Search results

    Can Systems Explain Permissions Better? Understanding Users' Misperceptions under Smartphone Runtime Permission ModelUSENIX Security '21Bingyu Shen, Lili Wei, Chengcheng Xiang, Yudong Wu, Mingyao Shen, Yuanyuan Zhou, Xinxin Jin
    EVMPatch: Timely and Automated Patching of Ethereum Smart ContractsUSENIX Security '21Michael Rodler, Wenting Li, Ghassan O. Karame, Lucas Davi
    DOLMA: Securing Speculation with the Principle of Transient Non-ObservabilityUSENIX Security '21Kevin Loughlin, Ian Neal, Jiacheng Ma, Elisa Tsai, Ofir Weisse, Satish Narayanasamy, Baris Kasikci
    Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized ApplicationsUSENIX Security '21Liya Su, Xinyue Shen, Xiangyu Du, Xiaojing Liao, XiaoFeng Wang, Luyi Xing, Baoxu Liu
    PTAuth: Temporal Memory Safety via Robust Points-to AuthenticationUSENIX Security '21Reza Mirzazade Farkhani, Mansour Ahmadi, Long Lu
    VoltPillager: Hardware-based fault injection attacks against Intel SGX Enclaves using the SVID voltage scaling interfaceUSENIX Security '21Zitai Chen, Georgios Vasilakis, Kit Murdock, Edward Dean, David Oswald, Flavio D. Garcia
    Identifying Harmful Media in End-to-End Encrypted Communication: Efficient Private Membership ComputationUSENIX Security '21Anunay Kulshrestha, Jonathan Mayer
    " quiet!" Reducing the Unwanted Interruptions of Notification Permission Prompts on ChromeUSENIX Security '21Igor Bilogrevic, Balazs Engedy, Judson L. Porter III, Nina Taft, Kamila Hasanbega, Andrew Paseltiner, Hwi Kyoung Lee, Edward Jung, Meggyn Watkins, PJ McLachlan, Jason James
    Smart Contract Vulnerabilities: Vulnerable Does Not Imply ExploitedUSENIX Security '21Daniel Perez, Benjamin Livshits
    PEARL: Plausibly Deniable Flash Translation Layer using WOM codingUSENIX Security '21Chen Chen, Anrin Chakraborti, Radu Sion
    CURE: A Security Architecture with CUstomizable and Resilient EnclavesUSENIX Security '21Raad Bahmani, Ferdinand Brasser, Ghada Dessouky, Patrick Jauernig, Matthias Klimmek, Ahmad-Reza Sadeghi, Emmanuel Stapf
    PrivSyn: Differentially Private Data SynthesisUSENIX Security '21Zhikun Zhang, Tianhao Wang, Ninghui Li, Jean Honorio, Michael Backes, Shibo He, Jiming Chen, Yang Zhang
    A Large-Scale Interview Study on Information Security in and Attacks against Small and Medium-sized EnterprisesUSENIX Security '21Nicolas Huaman, Bennet von Skarczinski, Christian Stransky, Dominik Wermke, Yasemin Acar, Arne Dreißigacker, Sascha Fahl
    Examining the Efficacy of Decoy-based and Psychological Cyber DeceptionUSENIX Security '21Kimberly J. Ferguson-Walter, Maxine M. Major, Chelsea K. Johnson, Daniel H. Muhleman
    Does logic locking work with EDA tools?USENIX Security '21Zhaokun Han, Muhammad Yasin, Jeyavijayan (JV) Rajendran
    Data Poisoning Attacks to Local Differential Privacy ProtocolsUSENIX Security '21Xiaoyu Cao, Jinyuan Jia, Neil Zhenqiang Gong
    How to Make Private Distributed Cardinality Estimation Practical, and Get Differential Privacy for FreeUSENIX Security '21Changhui Hu, Jin Li, Zheli Liu, Xiaojie Guo, Yu Wei, Xuan Guang, Grigorios Loukides, Changyu Dong
    Helping Users Automatically Find and Manage Sensitive, Expendable Files in Cloud StorageUSENIX Security '21Mohammad Taha Khan, Christopher Tran, Shubham Singh, Dimitri Vasilkov, Chris Kanich, Blase Ur, Elena Zheleva
    Coco: Co-Design and Co-Verification of Masked Software Implementations on CPUsUSENIX Security '21Barbara Gigerl, Vedad Hadzic, Robert Primas, Stefan Mangard, Roderick Bloem
    Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic DictionariesUSENIX Security '21Dario Pasquini, Marco Cianfriglia, Giuseppe Ateniese, Massimo Bernaschi
    Using Amnesia to Detect Credential Database BreachesUSENIX Security '21Ke Coby Wang, Michael K. Reiter
    SMASH: Synchronized Many-sided Rowhammer Attacks from JavaScriptUSENIX Security '21Finn de Ridder, Pietro Frigo, Emanuele Vannacci, Herbert Bos, Cristiano Giuffrida, Kaveh Razavi
    Swivel: Hardening WebAssembly against SpectreUSENIX Security '21Shravan Narayan, Craig Disselkoen, Daniel Moghimi, Sunjay Cauligi, Evan Johnson, Zhao Gang, Anjo Vahldiek-Oberwagner, Ravi Sahita, Hovav Shacham, Dean Tullsen, Deian Stefan
    On the Routing-Aware Peering against Network-Eclipse Attacks in BitcoinUSENIX Security '21Muoi Tran, Akshaye Shenoi, Min Suk Kang
    MIRAGE: Mitigating Conflict-Based Cache Attacks with a Practical Fully-Associative DesignUSENIX Security '21Gururaj Saileshwar, Moinuddin Qureshi