Conferences

Search results

    TitleConferenceSpeaker(s)
    HardFails: Insights into Software-Exploitable Hardware BugsUSENIX Security '19Ghada Dessouky, David Gens, Patrick Haney, Garrett Persyn, Arun Kanuparthi, Hareesh Khattri, Jason M. Fung, Ahmad-Reza Sadeghi, Jeyavijayan Rajendran
    Understanding and Securing Device Vulnerabilities through Automated Bug Report AnalysisUSENIX Security '19Xuan Feng, Xiaojing Liao, XiaoFeng Wang, Haining Wang, Qiang Li, Kai Yang, Hongsong Zhu, Limin Sun
    The Art of The Scam: Demystifying Honeypots in Ethereum Smart ContractsUSENIX Security '19Christof Ferreira Torres, Mathis Steichen, Radu State
    DEEPVSA: Facilitating Value-set Analysis with Deep Learning for Postmortem Program AnalysisUSENIX Security '19Wenbo Guo, Dongliang Mu, Xinyu Xing, Min Du, Dawn Song
    Clinical Computer Security for Victims of Intimate Partner ViolenceUSENIX Security '19Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, Thomas Ristenpart
    Detecting and Characterizing Lateral Phishing at ScaleUSENIX Security '19Grant Ho, Asaf Cidon, Lior Gavish, Marco Schweighauser, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David Wagner
    Terminal Brain Damage: Exposing the Graceless Degradation in Deep Neural Networks Under Hardware Fault AttacksUSENIX Security '19Sanghyun Hong, Pietro Frigo, Yiğitcan Kaya, Cristiano Giuffrida, Tudor Dumitraș
    Not Everything is Dark and Gloomy: Power Grid Protections Against IoT Demand AttacksUSENIX Security '19Bing Huang, Alvaro A. Cardenas, Ross Baldick
    SPOILER: Speculative Load Hazards Boost Rowhammer and Cache AttacksUSENIX Security '19Saad Islam, Ahmad Moghimi, Ida Bruhns, Moritz Krebbel, Berk Gulmezoglu, Thomas Eisenbarth, Berk Sunar
    Evaluating Differentially Private Machine Learning in PracticeUSENIX Security '19Bargav Jayaraman, David Evans
    Mobile Private Contact Discovery at ScaleUSENIX Security '19Daniel Kales, Christian Rechberger, Thomas Schneider, Matthias Senker, Christian Weinert
    Origin-sensitive Control Flow IntegrityUSENIX Security '19Mustakimur Rahman Khandaker, Wenqing Liu, Abu Naser, Zhi Wang, Jie Yang
    RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through Control-Guided TestingUSENIX Security '19Taegyu Kim, Chung Hwan Kim, Junghwan Rhee, Fan Fei, Zhan Tu, Gregory Walkup, Xiangyu Zhang, Xinyan Deng, Dongyan Xu
    From IP ID to Device ID and KASLR BypassUSENIX Security '19Amit Klein, Benny Pinkas
    CANvas: Fast and Inexpensive Automotive Network MappingUSENIX Security '19Sekar Kulandaivel, Tushar Goyal, Arnav Kumar Agrawal, Vyas Sekar
    JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoTUSENIX Security '19Sam Kumar, Yuncong Hu, Michael P Andersen, Raluca Ada Popa, David E. Culler
    All Things Considered: An Analysis of IoT Devices on Home NetworksUSENIX Security '19Deepak Kumar, Kelly Shen, Benton Case, Deepali Garg, Galina Alperovich, Dmitry Kuznetsov, Rajarshi Gupta, Zakir Durumeric
    uXOM: Efficient eXecute-Only Memory on ARM Cortex-MUSENIX Security '19Donghyun Kwon, Jangseop Shin, Giyeol Kim, Byoungyoung Lee, Yeongpil Cho, Yunheung Paek
    Understanding iOS-based Crowdturfing Through Hidden UI AnalysisUSENIX Security '19Yeonjoon Lee, Xueqiang Wang, Kwangwuk Lee, Xiaojing Liao, XiaoFeng Wang, Tongxin Li, Xianghang Mi
    Fuzzification: Anti-Fuzzing TechniquesUSENIX Security '19Jinho Jung, Hong Hu, David Solodukhin, Daniel Pagan, Kyu Hyung Lee, Taesoo Kim
    Leaky Images: Targeted Privacy Attacks in the WebUSENIX Security '19Cristian-Alexandru Staicu, Michael Pradel
    All Your Clicks Belong to Me: Investigating Click Interception on the WebUSENIX Security '19Mingxue Zhang, Wei Meng, Sangho Lee, Byoungyoung Lee, Xinyu Xing
    Evaluating the Contextual Integrity of Privacy Regulation: Parents' IoT Toy Privacy Norms Versus COPPAUSENIX Security '19Noah Apthorpe, Sarah Varghese, Nick Feamster
    Stack Overflow Considered Helpful! Deep Learning Security Nudges Towards Stronger CryptographyUSENIX Security '19Felix Fischer, Huang Xiao, Ching-Yu Kao, Yannick Stachelscheid, Benjamin Johnson, Danial Razar, Paul Fawkesley, Nat Buckley, Konstantin Böttinger, Paul Muntean, Jens Grossklags
    FastKitten: Practical Smart Contracts on BitcoinUSENIX Security '19Poulami Das, Lisa Eckey, Tommaso Frassetto, David Gens, Kristina Hostáková, Patrick Jauernig, Sebastian Faust, Ahmad-Reza Sadeghi

Pages