Search results

    Embracing the "Hack." A Better Strategy for Team-DefenseUSENIX Security '19Haroon Meer
    Rendered Private: Making GLSL Execution Uniform to Prevent WebGL-based Browser FingerprintingUSENIX Security '19Shujiang Wu, Song Li, Yinzhi Cao, Ningfei Wang
    Fuzzification: Anti-Fuzzing TechniquesUSENIX Security '19Jinho Jung, Hong Hu, David Solodukhin, Daniel Pagan, Kyu Hyung Lee, Taesoo Kim
    AntiFuzz: Impeding Fuzzing Audits of Binary ExecutablesUSENIX Security '19Emre Güler, Cornelius Aschermann, Ali Abbasi, Thorsten Holz
    Less is More: Quantifying the Security Benefits of Debloating Web ApplicationsUSENIX Security '19Babak Amin Azad, Pierre Laperdrix, Nick Nikiforakis
    GRIMOIRE: Synthesizing Structure while FuzzingUSENIX Security '19Tim Blazytko, Cornelius Aschermann, Moritz Schlögel, Ali Abbasi, Sergej Schumilo, Simon Wörner, Thorsten Holz
    EnFuzz: Ensemble Fuzzing with Seed Synchronization among Diverse FuzzersUSENIX Security '19Yuanliang Chen, Yu Jiang, Fuchen Ma, Jie Liang, Mingzhe Wang, Chijin Zhou, Xun Jiao, Zhuo Su
    Evaluating Differentially Private Machine Learning in PracticeUSENIX Security '19Bargav Jayaraman, David Evans
    Detecting Missing-Check Bugs via Semantic- and Context-Aware Criticalness and Constraints InferencesUSENIX Security '19Kangjie Lu, Aditya Pakki, Qiushi Wu
    MOPT: Optimized Mutation Scheduling for FuzzersUSENIX Security '19Chenyang Lyu, Shouling Ji, Chao Zhang, Yuwei Li, Wei-Han Lee, Yu Song, Raheem Beyah
    Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic TechniquesUSENIX Security '19Fabio Pagani, Davide Balzarotti
    On (The Lack Of) Location Privacy in Crowdsourcing ApplicationsUSENIX Security '19Spyros Boukoros, Mathias Humbert, Stefan Katzenbeisser, Carmela Troncoso
    The Art of The Scam: Demystifying Honeypots in Ethereum Smart ContractsUSENIX Security '19Christof Ferreira Torres, Mathis Steichen, Radu State
    DEEPVSA: Facilitating Value-set Analysis with Deep Learning for Postmortem Program AnalysisUSENIX Security '19Wenbo Guo, Dongliang Mu, Xinyu Xing, Min Du, Dawn Song
    No Right to Remain Silent: Isolating Malicious MixesUSENIX Security '19Hemi Leibowitz, Ania M. Piotrowska, George Danezis, Amir Herzberg
    Site Isolation: Process Separation for Web Sites within the BrowserUSENIX Security '19Charles Reis, Alexander Moshchuk, Nasko Oskov
    The Web's Identity Crisis: Understanding the Effectiveness of Website Identity IndicatorsUSENIX Security '19Christopher Thompson, Martin Shelton, Emily Stark, Maximilian Walker, Emily Schechter, Adrienne Porter Felt
    The Anatomy of a Cryptocurrency Pump-and-Dump SchemeUSENIX Security '19Jiahua Xu, Benjamin Livshits
    CONFIRM: Evaluating Compatibility and Relevance of Control-flow Integrity Protections for Modern SoftwareUSENIX Security '19Xiaoyang Xu, Masoud Ghaffarinia, Wenhao Wang, Kevin W. Hamlen, Zhiqiang Lin
    Lessons Learned About Building Secure Software: It's About the Developers!USENIX Security '19Steve Lipner
    Point Break: A Study of Bandwidth Denial-of-Service Attacks against TorUSENIX Security '19Rob Jansen, Tavish Vaidya, Micah Sherr
    Reading the Tea leaves: A Comparative Analysis of Threat IntelligenceUSENIX Security '19Vector Guo Li, Matthew Dunn, Paul Pearce, Damon McCoy, Geoffrey M. Voelker, Stefan Savage
    Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet ScaleUSENIX Security '19Hugo L.J. Bijmans, Tim M. Booij, Christian Doerr
    Blind Bernoulli Trials: A Noninteractive Protocol For Hidden-Weight Coin FlipsUSENIX Security '19R. Joseph Connor, Max Schuchard
    Utility-Optimized Local Differential Privacy Mechanisms for Distribution EstimationUSENIX Security '19Takao Murakami, Yusuke Kawamoto