Conferences

Search results

    TitleConferenceSpeaker(s)
    Circonus: Design (Failures) Case StudySREcon18 EuropeTheo Schlossnagle, Heinrich Hartmann
    Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB AttacksUSENIX Security '18Ben Gras, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida
    A Sense of Time for JavaScript and Node.js: First-Class Timeouts as a Cure for Event Handler PoisoningUSENIX Security '18James C. Davis, Eric R. Williamson, Dongyoon Lee
    The Broken Shield: Measuring Revocation Effectiveness in the Windows Code-Signing PKIUSENIX Security '18Doowon Kim, Bum Jun Kwon, Kristián Kozák, Christopher Gates, Tudor Dumitraș
    Guarder: A Tunable Secure AllocatorUSENIX Security '18Sam Silvestro, Hongyu Liu, Tianyi Liu, Zhiqiang Lin, Tongping Liu
    teEther: Gnawing at Ethereum to Automatically Exploit Smart ContractsUSENIX Security '18Johannes Krupp, Christian Rossow
    How Do Tor Users Interact With Onion Services?USENIX Security '18Philipp Winter, Anne Edmundson, Laura M. Roberts, Agnieszka Dutkowska-Żuk, Marshini Chetty, Nick Feamster
    Shielding Software From Privileged Side-Channel AttacksUSENIX Security '18Xiaowan Dong, Zhuojia Shen, John Criswell, Alan L. Cox, Sandhya Dwarkadas
    Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep LearningUSENIX Security '18Hamza Harkous, Kassem Fawaz, Rémi Lebret, Florian Schaub, Kang G. Shin, Karl Aberer
    Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart ContractsUSENIX Security '18Lorenz Breidenbach, Phil Daian, Florian Tramer, Ari Juels
    Tackling runtime-based obfuscation in Android with TIROUSENIX Security '18Michelle Y. Wong, David Lie
    All Your GPS Are Belong To Us: Towards Stealthy Manipulation of Road Navigation SystemsUSENIX Security '18Kexiong (Curtis) Zeng, Shinan Liu, Yuanchao Shu, Dong Wang, Haoyu Li, Yanzhi Dou, Gang Wang, Yaling Yang
    Meltdown: Reading Kernel Memory from User SpaceUSENIX Security '18Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg
    FANCI : Feature-based Automated NXDomain Classification and IntelligenceUSENIX Security '18Samuel Schüppen, Dominik Teubert, Patrick Herrmann, Ulrike Meyer
    With Great Training Comes Great Vulnerability: Practical Attacks against Transfer LearningUSENIX Security '18Bolun Wang, Yuanshun Yao, Bimal Viswanath, Haitao Zheng, Ben Y. Zhao
    DIZK: A Distributed Zero Knowledge Proof SystemUSENIX Security '18Howard Wu, Wenting Zheng, Alessandro Chiesa, Raluca Ada Popa, Ion Stoica
    When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning AttacksUSENIX Security '18Octavian Suciu, Radu Marginean, Yigitcan Kaya, Hal Daume III, Tudor Dumitras
    HeapHopper: Bringing Bounded Model Checking to Heap Implementation SecurityUSENIX Security '18Moritz Eckert, Antonio Bianchi, Ruoyu Wang, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna
    Unveiling and Quantifying Facebook Exploitation of Sensitive Personal Data for Advertising PurposesUSENIX Security '18José González Cabañas, Ángel Cuevas, Rubén Cuevas
    Effective Detection of Multimedia Protocol Tunneling using Machine LearningUSENIX Security '18Diogo Barradas, Nuno Santos, Luís Rodrigues
    Return Of Bleichenbacher’s Oracle Threat (ROBOT)USENIX Security '18Hanno Böck, Juraj Somorovsky, Craig Young
    SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior DetectionUSENIX Security '18Peng Gao, Xusheng Xiao, Ding Li, Zhichun Li, Kangkook Jee, Zhenyu Wu, Chung Hwan Kim, Sanjeev R. Kulkarni, Prateek Mittal
    O Single Sign-Off, Where Art Thou? An Empirical Analysis of Single Sign-On Account Hijacking and Session Management on the WebUSENIX Security '18Mohammad Ghasemisharif, Amrutha Ramesh, Stephen Checkoway, Chris Kanich, Jason Polakis
    A4NT: Author Attribute Anonymity by Adversarial Training of Neural Machine TranslationUSENIX Security '18Rakshith Shetty, Bernt Schiele, Mario Fritz
    Rethinking Access Control and Authentication for the Home Internet of Things (IoT)USENIX Security '18Weijia He, Maximilian Golla, Roshni Padhi, Jordan Ofek, Markus Dürmuth, Earlence Fernandes, Blase Ur

Pages