Conferences

Search results

    TitleConferenceSpeaker(s)
    Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote ConnectionsUSENIX Security '20
    Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN ArchitecturesUSENIX Security '20
    Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheckUSENIX Security '20
    The Impact of Ad-Blockers on Product Search and Purchase Behavior: A Lab ExperimentUSENIX Security '20Alisa Frik, Amelia Haviland, Alessandro Acquisti
    Certified Side ChannelsUSENIX Security '20
    NetWarden: Mitigating Network Covert Channels while Preserving PerformanceUSENIX Security '20Jiarong Xing, Qiao Kang, Ang Chen
    Scaling Verifiable Computation Using Efficient Set AccumulatorsUSENIX Security '20
    Symbolic execution with SymCC: Don't interpret, compile!USENIX Security '20
    Pixel: Multi-signatures for ConsensusUSENIX Security '20
    Sys: A Static/Symbolic Tool for Finding Good Bugs in Good (Browser) CodeUSENIX Security '20
    SANNS: Scaling Up Secure Approximate k-Nearest Neighbors SearchUSENIX Security '20Hao Chen, Ilaria Chillotti, Yihe Dong, Oxana Poburinnaya, Ilya Razenshteyn, M. Sadegh Riazi
    Visor: Privacy-Preserving Video Analytics as a Cloud ServiceUSENIX Security '20
    Differentially-Private Control-Flow Node Coverage for Software Usage AnalysisUSENIX Security '20
    MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKsUSENIX Security '20Ahmed Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Dawn Song
    Walking Onions: Scaling Anonymity Networks while Protecting UsersUSENIX Security '20
    Secure Multi-party Computation of Differentially Private MedianUSENIX Security '20
    Everything Old is New Again: Binary Security of WebAssemblyUSENIX Security '20
    AURORA: Statistical Crash Analysis for Automated Root Cause ExplanationUSENIX Security '20Tim Blazytko, Moritz Schlögel, Cornelius Aschermann, Ali Abbasi, Joel Frank, Simon Wörner, Thorsten Holz
    That Was Then, This Is Now: A Security Evaluation of Password Generation, Storage, and Autofill in Browser-Based Password ManagersUSENIX Security '20
    Composition Kills: A Case Study of Email Sender AuthenticationUSENIX Security '20Jianjun Chen, Vern Paxson, Jian Jiang
    SmartVerif: Push the Limit of Automation Capability of Verifying Security Protocols by Dynamic StrategiesUSENIX Security '20
    Datalog DisassemblyUSENIX Security '20Antonio Flores-Montoya, Eric Schulte
    Detecting Stuffing of a User’s Credentials at Her Own AccountsUSENIX Security '20Ke Coby Wang, Michael K. Reiter
    KOOBE: Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write VulnerabilitiesUSENIX Security '20
    Liveness is Not Enough: Enhancing Fingerprint Authentication with Behavioral Biometrics to Defeat Puppet AttacksUSENIX Security '20Cong Wu, Kun He, Jing Chen, Ziming Zhao, Ruiying Du

Pages