USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 10 results:
Filters: Author is William Robertson [Clear All Filters]
Cached and Confused: Web Cache Deception in the Wild. 29th USENIX Security Symposium (USENIX Security 20). :665--682.
.
2020. What's in an Exploit? An Empirical Analysis of Reflected Server XSS Exploitation Techniques 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). :107--120.
.
2020. USBESAFE: An End-Point Solution to Protect Against USB-Based Attacks. 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019). :89--103.
.
2019. Game of Registrars: An Empirical Analysis of Post-Expiration Domain Name Takeovers. 26th USENIX Security Symposium (USENIX Security 17). :865--880.
.
2017. Tracing Information Flows Between Ad Exchanges Using Retargeted Ads. 25th USENIX Security Symposium (USENIX Security 16). :481--496.
.
2016. UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware. 25th USENIX Security Symposium (USENIX Security 16). :757--772.
.
2016. ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities. 24th USENIX Security Symposium (USENIX Security 15). :737--752.
.
2015. Automating Mimicry Attacks Using Static Binary Analysis. 14th USENIX Security Symposium (USENIX Security 05).
.
2005. Static Disassembly of Obfuscated Binaries. 13th USENIX Security Symposium (USENIX Security 04).
.
2004. Run-time Detection of Heap-based Overflows. 17th Large Installation Systems Administration Conference (LISA 03).
.
2003.