Conferences

Search results

    TitleConferenceSpeaker(s)
    PKU Pitfalls: Attacks on PKU-based Memory Isolation SystemsUSENIX Security '20R. Joseph Connor, Tyler McDaniel, Jared M. Smith, Max Schuchard
    Automatic Techniques to Systematically Discover New Heap Exploitation PrimitivesUSENIX Security '20Insu Yun, Dhaval Kapil, Taesoo Kim
    Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks in Machine LearningUSENIX Security '20Erwin Quiring, David Klein, Daniel Arp, Martin Johns, Konrad Rieck
    TextShield: Robust Text Classification Based on Multimodal Embedding and Neural Machine TranslationUSENIX Security '20Jinfeng Li, Tianyu Du, Shouling Ji, Rong Zhang, Quan Lu, Min Yang, Ting Wang
    Medusa: Microarchitectural Data Leakage via Automated Attack SynthesisUSENIX Security '20Daniel Moghimi, Moritz Lipp, Berk Sunar, Michael Schwarz
    V0LTpwn: Attacking x86 Processor Integrity from SoftwareUSENIX Security '20Zijo Kenjar, Tommaso Frassetto, David Gens, Michael Franz, Ahmad-Reza Sadeghi
    COUNTERFOIL: Verifying Provenance of Integrated Circuits using Intrinsic Package Fingerprints and Inexpensive CamerasUSENIX Security '20Siva Nishok Dhanuskodi, Xiang Li, Daniel Holcomb
    Silhouette: Efficient Protected Shadow Stacks for Embedded SystemsUSENIX Security '20Jie Zhou, Yufei Du, Zhuojia Shen, Lele Ma, John Criswell, Robert J. Walls
    Towards Robust LiDAR-based Perception in Autonomous Driving: General Black-box Adversarial Sensor Attack and CountermeasuresUSENIX Security '20Jiachen Sun, Yulong Cao, Qi Alfred Chen, Z. Morley Mao
    VoteAgain: A scalable coercion-resistant voting systemUSENIX Security '20Wouter Lueks, Iñigo Querejeta-Azurmendi, Carmela Troncoso
    The Industrial Age of HackingUSENIX Security '20Timothy Nosco, Jared Ziegler, Zechariah Clark, Davy Marrero, Todd Finkler, Andrew Barbarello, W. Michael Petullo
    DECAF: Automatic, Adaptive De-bloating and Hardening of COTS FirmwareUSENIX Security '20Jake Christensen, Ionut Mugurel Anghel, Rob Taglang, Mihai Chiroiu, Radu Sion
    Boxer: Preventing fraud by scanning credit cardsUSENIX Security '20Zainul Abi Din, Hari Venugopalan, Jaime Park, Andy Li, Weisu Yin, Haohui Mai, Yong Jae Lee, Steven Liu, Samuel T. King
    Fawkes: Protecting Privacy against Unauthorized Deep Learning ModelsUSENIX Security '20Shawn Shan, Emily Wenger, Jiayun Zhang, Huiying Li, Haitao Zheng, Ben Y. Zhao
    Justinian's GAAvernor: Robust Distributed Learning with Gradient Aggregation AgentUSENIX Security '20Xudong Pan, Mi Zhang, Duocai Wu, Qifan Xiao, Shouling Ji, Zhemin Yang
    DeepHammer: Depleting the Intelligence of Deep Neural Networks through Targeted Chain of Bit FlipsUSENIX Security '20Fan Yao, Adnan Siraj Rakin, Deliang Fan
    DELF: Safeguarding deletion correctness in Online Social NetworksUSENIX Security '20Katriel Cohn-Gordon, Georgios Damaskinos, Divino Neto, Joshi Cordova, Benoît Reitz, Benjamin Strahs, Daniel Obenshain, Paul Pearce, Ioannis Papagiannis
    Visor: Privacy-Preserving Video Analytics as a Cloud ServiceUSENIX Security '20Rishabh Poddar, Ganesh Ananthanarayanan, Srinath Setty, Stavros Volos, Raluca Ada Popa
    Walking Onions: Scaling Anonymity Networks while Protecting UsersUSENIX Security '20Chelsea H. Komlo, Nick Mathewson, Ian Goldberg
    Donky: Domain Keys – Efficient In-Process Isolation for RISC-V and x86USENIX Security '20David Schrammel, Samuel Weiser, Stefan Steinegger, Martin Schwarzl, Michael Schwarz, Stefan Mangard, Daniel Gruss
    Drift with Devil: Security of Multi-Sensor Fusion based Localization in High-Level Autonomous Driving under GPS SpoofingUSENIX Security '20Junjie Shen, Jun Yeon Won, Zeyuan Chen, Qi Alfred Chen
    Hall Spoofing: A Non-Invasive DoS Attack on Grid-Tied Solar InverterUSENIX Security '20Anomadarshi Barua, Mohammad Abdullah Al Faruque
    From Control Model to Program: Investigating Robotic Aerial Vehicle Accidents with MAYDAYUSENIX Security '20Taegyu Kim, Chung Hwan Kim, Altay Ozen, Fan Fei, Zhan Tu, Xiangyu Zhang, Xinyan Deng, Dave (Jing) Tian, Dongyan Xu
    Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access DelegationUSENIX Security '20Bin Yuan, Yan Jia, Luyi Xing, Dongfang Zhao, XiaoFeng Wang, Yuqing Zhang
    Differentially-Private Control-Flow Node Coverage for Software Usage AnalysisUSENIX Security '20Hailong Zhang, Sufian Latif, Raef Bassily, Atanas Rountev

Pages