Conferences

Search results

    TitleConferenceSpeaker(s)
    VoteAgain: A scalable coercion-resistant voting systemUSENIX Security '20Wouter Lueks, Iñigo Querejeta-Azurmendi, Carmela Troncoso
    The Industrial Age of HackingUSENIX Security '20Timothy Nosco, Jared Ziegler, Zechariah Clark, Davy Marrero, Todd Finkler, Andrew Barbarello, W. Michael Petullo
    DECAF: Automatic, Adaptive De-bloating and Hardening of COTS FirmwareUSENIX Security '20Jake Christensen, Ionut Mugurel Anghel, Rob Taglang, Mihai Chiroiu, Radu Sion
    Boxer: Preventing fraud by scanning credit cardsUSENIX Security '20Zainul Abi Din, Hari Venugopalan, Jaime Park, Andy Li, Weisu Yin, Haohui Mai, Yong Jae Lee, Steven Liu, Samuel T. King
    Fawkes: Protecting Privacy against Unauthorized Deep Learning ModelsUSENIX Security '20Shawn Shan, Emily Wenger, Jiayun Zhang, Huiying Li, Haitao Zheng, Ben Y. Zhao
    Justinian's GAAvernor: Robust Distributed Learning with Gradient Aggregation AgentUSENIX Security '20Xudong Pan, Mi Zhang, Duocai Wu, Qifan Xiao, Shouling Ji, Zhemin Yang
    DeepHammer: Depleting the Intelligence of Deep Neural Networks through Targeted Chain of Bit FlipsUSENIX Security '20Fan Yao, Adnan Siraj Rakin, Deliang Fan
    DELF: Safeguarding deletion correctness in Online Social NetworksUSENIX Security '20Katriel Cohn-Gordon, Georgios Damaskinos, Divino Neto, Joshi Cordova, Benoît Reitz, Benjamin Strahs, Daniel Obenshain, Paul Pearce, Ioannis Papagiannis
    Visor: Privacy-Preserving Video Analytics as a Cloud ServiceUSENIX Security '20Rishabh Poddar, Ganesh Ananthanarayanan, Srinath Setty, Stavros Volos, Raluca Ada Popa
    Walking Onions: Scaling Anonymity Networks while Protecting UsersUSENIX Security '20Chelsea H. Komlo, Nick Mathewson, Ian Goldberg
    Drift with Devil: Security of Multi-Sensor Fusion based Localization in High-Level Autonomous Driving under GPS SpoofingUSENIX Security '20Junjie Shen, Jun Yeon Won, Zeyuan Chen, Qi Alfred Chen
    Hall Spoofing: A Non-Invasive DoS Attack on Grid-Tied Solar InverterUSENIX Security '20Anomadarshi Barua, Mohammad Abdullah Al Faruque
    From Control Model to Program: Investigating Robotic Aerial Vehicle Accidents with MAYDAYUSENIX Security '20Taegyu Kim, Chung Hwan Kim, Altay Ozen, Fan Fei, Zhan Tu, Xiangyu Zhang, Xinyan Deng, Dave (Jing) Tian, Dongyan Xu
    Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access DelegationUSENIX Security '20Bin Yuan, Yan Jia, Luyi Xing, Dongfang Zhao, XiaoFeng Wang, Yuqing Zhang
    Differentially-Private Control-Flow Node Coverage for Software Usage AnalysisUSENIX Security '20Hailong Zhang, Sufian Latif, Raef Bassily, Atanas Rountev
    The Ballot is Busted Before the Blockchain: A Security Analysis of Voatz, the First Internet Voting Application Used in U.S. Federal ElectionsUSENIX Security '20Michael A. Specter, James Koppel, Daniel Weitzner
    Stolen Memories: Leveraging Model Memorization for Calibrated White-Box Membership InferenceUSENIX Security '20Klas Leino, Matt Fredrikson
    "I am uncomfortable sharing what I can't see": Privacy Concerns of the Visually Impaired with Camera Based Assistive ApplicationsUSENIX Security '20Taslima Akter, Bryan Dosono, Tousif Ahmed, Apu Kapadia, Bryan Semaan
    Automatic Hot Patch Generation for Android KernelsUSENIX Security '20Zhengzi Xu, Yulong Zhang, Longri Zheng, Liangzhao Xia, Chenfu Bao, Zhi Wang, Yang Liu
    Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN ArchitecturesUSENIX Security '20Mengjia Yan, Christopher W. Fletcher, Josep Torrellas
    Human Distinguishable Visual Key FingerprintsUSENIX Security '20Mozhgan Azimpourkivi, Umut Topkara, Bogdan Carbunar
    On Training Robust PDF Malware ClassifiersUSENIX Security '20Yizheng Chen, Shiqi Wang, Dongdong She, Suman Jana
    Pixel: Multi-signatures for ConsensusUSENIX Security '20Manu Drijvers, Sergey Gorbunov, Gregory Neven, Hoeteck Wee
    That Was Then, This Is Now: A Security Evaluation of Password Generation, Storage, and Autofill in Browser-Based Password ManagersUSENIX Security '20
    Estonian Electronic Identity Card: Security Flaws in Key ManagementUSENIX Security '20Arnis Parsovs

Pages