Search results

    Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable SystemsUSENIX Security '20Takeshi Sugawara, Benjamin Cyr, Sara Rampazzi, Daniel Genkin, Kevin Fu
    Remote Side-Channel Attacks on Anonymous TransactionsUSENIX Security '20Florian Tramer, Dan Boneh, Kenny Paterson
    Preech: A System for Privacy-Preserving Speech TranscriptionUSENIX Security '20Shimaa Ahmed, Amrita Roy Chowdhury, Kassem Fawaz, Parmesh Ramanathan
    Pancake: Frequency Smoothing for Encrypted Data StoresUSENIX Security '20Paul Grubbs, Anurag Khandelwal, Marie-Sarah Lacharité, Lloyd Brown, Lucy Li, Rachit Agarwal, Thomas Ristenpart
    SkillExplorer: Understanding the Behavior of Skills in Large ScaleUSENIX Security '20Zhixiu Guo, Zijin Lin, Pan Li, Kai Chen
    USBFuzz: A Framework for Fuzzing USB Drivers by Device EmulationUSENIX Security '20Hui Peng, Mathias Payer
    TXSPECTOR: Uncovering Attacks in Ethereum from TransactionsUSENIX Security '20Mengya Zhang, Xiaokuan Zhang, Yinqian Zhang, Zhiqiang Lin
    BlockSci: Design and applications of a blockchain analysis platformUSENIX Security '20Harry Kalodner, Malte Möser, Kevin Lee, Steven Goldfeder, Martin Plattner, Alishah Chator, Arvind Narayanan
    Droplet: Decentralized Authorization and Access Control for Encrypted Data StreamsUSENIX Security '20Hossein Shafagh, Lukas Burkhalter, Sylvia Ratnasamy, Anwar Hithnawi
    Identifying Disinformation Websites Using Infrastructure FeaturesFOCI '20Austin Hounsel, Jordan Holland, Ben Kaiser, Kevin Borgolte, Nick Feamster, Jonathan Mayer
    A Comprehensive Study of DNS-over-HTTPS Downgrade AttackFOCI '20Qing Huang, Deliang Chang, Zhou Li
    Detecting and Evading Censorship-in-Depth: A Case Study of Iran’s Protocol WhitelisterFOCI '20Kevin Bock, Yair Fax, Kyle Reese, Jasraj Singh, Dave Levin
    MIMIQ: Masking IPs with Migration in QUICFOCI '20Yashodhar Govil, Liang Wang, Jennifer Rexford
    Slitheen++: Stealth TLS-based Decoy RoutingFOCI '20Benedikt Birtel, Christian Rossow
    Padding Ain't Enough: Assessing the Privacy Guarantees of Encrypted DNSFOCI '20Jonas Bushart, Christian Rossow
    Turbo Tunnel, a good way to design censorship circumvention protocolsFOCI '20David Fifield
    HTTPT: A Probe-Resistant ProxyFOCI '20Sergey Frolov, Eric Wustrow
    Opening Digital Borders Cautiously yet Decisively: Digital Filtering in Saudi ArabiaFOCI '20Fatemah Alharbi, Michalis Faloutsos, Nael Abu-Ghazaleh
    Bystanders’ Privacy: The Perspectives of Nannies on Smart Home SurveillanceFOCI '20Julia Bernd, Ruba Abu-Salma, Alisa Frik
    Triplet Censors: Demystifying Great Firewall’s DNS Censorship BehaviorFOCI '20 Anonymous, Arian Akhavan Niaki, Nguyen Phong Hoang, Phillipa Gill, Amir Houmansadr
    OS Security Is Hard: Why All the Fuzzers in the World Won't Change the Way Platform Security Is Failing UsWOOT '20Alex Ionescu
    When Is a Proof Actually Not?WOOT '20Vanessa Teague
    Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel PointersWOOT '20Haehyun Cho, Jinbum Park, Joonwon Kang, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn
    ToothPicker: Apple Picking in the iOS Bluetooth StackWOOT '20Dennis Heinze, Jiska Classen, Matthias Hollick
    Bankrupt Covert Channel: Turning Network Predictability into VulnerabilityWOOT '20Dmitrii Ustiugov, Plamen Petrov, M. R. Siavash Katebzadeh, Boris Grot