40th IEEE Symposium on
Security and Privacy

Poster: A Smörgåsbord of Typos: Exploring International Keyboard Layout Typosquatting
Victor Le Pochat, Tom Van Goethem, and Wouter Joosen (imec-DistriNet, KU Leuven)

Poster: A critique of the DEEPSEC Platform for Security Analysis of Deep Learning Models
Nicholas Carlini (Google Research)

Poster: Android App Forensic Evidence Database
Chen Shi, Chris Cheng, Mitchell Kerr, Connor Kocolowski, Emmett Kozlowski, Matthew Lawlor, Jacob Stair, Neil Gong, and Yong Guan (Iowa State University)

Poster: AppPrivacy: Analyzing Data Collection and Privacy Leakage from Mobile Apps
Minjie Zhu, Qingqing Ye, Xin Yang, and Xiaofeng Meng (Renmin University of China); Haibo Hu (Hong Kong Polytechnic University)

Poster: Application-Layer Routing Attacks on Tor
Katharina Kohls (Ruhr University Bochum); Christina Pöpper (New York University Abu Dhabi)

Poster: Are Self-Driving Cars Secure? Evasion Attacks against Deep Neural Networks for Steering Angle Prediction
Alesia Chernikova, Alina Oprea, and Cristina Nita-Rotaru (Northeastern University); BaekGyu Kim (Toyota ITC)

Poster: Attack the Dedicated Short-Range Communication for Connected Vehicles
Tu Le, Ingy ElSayed-Aly, Weizhao Jin, Seunghan Ryu, Guy Verrier, Tamjid Al Rahat, B. Brian Park, and Yuan Tian (University of Virginia)

Poster: Automating the Authentication Ceremony in Signal
Tarun Kumar Yadav, Aaron Chan, Austin Kolander, and Kent Seamons (Brigham Young University)

Poster: Collecting Contextual Information About a DDoS Attack Event Using Google Alerts
Abhishta Abhishta, Reinoud Joosten, Mattijs Jonker, Wim Kamerman, and Lambert J. M. Nieuwenhuis (University of Twente)

Poster: Consent Conditions Compliant with GDPR from the Viewpoint of Data Subject
Junhyoung Oh and Kyungho Lee (Korea University)

Poster: Deployment-quality and Accessible Solutions for Cryptography Code Development
Sazzadur Rahaman, Ya Xiao, Sharmin Afrose, Ke Tian, Miles Frantz, Danfeng (Daphne) Yao, and Na Meng (Computer Science, Virginia Tech); Barton P. Miller (Computer Science, University of Wisconsin-Madison); Fahad Shaon and Murat Kantarcioglu (Computer Science, University of Texas at Dallas)

Poster: Encrypted QR code
Jiahui Cui and Basar Koc (Stetson University)

Poster: Exploring Adversarial Examples in Malware Detection
Octavian Suciu (University of Maryland, College Park); Scott E. Coull and Jeffrey Johns (FireEye, Inc.)

Poster: Exploring Biases in Vision Privacy Protection Techniques
Jasmine DeHart, Lisa Egede, and Christan Grant (University of Oklahoma)

Poster: Faster Optimal-Rate Many-Server PIR
Syed Mahbub Hafiz (Indiana University Bloomington); Ryan Henry (University of Calgary)

Poster: Full-speed Fuzzing: Reducing Fuzzing Overhead through Coverage-guided Tracing
Stefan Nagy and Matthew Hicks (Virginia Tech)

Poster: GIPSim: Low-level Power Modeling for Resiliency from Side Channel Attacks on GPUs
Saoni Mukherjee, Yunsi Fei, and David Kaeli (Northeastern University)

Poster: How to Homomorphically Compute on Data Encrypted under Different Keys?
Asma Aloufi (Rochester Institute of Technology, Taif University); Peizhao Hu (Rochester Institute of Technology)

Poster: Improving the Adaptability of Differential Privacy
Vaikkunth Mugunthan, Wanyi Xiao, and Lalana Kagal (CSAIL, Massachusetts Institute of Technology)

Poster: Insecurities of D2D and a Usable Solution
Jay Prakash, Andrei Bytes, and Saket Chandra (Singapore University of Technology and Design, Singapore); Ruei-Hau (Richard) Hsu (National Sun Yat-sen University, Taiwan); Jemin Lee (DGIST, South Korea); Tony Q. S. Quek and Jianying Zhou (Singapore University of Technology and Design, Singapore)

Poster: Leveraging Prior Knowledge Asymmetries in the Design of IoT Privacy-Preserving Mechanisms
Nazanin Takbiri, Virat Shejwalkar, Amir Houmansadr, Dennis L. Goecekl, and Hossein Pishro-Nik (University of Massachusetts Amherst)

Poster: MaxNet: Neural network architecture for continuous detection of malicious activity
Petr Gronát, Javier Aldana-Iuit, and Martin Bálek (AVAST)

Poster: Membership Inference Attacks against Adversarially Robust Deep Learning Models
Liwei Song (Princeton University); Reza Shokri (National University of Singapore); Prateek Mittal (Princeton University)

Poster: Natural Face De-Identification
Tao Li (Purdue University)

Poster: Non Public-Key Solution for Key Establishment in a Permissioned Blockchain
Ashwag O Albakri and Lein Harn (University of Missouri- Kansas City)

Poster: Novel Strategies to Calculate the Privacy Loss Parameter in Differential Privacy
Vaikkunth Mugunthan, Wanyi Xiao, and Lalana Kagal (CSAIL, Massachusetts Institute of Technology)

Poster: Perceived Adversarial Examples
Yanmao Man and Ming Li (University of Arizona); Ryan Gerdes (Virginia Tech.)

