Conferences

Search results

    TitleConferenceSpeaker(s)
    Modelling and Analysis of a Hierarchy of Distance Bounding AttacksUSENIX Security '18Tom Chothia, Joeri de Ruiter, Ben Smyth
    The Secure Socket API: TLS as an Operating System ServiceUSENIX Security '18Mark O'Neill, Scott Heidbrink, Jordan Whitehead, Tanner Perdue, Luke Dickinson, Torstein Collett, Nick Bonner, Kent Seamons, Daniel Zappala
    Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service AttacksUSENIX Security '18Wei Meng, Chenxiong Qian, Shuang Hao, Kevin Borgolte, Giovanni Vigna, Christopher Kruegel, Wenke Lee
    Reading Thieves' Cant: Automatically Identifying and Understanding Dark Jargons from Cybercrime MarketplacesUSENIX Security '18Kan Yuan, Haoran Lu, Xiaojing Liao, XiaoFeng Wang
    Arbitrum: Scalable, private smart contractsUSENIX Security '18Harry Kalodner, Steven Goldfeder, Xiaoqi Chen, S. Matthew Weinberg, Edward W. Felten
    NetHide: Secure and Practical Network Topology ObfuscationUSENIX Security '18Roland Meier, Petar Tsankov, Vincent Lenders, Laurent Vanbever, Martin Vechev
    GAZELLE: A Low Latency Framework for Secure Neural Network InferenceUSENIX Security '18Chiraag Juvekar, Vinod Vaikuntanathan, Anantha Chandrakasan
    Freezing the Web: A Study of ReDoS Vulnerabilities in JavaScript-based Web ServersUSENIX Security '18Cristian-Alexandru Staicu, Michael Pradel
    Acquisitional Rule-based Engine for Discovering Internet-of-Things DevicesUSENIX Security '18Xuan Feng, Qiang Li, Haining Wang, Limin Sun
    DelegaTEE: Brokered Delegation Using Trusted Execution EnvironmentsUSENIX Security '18Sinisa Matetic, Moritz Schneider, Andrew Miller, Ari Juels, Srdjan Capkun
    AttriGuard: A Practical Defense Against Attribute Inference Attacks via Adversarial Machine LearningUSENIX Security '18Jinyuan Jia, Neil Zhenqiang Gong
    Plug and Prey? Measuring the Commoditization of Cybercrime via Online Anonymous MarketsUSENIX Security '18Rolf van Wegberg, Samaneh Tajalizadehkhoob, Kyle Soska, Ugur Akyazi, Carlos Hernandez Ganan, Bram Klievink, Nicolas Christin, Michel van Eeten
    Automatic Heap Layout Manipulation for ExploitationUSENIX Security '18Sean Heelan, Tom Melham, Daniel Kroening
    Fp-Scanner: The Privacy Implications of Browser Fingerprint InconsistenciesUSENIX Security '18Antoine Vastel, Pierre Laperdrix, Walter Rudametkin, Romain Rouvoy
    An Empirical Study of Web Resource Manipulation in Real-world Mobile ApplicationsUSENIX Security '18Xiaohan Zhang, Yuan Zhang, Qianqian Mo, Hao Xia, Zhemin Yang, Min Yang, Xiaofeng Wang, Long Lu, Haixin Duan
    SAD THUG: Structural Anomaly Detection for Transmissions of High-value Information Using GraphicsUSENIX Security '18Jonathan P. Chapman
    An Empirical Analysis of Anonymity in ZcashUSENIX Security '18George Kappos, Haaroon Yousaf, Mary Maller, Sarah Meiklejohn
    DATA – Differential Address Trace Analysis: Finding Address-based Side-Channels in BinariesUSENIX Security '18Samuel Weiser, Andreas Zankl, Raphael Spreitzer, Katja Miller, Stefan Mangard, Georg Sigl
    BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power GridUSENIX Security '18Saleh Soltan, Prateek Mittal, H. Vincent Poor
    Bamboozling Certificate Authorities with BGPUSENIX Security '18Henry Birge-Lee, Yixin Sun, Anne Edmundson, Jennifer Rexford, Prateek Mittal
    Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order ExecutionUSENIX Security '18Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F. Wenisch, Yuval Yarom, Raoul Strackx
    ACES: Automatic Compartments for Embedded SystemsUSENIX Security '18Abraham A Clements, Naif Saleh Almakhdhub, Saurabh Bagchi, Mathias Payer
    Discovering Flaws in Security-Focused Static Analysis Tools for Android using Systematic MutationUSENIX Security '18Richard Bonett, Kaushal Kafle, Kevin Moran, Adwait Nadkarni, Denys Poshyvanyk
    FlowCog: Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android AppsUSENIX Security '18Xiang Pan, Yinzhi Cao, Xuechao Du, Boyuan He, Gan Fang, Rui Shao, Yan Chen
    Who Is Answering My Queries: Understanding and Characterizing Interception of the DNS Resolution PathUSENIX Security '18Baojun Liu, Chaoyi Lu, Haixin Duan, Ying Liu, Zhou Li, Shuang Hao, Min Yang

Pages