ACM CCS 2018

197 papers accepted.

Updated on 2023-09-08.

You can find the lastest information here.


Towards Fine-grained Network Security Forensics and Diagnosis in the SDN Era.

vNIDS: Towards Elastic Security with Safe and Efficient Virtualization of Network Intrusion Detection Systems.

ABY3: A Mixed Protocol Framework for Machine Learning.

Voting: You Can't Have Privacy without Individual Verifiability.

Securify: Practical Security Analysis of Smart Contracts.

BitML: A Calculus for Bitcoin Smart Contracts.

Large-Scale and Language-Oblivious Code Authorship Identification.

Fraud De-Anonymization for Fun and Profit.

Unveiling Hardware-based Data Prefetcher, a Hidden Source of Information Leakage.

Ohm's Law in Data Centers: A Voltage Side Channel for Timing Power Attacks.

Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers.

Nemesis: Studying Microarchitectural Timing Leaks in Rudimentary CPU Interrupt Logic.

Utility-Aware Synthesis of Differentially Private and Attack-Resilient Location Traces.

CALM: Consistent Adaptive Local Marginal for Marginal Release under Local Differential Privacy.

MVG Mechanism: Differential Privacy under Matrix-Valued Query.

Tight on Budget?: Tight Bounds for r-Fold Approximate Differential Privacy.

Practical State Recovery Attacks against Legacy RNG Implementations.

Prime and Prejudice: Primality Testing Under Adversarial Conditions.

Release the Kraken: New KRACKs in the 802.11 Standard.

Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries.

Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach.

Model-Reuse Attacks on Deep Learning Systems.

LEMNA: Explaining Deep Learning based Security Applications.

Effective Program Debloating via Reinforcement Learning.

Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking with Orders-of-Magnitude Performance Boost.

K-Hunt: Pinpointing Insecure Cryptographic Keys from Execution Traces.

Using Logic Programming to Recover C++ Classes and Methods from Compiled Executables.

VMHunt: A Verifiable Approach to Partially-Virtualized Binary Code Simplification.

Preserving Both Privacy and Utility in Network Trace Anonymization.

Detecting Violations of Differential Privacy.

Secure Computation with Differentially Private Access Patterns.

DP-Finder: Finding Differential Privacy Violations by Sampling and Optimization.

Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum Signatures.

Symbolic Proofs for Lattice-Based Cryptography.

Lattice-Based zk-SNARKs from Square Span Programs.

Lattice-Based Group Signatures and Zero-Knowledge Proofs of Automorphism Stability.

Tiresias: Predicting Security Events Through Deep Learning.

DeepMem: Learning Graph Neural Network Models for Fast and Robust Memory Forensic Analysis.

Property Inference Attacks on Fully Connected Neural Networks using Permutation Invariant Representations.

Machine Learning with Membership Privacy using Adversarial Regularization.

Advanced Cryptography: Promise and Challenges.

Cross-App Poisoning in Software-Defined Networking.

AIM-SDN: Attacking Information Mismanagement in SDN-datastores.

Fast Secure Computation for Small Population over the Internet.

An End-to-End System for Large Scale P2P MPC-as-a-Service and Low-Bandwidth MPC for Weak Participants.

The Gap Game.

A Better Method to Analyze Blockchain Consistency.

Result Pattern Hiding Searchable Encryption for Conjunctive Queries.

Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption.

Scission: Signal Characteristic-Based Sender Identification and Intrusion Detection in Automotive Networks.

Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach.

Truth Will Out: Departure-Based Process-Level Detection of Stealthy Attacks on Control Systems.

On the Safety of IoT Device Physical Interaction Control.

HyCC: Compilation of Hybrid Protocols for Practical Secure Computation.

NANOPI: Extreme-Scale Actively-Secure Multi-Party Computation.

Generalizing the SPDZ Compiler For Other Protocols.

Compressing Vector OLE.

Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability.

RapidChain: Scaling Blockchain via Full Sharding.

General State Channel Networks.

FairSwap: How To Fairly Exchange Digital Goods.

Secure Search on Encrypted Data via Multi-Ring Sketch.

Private Stateful Information Retrieval.

ALCHEMY: A Language and Compiler for Homomorphic Encryption Made easY.

New Constructions for Forward and Backward Private Symmetric Searchable Encryption.

Situational Access Control in the Internet of Things.

HoMonit: Monitoring Smart Home Apps from Encrypted Traffic.

