Conferences

Search results

    TitleConferenceSpeaker(s)
    BScout: Direct Whole Patch Presence Test for Java ExecutablesUSENIX Security '20Jiarun Dai, Yuan Zhang, Zheyue Jiang, Yingtian Zhou, Junyan Chen, Xinyu Xing, Xiaohan Zhang, Xin Tan, Min Yang, Zhemin Yang
    Local Model Poisoning Attacks to Byzantine-Robust Federated LearningUSENIX Security '20Minghong Fang, Xiaoyu Cao, Jinyuan Jia, Neil Gong
    PCKV: Locally Differentially Private Correlated Key-Value Data Collection with Optimized UtilityUSENIX Security '20Xiaolan Gu, Ming Li, Yueqiang Cheng, Li Xiong, Yang Cao
    Data Recovery from “Scrubbed” NAND Flash Storage: Need for Analog SanitizationUSENIX Security '20Md Mehedi Hasan, Biswajit Ray
    Security Analysis of Unified Payments Interface and Payment Apps in IndiaUSENIX Security '20Renuka Kumar, Sreesh Kishore, Hao Lu, Atul Prakash
    Stealthy Tracking of Autonomous Vehicles with Cache Side ChannelsUSENIX Security '20Mulong Luo, Andrew C. Myers, G. Edward Suh
    (Mostly) Exitless VM Protection from Untrusted Hypervisor through Disaggregated Nested VirtualizationUSENIX Security '20Zeyu Mi, Dingji Li, Haibo Chen, Binyu Zang, Haibing Guan
    SAVIOR: Securing Autonomous Vehicles with Robust Physical InvariantsUSENIX Security '20Raul Quinonez, Jairo Giraldo, Luis Salazar, Erick Bauman, Alvaro Cardenas, Zhiqiang Lin
    Updates-Leak: Data Set Inference and Reconstruction Attacks in Online LearningUSENIX Security '20Ahmed Salem, Apratim Bhattacharya, Michael Backes, Mario Fritz, Yang Zhang
    Plug-N-Pwned: Comprehensive Vulnerability Analysis of OBD-II Dongles as A New Over-the-Air Attack Surface in Automotive IoTUSENIX Security '20Haohuang Wen, Qi Alfred Chen, Zhiqiang Lin
    MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability SignaturesUSENIX Security '20Yang Xiao, Bihuan Chen, Chendong Yu, Zhengzi Xu, Zimu Yuan, Feng Li, Binghong Liu, Yang Liu, Wei Huo, Wei Zou, Wenchang Shi
    Cardpliance: PCI DSS Compliance of Android ApplicationsUSENIX Security '20Samin Yaseer Mahmud, Akhil Acharya, Benjamin Andow, William Enck, Bradley Reaves
    High Accuracy and High Fidelity Extraction of Neural NetworksUSENIX Security '20Matthew Jagielski, Nicholas Carlini, David Berthelot, Alex Kurakin, Nicolas Papernot
    SpecFuzz: Bringing Spectre-type vulnerabilities to the surfaceUSENIX Security '20Oleksii Oleksenko, Bohdan Trach, Mark Silberstein, Christof Fetzer
    PKU Pitfalls: Attacks on PKU-based Memory Isolation SystemsUSENIX Security '20R. Joseph Connor, Tyler McDaniel, Jared M. Smith, Max Schuchard
    TextShield: Robust Text Classification Based on Multimodal Embedding and Neural Machine TranslationUSENIX Security '20Jinfeng Li, Tianyu Du, Shouling Ji, Rong Zhang, Quan Lu, Min Yang, Ting Wang
    Medusa: Microarchitectural Data Leakage via Automated Attack SynthesisUSENIX Security '20Daniel Moghimi, Moritz Lipp, Berk Sunar, Michael Schwarz
    V0LTpwn: Attacking x86 Processor Integrity from SoftwareUSENIX Security '20Zijo Kenjar, Tommaso Frassetto, David Gens, Michael Franz, Ahmad-Reza Sadeghi
    COUNTERFOIL: Verifying Provenance of Integrated Circuits using Intrinsic Package Fingerprints and Inexpensive CamerasUSENIX Security '20Siva Nishok Dhanuskodi, Xiang Li, Daniel Holcomb
    Towards Robust LiDAR-based Perception in Autonomous Driving: General Black-box Adversarial Sensor Attack and CountermeasuresUSENIX Security '20Jiachen Sun, Yulong Cao, Qi Alfred Chen, Z. Morley Mao
    VoteAgain: A scalable coercion-resistant voting systemUSENIX Security '20Wouter Lueks, Iñigo Querejeta-Azurmendi, Carmela Troncoso
    The Industrial Age of HackingUSENIX Security '20Timothy Nosco, Jared Ziegler, Zechariah Clark, Davy Marrero, Todd Finkler, Andrew Barbarello, W. Michael Petullo
    DECAF: Automatic, Adaptive De-bloating and Hardening of COTS FirmwareUSENIX Security '20Jake Christensen, Ionut Mugurel Anghel, Rob Taglang, Mihai Chiroiu, Radu Sion
    Boxer: Preventing fraud by scanning credit cardsUSENIX Security '20Zainul Abi Din, Hari Venugopalan, Jaime Park, Andy Li, Weisu Yin, Haohui Mai, Yong Jae Lee, Steven Liu, Samuel T. King
    Justinian's GAAvernor: Robust Distributed Learning with Gradient Aggregation AgentUSENIX Security '20Xudong Pan, Mi Zhang, Duocai Wu, Qifan Xiao, Shouling Ji, Zhemin Yang

Pages