MAY 24-27, 2021

42nd IEEE Symposium on
Security and Privacy

   Registration and Access

May 24

CANnon: Stealthy Remote Shutdown Attacks via Automotive MCUs 
Sekar Kulandaivel

Constant-Time Foundations for the New Spectre Era 
Sunjay Cauligi and Craig Disselkoen

Detecting AI Trojans Using Meta Neural Analysis 
Xiaojun Xu, Qi Wang, Huichen Li, Nikita Borisov, Carl A. Gunter, Bo Li

Differentially Private Imaging via Latent Space Manipulation 
Tao Li and Chris Clifton

Ebb-and-Flow Protocols: A Resolution of the Availability-Finality Dilemma 
Joachim Neu, Nusret Tas, David Tse

Explainability-based Backdoor Attacks Against Graph Neural Networks 
Jing Xu, Minhui Xue, Stjepan Picek

FedV: Privacy-Preserving Federated Learning over Vertically Partitioned Data 
Runhua Xu, Nathalie Baracaldo, Yi Zhou, Ali Anwar and Heiko Ludwig

Invisible for both Camera and LiDAR: Security of Multi-Sensor Fusion based Perception in Autonomous Driving Under Physical-World Attacks 
Ningfei Wang, Yulong Cao, Chaowei Xiao, Daweil Yang, Jin Fang, Ruigang Yang, Qi Alfredo Chen, Mingyan Liu, Bo Li

Known Vulnerability Detection for WebAssembly Binaries 
Luis Garcia,Pengfei Sun, Yi Han, Saman Zonouz and Yao Zhao

LEGATO: A LayerwisE Gradient AggregaTiOn Algorithm for Mitigating Byzantine Attacks in Federated Learning 
Yi Zhou, Kamala Varma, Nathalie Baracaldo, Ali Anwar

Machine Unlearning 
Christopher A. Choquette-Choo, Hengrui Jia, Adelin Travers

On the (Im)Practicality of Adversarial Perturbation for Image Privacy 
Arezoo Rajabi, Rakesh Bobba, Mike Rosulek, Charles V. Wright and Wu-Chi Feng

Privacy Preserving Recurrent Neural Network (RNN) Prediction using Homomorphic Encryption 
Robert Podschwadt, Daniel Takabi

Privacy Regularization: Joint Privacy-Utility Optimization in Text-Generation Models 
Fatemehsadat Mireshghallah, Huseyin A. Inan, Marcello Hasegawa, Victor Ruhle, Taylor Berg-Kirkpatrick and Robert Sim

Proof-of-Learning: Definitions and Practice 
Hengrui Jia, Mohammad Yaghini, Christopher A. Choquette-Choo, Anvith Thudi

Revolutionary DoH: Effective DNS Service 
Rintaro Kobayashi

Scalable Log Auditing on Private Blockchains via Lightweight Log-Fork Prevention 
Yibo Wang , Yuzhe Tang, Kai Li, and Sencer Burak Somuncuoglu

Security vs. Privacy in Cyber-Physical Systems 
Luis Burbano, Gabriel Torres

Speculative Data-Oblivious Execution: Mobilizing Safe Prediction For Safe and Efficient Speculative Execution 
Jiyong Yu, Namrata Mantri, Josep Torrellas, Adam Morrison, Christopher W. Fletcher

Symbolic Modeling of Micro Services for Intrusion Detection 
William Blair, Federtico Araujo, Teryl Taylor, Jiyong Jang

Uncover the Veil: The First Lesson We Learn from a Real-world Bulk Power System 
Xi Qin, Neil Ortiz, Alvaro A. Cardenas

May 25

Bitcoin-Compatible Virtual Channels 
Oguzhan Ersoy

Bomberman: Defining and Defeating Hardware Ticking Timebombs at Design-time 
Timothy Trippel

CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU 
Sijun Tan

FPFlow: Detect and Prevent Browser Fingerprinting with Dynamic Taint Analysis 
Tianyi Li, Xiaofeng Zheng, Kaiwen Shen and Xinhui Han

Fingerprinting the Fingerprinters: Learning to Detect Browser Fingerprinting Behaviors 
Umar Iqbal

Fraud Detection with Confidence: A Benchmarking Case Study on Synthetic Data 
Daniel Turner-Szymkiewicz, Prof. Ulf Norinder, Dr. Miroslawa Alunowska Figueroa, Dr. Edgar Lopez-Rojas

High-Frequency Trading on Decentralized On-Chain Exchanges 
Liyi Zhou

Is it Possible to Detect Unknown DNS Covert Channel With No Support of Real Malware Samples? 
Jiawen Diao, Zhongru Wang, Xiang Cui, Tian Wang and Hai Jiang

Keep the Dirt: Tainted TreeKEM, Adaptively and Actively Secure Continuous Group Key Agreement 
Guillermo Pascual-Perez

MPCLeague: Robust and Efficient Mixed-protocol Framework for 4-party Computation 
Nishat Koti, Arpita Patra and Ajith Suresh

Mobile Payment Applications: Risks and Possibilities 
Trishla Shah, Raghav Sampangi and Angela Siegel

On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols 
Kaihua Qin

Poltergeist: Acoustic Adversarial Machine Learning against Cameras and Computer Vision 
Yushi Cheng, Chen Yan

Proof-of-Learning: Definitions and Practice 
Hengrui Jia, Mohammad Yaghini, Christopher A. Choquette-Choo, Anvith Thudi

Revolutionary DoH: Effective DNS Service 
Rintaro Kobayashi

Rosita++: Automatic Second-Order Leakage Elimination from Cryptographic Code 
Madura A. Shelton, Niels Samwel, Łukasz Chmielewski, Lejla Batina, Markus Wagner, Yuval Yarom

Specification-Based Process Control Attack Detection in Substation Automation 
Muhammad Nouman Nafees, Neetesh Saxena and Pete Burnap

Squirrel: An Interactive Prover for Protocol Verification in the Computational Model 
David Baelde, Stéphanie Delaune, Charlie Jacomme, Adrien Koutsos, and Solène Moreau.

May 26

ConDySTA: Context-Aware Dynamic Supplement to Static Taint Analysis 
Xueling Zhang, Xiaoyin Wang, Rocky Slavin, Jianwei Niu

FedV: Privacy-Preserving Federated Learning over Vertically Partitioned Data 
Runhua Xu, Nathalie Baracaldo, Yi Zhou, Ali Anwar and Heiko Ludwig

Good Bot, Bad Bot: Characterizing Automated Browsing Activity 
Xigao Li, Babak Amin Azad, Amir Rahmati, Nick Nikiforakis

Is Private Learning Possible with Instance Encoding? 
Nicholas Carlini, Samuel Deng, Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Abhradeep Thakurta, Florian Tramèr

LEGATO: A LayerwisE Gradient AggregaTiOn Algorithm for Mitigating Byzantine Attacks in Federated Learning 
Yi Zhou, Kamala Varma, Nathalie Baracaldo, Ali Anwar

Privacy Regularization: Joint Privacy-Utility Optimization in Text-Generation Models 
Fatemehsadat Mireshghallah, Huseyin A. Inan, Marcello Hasegawa, Victor Ruhle, Taylor Berg-Kirkpatrick and Robert Sim

Revolutionary DoH: Effective DNS Service 
Rintaro Kobayashi

Symbolic Modeling of Micro Services for Intrusion Detection 
William Blair, Federtico Araujo, Teryl Taylor, Jiyong Jang

Twice the Fun: Adapting Unicast Privacy Notions for Group Communication 
Christoph Coijanovic, Christiane Kuhn and Thorsten Strufe