43rd IEEE Symposium on
Security and Privacy


Poster 6: ARLIF-IDS --- Attention augmented Real-Time Isolation Forest Intrusion Detection System 
Aman Priyanshu, Sarthak Shastri, Sai Sravan Medicherla

Poster 8: ART-assisted App Diffing: Defeating Dalvik Bytecode Shrinking, Obfuscation, and Optimization with Android's OAT Compiler 
Jakob Bleier, Martina Lindorfer

Poster 4: Are Trusted-Types the Panacea for XSS? 
Sebastian Roth, Lea Gröber, Katharina Krombholz, Ben Stock

Poster 10: Automatic Identification and Protection of Memory-resident Sensitive Data to Defend Against Data-Oriented Attacks 
Salman Ahmed, Hans Liljestrand, N. Asokan, Danfeng (Daphne) Yao

Poster 12: Azeroth: Auditable Zero-knowledge Transaction in Smart Contracts 
Gweonho Jeong, Nuri Lee, Jihye Kim, Hyunok Oh

Poster 14: Blacksmith -- Scalable Rowhammering in the Frequency Domain 
Patrick Jattke, Victor van der Veen, Pietro Frigo, Stijn Gunter, Kaveh Razavi

Poster 16: Characterizing Deceptive Affiliate Marketing Offers 
Victor Le Pochat, Cameron Ballard, Tom Van Goethem, Wouter Joosen, Damon McCoy, Tobias Lauinger

Poster 18: Committed by Accident -- Prevention and Remediation Strategies Against Secret Leakage 
Alexander Krause, Jan H. Klemmer, Nicolas Human, Dominik Wermke, Yasemin Acar, Sascha Fahl

Poster 22: DP-SGD vs PATE: Which Has Less Disparate Impact on Model Accuracy? 
Archit Uniyal, Rakshit Naidu, Sasikanth Kotti, Sahib Singh, Patrik Joslin Kenfack, Fatemehsadat Mireshghallah, Andrew Trask

Poster 20: Denial of Wallet Preemptive Defence - Attack Simulation and Vulnerability Scouting 
Daniel Kelly, Frank G Glavin, Enda Barrett

Poster 24: Efficient Hyperparameter Optimization for Differentially Private Deep Learning 
Aman Priyanshu, Rakshit Naidu, Fatemehsadat Mireshghallah, Mohammad Malekzadeh

Poster 28: Exploring User Perceptions and Expectations of Privacy in City-wide WiFi Services 
Prianka Mandal, Tu Le, Yuan Tian, Adwait Nadkarni

Poster 30: Feasibility of Malware Visualization Techniques against Adversarial Machine Learning Attacks 
H. Oz, F. Naseem, A. Aris, A. Acar, G. Tuncay, S. Uluagac

Poster 32: Improved Website Fingerprinting Attacks based on Tor Network Protocols 
Loc Ho, Jongwook Lee, Won-gyum Kim, Donghoon Kim, Doosung Hwang

Poster 2: L4 (Long Long Long Long) Pointer to Prevent Buffer Overflow* 
Seong-Kyun Mok, Eun-Sun Cho

Poster 34: LPEES: Lightweight Policy Enforcement and Evaluation for SDN-based Multi-Domain Communication 
Abdulhakim Sabur, Ankur Chowdhary, Kritshekhar Jha, and Ming Zhao

Poster 38: Leveraging Interpersonal Dynamics for IoT Privacy 
Nathan Malkin, Alan F. Luo, Julio Poveda, Michelle Mazurek

Poster 36: Mitigating Blackhole Attack in NDNoT 
Afia Anjum, Habeeb Olufowobi

Poster 40: PhisherCop - An Automated Tool Using NLP for Phishing Detection and Mitigation 
Naheem Noah, Abebe Tayachew, Stuart Ryan, Sanchari Das

Poster 42: PluginPermCheck: Preventing Permission Escalation in App Virtualization 
Shou-Ching Hsiao, Hsu-Chun Hsiao

Poster 44: Privacy-preserving Neural Network with Functional Encryption 
Prajwal Panzade, Daniel Takabi

Poster 46: Quantifying Privacy Risks of Masked Language Models Using Membership Inference Attacks 
Fatemeh Mireshghallah, Kartik Goyal, Archit Uniyal, Taylor Berg-Kirkpatrick, Reza Shokri

Poster 48: Scientific Comparison on Accuracy and Scalability of Cryptographic API Misuse Detection 
Sharmin Afrose, Ya Xiao, Sazzadur Rahaman, Barton P. Miller, Danfeng (Daphne) Yao

Poster 50: Secure SqueezeNet inference in 4 minutes 
E. Aharoni, M. Baruch, N. Drucker, G. Ezov, E. Kushnir, G. Moshkowich, O. Soceanu

Poster 51: Style Pooling: Automatic Text Style Obfuscation for Hiding Sensitive Attributes 
Fatemehsadat Mireshghallah, Taylor Berg-Kirkpatrick

Poster 26: Unintended Consequences of Security and Privacy Software 
Harshini Sri Ramulu, Yasemin Acar

Poster 52: Unsafe Rust: Conscious Choice or Spiky Shortcut? 
Sandra Hötervennhoff, Philip Klostermeyer, Noah Wöhler, Yasemin Acar, Sascha Fahl

Poster 53: User Awareness of Phishing and WebAuthn 
Mindy Tran, Sabrina Amft, Dominik Wermke

Poster 54: You Share Because We Care: Secure Allegation Escrow System 
Nishat Koti, Varsha Bhat Kukkala, Arpita Patra