Search results

    Protecting Cloud Virtual Machines from Hypervisor and Host Operating System ExploitsUSENIX Security '19Shih-Wei Li, John S. Koh, Jason Nieh
    ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the Evolution of CyberattacksUSENIX Security '19Yun Shen, Gianluca Stringhini
    Everyone is Different: Client-side Diversification for Defending Against Extension FingerprintingUSENIX Security '19Erik Trickel, Oleksii Starov, Alexandros Kapravelos, Nick Nikiforakis, Adam Doupé
    Birthday, Name and Bifacial-security: Understanding Passwords of Chinese Web UsersUSENIX Security '19Ding Wang, Ping Wang, Debiao He, Yuan Tian
    Tracing Transactions Across Cryptocurrency LedgersUSENIX Security '19Haaroon Yousaf, George Kappos, Sarah Meiklejohn
    Small World with High Risks: A Study of Security Threats in the npm EcosystemUSENIX Security '19Markus Zimmermann, Cristian-Alexandru Staicu, Cam Tenny, Michael Pradel
    Towards the Detection of Inconsistencies in Public Security Vulnerability ReportsUSENIX Security '19Ying Dong, Wenbo Guo, Yueqi Chen, Xinyu Xing, Yuqing Zhang, Gang Wang
    Scalable Scanning and Automatic Classification of TLS Padding Oracle VulnerabilitiesUSENIX Security '19Robert Merget, Juraj Somorovsky, Nimrod Aviram, Craig Young, Janis Fliegenschmidt, Jörg Schwenk, Yuval Shavitt
    Probability Model Transforming Encoders Against Encoding AttacksUSENIX Security '19Haibo Cheng, Zhixiong Zheng, Wenting Li, Ping Wang, Chao-Hsien Chu
    Not Everything is Dark and Gloomy: Power Grid Protections Against IoT Demand AttacksUSENIX Security '19Bing Huang, Alvaro A. Cardenas, Ross Baldick
    All Things Considered: An Analysis of IoT Devices on Home NetworksUSENIX Security '19Deepak Kumar, Kelly Shen, Benton Case, Deepali Garg, Galina Alperovich, Dmitry Kuznetsov, Rajarshi Gupta, Zakir Durumeric
    What Are You Searching For? A Remote Keylogging Attack on Search Engine AutocompleteUSENIX Security '19John V. Monaco
    Cognitive Triaging of Phishing AttacksUSENIX Security '19Amber van der Heijden, Luca Allodi
    Looking from the Mirror: Evaluating IoT Device Security through Mobile Companion AppsUSENIX Security '19Xueqiang Wang, Yuqiong Sun, Susanta Nanda, XiaoFeng Wang
    BITE: Bitcoin Lightweight Client Privacy using Trusted ExecutionUSENIX Security '19Sinisa Matetic, Karl Wüst, Moritz Schneider, Kari Kostiainen, Ghassan Karame, Srdjan Capkun
    High Precision Detection of Business Email CompromiseUSENIX Security '19Asaf Cidon, Lior Gavish, Itay Bleier, Nadia Korshun, Marco Schweighauser, Alexey Tsitkin
    Exploiting Unprotected I/O Operations in AMD’s Secure Encrypted VirtualizationUSENIX Security '19Mengyuan Li, Yinqian Zhang, Zhiqiang Lin, Yan Solihin
    Wireless Attacks on Aircraft Instrument Landing SystemsUSENIX Security '19Harshad Sathaye, Domien Schepers, Aanjhan Ranganathan, Guevara Noubir
    StrongChain: Transparent and Collaborative Proof-of-Work ConsensusUSENIX Security '19Pawel Szalachowski, Daniël Reijsbergen, Ivan Homoliak, Siwei Sun
    Users Really Do Answer Telephone ScamsUSENIX Security '19Huahong Tu, Adam Doupé, Ziming Zhao, Gail-Joon Ahn
    IODINE: Verifying Constant-Time Execution of HardwareUSENIX Security '19Klaus v. Gleissenthall, Rami Gökhan Kıcı, Deian Stefan, Ranjit Jhala
    Seeing is Not Believing: Camouflage Attacks on Image Scaling AlgorithmsUSENIX Security '19Qixue Xiao, Yufei Chen, Chao Shen, Yu Chen, Kang Li
    PeX: A Permission Check Analysis Framework for Linux KernelUSENIX Security '19Tong Zhang, Wenbo Shen, Dongyoon Lee, Changhee Jung, Ahmed M. Azab, Ruowen Wang
    The CrossPath Attack: Disrupting the SDN Control Channel via Shared LinksUSENIX Security '19Jiahao Cao, Qi Li, Renjie Xie, Kun Sun, Guofei Gu, Mingwei Xu, Yuan Yang
    TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and TimeUSENIX Security '19Feargus Pendlebury, Fabio Pierazzi, Roberto Jordaney, Johannes Kinder, Lorenzo Cavallaro