Search results

    Estonian Electronic Identity Card: Security Flaws in Key ManagementUSENIX Security '20
    The Unpatchable Silicon: A Full Break of the Bitstream Encryption of Xilinx 7-Series FPGAsUSENIX Security '20Maik Ender, Amir Moradi, Christof Paar
    Automating the Development of Chosen Ciphertext AttacksUSENIX Security '20Gabrielle Beck, Maximilian Zinkus, Matthew Green
    Big Numbers - Big Troubles: Systematically Analyzing Nonce Leakage in (EC)DSA ImplementationsUSENIX Security '20
    SHA-1 is a Shambles: First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of TrustUSENIX Security '20
    A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman ProtocolsUSENIX Security '20Guillaume Girol, Lucca Hirschi, Ralf Sasse, Dennis Jackson, Cas Cremers, David Basin
    An Observational Investigation of Reverse Engineers’ ProcessesUSENIX Security '20
    The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity ForumsUSENIX Security '20
    DatashareNetwork: A Decentralized Privacy-Preserving Search Engine for Investigative JournalistsUSENIX Security '20
    "I am uncomfortable sharing what I can't see": Privacy Concerns of the Visually Impaired with Camera Based Assistive ApplicationsUSENIX Security '20Taslima Akter, Bryan Dosono, Tousif Ahmed, Apu Kapadia, Bryan Semaan
    'I have too much respect for my elders': Understanding South African Mobile Users' Perceptions of Privacy and Current Behaviors on Facebook and WhatsAppUSENIX Security '20Jake Reichel, Fleming Peck, Mikako Inaba, Bisrat Moges, Brahmnoor Singh Chawla, Marshini Chetty
    RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache AttacksUSENIX Security '20Samira Briongos, Pedro Malagón, José M. Moya, Thomas Eisenbarth
    Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote ConnectionsUSENIX Security '20
    Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN ArchitecturesUSENIX Security '20
    Certified Side ChannelsUSENIX Security '20
    NetWarden: Mitigating Network Covert Channels while Preserving PerformanceUSENIX Security '20Jiarong Xing, Qiao Kang, Ang Chen
    Scaling Verifiable Computation Using Efficient Set AccumulatorsUSENIX Security '20
    Pixel: Multi-signatures for ConsensusUSENIX Security '20
    SANNS: Scaling Up Secure Approximate k-Nearest Neighbors SearchUSENIX Security '20Hao Chen, Ilaria Chillotti, Yihe Dong, Oxana Poburinnaya, Ilya Razenshteyn, M. Sadegh Riazi
    MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKsUSENIX Security '20Ahmed Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Dawn Song
    Secure Multi-party Computation of Differentially Private MedianUSENIX Security '20
    That Was Then, This Is Now: A Security Evaluation of Password Generation, Storage, and Autofill in Browser-Based Password ManagersUSENIX Security '20
    Composition Kills: A Case Study of Email Sender AuthenticationUSENIX Security '20Jianjun Chen, Vern Paxson, Jian Jiang
    Detecting Stuffing of a User’s Credentials at Her Own AccountsUSENIX Security '20Ke Coby Wang, Michael K. Reiter
    Liveness is Not Enough: Enhancing Fingerprint Authentication with Behavioral Biometrics to Defeat Puppet AttacksUSENIX Security '20Cong Wu, Kun He, Jing Chen, Ziming Zhao, Ruiying Du