| All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption | USENIX Security '16 | Yupeng Zhang, Jonathan Katz, Charalampos Papamanthou |
| Authenticated Network Time Synchronization | USENIX Security '16 | Benjamin Dowling, Douglas Stebila, Greg Zaverucha |
| Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks | USENIX Security '16 | William Melicher, Blase Ur, Sean M. Segreti, Saranga Komanduri, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor |
| DROWN: Breaking TLS Using SSLv2 | USENIX Security '16 | Nimrod Aviram, Sebastian Schinzel, Juraj Somorovsky, Nadia Heninger, Maik Dankel, Jens Steube, Luke Valenta, David Adrian, J. Alex Halderman, Viktor Dukhovni, Emilia Käsper, Shaanan Cohney, Susanne Engels, Christof Paar, Yuval Shavitt |
| Oblivious Multi-Party Machine Learning on Trusted Processors | USENIX Security '16 | Olga Ohrimenko, Felix Schuster, Cédric Fournet, Aastha Mehta, Sebastian Nowozin, Kapil Vaswani, Manuel Costa |
| Poking Holes in Information Hiding | USENIX Security '16 | Angelos Oikonomopoulos, Elias Athanasopoulos, Herbert Bos, Cristiano Giuffrida |
| Making USB Great Again with USBFILTER | USENIX Security '16 | Dave (Jing) Tian, Nolen Scaife, Adam Bates, Kevin Butler, Patrick Traynor |
| Off-Path TCP Exploits: Global Rate Limit Considered Dangerous | USENIX Security '16 | Yue Cao, Zhiyun Qian, Zhongjie Wang, Tuan Dao, Srikanth V. Krishnamurthy, Lisa M. Marvel |
| Secure, Precise, and Fast Floating-Point Operations on x86 Processors | USENIX Security '16 | Ashay Rane, Calvin Lin, Mohit Tiwari |
| Request and Conquer: Exposing Cross-Origin Resource Size | USENIX Security '16 | Tom Van Goethem, Mathy Vanhoef, Frank Piessens, Wouter Joosen |
| Faster Malicious 2-Party Secure Computation with Online/Offline Dual Execution | USENIX Security '16 | Peter Rindal, Mike Rosulek |
| Predicting, Decrypting, and Abusing WPA2/802.11 Group Keys | USENIX Security '16 | Mathy Vanhoef, Frank Piessens |
| Flip Feng Shui: Hammering a Needle in the Software Stack | USENIX Security '16 | Kaveh Razavi, Ben Gras, Erik Bosman, Bart Preneel, Cristiano Giuffrida, Herbert Bos |
| The Cut-and-Choose Game and Its Application to Cryptographic Protocols | USENIX Security '16 | Ruiyu Zhu, Yan Huang, Jonathan Katz, Abhi Shelat |
| Tracing Information Flows Between Ad Exchanges Using Retargeted Ads | USENIX Security '16 | Muhammad Ahmad Bashir, Sajjad Arshad, William Robertson, Christo Wilson |
| You've Got Vulnerability: Exploring Effective Vulnerability Notifications | USENIX Security '16 | Frank Li, Zakir Durumeric, Jakub Czyz, Mohammad Karami, Michael Bailey, Damon McCoy, Stefan Savage, Vern Paxson |
| Stealing Machine Learning Models via Prediction APIs | USENIX Security '16 | Florian Tramèr, Fan Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart |
| Protecting Privacy of BLE Device Users | USENIX Security '16 | Kassem Fawaz, Kyu-Han Kim, Kang G. Shin |
| Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016 | USENIX Security '16 | Ada Lerner, Anna Kornfeld Simpson, Tadayoshi Kohno, Franziska Roesner |
| On Omitting Commits and Committing Omissions: Preventing Git Metadata Tampering That (Re)introduces Software Vulnerabilities | USENIX Security '16 | Santiago Torres-Arias, Anil Kumar Ammula, Reza Curtmola, Justin Cappos |
| FlowFence: Practical Data Protection for Emerging IoT Application Frameworks | USENIX Security '16 | Earlence Fernandes, Justin Paupore, Amir Rahmati, Daniel Simionato, Mauro Conti, Atul Prakash |
| Towards Measuring and Mitigating Social Engineering Software Download Attacks | USENIX Security '16 | Terry Nelms, Roberto Perdisci, Manos Antonakakis, Mustaque Ahamad |
| Egalitarian Computing | USENIX Security '16 | Alex Biryukov, Dmitry Khovratovich |
| Micro-Virtualization Memory Tracing to Detect and Prevent Spraying Attacks | USENIX Security '16 | Stefano Cristalli, Mattia Pagnozzi, Mariano Graziano, Andrea Lanzi, Davide Balzarotti |
| Specification Mining for Intrusion Detection in Networked Control Systems | USENIX Security '16 | Marco Caselli, Emmanuele Zambon, Johanna Amann, Robin Sommer, Frank Kargl |