Conferences

Search results

    TitleConferenceSpeaker(s)
    Towards the Detection of Inconsistencies in Public Security Vulnerability ReportsUSENIX Security '19Ying Dong, Wenbo Guo, Yueqi Chen, Xinyu Xing, Yuqing Zhang, Gang Wang
    Robust Website Fingerprinting Through the Cache Occupancy ChannelUSENIX Security '19Anatoly Shusterman, Lachlan Kang, Yarden Haskal, Yosef Meltser, Prateek Mittal, Yossi Oren, Yuval Yarom
    XONN: XNOR-based Oblivious Deep Neural Network InferenceUSENIX Security '19M. Sadegh Riazi, Mohammad Samragh, Hao Chen, Kim Laine, Kristin Lauter, Farinaz Koushanfar
    “Johnny, you are fired!” – Spoofing OpenPGP and S/MIME Signatures in EmailsUSENIX Security '19Jens Müller, Marcus Brinkmann, Damian Poddebniak, Hanno Böck, Sebastian Schinzel, Juraj Somorovsky, Jörg Schwenk
    TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and TimeUSENIX Security '19Feargus Pendlebury, Fabio Pierazzi, Roberto Jordaney, Johannes Kinder, Lorenzo Cavallaro
    Scalable Scanning and Automatic Classification of TLS Padding Oracle VulnerabilitiesUSENIX Security '19Robert Merget, Juraj Somorovsky, Nimrod Aviram, Craig Young, Janis Fliegenschmidt, Jörg Schwenk, Yuval Shavitt
    When the Signal is in the Noise: Exploiting Diffix's Sticky NoiseUSENIX Security '19Andrea Gadotti, Florimond Houssiau, Luc Rocher, Benjamin Livshits, Yves-Alexandre de Montjoye
    AntiFuzz: Impeding Fuzzing Audits of Binary ExecutablesUSENIX Security '19Emre Güler, Cornelius Aschermann, Ali Abbasi, Thorsten Holz
    Computer Security and Privacy in the Interactions Between Victim Service Providers and Human Trafficking SurvivorsUSENIX Security '19Christine Chen, Nicola Dell, Franziska Roesner
    UWB-ED: Distance Enlargement Attack Detection in Ultra-WidebandUSENIX Security '19Mridula Singh, Patrick Leu, AbdelRahman Abdou, Srdjan Capkun
    The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDRUSENIX Security '19Daniele Antonioli, Nils Ole Tippenhauer, Kasper B. Rasmussen
    Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic TechniquesUSENIX Security '19Fabio Pagani, Davide Balzarotti
    Point Break: A Study of Bandwidth Denial-of-Service Attacks against TorUSENIX Security '19Rob Jansen, Tavish Vaidya, Micah Sherr
    Reading the Tea leaves: A Comparative Analysis of Threat IntelligenceUSENIX Security '19Vector Guo Li, Matthew Dunn, Paul Pearce, Damon McCoy, Geoffrey M. Voelker, Stefan Savage
    Rendered Private: Making GLSL Execution Uniform to Prevent WebGL-based Browser FingerprintingUSENIX Security '19Shujiang Wu, Song Li, Yinzhi Cao, Ningfei Wang
    The CrossPath Attack: Disrupting the SDN Control Channel via Shared LinksUSENIX Security '19Jiahao Cao, Qi Li, Renjie Xie, Kun Sun, Guofei Gu, Mingwei Xu, Yuan Yang
    A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct LinkUSENIX Security '19Milan Stute, Sashank Narain, Alex Mariotto, Alexander Heinrich, David Kreitschmann, Guevara Noubir, Matthias Hollick
    BITE: Bitcoin Lightweight Client Privacy using Trusted ExecutionUSENIX Security '19Sinisa Matetic, Karl Wüst, Moritz Schneider, Kari Kostiainen, Ghassan Karame, Srdjan Capkun
    PAC it up: Towards Pointer Integrity using ARM Pointer AuthenticationUSENIX Security '19Hans Liljestrand, Thomas Nyman, Kui Wang, Carlos Chinea Perez, Jan-Erik Ekberg, N. Asokan
    Enhancing Privacy through an Interactive On-demand Incremental Information Disclosure Interface: Applying Privacy-by-Design to Record LinkageSOUPS 2019Hye-Chung Kum, Eric D. Ragan, Gurudev Ilangovan, Mahin Ramezani, Qinbo Li, Cason Schmit
    Evaluating Users’ Perceptions about a System’s Privacy: Differentiating Social and Institutional AspectsSOUPS 2019Oshrat Ayalon, Eran Toch
    From Usability to Secure Computing and Back AgainSOUPS 2019Lucy Qin, Andrei Lapets, Frederick Jansen, Peter Flockhart, Kinan Dak Albab, Ira Globus-Harris, Shannon Roberts, Mayank Varia
    Personal Information Leakage by Abusing the GDPR 'Right of Access'SOUPS 2019Mariano Di Martino, Pieter Robyns, Winnie Weyts, Peter Quax, Wim Lamotte, Ken Andries
    "We Can't Live Without Them!" App Developers' Adoption of Ad Networks and Their Considerations of Consumer RisksSOUPS 2019Abraham H. Mhaidli, Yixin Zou, Florian Schaub
    A Self-Report Measure of End-User Security Attitudes (SA-6)SOUPS 2019Cori Faklaris, Laura A. Dabbish, Jason I. Hong

Pages