Search results

    RAZOR: A Framework for Post-deployment Software DebloatingUSENIX Security '19Chenxiong Qian, Hong Hu, Mansour Alharthi, Pak Ho Chung, Taesoo Kim, Wenke Lee
    ERIM: Secure, Efficient In-process Isolation with Protection Keys (MPK)USENIX Security '19Anjo Vahldiek-Oberwagner, Eslam Elnikety, Nuno O. Duarte, Michael Sammler, Peter Druschel, Deepak Garg
    SafeHidden: An Efficient and Secure Information Hiding Technique Using Re-randomizationUSENIX Security '19Zhe Wang, Chenggang Wu, Yinqian Zhang, Bowen Tang, Pen-Chung Yew, Mengyao Xie, Yuanming Lai, Yan Kang, Yueqiang Cheng, Zhiping Shi
    XONN: XNOR-based Oblivious Deep Neural Network InferenceUSENIX Security '19M. Sadegh Riazi, Mohammad Samragh, Hao Chen, Kim Laine, Kristin Lauter, Farinaz Koushanfar
    Understanding and Securing Device Vulnerabilities through Automated Bug Report AnalysisUSENIX Security '19Xuan Feng, Xiaojing Liao, XiaoFeng Wang, Haining Wang, Qiang Li, Kai Yang, Hongsong Zhu, Limin Sun
    From IP ID to Device ID and KASLR BypassUSENIX Security '19Amit Klein, Benny Pinkas
    Understanding iOS-based Crowdturfing Through Hidden UI AnalysisUSENIX Security '19Yeonjoon Lee, Xueqiang Wang, Kwangwuk Lee, Xiaojing Liao, XiaoFeng Wang, Tongxin Li, Xianghang Mi
    Platforms in Everything: Analyzing Ground-Truth Data on the Anatomy and Economics of Bullet-Proof HostingUSENIX Security '19Arman Noroozian, Jan Koenders, Eelco van Veldhuizen, Carlos H. Ganan, Sumayah Alrwais, Damon McCoy, Michel van Eeten
    in-toto: Providing farm-to-table guarantees for bits and bytesUSENIX Security '19Santiago Torres-Arias, Hammad Afzali, Trishank Karthik Kuppusamy, Reza Curtmola, Justin Cappos
    KEPLER: Facilitating Control-flow Hijacking Primitive Evaluation for Linux Kernel VulnerabilitiesUSENIX Security '19Wei Wu, Yueqi Chen, Xinyu Xing, Wei Zou
    FIRM-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process EmulationUSENIX Security '19Yaowen Zheng, Ali Davanian, Heng Yin, Chengyu Song, Hongsong Zhu, Limin Sun
    Security Educational PanelUSENIX Security '19Elissa Redmiles, Matt Bishop, Justin Cappos, Raheem Beyah
    The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDRUSENIX Security '19Daniele Antonioli, Nils Ole Tippenhauer, Kasper B. Rasmussen
    FastKitten: Practical Smart Contracts on BitcoinUSENIX Security '19Poulami Das, Lisa Eckey, Tommaso Frassetto, David Gens, Kristina Hostáková, Patrick Jauernig, Sebastian Faust, Ahmad-Reza Sadeghi
    “Johnny, you are fired!” – Spoofing OpenPGP and S/MIME Signatures in EmailsUSENIX Security '19Jens Müller, Marcus Brinkmann, Damian Poddebniak, Hanno Böck, Sebastian Schinzel, Juraj Somorovsky, Jörg Schwenk
    VRASED: A Verified Hardware/Software Co-Design for Remote AttestationUSENIX Security '19Ivan De Oliveira Nunes, Karim Eldefrawy, Norrathep Rattanavipanon, Michael Steiner, Gene Tsudik
    Detecting and Characterizing Lateral Phishing at ScaleUSENIX Security '19Grant Ho, Asaf Cidon, Lior Gavish, Marco Schweighauser, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David Wagner
    Mobile Private Contact Discovery at ScaleUSENIX Security '19Daniel Kales, Christian Rechberger, Thomas Schneider, Matthias Senker, Christian Weinert
    Protecting accounts from credential stuffing with password breach alertingUSENIX Security '19Kurt Thomas, Jennifer Pullman, Kevin Yeo, Ananth Raghunathan, Patrick Gage Kelley, Luca Invernizzi, Borbala Benko, Tadek Pietraszek, Sarvar Patel, Dan Boneh, Elie Bursztein
    Iframes/Popups Are Dangerous in Mobile WebView: Studying and Mitigating Differential Context VulnerabilitiesUSENIX Security '19GuangLiang Yang, Jeff Huang, Guofei Gu
    Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home PlatformsUSENIX Security '19Wei Zhou, Yan Jia, Yao Yao, Lipeng Zhu, Le Guan, Yuhang Mao, Peng Liu, Yuqing Zhang
    Leaky Images: Targeted Privacy Attacks in the WebUSENIX Security '19Cristian-Alexandru Staicu, Michael Pradel
    WAVE: A Decentralized Authorization Framework with Transitive DelegationUSENIX Security '19Michael P Andersen, Sam Kumar, Moustafa AbdelBaky, Gabe Fierro, John Kolb, Hyung-Sin Kim, David E. Culler, Raluca Ada Popa
    EverParse: Verified Secure Zero-Copy Parsers for Authenticated Message FormatsUSENIX Security '19Tahina Ramananandro, Antoine Delignat-Lavaud, Cédric Fournet, Nikhil Swamy, Tej Chajed, Nadim Kobeissi, Jonathan Protzenko
    JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoTUSENIX Security '19Sam Kumar, Yuncong Hu, Michael P Andersen, Raluca Ada Popa, David E. Culler