Conferences

Search results

    TitleConferenceSpeaker(s)
    Qapla: Policy compliance for database-backed systemsUSENIX Security '17Aastha Mehta, Eslam Elnikety, Katura Harvey, Deepak Garg, Peter Druschel
    BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence CheckingUSENIX Security '17Jiang Ming, Dongpeng Xu, Yufei Jiang, Dinghao Wu
    Computer Security, Privacy, and DNA Sequencing: Compromising Computers with Synthesized DNA, Privacy Leaks, and MoreUSENIX Security '17Peter Ney, Karl Koscher, Lee Organick, Luis Ceze, Tadayoshi Kohno
    CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified BuildsUSENIX Security '17Kirill Nikitin, Eleftherios Kokoris-Kogias, Philipp Jovanovic, Nicolas Gailly, Linus Gasser, Ismail Khoffi, Justin Cappos, Bryan Ford
    Ninja: Towards Transparent Tracing and Debugging on ARMUSENIX Security '17Zhenyu Ning, Fengwei Zhang
    TrustBase: An Architecture to Repair and Strengthen Certificate-based AuthenticationUSENIX Security '17Mark O'Neill, Scott Heidbrink, Scott Ruoti, Jordan Whitehead, Dan Bunker, Luke Dickinson, Travis Hendershot, Joshua Reynolds, Kent Seamons, Daniel Zappala
    Digtool: A Virtualization-Based Framework for Detecting Kernel VulnerabilitiesUSENIX Security '17Jianfeng Pan, Guanglu Yan, Xiaocao Fan
    Global Measurement of DNS ManipulationUSENIX Security '17Paul Pearce, Ben Jones, Frank Li, Roya Ensafi, Nick Feamster, Nick Weaver, Vern Paxson
    AWare: Preventing Abuse of Privacy-Sensitive Sensors via Operation BindingsUSENIX Security '17Giuseppe Petracca, Ahmad-Atamli Reineh, Yuqiong Sun, Jens Grossklags, Trent Jaeger
    ORide: A Privacy-Preserving yet Accountable Ride-Hailing ServiceUSENIX Security '17Anh Pham, Italo Dacosta, Guillaume Endignoux, Juan Ramon Troncoso Pastoriza, Kevin Huguenin, Jean-Pierre Hubaux
    The Loopix Anonymity SystemUSENIX Security '17Ania M. Piotrowska, Jamie Hayes, Tariq Elahi, Sebastian Meiser, George Danezis
    Exploring User Perceptions of Discrimination in Online Targeted AdvertisingUSENIX Security '17Angelisa C. Plane, Elissa M. Redmiles, Michelle L. Mazurek, Michael Carl Tschantz
    AuthentiCall: Efficient Identity and Content Authentication for Phone CallsUSENIX Security '17Bradley Reaves, Logan Blue, Hadi Abdullah, Luis Vargas, Patrick Traynor, Thomas Shrimpton
    BootStomp: On the Security of Bootloaders in Mobile DevicesUSENIX Security '17Nilo Redini, Aravind Machiry, Dipanjan Das, Yanick Fratantonio, Antonio Bianchi, Eric Gustafson, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna
    Extension Breakdown: Security Analysis of Browsers Extension Resources Control PoliciesUSENIX Security '17Iskander Sanchez-Rola, Igor Santos, Davide Balzarotti
    kAFL: Hardware-Assisted Feedback Fuzzing for OS KernelsUSENIX Security '17Sergej Schumilo, Cornelius Aschermann, Robert Gawlik, Sebastian Schinzel, Thorsten Holz
    Same-Origin Policy: Evaluation in Modern BrowsersUSENIX Security '17Jörg Schwenk, Marcus Niemietz, Christian Mainka
    6thSense: A Context-aware Sensor-based Attack Detector for Smart DevicesUSENIX Security '17Amit Kumar Sikder, Hidayet Aksu, A. Selcuk Uluagac
    Characterizing the Nature and Dynamics of Tor Exit BlockingUSENIX Security '17Rachee Singh, Rishab Nithyanand, Sadia Afroz, Paul Pearce, Michael Carl Tschantz, Phillipa Gill, Vern Paxson
    Speeding up detection of SHA-1 collision attacks using unavoidable attack conditionsUSENIX Security '17Marc Stevens, Daniel Shumow
    How the Web Tangled Itself: Uncovering the History of Client-Side Web (In)SecurityUSENIX Security '17Ben Stock, Martin Johns, Marius Steffens, Michael Backes
    USB Snooping Made Easy: Crosstalk Leakage Attacks on USB HubsUSENIX Security '17Yang Su, Daniel Genkin, Damith Ranasinghe, Yuval Yarom
    SmartAuth: User-Centered Authorization for the Internet of ThingsUSENIX Security '17Yuan Tian, Nan Zhang, Yueh-Hsun Lin, Xiaofeng Wang, Blase Ur, Xianzheng Guo, Patrick Tague
    Telling Your Secrets without Page Faults: Stealthy Page Table-Based Attacks on Enclaved ExecutionUSENIX Security '17Jo Van Bulck, Nico Weichbrodt, Rüdiger Kapitza, Frank Piessens, Raoul Strackx
    Locally Differentially Private Protocols for Frequency EstimationUSENIX Security '17Tianhao Wang, Jeremiah Blocki, Ninghui Li, Somesh Jha

Pages