USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 34 results:
Filters: Author is David Wagner [Clear All Filters]
Continuous Learning for Android Malware Detection. 32nd USENIX Security Symposium (USENIX Security 23). :1127--1144.
.
2023. Network Detection of Interactive SSH Impostors Using Deep Learning. 32nd USENIX Security Symposium (USENIX Security 23). :4283--4300.
.
2023. Runtime Permissions for Privacy in Proactive Intelligent Assistants. Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022). :633--651.
.
2022. Hopper: Modeling and Detecting Lateral Movement. 30th USENIX Security Symposium (USENIX Security 21). :3093--3110.
.
2021. Detecting and Characterizing Lateral Phishing at Scale. 28th USENIX Security Symposium (USENIX Security 19). :1273--1290.
.
2019. Detecting Credential Spearphishing in Enterprise Settings. 26th USENIX Security Symposium (USENIX Security 17). :469--485.
.
2017. Oscar: A Practical Page-Permissions-Based Scheme for Thwarting Dangling Pointers. 26th USENIX Security Symposium (USENIX Security 17). :815--832.
.
2017. Turtle Guard: Helping Android Users Apply Contextual Privacy Preferences. Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). :145--162.
.
2017. Hidden Voice Commands. 25th USENIX Security Symposium (USENIX Security 16). :513--530.
.
2016. Recovering High-Value Secrets with SGX and Social Authentication. Twelfth Symposium on Usable Privacy and Security (SOUPS 2016).
.
2016. Android Permissions Remystified: A Field Study on Contextual Integrity. 24th USENIX Security Symposium (USENIX Security 15). :499--514.
.
2015. Control-Flow Bending: On the Effectiveness of Control-Flow Integrity. 24th USENIX Security Symposium (USENIX Security 15). :161--176.
.
2015. ROP is Still Dangerous: Breaking Modern Defenses. 23rd USENIX Security Symposium (USENIX Security 14). :385--399.
.
2014. An Empirical Study of Vulnerability Rewards Programs. 22nd USENIX Security Symposium (USENIX Security 13). :273--288.
.
2013. Improved Support for Machine-assisted Ballot-level Audits. 2013 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE 13).
.
2013. An Evaluation of the Google Chrome Extension Security Architecture. 21st USENIX Security Symposium (USENIX Security 12). :97--111.
.
2012. An Analysis of Write-in Marks on Optical Scan Ballots. 2011 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE 11).
.
2011. The Effectiveness of Application Permissions. 2nd USENIX Conference on Web Application Development (WebApps 11).
.
2011. Efficient User-Guided Ballot Image Verification. 2010 Electronic Voting Technology Workshop/ Workshop on Trustworthy Elections (EVT/WOTE 10).
.
2010. Weight, Weight, Don't Tell Me: Using Scales to Select Ballots for Auditing. 2009 Electronic Voting Technology Workshop/ Workshop on Trustworthy Elections (EVT/WOTE 09).
.
2009. Portably Solving File TOCTTOU Races with Hardness Amplification. 6th USENIX Conference on File and Storage Technologies (FAST 08).
.
2008. Replayable Voting Machine Audit Logs. 2008 USENIX/ACCURATE Electronic Voting Technology Workshop (EVT 08).
.
2008. The State of Electronic Voting, 2008. 22nd Large Installation System Administration Conference (LISA 08).
.
2008. A User Study Design for Comparing the Security of Registration Protocols. Usability, Psychology, and Security 2008 (UPSEC 08).
.
2008. Report of the California Voting Systems Review. 16th USENIX Security Symposium (USENIX Security 07).
.
2007.