Conferences

Search results

    TitleConferenceSpeaker(s)
    All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable EncryptionUSENIX Security '16Yupeng Zhang, Jonathan Katz, Charalampos Papamanthou
    Authenticated Network Time SynchronizationUSENIX Security '16Benjamin Dowling, Douglas Stebila, Greg Zaverucha
    Fast, Lean, and Accurate: Modeling Password Guessability Using Neural NetworksUSENIX Security '16William Melicher, Blase Ur, Sean M. Segreti, Saranga Komanduri, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor
    DROWN: Breaking TLS Using SSLv2USENIX Security '16Nimrod Aviram, Sebastian Schinzel, Juraj Somorovsky, Nadia Heninger, Maik Dankel, Jens Steube, Luke Valenta, David Adrian, J. Alex Halderman, Viktor Dukhovni, Emilia Käsper, Shaanan Cohney, Susanne Engels, Christof Paar, Yuval Shavitt
    Oblivious Multi-Party Machine Learning on Trusted ProcessorsUSENIX Security '16Olga Ohrimenko, Felix Schuster, Cédric Fournet, Aastha Mehta, Sebastian Nowozin, Kapil Vaswani, Manuel Costa
    Poking Holes in Information HidingUSENIX Security '16Angelos Oikonomopoulos, Elias Athanasopoulos, Herbert Bos, Cristiano Giuffrida
    Making USB Great Again with USBFILTERUSENIX Security '16Dave (Jing) Tian, Nolen Scaife, Adam Bates, Kevin Butler, Patrick Traynor
    Off-Path TCP Exploits: Global Rate Limit Considered DangerousUSENIX Security '16Yue Cao, Zhiyun Qian, Zhongjie Wang, Tuan Dao, Srikanth V. Krishnamurthy, Lisa M. Marvel
    Secure, Precise, and Fast Floating-Point Operations on x86 ProcessorsUSENIX Security '16Ashay Rane, Calvin Lin, Mohit Tiwari
    Request and Conquer: Exposing Cross-Origin Resource SizeUSENIX Security '16Tom Van Goethem, Mathy Vanhoef, Frank Piessens, Wouter Joosen
    Faster Malicious 2-Party Secure Computation with Online/Offline Dual ExecutionUSENIX Security '16Peter Rindal, Mike Rosulek
    Predicting, Decrypting, and Abusing WPA2/802.11 Group KeysUSENIX Security '16Mathy Vanhoef, Frank Piessens
    Flip Feng Shui: Hammering a Needle in the Software StackUSENIX Security '16Kaveh Razavi, Ben Gras, Erik Bosman, Bart Preneel, Cristiano Giuffrida, Herbert Bos
    The Cut-and-Choose Game and Its Application to Cryptographic ProtocolsUSENIX Security '16Ruiyu Zhu, Yan Huang, Jonathan Katz, Abhi Shelat
    Tracing Information Flows Between Ad Exchanges Using Retargeted AdsUSENIX Security '16Muhammad Ahmad Bashir, Sajjad Arshad, William Robertson, Christo Wilson
    You've Got Vulnerability: Exploring Effective Vulnerability NotificationsUSENIX Security '16Frank Li, Zakir Durumeric, Jakub Czyz, Mohammad Karami, Michael Bailey, Damon McCoy, Stefan Savage, Vern Paxson
    Stealing Machine Learning Models via Prediction APIsUSENIX Security '16Florian Tramèr, Fan Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart
    Protecting Privacy of BLE Device UsersUSENIX Security '16Kassem Fawaz, Kyu-Han Kim, Kang G. Shin
    Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016USENIX Security '16Ada Lerner, Anna Kornfeld Simpson, Tadayoshi Kohno, Franziska Roesner
    On Omitting Commits and Committing Omissions: Preventing Git Metadata Tampering That (Re)introduces Software VulnerabilitiesUSENIX Security '16Santiago Torres-Arias, Anil Kumar Ammula, Reza Curtmola, Justin Cappos
    FlowFence: Practical Data Protection for Emerging IoT Application FrameworksUSENIX Security '16Earlence Fernandes, Justin Paupore, Amir Rahmati, Daniel Simionato, Mauro Conti, Atul Prakash
    Towards Measuring and Mitigating Social Engineering Software Download AttacksUSENIX Security '16Terry Nelms, Roberto Perdisci, Manos Antonakakis, Mustaque Ahamad
    Egalitarian ComputingUSENIX Security '16Alex Biryukov, Dmitry Khovratovich
    Micro-Virtualization Memory Tracing to Detect and Prevent Spraying AttacksUSENIX Security '16Stefano Cristalli, Mattia Pagnozzi, Mariano Graziano, Andrea Lanzi, Davide Balzarotti
    Specification Mining for Intrusion Detection in Networked Control SystemsUSENIX Security '16Marco Caselli, Emmanuele Zambon, Johanna Amann, Robin Sommer, Frank Kargl

Pages