USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 19 results:
Filters: Author is Hovav Shacham [Clear All Filters]
Checking Passwords on Leaky Computers: A Side Channel Analysis of Chrome's Password Leak Detect Protocol. 32nd USENIX Security Symposium (USENIX Security 23). :7107--7124.
.
2023. The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 Decoders. 32nd USENIX Security Symposium (USENIX Security 23). :6647--6664.
.
2023. Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86. 31st USENIX Security Symposium (USENIX Security 22). :679--697.
.
2022. Swivel: Hardening WebAssembly against Spectre. 30th USENIX Security Symposium (USENIX Security 21). :1433--1450.
.
2021. Retrofitting Fine Grain Isolation in the Firefox Renderer. 29th USENIX Security Symposium (USENIX Security 20). :699--716.
.
2020. On the effectiveness of mitigations against floating-point timing channels. 26th USENIX Security Symposium (USENIX Security 17). :69--81.
.
2017. Trusted Browsers for Uncertain Times. 25th USENIX Security Symposium (USENIX Security 16). :463--480.
.
2016. Mouse Trap: Exploiting Firmware Updates in USB Peripherals. 8th USENIX Workshop on Offensive Technologies (WOOT 14).
.
2014. On the Practical Exploitability of Dual EC in TLS Implementations. 23rd USENIX Security Symposium (USENIX Security 14). :319--335.
.
2014. Security Analysis of a Full-Body Scanner. 23rd USENIX Security Symposium (USENIX Security 14). :369--384.
.
2014. Measuring the Practical Impact of DNSSEC Deployment. 22nd USENIX Security Symposium (USENIX Security 13). :573--588.
.
2013. Comprehensive Experimental Analyses of Automotive Attack Surfaces. 20th USENIX Security Symposium (USENIX Security 11).
.
2011. Opening Remarks. 2011 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE 11).
.
2011. The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion. 20th USENIX Security Symposium (USENIX Security 11).
.
2011. Are Text-Only Data Formats Safe? Or, Use This LaTeX Class File to Pwn Your Computer 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 10).
.
2010. OpenScan: A Fully Transparent Optical Scan Voting System. 2010 Electronic Voting Technology Workshop/ Workshop on Trustworthy Elections (EVT/WOTE 10).
.
2010. Welcome. 4th USENIX Workshop on Offensive Technologies (WOOT 10).
.
2010. Can DREs Provide Long-Lasting Security? The Case of Return-Oriented Programming and the AVC Advantage 2009 Electronic Voting Technology Workshop/ Workshop on Trustworthy Elections (EVT/WOTE 09).
.
2009. You Go to Elections with the Voting System You Have: Stop-Gap Mitigations for Deployed Voting Systems. 2008 USENIX/ACCURATE Electronic Voting Technology Workshop (EVT 08).
.
2008.