Results

Title Badge Artifact URL
A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web Artifact
A Formal Analysis of IEEE 802.11's WPA2: Countering the Kracks Caused by Cracking the Counters Artifact
A Longitudinal and Comprehensive Study of the DANE Ecosystem in Email Artifact
A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols Artifact
A Tale of Two Headers: A Formal Analysis of Inconsistent Click-Jacking Protection on the Web Artifact
Achieving Keyless CDNs with Conclaves Artifact
Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks in Machine Learning Artifact
Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints Artifact
An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem Artifact
Analysis of DTLS Implementations Using Protocol State Fuzzing Artifact
APEX: A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise Artifact
Automatic Techniques to Systematically Discover New Heap Exploitation Primitives Artifact
Automating the Development of Chosen Ciphertext Attacks Artifact
Big Numbers - Big Troubles: Systematically Analyzing Nonce Leakage in (EC)DSA Implementations Artifact
BlockSci: Design and applications of a blockchain analysis platform Artifact
Certified Side Channels Artifact
Chaperone: Real-time Locking and Loss Prevention for Smartphones Artifact
Datalog Disassembly Artifact
Donky: Domain Keys - Efficient In-Process Isolation for RISC-V and x86 Artifact
EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed Bandit Artifact
FANS: Fuzzing Android Native System Services via Automated Interface Analysis Artifact
Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets Artifact
From Needs to Actions to Secure Apps? The Effect of Requirements and Developer Practices on App Security Artifact
HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation Artifact
Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries Artifact
McTiny: Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers Artifact
Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines Artifact
Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer Artifact
PHMon: A Programmable Hardware Monitor and Its Security Use Cases Artifact
RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks Artifact
Retrofitting Fine Grain Isolation in the Firefox Renderer Artifact
Scaling Verifiable Computation Using Efficient Set Accumulators Artifact
SENG, the SGX-Enforcing Network Gateway: Authorizing Communication from Shielded Clients Artifact
Silhouette: Efficient Protected Shadow Stacks for Embedded Systems Artifact
Symbolic execution with SymCC: Don't interpret, compile! Artifact
Temporal System Call Specialization for Attack Surface Reduction Artifact
Towards HTTPS Everywhere on Android: We Are Not There Yet