IEEE S&P 2018 63 papers accepted. Updated on 2023-09-08. You can find the lastest information here. AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation. Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning. Stealing Hyperparameters in Machine Learning. A Machine Learning Approach to Prevent Malicious Calls over Telephony Networks. Surveylance: Automatically Detecting Online Survey Scams. Privacy Risks with Facebook's PII-Based Targeting: Auditing a Data Broker's Advertising Interface. Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency - Choose Two. Locally Differentially Private Frequent Itemset Mining. EyeTell: Video-Assisted Touchscreen Keystroke Inference from Eye Movements. Understanding Linux Malware. Racing in Hyperspace: Closing Hyper-Threading Side Channels on SGX with Contrived Data Races. Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPU. SoK: Keylogging Side Channels. FPGA-Based Remote Power Side-Channel Attacks. Another Flip in the Wall of Rowhammer Defenses. EnclaveDB: A Secure Database Using SGX. Oblix: An Efficient Oblivious Search Index. Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage. Bulletproofs: Short Proofs for Confidential Transactions and More. FuturesMEX: Secure, Distributed Futures Market Exchange. Implementing Conjunction Obfuscation Under Entropic Ring LWE. Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes. Towards Security and Privacy for Multi-user Augmented Reality: Foundations with End Users. Computer Security and Privacy for Refugees in the United States. On Enforcing the Digital Immunity of a Large Humanitarian Organization. The Spyware Used in Intimate Partner Violence. Compiler-Assisted Code Randomization. Protecting the Stack with Metadata Policies and Tagged Hardware. Impossibility of Precise and Sound Termination-Sensitive Security Enforcements. Static Evaluation of Noninterference Using Approximate Model Counting. DEEPSEC: Deciding Equivalence Properties in Security Protocols Theory and Practice. Distance-Bounding Protocols: Verification without Time and Location. Sonar: Detecting SS7 Redirection Attacks with Audio-Based Distance Bounding. OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding. Routing Around Congestion: Defeating DDoS Attacks and Adverse Network Conditions via Reactive BGP Routing. Tracking Ransomware End-to-end. The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators. Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System. Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels. CollAFL: Path Sensitive Fuzzing. T-Fuzz: Fuzzing by Program Transformation. Angora: Efficient Fuzzing by Principled Search. FP-STALKER: Tracking Browser Fingerprint Evolutions. Study and Mitigation of Origin Stripping Vulnerabilities in Hybrid-postMessage Enabled Mobile Applications. Mobile Application Web API Reconnaissance: Web-to-Mobile Inconsistencies & Vulnerabilities. Enumerating Active IPv6 Hosts for Large-Scale Security Scans via DNSSEC-Signed Reverse Zones. Tracking Certificate Misissuance in the Wild. A Formal Treatment of Accountable Proxying Over TLS. Secure Device Bootstrapping Without Secrets Resistant to Signal Manipulation Attacks. Do You Feel What I Hear? Enabling Autonomous IoT Device Pairing Using Different Sensor Types. On the Economics of Offline Password Cracking. A Tale of Two Studies: The Best and Worst of YubiKey Usability. When Your Fitness Tracker Betrays You: Quantifying the Predictability of Biometric Features Across Contexts. vRAM: Faster Verifiable RAM with Program-Independent Preprocessing. Doubly-Efficient zkSNARKs Without Trusted Setup. xJsnark: A Framework for Efficient Verifiable Computation. PIR with Compressed Queries and Amortized Query Processing. Secure Two-party Threshold ECDSA from ECDSA Assumptions. Speechless: Analyzing the Threat to Speech Privacy from Smartphone Motion Sensors. Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks. SoK: "Plug & Pray" Today - Understanding USB Insecurity in Versions 1 Through C. Blue Note: How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems. The Cards Aren't Alright: Detecting Counterfeit Gift Cards Using Encoding Jitter.