| HardFails: Insights into Software-Exploitable Hardware Bugs | USENIX Security '19 | Ghada Dessouky, David Gens, Patrick Haney, Garrett Persyn, Arun Kanuparthi, Hareesh Khattri, Jason M. Fung, Ahmad-Reza Sadeghi, Jeyavijayan Rajendran |
| Understanding and Securing Device Vulnerabilities through Automated Bug Report Analysis | USENIX Security '19 | Xuan Feng, Xiaojing Liao, XiaoFeng Wang, Haining Wang, Qiang Li, Kai Yang, Hongsong Zhu, Limin Sun |
| The Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts | USENIX Security '19 | Christof Ferreira Torres, Mathis Steichen, Radu State |
| DEEPVSA: Facilitating Value-set Analysis with Deep Learning for Postmortem Program Analysis | USENIX Security '19 | Wenbo Guo, Dongliang Mu, Xinyu Xing, Min Du, Dawn Song |
| Clinical Computer Security for Victims of Intimate Partner Violence | USENIX Security '19 | Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, Thomas Ristenpart |
| Detecting and Characterizing Lateral Phishing at Scale | USENIX Security '19 | Grant Ho, Asaf Cidon, Lior Gavish, Marco Schweighauser, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David Wagner |
| Terminal Brain Damage: Exposing the Graceless Degradation in Deep Neural Networks Under Hardware Fault Attacks | USENIX Security '19 | Sanghyun Hong, Pietro Frigo, Yiğitcan Kaya, Cristiano Giuffrida, Tudor Dumitraș |
| Not Everything is Dark and Gloomy: Power Grid Protections Against IoT Demand Attacks | USENIX Security '19 | Bing Huang, Alvaro A. Cardenas, Ross Baldick |
| SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks | USENIX Security '19 | Saad Islam, Ahmad Moghimi, Ida Bruhns, Moritz Krebbel, Berk Gulmezoglu, Thomas Eisenbarth, Berk Sunar |
| Evaluating Differentially Private Machine Learning in Practice | USENIX Security '19 | Bargav Jayaraman, David Evans |
| Mobile Private Contact Discovery at Scale | USENIX Security '19 | Daniel Kales, Christian Rechberger, Thomas Schneider, Matthias Senker, Christian Weinert |
| Origin-sensitive Control Flow Integrity | USENIX Security '19 | Mustakimur Rahman Khandaker, Wenqing Liu, Abu Naser, Zhi Wang, Jie Yang |
| RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through Control-Guided Testing | USENIX Security '19 | Taegyu Kim, Chung Hwan Kim, Junghwan Rhee, Fan Fei, Zhan Tu, Gregory Walkup, Xiangyu Zhang, Xinyan Deng, Dongyan Xu |
| From IP ID to Device ID and KASLR Bypass | USENIX Security '19 | Amit Klein, Benny Pinkas |
| CANvas: Fast and Inexpensive Automotive Network Mapping | USENIX Security '19 | Sekar Kulandaivel, Tushar Goyal, Arnav Kumar Agrawal, Vyas Sekar |
| JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT | USENIX Security '19 | Sam Kumar, Yuncong Hu, Michael P Andersen, Raluca Ada Popa, David E. Culler |
| All Things Considered: An Analysis of IoT Devices on Home Networks | USENIX Security '19 | Deepak Kumar, Kelly Shen, Benton Case, Deepali Garg, Galina Alperovich, Dmitry Kuznetsov, Rajarshi Gupta, Zakir Durumeric |
| uXOM: Efficient eXecute-Only Memory on ARM Cortex-M | USENIX Security '19 | Donghyun Kwon, Jangseop Shin, Giyeol Kim, Byoungyoung Lee, Yeongpil Cho, Yunheung Paek |
| Understanding iOS-based Crowdturfing Through Hidden UI Analysis | USENIX Security '19 | Yeonjoon Lee, Xueqiang Wang, Kwangwuk Lee, Xiaojing Liao, XiaoFeng Wang, Tongxin Li, Xianghang Mi |
| Fuzzification: Anti-Fuzzing Techniques | USENIX Security '19 | Jinho Jung, Hong Hu, David Solodukhin, Daniel Pagan, Kyu Hyung Lee, Taesoo Kim |
| Leaky Images: Targeted Privacy Attacks in the Web | USENIX Security '19 | Cristian-Alexandru Staicu, Michael Pradel |
| All Your Clicks Belong to Me: Investigating Click Interception on the Web | USENIX Security '19 | Mingxue Zhang, Wei Meng, Sangho Lee, Byoungyoung Lee, Xinyu Xing |
| Evaluating the Contextual Integrity of Privacy Regulation: Parents' IoT Toy Privacy Norms Versus COPPA | USENIX Security '19 | Noah Apthorpe, Sarah Varghese, Nick Feamster |
| Stack Overflow Considered Helpful! Deep Learning Security Nudges Towards Stronger Cryptography | USENIX Security '19 | Felix Fischer, Huang Xiao, Ching-Yu Kao, Yannick Stachelscheid, Benjamin Johnson, Danial Razar, Paul Fawkesley, Nat Buckley, Konstantin Böttinger, Paul Muntean, Jens Grossklags |
| FastKitten: Practical Smart Contracts on Bitcoin | USENIX Security '19 | Poulami Das, Lisa Eckey, Tommaso Frassetto, David Gens, Kristina Hostáková, Patrick Jauernig, Sebastian Faust, Ahmad-Reza Sadeghi |