Conferences

Search results

    TitleConferenceSpeaker(s)
    Constant-Time Callees with Variable-Time CallersUSENIX Security '17Cesar Pereida García, Billy Bob Brumley
    Detecting Android Root Exploits by Learning from Root ProvidersUSENIX Security '17Ioannis Gasparis, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy
    HELP: Helper-Enabled In-Band Device Pairing Resistant Against Signal CancellationUSENIX Security '17Nirnimesh Ghose, Loukas Lazos, Ming Li
    AutoLock: Why Cache Attacks on ARM Are Harder Than You ThinkUSENIX Security '17Marc Green, Leandro Rodrigues-Lima, Andreas Zankl, Gorka Irazoqui, Johann Heyszl, Thomas Eisenbarth
    Strong and Efficient Cache Side-Channel Protection using Hardware Transactional MemoryUSENIX Security '17Daniel Gruss, Julian Lettner, Felix Schuster, Olya Ohrimenko, Istvan Haller, Manuel Costa
    SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit DataUSENIX Security '17Md Nahid Hossain, Sadegh M. Milajerdi, Junao Wang, Birhanu Eshete, Rigel Gjomemo, R. Sekar, Scott Stoller, V.N. Venkatakrishnan
    vTZ: Virtualizing ARM TrustZoneUSENIX Security '17Zhichao Hua, Jinyu Gu, Yubin Xia, Haibo Chen, Binyu Zang, Haibing Guan
    Identifier Binding Attacks and Defenses in Software-Defined NetworksUSENIX Security '17Samuel Jero, William Koch, Richard Skowyra, Hamed Okhravi, Cristina Nita-Rotaru, David Bigelow
    Towards Efficient Heap Overflow DiscoveryUSENIX Security '17Xiangkun Jia, Chao Zhang, Purui Su, Yi Yang, Huafeng Huang, Dengguo Feng
    Transcend: Detecting Concept Drift in Malware Classification ModelsUSENIX Security '17Roberto Jordaney, Kumar Sharad, Santanu K. Dash, Zhi Wang, Davide Papini, Ilia Nouretdinov, Lorenzo Cavallaro
    On the effectiveness of mitigations against floating-point timing channelsUSENIX Security '17David Kohlbrenner, Hovav Shacham
    Reverse Engineering x86 Processor MicrocodeUSENIX Security '17Philipp Koppe, Benjamin Kollenda, Marc Fyrbiak, Christian Kison, Robert Gawlik, Christof Paar, Thorsten Holz
    "I Have No Idea What I'm Doing" - On the Usability of Deploying HTTPSUSENIX Security '17Katharina Krombholz, Wilfried Mayer, Martin Schmiedecker, Edgar Weippl
    Phoenix: Rebirth of a Cryptographic Password-Hardening ServiceUSENIX Security '17Russell W. F. Lai, Christoph Egger, Dominique Schröder, Sherman S. M. Chow
    CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel MemoryUSENIX Security '17Ferdinand Brasser, Lucas Davi, David Gens, Christopher Liebchen, Ahmad-Reza Sadeghi
    Hacking in Darkness: Return-oriented Programming against Secure EnclavesUSENIX Security '17Jaehyuk Lee, Jinsoo Jang, Yeongjin Jang, Nohyun Kwak, Yeseul Choi, Changho Choi, Taesoo Kim, Marcus Peinado, Brent Byunghoon Kang
    Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch ShadowingUSENIX Security '17Sangho Lee, Ming-Wei Shih, Prasun Gera, Taesoo Kim, Hyesoon Kim, Marcus Peinado
    DeTor: Provably Avoiding Geographic Regions in TorUSENIX Security '17Zhihao Li, Stephen Herwig, Dave Levin
    Measuring the Insecurity of Mobile Deep Links of AndroidUSENIX Security '17Fang Liu, Chun Wang, Andres Pico, Danfeng Yao, Gang Wang
    SmartPool: Practical Decentralized Pooled MiningUSENIX Security '17Loi Luu, Yaron Velner, Jason Teutsch, Prateek Saxena
    DR. CHECKER: A Soundy Analysis for Linux Kernel DriversUSENIX Security '17Aravind Machiry, Chad Spensky, Jake Corina, Nick Stephens, Christopher Kruegel, Giovanni Vigna
    PDF Mirage: Content Masking Attack Against Information-Based Online ServicesUSENIX Security '17Ian Markwood, Dakun Shen, Yao Liu, Zhuo Lu
    ROTE: Rollback Protection for Trusted ExecutionUSENIX Security '17Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David Sommer, Arthur Gervais, Ari Juels, Srdjan Capkun
    Towards Practical Tools for Side Channel Aware Software Engineering: 'Grey Box' Modelling for Instruction LeakagesUSENIX Security '17David McCann, Elisabeth Oswald, Carolyn Whitnall
    When the Weakest Link is Strong: Secure Collaboration in the Case of the Panama PapersUSENIX Security '17Susan E. McGregor, Elizabeth Anne Watkins, Mahdi Nasrullah Al-Ameen, Kelly Caine, Franziska Roesner

Pages