Pinto: Enabling Video Privacy for Commodity IoT Cameras.

If This Then What?: Controlling Flows in IoT Apps.

ClickShield: Are You Hiding Something? Towards Eradicating Clickjacking on Android.

JN-SAF: Precise and Efficient NDK/JNI-aware Inter-language Static Analysis Framework for Security Vetting of Android Applications with Native Code.

Precise Android API Protection Mapping Derivation and Reasoning.

Invetter: Locating Insecure Input Validations in Android Services.

Fast Multiparty Threshold ECDSA with Fast Trustless Setup.

On the Security of the PKCS#1 v1.5 Signature Scheme.

Secure Outsourced Matrix Computation and Application to Neural Networks.

Labeled PSI from Fully Homomorphic Encryption with Malicious Security.

Asking for a Friend: Evaluating Response Biases in Security User Studies.

Towards Usable Checksums: Automating the Integrity Verification of Web Downloads for the Masses.

Investigating System Operators' Perspective on Security Misconfigurations.

Peeling the Onion's User Experience Layer: Examining Naturalistic Use of the Tor Browser.

PrinTracker: Fingerprinting 3D Printers using Commodity Scanners.

NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis.

EviHunter: Identifying Digital Evidence in the Permanent Storage of Android Devices via Static Analysis.

When Good Components Go Bad: Formally Secure Compilation Despite Dynamic Compromise.

Towards Verified, Constant-time Floating Point Operations.

A Formal Analysis of 5G Authentication.

Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure.

Partially Specified Channels: The TLS 1.3 Record Layer without Elision.

The Multi-user Security of GCM, Revisited: Tight Bounds for Nonce Randomization.

Lord of the x86 Rings: A Portable User Mode Privilege Separation Architecture on x86.

Milkomeda: Safeguarding the Mobile GPU Interface Using WebGL Security Checks.

Enforcing Unique Code Target Property for Control-Flow Integrity.

Predicting Impending Exposure to Malicious Content from User Behavior.

Clock Around the Clock: Time-Based Device Fingerprinting.

The Web's Sixth Sense: A Study of Scripts Accessing Smartphone Sensors.

Reinforcing System-Assigned Passphrases Through Implicit Learning.

"What was that site doing with my Facebook password?": Designing Password-Reuse Notifications.

On the Accuracy of Password Strength Meters.

HyperFlow: A Processor Architecture for Nonmalleable, Timing-Safe Information Flow Security.

Runtime Analysis of Whole-System Provenance.

Faceted Secure Multi Execution.

A Robust and Efficient Defense against Use-after-Free Exploits via Concurrent Pointer Sweeping.

An Exploratory Analysis of Microcode as a Building Block for System Defenses.

Debin: Predicting Debug Information in Stripped Binaries.

Mystique: Uncovering Information Leakage from Browser Extensions.

How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World.

MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense.

Pride and Prejudice in Progressive Web Apps: Abusing Native App-like Features in Web Applications.

No Training Hurdles: Fast Training-Agnostic Attacks to Infer Your Typing.

Lawful Device Access without Mass Surveillance Risk: A Technical Design Discussion.

PatternListener: Cracking Android Pattern Lock Using Acoustic Signals.

Phishing Attacks on Modern Android.

On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees.

Bandwidth-Hard Functions: Reductions and Lower Bounds.

Fast Secure Multiparty ECDSA with Practical Distributed Key Generation and Applications to Cryptocurrency Custody.

TACHYON: Fast Signatures from Compact Knapsack.

Block Oriented Programming: Automating Data-Only Attacks.

Threat Intelligence Computing.

Check It Again: Detecting Lacking-Recheck Bugs in OS Kernels.

Revery: From Proof-of-Concept to Exploitable.

Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning.

Privacy-Preserving Dynamic Learning of Tor Network Traffic.

DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning.

Measuring Information Leakage in Website Fingerprinting Attacks and Defenses.

DiSE: Distributed Symmetric-key Encryption.

Mitigating Risk while Complying with Data Retention Laws.

BEAT: Asynchronous BFT Made Practical.

PASTA: PASsword-based Threshold Authentication.

Domain Validation++ For MitM-Resilient PKI.

Secure Opportunistic Multipath Key Exchange.

Hawkeye: Towards a Desired Directed Grey-box Fuzzer.

ret2spec: Speculative Execution Using Return Stack Buffers.

