjamin Livshits (Imperial College London), Arthur Gervais (Imperial College London)Imperial College London英国
One Engine to Fuzz ’em All: Generic Language Processor Testing with Semantic Validation Yongheng Chen (Georgia Institute of Technology), Rui Zhong (Pennsylvania State University), Hong Hu (Pennsylvania State University), Hangfan Zhang (Pennsylvania State University), Yupeng Yang (University of Electronic Science and Technology of China), Dinghao Wu (Pennsylvania State University), Wenke Lee (Georgia Institute of Technology)Georgia Institute of Technology美国
PLATYPUS: Software-based Power Side-Channel Attacks on x86Moritz Lipp (Graz University of Technology), Andreas Kogler (Graz University of Technology), David Oswald (The University of Birmingham, UK), Michael Schwarz (CISPA Helmholtz Center for Information Security), Catherine Easdon (Graz University of Technology), Claudio Canella (Graz University of Technology), Daniel Gruss (Graz University of Technology), Catherine Easdon (Graz University of Technology)Graz University of Technology奥地利
Pegasus: Bridging Polynomial and Non-polynomial Evaluations in Homomorphic Encryption Wen-jie Lu (Alibaba Group), Zhicong Huang (Alibaba Group), Cheng Hong (Alibaba Group), Yiping Ma (University of Pennsylvania), Fuping Qu (Alibaba Group)Alibaba Group中国
Poltergeist: Acoustic Adversarial Machine Learning against Cameras and Computer VisionXiaoyu Ji (Zhejiang University), Yushi Cheng (Zhejiang University), Yuepeng Zhang (Zhejiang University), Kai Wang (Zhejiang University), Chen Yan (Zhejiang University), Kevin Fu (University of Michigan), Wenyuan Xu (Zhejiang University)Zhejiang University中国
Post-Quantum WireGuard Andreas Hülsing (Eindhoven University of Technology, NL), Kai-Chun Ning (KPN B.V., NL), Peter Schwabe (Radboud University, NL), Florian Weber (Eindhoven University of Technology, NL), Philip R. Zimmermann (Delft University of Technology & KPN B.V., NL)Eindhoven University of Technology荷兰
Proactive Threshold Wallets with Offline DevicesYashvanth Kondi (Northeastern University), Bernardo Magri (Aarhus University), Claudio Orlandi (Aarhus University), Omer Shlomovits (ZenGo X)Northeastern University美国
Proof-of-Learning: Definitions and PracticeHengrui Jia (University of Toronto and Vector Institute), Mohammad Yaghini (University of Toronto and Vector Institute), Christopher A. Choquette-Choo (University of Toronto and Vector Institute), Natalie Dullerud (University of Toronto and Vector Institute), Anvith Thudi (University of Toronto and Vector Institute), Varun Chandrasekaran (University of Wisconsin-Madison), Nicolas Papernot (University of Toronto and Vector Institute)University of Toronto and Vector Institute加拿大
Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks! But We Can Fix It Wei Song (State Key Laboratory of Information Security, Institute of Information Engineering, CAS), Boya Li (State Key Laboratory of Information Security, Institute of Information Engineering, CAS), Zihan Xue (State Key Laboratory of Information Security, Institute of Information Engineering, CAS), Zhenzhen Li (State Key Laboratory of Information Security, Institute of Information Engineering, CAS), Wenhao Wang (State Key Laboratory of Information Security, Institute of Information Engineering, CAS), Peng Liu (The Pennsylvania State University)State Key Laboratory of Information Security中国
Reading between the Lines: An Extensive Evaluation of the Security and Privacy Implications of EPUB Reading Systems Gertjan Franken (imec-DistriNet, KU Leuven), Tom Van Goethem (imec-DistriNet, KU Leuven), Wouter Joosen (imec-DistriNet, KU Leuven)imec-DistriNet,KU Leuven荷兰
Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model. Thilo Krachenfels (Technische Universität Berlin), Amir Moradi (Ruhr-Uni­ver­si­tät Bo­chum), Jean-Pierre Seifert (Technische Universität Berlin), Fatemeh Ganji (Worcester Polytechnic Institute), Shahin Tajik (Worcester Polytechnic Institute)Technische Universität Berlin德国
Red Belly: A Secure, Fair and Scalable Open BlockchainTyler Crain (University of Sydney), Christopher Natoli (University of Sydney), Vincent Gramoli (University of Sydney and EPFL)University of Sydney澳大利亚
Response-Hiding Encrypted Ranges: Revisiting Security via Parametrized Leakage-Abuse AttacksEvgenios Kornaropoulos (UC Berkeley), Charalampos Papamanthou (University of Maryland), Roberto Tamassia (Brown University)UC Berkeley美国