Poster: Power Player: Using IoT Devices to Profit from the Energy Market
Tohid Shekari and Raheem Beyah (School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA, USA)

Poster: Precise Dynamic Data Flow Tracking with Proximal Gradients
Gabriel Ryan, Abhishek Shah, and Dongdong She (Columbia University); Koustubha Bhat (Vrije Universiteit); Suman Jana (Columbia University)

Poster: Privacy Risk Assessment for Data Subject-aware Threat Modeling
Laurens Sion, Dimitri Van Landuyt, Kim Wuyts, and Wouter Joosen (imec-DistriNet, KU Leuven)

Poster: Protecting Campus Networks with Cost-effective DDoS Defense
Wei-Hsuan Chiang, Shu-Po Tung, Yu-Su Wang, I-Jen Hsiao, and Hsu-Chun Hsiao (National Taiwan University)

Poster: ROS-Defender: SDN-based Security Policy Enforcement for Robotic Applications
Sean Rivera, Sofiane Lagraa, and Radu State (University of Luxembourg); Cristina Nita-Rotaru (Northeastern University); Sheila Becker (Defence Directorate, Luxembourg)

Poster: Reconfigurable monitoring and performance awareness in VMI-based SIEM systems
Noëlle Rakotondravony, Benjamin Taubmann, Stewart Sentanoe, and Hans P. Reiser (University of Passau)

Poster: Refinement and Verification of CBC Casper
Ryuya Nakamura (LayerX, University of Tokyo); Takayuki Jimba (LayerX); Dominik Harz (Imperial College London)

Poster: Resilience of Multi-Robot Systems to Physical Masquerade Attacks
Kacper Wardega, Roberto Tron, and Wenchao Li (Boston University)

Poster: SecDir: Secure Directories to Defeat Directory Side Channel Attacks
Mengjia Yan, Jen-Yang Wen, Christopher Fletcher, and Josep Torrellas (University of Illinois at Urbana Champaign)

Poster: SecTAG: Enhancing ARM Platform Security with Hardware Tags
Zhenyu Ning and Fengwei Zhang (Wayne State University)

Poster: Side-Channel Hardware Trojan
Samaneh Ghandali (University of Massachusetts)

Poster: Side-Channel Vulnerabilities Of Cyber-Physical Systems In Biomedical Applications
Sina Faezi and Mohammad Abdullah Al Faruque (University of California, Irvine)

Poster: Smart Speaker Privacy Control - Acoustic Tagging for Personal Voice Assistants
Peng Cheng and Ibrahim Ethem Bagci (Lancaster University); Jeff Yan (Linköping University); Utz Roedig (University College Cork)

Poster: SwitchMan: An Easy-to-Use Approach to Secure User Input and Output
Shengbao Zheng and Zhenyu Zhou (Duke University); Heyi Tang (Tsinghua University); Xiaowei Yang (Duke University)

Poster: Toward Measuring the Quality of Security Advice
Elissa Redmiles, Noel Warford, Emily Hwang, Amritha Jayanti, and Aravind Koneru (University of Maryland); Dhruv Kuchhal (Maharaja Agrasen Institute of Technology); Everest Liu and Lisa Maszkiewicz (University of Maryland); Miraida Morales (Rutgers University); Rock Stevens and Michelle L Mazurek (University of Maryland)

Poster: Towards A Reliable Privacy-Enhanced V-Model For Software Development
Ala'a Al-Momani and Frank Kargl (Ulm University); Robert Schmidt (Denso Automotive Deutschland); Antonio Kung (Trialog); Christoph Bösch (Ulm University)

Poster: Towards Attack Resilient Interoperable Hybrid Blockchain Framework
Kuheli Sai and David Tipper (University of Pittsburgh)

Poster: Training GANs to Generate Adversarial Examples Against Malware Classification
Raphael Labaca Castro, Corinna Schmitt, and Gabi Dreo Rodosek (Research Institute CODE - Bundeswehr University Munich, Germany)

Poster: Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning
Ahmed Salem (CISPA Helmholtz Center for Information Security); Apratim Bhattacharya (Max Planck Institute for Informatics); Michael Backes, Mario Fritz, and Yang Zhang (CISPA Helmholtz Center for Information Security)

Poster: Using Honeypots to Understand Attacks to Industrial Control Systems
Marcello Pogliani, Mattia Barlocco, Mirko Pesatori, and Stefano Zanero (Politecnico di Milano)

Poster: Using Machine Learning for Detection of Advanced Persistent Threats
Anoop Singhal (NIST); Qing Zou (Penn State Univ); Xiaoyan Sun (Caifornia State Univ); Peng Liu (Penn State Univ)

Poster: Zero-delay Lightweight Defenses against Website Fingerprinting
Jiajun Gong and Tao Wang

Poster: ZigBee Protocol Fuzzing
Mengfei Ren, Jiang Ming, and Yu Lei (University of Texas at Arlington)

Poster: gbdt-rs: Fast and Trustworthy Gradient Boosting Decision Tree
Tianyi Li (Peking University); Tongxin Li, Yu Ding, Yulong Zhang, and Tao Wei (Baidu X-Lab); Xinhui Han (Peking University)