Evaluating Fuzz Testing.

Rendered Insecure: GPU Side Channel Attacks are Practical.

Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning.

Secure Multi-Party Computation.

Building Applications with Homomorphic Encryption.

Game Theory Meets Network Security: A Tutorial.

11th International Workshop on Artificial Intelligence and Security (AISec 2018).

ASHES 2018- Workshop on Attacks and Solutions in Hardware Security.

CPS-SPC 2018: Fourth Workshop on Cyber-Physical Systems Security and PrivaCy.

2nd International Workshop on Multimedia Privacy and Security.

MTD 2018: 5th ACM Workshop on Moving Target Defense (MTD).

SecArch'18: 1st Workshop of Security-Oriented Designs of Computer Architectures and Processors.

PLAS 2018 - ACM SIGSAC Workshop on Programming Languages and Analysis for Security.

SysTEX'18: 2018 Workshop on System Software for Trusted Execution.

17th Workshop on Privacy in the Electronic Society (WPES 2018).

WAHC'18: 6th Workshop on Encrypted Computing and Applied Homomorphic Cryptography.

FEAST'18 - 2018 Workshop on Forming an Ecosystem around Software Transformation.

A Discussion on Security Education in Academia.

An Effective Android Code Coverage Tool.

PrivacyBuDe: Privacy Buckets Demo Tight Differential Privacy Guarantees made Simple.

A Re-evaluation of Intrusion Detection Accuracy: Alternative Evaluation Strategy.

How to Choose Suitable Secure Multiparty Computation Using Generalized SPDZ.

Hardware Acceleration of Searchable Encryption.

Practical Fault Attack on Deep Neural Networks.

FlowNotation: An Annotation System for Statically Enforcing Information Flow Policies in C.

Cracking the TSCH Channel Hopping in IEEE 802.15.4e.

Off-Path Attacks Against PKI.

The Influence of Code Coverage Metrics on Automated Testing Efficiency in Android.

Toward Trustworthy Deep Learning in Security.

Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams.

Adversarial Traces for Website Fingerprinting Defense.

Towards Understanding the Dynamics of Adversarial Attacks.

Circular AON: A Very Fast Scheme to Protect Encrypted Data Against Key Exposure.

CipherLocker: Encrypted File Sharing with Ranked Search https: //cipherlocker.com.

A Guided Approach to Behavioral Authentication.

Cryptographically Secure Detection of Injection Attacks.

Can Browser Add-Ons Protect Your Children from Online Tracking?

Spartan Networks: Self-Feature-Squeezing Networks for Increased Robustness in Adversarial Settings.

Knowledge Seeking on The Shadow Brokers.

Assessing Non-Visual SSL Certificates with Desktop and Mobile Screen Readers.

The House That Knows You: User Authentication Based on IoT Data.

A Storage-level Detection Mechanism against Crypto-Ransomware.

The Price of Privacy in Collaborative Learning.

Enabling Fair ML Evaluations for Security.

Towards Architecture and OS-Independent Malware Detection via Memory Forensics.

Equitable Security: Optimizing Distribution of Nudges and Resources.

Public Order Preserving Cipher Generation Scheme for Distributed Computing.

AST-Based Deep Learning for Detecting Malicious PowerShell.

Aggregated Machine Learning on Indicators of Compromise in Android Devices.

End-to-End Secure Mobile Group Messaging with Conversation Integrity and Minimal Metadata Leakage.

Not All Pixels are Born Equal: An Analysis of Evasion Attacks under Locality Constraints.

Post-quantum Security using Channel Noise.

Image Disguising for Privacy-preserving Deep Learning.

Privacy-Preserving Boosting with Random Linear Classifiers.

Restricting Control Flow During Speculative Execution.

Removing the Bottleneck for Practical 2PC.

Cashing in on the File-System Cache.

Facilitating Privacy-preserving Recommendation-as-a-Service with Machine Learning.

Medical Devices are at Risk: Information Security on Diagnostic Imaging System.

Practical and Privacy-Aware Truth Discovery in Mobile Crowd Sensing Systems.

MORPH: Enhancing System Security through Interactive Customization of Application and Communication Protocol Features.

A Bitstream Reverse Engineering Tool for FPGA Hardware Trojan Detection.

A Markov Decision Process to Determine Optimal Policies in Moving Target.

Adversarial Product Review Generation with Word Replacements.