Revealer: Detecting and Exploiting Regular Expression Denial-of-Service Vulnerabilities Yinxi Liu (The Chinese University of Hong Kong), Mingxue Zhang (The Chinese University of Hong Kong), Wei Meng (The Chinese University of Hong Kong)The Chinese University of Hong Kong中国
Runtime Recovery of Web Applications under Zero-Day ReDoS AttacksZhihao Bai (Johns Hopkins University), Ke Wang (Peking University), Hang Zhu (Johns Hopkins University), Yinzhi Cao (Johns Hopkins University), Xin Jin (Peking University)Johns Hopkins University美国
SGUARD: Towards Fixing Vulnerable Smart Contracts Automatically Tai D. Nguyen (Singapore Management University), Long H. Pham (Singapore Management University), Jun Sun (Singapore Management University)Singapore Management University新加坡
SIRNN: A Math Library for Secure RNN Inference Deevashwer Rathee (Microsoft), Mayank Rathee (Microsoft), Rahul Kranti Kiran Goli (Microsoft), Divya Gupta (Microsoft), Rahul Sharma (Microsoft), Nishanth Chandran (Microsoft), Aseem Rastogi (Microsoft)Microsoft美国
STOCHFUZZ: Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic RewritingZhuo Zhang (Purdue University), Wei You (Renmin University of China), Guanhong Tao (Purdue University), Yousra Aafer (University of Waterloo), Xuwei Liu (Purdue University), Xiangyu Zhang (Purdue University)Purdue University美国
Self-Supervised Euphemism Detection and Identification for Content ModerationWanzheng Zhu (University of Illinois, at Urbana-Champaign), Hongyu Gong (Facebook), Rohan Bansal (Carnegie Mellon University), Zachary Weinberg (University of Massachusetts, Amherst), Nicolas Christin (Carnegie Mellon University), Giulia Fanti (Carnegie Mellon University), Suma Bhat (University of Illinois, at Urbana-Champaign)University of Illinois美国
SmartPulse: Automated Checking of Temporal Properties in Smart ContractsJon Stephens (The University of Texas at Austin), Kostas Ferles (The University of Texas at Austin), Benjamin Mariano (The University of Texas at Austin), Shuvendu Lahiri (Microsoft Research), Isil Dillig (The University of Texas at Austin)The University of Texas at Austin美国
SoK: All You Ever Wanted to Know About x86/x64 Binary Disassembly but Were Afraid to Ask Chengbin Pang (Stevens Institute of Technology; Nanjing University), Ruotong Yu (Stevens Institute of Technology), Yaohui Chen (Facebook Inc.), Eric Koskinen (Stevens Institute of Technology), Georgios Portokalidis (Stevens Institute of Technology), Bing Mao (Nanjing University), Jun Xu (Stevens Institute of Technology)Stevens Institute of Technology; Nanjing University中国
SoK: Computer-Aided Cryptography Manuel Barbosa (University of Porto and INESC TEC), Gilles Barthe (Max Planck Institute for Security and Privacy; IMDEA Software Institute), Karthik Bhargavan (INRIA Paris), Bruno Blanchet (INRIA Paris), Cas Cremers (CISPA Helmholtz Center for Information Security), Kevin Liao (Max Planck Institute for Security and Privacy; Massachusetts Institute of Technology), Bryan Parno (Carnegie Mellon University)University of Porto and INESC TEC葡萄牙
SoK: Fully Homomorphic Encryption CompilersAlexander Viand (ETH Zurich), Patrick Jattke (ETH Zurich), Anwar Hithnawi (ETH Zurich)ETH Zurich瑞士
SoK: Hate, Harassment, and the Changing Landscape of Online AbuseKurt Thomas (Google), Deepak Kumar (University of Illinois, Urbana-Champaign), Michael Bailey (University of Illinois, Urbana-Champaign), Sarah Meiklejohn (University College London), Thomas Ristenpart (Cornell Tech), Devdatta Akhawe (Independent Researcher), Dan Boneh (Stanford), Zakir Durumeric (Stanford), Damon McCoy (New York University), Gianluca Stringhini (Boston University), Sunny Consolvo (Google), Patrick Gage Kelley (Google), Elie Bursztein (Google), Nicki Dell (Cornell)Google美国
SoK: Quantifying Cyber Risk Daniel W Woods (University of Innsbruck), Rainer Böhme (University of Innsbruck)University of Innsbruck奥地利
SoK: Security and Privacy in the Age of Commercial DronesBen Nassi (Ben-Gurion University of the Negev), Ron Bitton (Ben-Gurion University of the Negev), Ryusuke Masuoka (Fujitsu System Integration Laboratories), Asaf Shabtai (Ben-Gurion University of the Negev), Yuval Elovici (Ben-Gurion University of the Negev)Ben-Gurion University of the Negev以色列
SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems Hadi Abdullah (University of Florida), Kevin Warren (University of Florida), Vincent Bindschaedler (University of Florida), Nicolas Papernot (University of Toronto), Patrick Traynor (University of Florida)University of Florida美国
Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land Frederick Barr-Smith (Oxford University), Xabier Ugarte-Pedrero (Cisco Systems), Mariano Graziano (Cisco Systems), Riccardo Spolaor (Oxford University), Ivan Martinovic (Oxford University)Oxford University英国
Systematic Analysis of Randomization-Based Protected Cache Architectures Antoon Purnal (imec-COSIC, KU Leuven), Lukas Giner (Graz University of Technology), Daniel Gruss (Graz University of Technology), Ingrid Verbauwhede (imec-COSIC, KU Leuven)imec-COSIC, KU Leuven荷兰
The EMV Standard: Break, Fix, Verify David Basin (Department of Computer Science, ETH Zurich), Ralf Sasse (Department of Computer Science, ETH Zurich), Jorge Toro-Pozo (Department of Computer Science, ETH Zurich)Department of Computer Science, ETH Zurich瑞士
The Provable Security of Ed25519: Theory and Practice Jacqueline Brendel (CISPA), Cas Cremers (CISPA), Dennis Jackson (ETH Zurich), Mang Zhao (CISPA – Helmholtz Center for Information Security)CISPA德国
They Would do Better if They Worked Together: The Case of Interaction Problems Between Password Managers and WebsitesNicolas Huaman (Leibniz University Hannover), Sabrina Amft (Leibniz University Hannover), Marten Oltrogge (CISPA Helmholtz Center for Information Security), Yasemin Acar (Leibniz University Hannover and Max Planck Institute for Security and Privacy (MPI-SP)), Sascha Fahl (Leibniz University Hannover)Leibniz University Hannover德国
Trouble Over-The-Air: An Analysis of FOTA Apps in the Android EcosystemEduardo Blázquez (Universidad Carlos III de Madrid), Sergio Pastrana (Universidad Carlos III de Madrid), Álvaro Feal (IMDEA Networks Institute / Universidad Carlos III de Madrid), Julien Gamba (IMDEA Networks Institute / Universidad Carlos III de Madrid), Platon Kotzias (NortonLifelock Research Group), Narseo Vallina-Rodriguez (IMDEA Networks Institute / ICSI / AppCensus Inc.), Juan Tapiador (Universidad Carlos III de Madrid)Universidad Carlos III de Madrid西班牙
Trust, But Verify: A Longitudinal Analysis Of Android OEM Compliance and Customization Andrea Possemato (IDEMIA/Eurecom), Simone Aonzo (Eurecom), Davide Balzarotti (Eurecom), Yanick Fratantonio (Eurecom)IDEMIA/Eurecom法国
Using Selective Memoization to Defeat Regular Expression Denial of Service (ReDoS)James Davis (Virginia Tech / Purdue University), Francisco Servant (Virginia Tech), Dongyoon Lee (Stony Brook University)Virginia Tech / Purdue University美国
When Function Signature Recovery Meets Compiler Optimization Yan Lin (Singapore Management University), Debin Gao (Singapore Management University)Singapore Management University新加坡
Which Privacy and Security Attributes Most Impact Consumers‚ Risk Perception and Willingness to Purchase IoT Devices?Pardis Emami-Naeini (University of Washington), Janarth Dheenadhayalan (Carnegie Mellon University), Yuvraj Agarwal (Carnegie Mellon University), Lorrie Faith Cranor (Carnegie Mellon University)University of Washington美国
Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems Guangke Chen (ShanghaiTech University; Shanghai Institute of Microsystem and Information Technology, Chinese Academy of Sciences; University of Chinese Academy of Sciences), Sen Chen (Tianjin University; Nanyang Technological University), Lingling Fan (Nanyang Technological University), Xiaoning Du (Nanyang Technological University), Zhe Zhao (ShanghaiTech University), Fu Song (ShanghaiTech University; Shanghai Engineering Research Center of Intelligent Vision and Imaging), Yang Liu (Nanyang Technological University)ShanghaiTech University; Shanghai Institute of Microsystem and Information Technology中国
Wolverine: Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits Chenkai Weng (Northwestern University), Kang Yang (State Key Laboratory of Cryptology), Jonathan Katz (University of Maryland), Xiao Wang (Northwestern University)Northwestern University美国
Zero Knowledge for Everything and Everyone: Fast ZK Processor with Cached ORAM for ANSI C ProgramsDavid Heath (Georgia Institute of Technology), Yibin Yang (Georgia Institute of Technology), David Devecsery (Georgia Institute of Technology), Vladimir Kolesnikov (Georgia Institute of Technology)Georgia Institute of Technology美国
Bookmark the permalink.

Comments are closed.