| V0Finder: Discovering the Correct Origin of Publicly Reported Software Vulnerabilities | USENIX Security '21 | Seunghoon Woo, Dongwook Lee, Sunghan Park, Heejo Lee, Sven Dietrich |
| CIPHERLEAKS: Breaking Constant-time Cryptography on AMD SEV via the Ciphertext Side Channel | USENIX Security '21 | Mengyuan Li, Yinqian Zhang, Huibo Wang, Kang Li, Yueqiang Cheng |
| MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols | USENIX Security '21 | Qinying Wang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Yuhong Kan, Zhaowei Lin, Changting Lin, Shuiguang Deng, Alex X. Liu, Raheem Beyah |
| Why TLS is better without STARTTLS: A Security Analysis of STARTTLS in the Email Context | USENIX Security '21 | Damian Poddebniak, Fabian Ising, Hanno Böck, Sebastian Schinzel |
| FlowDist: Multi-Staged Refinement-Based Dynamic Information Flow Analysis for Distributed Software Systems | USENIX Security '21 | Xiaoqin Fu, Haipeng Cai |
| Minerva– An Efficient Risk-Limiting Ballot Polling Audit | USENIX Security '21 | Filip Zagórski, Grant McClearn, Sarah Morin, Neal McBurnett, Poorvi L. Vora |
| The Complexities of Healing in Secure Group Messaging: Why Cross-Group Effects Matter | USENIX Security '21 | Cas Cremers, Britta Hale, Konrad Kohbrok |
| Blind Backdoors in Deep Learning Models | USENIX Security '21 | Eugene Bagdasaryan, Vitaly Shmatikov |
| Once is Never Enough: Foundations for Sound Statistical Inference in Tor Network Experimentation | USENIX Security '21 | Rob Jansen, Justin Tracey, Ian Goldberg |
| Stars Can Tell: A Robust Method to Defend against GPS Spoofing Attacks using Off-the-shelf Chipset | USENIX Security '21 | Shinan Liu, Xiang Cheng, Hanchao Yang, Yuanchao Shu, Xiaoran Weng, Ping Guo, Kexiong (Curtis) Zeng, Gang Wang, Yaling Yang |
| People Count: Contact Tracing Apps and Public Health | USENIX Security '21 | Susan Landau |
| Towards Formal Verification of State Continuity for Enclave Programs | USENIX Security '21 | Mohit Kumar Jangid, Guoxing Chen, Yinqian Zhang, Zhiqiang Lin |
| Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications to Machine Learning | USENIX Security '21 | Chenkai Weng, Kang Yang, Xiang Xie, Jonathan Katz, Xiao Wang |
| Database Reconstruction from Noisy Volumes: A Cache Side-Channel Attack on SQLite | USENIX Security '21 | Aria Shahverdi, Mahammad Shirinov, Dana Dachman-Soled |
| Incrementally Updateable Honey Password Vaults | USENIX Security '21 | Haibo Cheng, Wenting Li, Ping Wang, Chao-Hsien Chu, Kaitai Liang |
| A Highly Accurate Query-Recovery Attack against Searchable Encryption using Non-Indexed Documents | USENIX Security '21 | Marc Damie, Florian Hahn, Andreas Peter |
| ELISE: A Storage Efficient Logging System Powered by Redundancy Reduction and Representation Learning | USENIX Security '21 | Hailun Ding, Shenao Yan, Juan Zhai, Shiqing Ma |
| Frontrunner Jones and the Raiders of the Dark Forest: An Empirical Study of Frontrunning on the Ethereum Blockchain | USENIX Security '21 | Christof Ferreira Torres, Ramiro Camino, Radu State |
| Dynamic proofs of retrievability with low server storage | USENIX Security '21 | Gaspard Anthoine, Jean-Guillaume Dumas, Mélanie de Jonghe, Aude Maignan, Clément Pernet, Michael Hanling, Daniel S. Roche |
| When Malware Changed Its Mind: An Empirical Study of Variable Program Behaviors in the Real World | USENIX Security '21 | Erin Avllazagaj, Ziyun Zhu, Leyla Bilge, Davide Balzarotti, Tudor Dumitraș |
| Dompteur: Taming Audio Adversarial Examples | USENIX Security '21 | Thorsten Eisenhofer, Lea Schönherr, Joel Frank, Lars Speckemeier, Dorothea Kolossa, Thorsten Holz |
| Dirty Road Can Attack: Security of Deep Learning based Automated Lane Centering under Physical-World Attack | USENIX Security '21 | Takami Sato, Junjie Shen, Ningfei Wang, Yunhan Jia, Xue Lin, Qi Alfred Chen |
| Double-Cross Attacks: Subverting Active Learning Systems | USENIX Security '21 | Jose Rodrigo Sanchez Vicarte, Gang Wang, Christopher W. Fletcher |
| DEFInit: An Analysis of Exposed Android Init Routines | USENIX Security '21 | Yuede Ji, Mohamed Elsabagh, Ryan Johnson, Angelos Stavrou |
| Reducing Test Cases with Attention Mechanism of Neural Networks | USENIX Security '21 | Xing Zhang, Jiongyi Chen, Chao Feng, Ruilin Li, Yunfei Su, Bin Zhang, Jing Lei, Chaojing Tang |