| Stealing Links from Graph Neural Networks | USENIX Security '21 | Xinlei He, Jinyuan Jia, Michael Backes, Neil Zhenqiang Gong, Yang Zhang |
| SHARD: Fine-Grained Kernel Specialization with Context-Aware Hardening | USENIX Security '21 | Muhammad Abubakar, Adil Ahmad, Pedro Fonseca, Dongyan Xu |
| Detecting Kernel Refcount Bugs with Two-Dimensional Consistency Checking | USENIX Security '21 | Xin Tan, Yuan Zhang, Xiyu Yang, Kangjie Lu, Min Yang |
| PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack Operations in Android Systems | USENIX Security '21 | Yu-Tsung Lee, William Enck, Haining Chen, Hayawardh Vijayakumar, Ninghui Li, Zhiyun Qian, Daimeng Wang, Giuseppe Petracca, Trent Jaeger |
| PatchGuard: A Provably Robust Defense against Adversarial Patches via Small Receptive Fields and Masking | USENIX Security '21 | Chong Xiang, Arjun Nitin Bhagoji, Vikash Sehwag, Prateek Mittal |
| Privacy and Integrity Preserving Computations with CRISP | USENIX Security '21 | Sylvain Chatel, Apostolos Pyrgelis, Juan Ramón Troncoso-Pastoriza, Jean-Pierre Hubaux |
| Senate: A Maliciously-Secure MPC Platform for Collaborative Analytics | USENIX Security '21 | Rishabh Poddar, Sukrit Kalra, Avishay Yanai, Ryan Deng, Raluca Ada Popa, Joseph M. Hellerstein |
| Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic Privacy | USENIX Security '21 | Saba Eskandarian, Henry Corrigan-Gibbs, Matei Zaharia, Dan Boneh |
| KeyForge: Non-Attributable Email from Forward-Forgeable Signatures | USENIX Security '21 | Michael A. Specter, Sunoo Park, Matthew Green |
| You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion | USENIX Security '21 | Roei Schuster, Congzheng Song, Eran Tromer, Vitaly Shmatikov |
| ARCUS: Symbolic Root Cause Analysis of Exploits in Production Systems | USENIX Security '21 | Carter Yagemann, Matthew Pruett, Simon P. Chung, Kennon Bittick, Brendan Saltaformaggio, Wenke Lee |
| Virtual Secure Platform: A Five-Stage Pipeline Processor over TFHE | USENIX Security '21 | Kotaro Matsuoka, Ryotaro Banno, Naoki Matsumoto, Takashi Sato, Song Bian |
| ReDMArk: Bypassing RDMA Security Mechanisms | USENIX Security '21 | Benjamin Rothenberger, Konstantin Taranov, Adrian Perrig, Torsten Hoefler |
| Ripple: A Programmable, Decentralized Link-Flooding Defense Against Adaptive Adversaries | USENIX Security '21 | Jiarong Xing, Wenqing Wu, Ang Chen |
| A Stealthy Location Identification Attack Exploiting Carrier Aggregation in Cellular Networks | USENIX Security '21 | Nitya Lakshmanan, Nishant Budhdev, Min Suk Kang, Mun Choon Chan, Jun Han |
| Automatic Policy Generation for Inter-Service Access Control of Microservices | USENIX Security '21 | Xing Li, Yan Chen, Zhiqiang Lin, Xiao Wang, Jim Hao Chen |
| Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks | USENIX Security '21 | Kaiwen Shen, Chuhan Wang, Minglei Guo, Xiaofeng Zheng, Chaoyi Lu, Baojun Liu, Yuxuan Zhao, Shuang Hao, Haixin Duan, Qingfeng Pan, Min Yang |
| ATLAS: A Sequence-based Learning Approach for Attack Investigation | USENIX Security '21 | Abdulellah Alsaheel, Yuhong Nan, Shiqing Ma, Le Yu, Gregory Walkup, Z. Berkay Celik, Xiangyu Zhang, Dongyan Xu |
| Security Analysis of the Democracy Live Online Voting System | USENIX Security '21 | Michael Specter, J. Alex Halderman |
| Domain Shadowing: Leveraging Content Delivery Networks for Robust Blocking-Resistant Communications | USENIX Security '21 | Mingkui Wei |
| mID: Tracing Screen Photos via Moiré Patterns | USENIX Security '21 | Yushi Cheng, Xiaoyu Ji, Lixu Wang, Qi Pang, Yi-Chao Chen, Wenyuan Xu |
| Accurately Measuring Global Risk of Amplification Attacks using AmpMap | USENIX Security '21 | Soo-Jin Moon, Yucheng Yin, Rahul Anand Sharma, Yifei Yuan, Jonathan M. Spring, Vyas Sekar |
| CADE: Detecting and Explaining Concept Drift Samples for Security Applications | USENIX Security '21 | Limin Yang, Wenbo Guo, Qingying Hao, Arridhana Ciptadi, Ali Ahmadzadeh, Xinyu Xing, Gang Wang |
| Adversarial Policy Training against Deep Reinforcement Learning | USENIX Security '21 | Xian Wu, Wenbo Guo, Hua Wei, Xinyu Xing |
| ReDoSHunter: A Combined Static and Dynamic Approach for Regular Expression DoS Detection | USENIX Security '21 | Yeting Li, Zixuan Chen, Jialun Cao, Zhiwu Xu, Qiancheng Peng, Haiming Chen, Liyuan Chen, Shing-Chi Cheung |