Conferences

Search results

    TitleConferenceSpeaker(s)
    End-to-End Measurements of Email Spoofing AttacksUSENIX Security '18Hang Hu, Gang Wang
    End-Users Get Maneuvered: Empirical Analysis of Redirection Hijacking in Content Delivery NetworksUSENIX Security '18Shuai Hao, Yubao Zhang, Haining Wang, Angelos Stavrou
    Schrödinger’s RAT: Profiling the Stakeholders in the Remote Access Trojan EcosystemUSENIX Security '18Mohammad Rezaeirad, Brown Farinholt, Hitesh Dharmdasani, Paul Pearce, Kirill Levchenko, Damon McCoy
    Towards a Secure Zero-rating Framework with Three PartiesUSENIX Security '18Zhiheng Liu, Zhen Zhang, Yinzhi Cao, Zhaohan Xi, Shihao Jing, Humberto La Roche
    The aftermath of a crypto-ransomware attack at a large academic institutionUSENIX Security '18Leah Zhang-Kennedy, Hala Assal, Jessica Rocheleau, Reham Mohamed, Khadija Baig, Sonia Chiasson
    Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial SensorsUSENIX Security '18Yazhou Tu, Zhiqiang Lin, Insup Lee, Xiali Hei
    Understanding the Reproducibility of Crowd-reported Security VulnerabilitiesUSENIX Security '18Dongliang Mu, Alejandro Cuevas, Limin Yang, Hang Hu, Xinyu Xing, Bing Mao, Gang Wang
    Fast and Service-preserving Recovery from Malware Infections Using CRIUUSENIX Security '18Ashton Webster, Ryan Eckenrod, James Purtilo
    From Patching Delays to Infection Symptoms: Using Risk Profiles for an Early Discovery of Vulnerabilities Exploited in the WildUSENIX Security '18Chaowei Xiao, Armin Sarabi, Yang Liu, Bo Li, Mingyan Liu, Tudor Dumitras
    MoonShine: Optimizing OS Fuzzer Seed Selection with Trace DistillationUSENIX Security '18Shankara Pailoor, Andrew Aday, Suman Jana
    Skill Squatting Attacks on Amazon AlexaUSENIX Security '18Deepak Kumar, Riccardo Paccagnella, Paul Murley, Eric Hennenfent, Joshua Mason, Adam Bates, Michael Bailey
    Charm: Facilitating Dynamic Analysis of Device Drivers of Mobile SystemsUSENIX Security '18Seyed Mohammadjavad Seyed Talebi, Hamid Tavakoli, Hang Zhang, Zheng Zhang, Ardalan Amiri Sani, Zhiyun Qian
    Dependence-Preserving Data Compaction for Scalable Forensic AnalysisUSENIX Security '18Md Nahid Hossain, Junao Wang, R. Sekar, Scott D. Stoller
    Precise and Accurate Patch Presence Test for BinariesUSENIX Security '18Hang Zhang, Zhiyun Qian
    Erays: Reverse Engineering Ethereum's Opaque Smart ContractsUSENIX Security '18Yi Zhou, Deepak Kumar, Surya Bakshi, Joshua Mason, Andrew Miller, Michael Bailey
    The Dangers of Key Reuse: Practical Attacks on IPsec IKEUSENIX Security '18Dennis Felsch, Martin Grothe, Jörg Schwenk, Adam Czubak, Marcin Szymanek
    Quack: Scalable Remote Measurement of Application-Layer CensorshipUSENIX Security '18Benjamin VanderSloot, Allison McDonald, Will Scott, J. Alex Halderman, Roya Ensafi
    Malicious Management Unit: Why Stopping Cache Attacks in Software is Harder Than You ThinkUSENIX Security '18Stephan van Schaik, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi
    Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by BackdooringUSENIX Security '18Yossi Adi, Carsten Baum, Moustapha Cisse, Benny Pinkas, Joseph Keshet
    Better managed than memorized? Studying the Impact of Managers on Password Strength and ReuseUSENIX Security '18Sanam Ghorbani Lyastani, Michael Schilling, Sascha Fahl, Michael Backes, Sven Bugiel
    Formal Security Analysis of Neural Networks using Symbolic IntervalsUSENIX Security '18Shiqi Wang, Kexin Pei, Justin Whitehouse, Junfeng Yang, Suman Jana
    We Still Don’t Have Secure Cross-Domain Requests: an Empirical Study of CORSUSENIX Security '18Jianjun Chen, Jian Jiang, Haixin Duan, Tao Wan, Shuo Chen, Vern Paxson, Min Yang
    Vetting Single Sign-On SDK Implementations via Symbolic ReasoningUSENIX Security '18Ronghai Yang, Wing Cheong Lau, Jiongyi Chen, Kehuan Zhang
    Off-Path TCP Exploit: How Wireless Routers Can Jeopardize Your SecretsUSENIX Security '18Weiteng Chen, Zhiyun Qian
    One&Done: A Single-Decryption EM-Based Attack on OpenSSL’s Constant-Time Blinded RSAUSENIX Security '18Monjur Alam, Haider Adnan Khan, Moumita Dey, Nishith Sinha, Robert Callan, Alenka Zajic, Milos Prvulovic

Pages