IEEE S&P 2018

63 papers accepted.

Updated on 2023-09-08.

You can find the lastest information here.


AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation.

Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning.

Stealing Hyperparameters in Machine Learning.

A Machine Learning Approach to Prevent Malicious Calls over Telephony Networks.

Surveylance: Automatically Detecting Online Survey Scams.

Privacy Risks with Facebook's PII-Based Targeting: Auditing a Data Broker's Advertising Interface.

Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency - Choose Two.

Locally Differentially Private Frequent Itemset Mining.

EyeTell: Video-Assisted Touchscreen Keystroke Inference from Eye Movements.

Understanding Linux Malware.

Racing in Hyperspace: Closing Hyper-Threading Side Channels on SGX with Contrived Data Races.

Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPU.

SoK: Keylogging Side Channels.

FPGA-Based Remote Power Side-Channel Attacks.

Another Flip in the Wall of Rowhammer Defenses.

EnclaveDB: A Secure Database Using SGX.

Oblix: An Efficient Oblivious Search Index.

Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage.

Bulletproofs: Short Proofs for Confidential Transactions and More.

FuturesMEX: Secure, Distributed Futures Market Exchange.

Implementing Conjunction Obfuscation Under Entropic Ring LWE.

Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes.

Towards Security and Privacy for Multi-user Augmented Reality: Foundations with End Users.

Computer Security and Privacy for Refugees in the United States.

On Enforcing the Digital Immunity of a Large Humanitarian Organization.

The Spyware Used in Intimate Partner Violence.

Compiler-Assisted Code Randomization.

Protecting the Stack with Metadata Policies and Tagged Hardware.

Impossibility of Precise and Sound Termination-Sensitive Security Enforcements.

Static Evaluation of Noninterference Using Approximate Model Counting.

DEEPSEC: Deciding Equivalence Properties in Security Protocols Theory and Practice.

Distance-Bounding Protocols: Verification without Time and Location.

Sonar: Detecting SS7 Redirection Attacks with Audio-Based Distance Bounding.

OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding.

Routing Around Congestion: Defeating DDoS Attacks and Adverse Network Conditions via Reactive BGP Routing.

Tracking Ransomware End-to-end.

The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators.

Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System.

Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels.

CollAFL: Path Sensitive Fuzzing.

T-Fuzz: Fuzzing by Program Transformation.

FP-STALKER: Tracking Browser Fingerprint Evolutions.

Study and Mitigation of Origin Stripping Vulnerabilities in Hybrid-postMessage Enabled Mobile Applications.

Mobile Application Web API Reconnaissance: Web-to-Mobile Inconsistencies & Vulnerabilities.

Enumerating Active IPv6 Hosts for Large-Scale Security Scans via DNSSEC-Signed Reverse Zones.

Tracking Certificate Misissuance in the Wild.

A Formal Treatment of Accountable Proxying Over TLS.

Secure Device Bootstrapping Without Secrets Resistant to Signal Manipulation Attacks.

Do You Feel What I Hear? Enabling Autonomous IoT Device Pairing Using Different Sensor Types.

On the Economics of Offline Password Cracking.

A Tale of Two Studies: The Best and Worst of YubiKey Usability.

When Your Fitness Tracker Betrays You: Quantifying the Predictability of Biometric Features Across Contexts.

vRAM: Faster Verifiable RAM with Program-Independent Preprocessing.

Doubly-Efficient zkSNARKs Without Trusted Setup.

xJsnark: A Framework for Efficient Verifiable Computation.

PIR with Compressed Queries and Amortized Query Processing.

Secure Two-party Threshold ECDSA from ECDSA Assumptions.

Speechless: Analyzing the Threat to Speech Privacy from Smartphone Motion Sensors.

Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks.

SoK: "Plug & Pray" Today - Understanding USB Insecurity in Versions 1 Through C.

Blue Note: How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems.

The Cards Aren't Alright: Detecting Counterfeit Gift Cards Using Encoding Jitter.