| Towards the Detection of Inconsistencies in Public Security Vulnerability Reports | USENIX Security '19 | Ying Dong, Wenbo Guo, Yueqi Chen, Xinyu Xing, Yuqing Zhang, Gang Wang |
| Robust Website Fingerprinting Through the Cache Occupancy Channel | USENIX Security '19 | Anatoly Shusterman, Lachlan Kang, Yarden Haskal, Yosef Meltser, Prateek Mittal, Yossi Oren, Yuval Yarom |
| XONN: XNOR-based Oblivious Deep Neural Network Inference | USENIX Security '19 | M. Sadegh Riazi, Mohammad Samragh, Hao Chen, Kim Laine, Kristin Lauter, Farinaz Koushanfar |
| “Johnny, you are fired!” – Spoofing OpenPGP and S/MIME Signatures in Emails | USENIX Security '19 | Jens Müller, Marcus Brinkmann, Damian Poddebniak, Hanno Böck, Sebastian Schinzel, Juraj Somorovsky, Jörg Schwenk |
| TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time | USENIX Security '19 | Feargus Pendlebury, Fabio Pierazzi, Roberto Jordaney, Johannes Kinder, Lorenzo Cavallaro |
| Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities | USENIX Security '19 | Robert Merget, Juraj Somorovsky, Nimrod Aviram, Craig Young, Janis Fliegenschmidt, Jörg Schwenk, Yuval Shavitt |
| When the Signal is in the Noise: Exploiting Diffix's Sticky Noise | USENIX Security '19 | Andrea Gadotti, Florimond Houssiau, Luc Rocher, Benjamin Livshits, Yves-Alexandre de Montjoye |
| AntiFuzz: Impeding Fuzzing Audits of Binary Executables | USENIX Security '19 | Emre Güler, Cornelius Aschermann, Ali Abbasi, Thorsten Holz |
| Computer Security and Privacy in the Interactions Between Victim Service Providers and Human Trafficking Survivors | USENIX Security '19 | Christine Chen, Nicola Dell, Franziska Roesner |
| UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband | USENIX Security '19 | Mridula Singh, Patrick Leu, AbdelRahman Abdou, Srdjan Capkun |
| The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR | USENIX Security '19 | Daniele Antonioli, Nils Ole Tippenhauer, Kasper B. Rasmussen |
| Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques | USENIX Security '19 | Fabio Pagani, Davide Balzarotti |
| Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor | USENIX Security '19 | Rob Jansen, Tavish Vaidya, Micah Sherr |
| Reading the Tea leaves: A Comparative Analysis of Threat Intelligence | USENIX Security '19 | Vector Guo Li, Matthew Dunn, Paul Pearce, Damon McCoy, Geoffrey M. Voelker, Stefan Savage |
| Rendered Private: Making GLSL Execution Uniform to Prevent WebGL-based Browser Fingerprinting | USENIX Security '19 | Shujiang Wu, Song Li, Yinzhi Cao, Ningfei Wang |
| The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links | USENIX Security '19 | Jiahao Cao, Qi Li, Renjie Xie, Kun Sun, Guofei Gu, Mingwei Xu, Yuan Yang |
| A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link | USENIX Security '19 | Milan Stute, Sashank Narain, Alex Mariotto, Alexander Heinrich, David Kreitschmann, Guevara Noubir, Matthias Hollick |
| BITE: Bitcoin Lightweight Client Privacy using Trusted Execution | USENIX Security '19 | Sinisa Matetic, Karl Wüst, Moritz Schneider, Kari Kostiainen, Ghassan Karame, Srdjan Capkun |
| PAC it up: Towards Pointer Integrity using ARM Pointer Authentication | USENIX Security '19 | Hans Liljestrand, Thomas Nyman, Kui Wang, Carlos Chinea Perez, Jan-Erik Ekberg, N. Asokan |
| Enhancing Privacy through an Interactive On-demand Incremental Information Disclosure Interface: Applying Privacy-by-Design to Record Linkage | SOUPS 2019 | Hye-Chung Kum, Eric D. Ragan, Gurudev Ilangovan, Mahin Ramezani, Qinbo Li, Cason Schmit |
| Evaluating Users’ Perceptions about a System’s Privacy: Differentiating Social and Institutional Aspects | SOUPS 2019 | Oshrat Ayalon, Eran Toch |
| From Usability to Secure Computing and Back Again | SOUPS 2019 | Lucy Qin, Andrei Lapets, Frederick Jansen, Peter Flockhart, Kinan Dak Albab, Ira Globus-Harris, Shannon Roberts, Mayank Varia |
| Personal Information Leakage by Abusing the GDPR 'Right of Access' | SOUPS 2019 | Mariano Di Martino, Pieter Robyns, Winnie Weyts, Peter Quax, Wim Lamotte, Ken Andries |
| "We Can't Live Without Them!" App Developers' Adoption of Ad Networks and Their Considerations of Consumer Risks | SOUPS 2019 | Abraham H. Mhaidli, Yixin Zou, Florian Schaub |
| A Self-Report Measure of End-User Security Attitudes (SA-6) | SOUPS 2019 | Cori Faklaris, Laura A. Dabbish, Jason I. Hong |