Search results

    Stolen Memories: Leveraging Model Memorization for Calibrated White-Box Membership InferenceUSENIX Security '20Klas Leino, Matt Fredrikson
    "I am uncomfortable sharing what I can't see": Privacy Concerns of the Visually Impaired with Camera Based Assistive ApplicationsUSENIX Security '20Taslima Akter, Bryan Dosono, Tousif Ahmed, Apu Kapadia, Bryan Semaan
    Automatic Hot Patch Generation for Android KernelsUSENIX Security '20Zhengzi Xu, Yulong Zhang, Longri Zheng, Liangzhao Xia, Chenfu Bao, Zhi Wang, Yang Liu
    Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN ArchitecturesUSENIX Security '20Mengjia Yan, Christopher W. Fletcher, Josep Torrellas
    Human Distinguishable Visual Key FingerprintsUSENIX Security '20Mozhgan Azimpourkivi, Umut Topkara, Bogdan Carbunar
    On Training Robust PDF Malware ClassifiersUSENIX Security '20Yizheng Chen, Shiqi Wang, Dongdong She, Suman Jana
    Pixel: Multi-signatures for ConsensusUSENIX Security '20Manu Drijvers, Sergey Gorbunov, Gregory Neven, Hoeteck Wee
    That Was Then, This Is Now: A Security Evaluation of Password Generation, Storage, and Autofill in Browser-Based Password ManagersUSENIX Security '20
    Estonian Electronic Identity Card: Security Flaws in Key ManagementUSENIX Security '20Arnis Parsovs
    An Observational Investigation of Reverse Engineers’ ProcessesUSENIX Security '20Daniel Votipka, Seth Rabin, Kristopher Micinski, Jeffrey S. Foster, Michelle L. Mazurek
    Big Numbers - Big Troubles: Systematically Analyzing Nonce Leakage in (EC)DSA ImplementationsUSENIX Security '20Samuel Weiser, David Schrammel, Lukas Bodner, Raphael Spreitzer
    FuzzGuard: Filtering out Unreachable Inputs in Directed Grey-box Fuzzing through Deep LearningUSENIX Security '20Peiyuan Zong, Tao Lv, Dawei Wang, Zizhuang Deng, Ruigang Liang, Kai Chen
    Composition Kills: A Case Study of Email Sender AuthenticationUSENIX Security '20Jianjun Chen, Vern Paxson, Jian Jiang
    'I have too much respect for my elders': Understanding South African Mobile Users' Perceptions of Privacy and Current Behaviors on Facebook and WhatsAppUSENIX Security '20Jake Reichel, Fleming Peck, Mikako Inaba, Bisrat Moges, Brahmnoor Singh Chawla, Marshini Chetty
    The Unpatchable Silicon: A Full Break of the Bitstream Encryption of Xilinx 7-Series FPGAsUSENIX Security '20Maik Ender, Amir Moradi, Christof Paar
    NetWarden: Mitigating Network Covert Channels while Preserving PerformanceUSENIX Security '20Jiarong Xing, Qiao Kang, Ang Chen
    RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache AttacksUSENIX Security '20Samira Briongos, Pedro Malagón, José M. Moya, Thomas Eisenbarth
    ParmeSan: Sanitizer-guided Greybox FuzzingUSENIX Security '20Sebastian Österlund, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida
    FuzzGen: Automatic Fuzzer GenerationUSENIX Security '20Kyriakos Ispoglou, Daniel Austin, Vishwath Mohan, Mathias Payer
    SANNS: Scaling Up Secure Approximate k-Nearest Neighbors SearchUSENIX Security '20Hao Chen, Ilaria Chillotti, Yihe Dong, Oxana Poburinnaya, Ilya Razenshteyn, M. Sadegh Riazi
    FIRMSCOPE: Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android FirmwareUSENIX Security '20Mohamed Elsabagh, Ryan Johnson, Angelos Stavrou, Chaoshun Zuo, Qingchuan Zhao, Zhiqiang Lin
    EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed BanditUSENIX Security '20Tai Yue, Pengfei Wang, Yong Tang, Enze Wang, Bo Yu, Kai Lu, Xu Zhou
    Liveness is Not Enough: Enhancing Fingerprint Authentication with Behavioral Biometrics to Defeat Puppet AttacksUSENIX Security '20Cong Wu, Kun He, Jing Chen, Ziming Zhao, Ruiying Du
    Automating the Development of Chosen Ciphertext AttacksUSENIX Security '20Gabrielle Beck, Maximilian Zinkus, Matthew Green
    MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKsUSENIX Security '20Ahmed Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Dawn Song