Conferences

Search results

    TitleConferenceSpeaker(s)
    On Omitting Commits and Committing Omissions: Preventing Git Metadata Tampering That (Re)introduces Software VulnerabilitiesUSENIX Security '16Santiago Torres-Arias, Anil Kumar Ammula, Reza Curtmola, Justin Cappos
    FlowFence: Practical Data Protection for Emerging IoT Application FrameworksUSENIX Security '16Earlence Fernandes, Justin Paupore, Amir Rahmati, Daniel Simionato, Mauro Conti, Atul Prakash
    Towards Measuring and Mitigating Social Engineering Software Download AttacksUSENIX Security '16Terry Nelms, Roberto Perdisci, Manos Antonakakis, Mustaque Ahamad
    Egalitarian ComputingUSENIX Security '16Alex Biryukov, Dmitry Khovratovich
    Micro-Virtualization Memory Tracing to Detect and Prevent Spraying AttacksUSENIX Security '16Stefano Cristalli, Mattia Pagnozzi, Mariano Graziano, Andrea Lanzi, Davide Balzarotti
    Specification Mining for Intrusion Detection in Networked Control SystemsUSENIX Security '16Marco Caselli, Emmanuele Zambon, Johanna Amann, Robin Sommer, Frank Kargl
    An In-Depth Analysis of Disassembly on Full-Scale x86/x64 BinariesUSENIX Security '16Dennis Andriesse, Xi Chen, Victor van der Veen, Asia Slowinska, Herbert Bos
    APISan: Sanitizing API Usages through Semantic Cross-CheckingUSENIX Security '16Insu Yun, Changwoo Min, Xujie Si, Yeongjin Jang, Taesoo Kim, Mayur Naik
    Post-quantum Key Exchange—A New HopeUSENIX Security '16Erdem Alkim, Léo Ducas, Thomas Pöppelmann, Peter Schwabe
    Lock It and Still Lose It —on the (In)Security of Automotive Remote Keyless Entry SystemsUSENIX Security '16Flavio D. Garcia, David Oswald, Timo Kasper, Pierre Pavlidès
    Sanctum: Minimal Hardware Extensions for Strong Software IsolationUSENIX Security '16Victor Costan, Ilia Lebedev, Srinivas Devadas
    Undermining Information Hiding (and What to Do about It)USENIX Security '16Enes Göktaş, Robert Gawlik, Benjamin Kollenda, Elias Athanasopoulos, Georgios Portokalidis, Cristiano Giuffrida, Herbert Bos
    Website-Targeted False Content Injection by Network OperatorsUSENIX Security '16Gabi Nakibly, Jaime Schcolnik, Yossi Rubin
    Investigating Commercial Pay-Per-Install and the Distribution of Unwanted SoftwareUSENIX Security '16Kurt Thomas, Juan A. Elices Crespo, Ryan Rasti, Jean-Michel Picod, Cait Phillips, Marc-André Decoste, Chris Sharp, Fabio Tirelo, Ali Tofigh, Marc-Antoine Courteau, Lucas Ballard, Robert Shield, Nav Jagpal, Moheeb Abu Rajab, Panayiotis Mavrommatis, Niels Provos, Elie Bursztein, Damon McCoy
    Fingerprinting Electronic Control Units for Vehicle Intrusion DetectionUSENIX Security '16Kyong-Tak Cho, Kang G. Shin
    überSpark: Enforcing Verifiable Object Abstractions for Automated Compositional Security Analysis of a HypervisorUSENIX Security '16Amit Vasudevan, Sagar Chaki, Petros Maniatis, Limin Jia, Anupam Datta
    Defending against Malicious Peripherals with CinchUSENIX Security '16Sebastian Angel, Riad S. Wahby, Max Howald, Joshua B. Leners, Michael Spilo, Zhen Sun, Andrew J. Blumberg, Michael Walfish
    zxcvbn: Low-Budget Password Strength EstimationUSENIX Security '16Daniel Lowe Wheeler
    Optimized Invariant Representation of Network Traffic for Detecting Unseen Malware VariantsUSENIX Security '16Karel Bartos, Michal Sofka, Vojtech Franc
    Mirror: Enabling Proofs of Data Replication and Retrievability in the CloudUSENIX Security '16Frederik Armknecht, Ludovic Barman, Jens-Matthias Bohli, Ghassan O. Karame
    Thoth: Comprehensive Policy Compliance in Data Retrieval SystemsUSENIX Security '16Eslam Elnikety, Aastha Mehta, Anjo Vahldiek-Oberwagner, Deepak Garg, Peter Druschel
    k-fingerprinting: A Robust Scalable Website Fingerprinting TechniqueUSENIX Security '16Jamie Hayes, George Danezis
    A Comprehensive Measurement Study of Domain Generating MalwareUSENIX Security '16Daniel Plohmann, Khaled Yakdan, Michael Klatt, Johannes Bader, Elmar Gerhards-Padilla
    An Empirical Study of Textual Key-Fingerprint RepresentationsUSENIX Security '16Sergej Dechand, Dominik Schürmann, Karoline Busse, Yasemin Acar, Sascha Fahl, Matthew Smith
    Ariadne: A Minimal Approach to State ContinuityUSENIX Security '16Raoul Strackx, Frank Piessens

Pages