Conferences

Search results

    TitleConferenceSpeaker(s)
    The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile BackendsUSENIX Security '19Omar Alrawi, Chaoshun Zuo, Ruian Duan, Ranjita Pai Kasturi, Zhiqiang Lin, Brendan Saltaformaggio
    CSI NN: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side ChannelUSENIX Security '19Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek
    Devils in the Guidance: Predicting Logic Vulnerabilities in Payment Syndication Services through Automated Documentation AnalysisUSENIX Security '19Yi Chen, Luyi Xing, Yue Qin, Xiaojing Liao, XiaoFeng Wang, Kai Chen, Wei Zou
    CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep LearningUSENIX Security '19Yisroel Mirsky, Tom Mahler, Ilan Shelef, Yuval Elovici
    EnTrust: Regulating Sensor Access by Cooperating Programs via Delegation GraphsUSENIX Security '19Giuseppe Petracca, Yuqiong Sun, Ahmad-Atamli Reineh, Patrick McDaniel, Jens Grossklags, Trent Jaeger
    50 Ways to Leak Your Data: An Exploration of Apps' Circumvention of the Android Permissions SystemUSENIX Security '19Joel Reardon, Álvaro Feal, Primal Wijesekera, Amit Elazari Bar On, Narseo Vallina-Rodriguez, Serge Egelman
    Pythia: Remote Oracles for the MassesUSENIX Security '19Shin-Yeh Tsai, Mathias Payer, Yiying Zhang
    Computer Security and Privacy in the Interactions Between Victim Service Providers and Human Trafficking SurvivorsUSENIX Security '19Christine Chen, Nicola Dell, Franziska Roesner
    A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct LinkUSENIX Security '19Milan Stute, Sashank Narain, Alex Mariotto, Alexander Heinrich, David Kreitschmann, Guevara Noubir, Matthias Hollick
    Please Pay Inside: Evaluating Bluetooth-based Detection of Gas Pump SkimmersUSENIX Security '19Nishant Bhaskar, Maxwell Bland, Kirill Levchenko, Aaron Schulman
    A Systematic Evaluation of Transient Execution Attacks and DefensesUSENIX Security '19Claudio Canella, Jo Van Bulck, Michael Schwarz, Moritz Lipp, Benjamin von Berg, Philipp Ortner, Frank Piessens, Dmitry Evtyushkin, Daniel Gruss
    Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning AttacksUSENIX Security '19Ambra Demontis, Marco Melis, Maura Pintor, Matthew Jagielski, Battista Biggio, Alina Oprea, Cristina Nita-Rotaru, Fabio Roli
    Terminal Brain Damage: Exposing the Graceless Degradation in Deep Neural Networks Under Hardware Fault AttacksUSENIX Security '19Sanghyun Hong, Pietro Frigo, Yiğitcan Kaya, Cristiano Giuffrida, Tudor Dumitraș
    Origin-sensitive Control Flow IntegrityUSENIX Security '19Mustakimur Rahman Khandaker, Wenqing Liu, Abu Naser, Zhi Wang, Jie Yang
    HideMyApp: Hiding the Presence of Sensitive Apps on AndroidUSENIX Security '19Anh Pham, Italo Dacosta, Eleonora Losiouk, John Stephan, Kévin Huguenin, Jean-Pierre Hubaux
    Understanding and Improving Security and Privacy in Multi-User Smart Homes: A Design Exploration and In-Home User StudyUSENIX Security '19Eric Zeng, Franziska Roesner
    Robust Website Fingerprinting Through the Cache Occupancy ChannelUSENIX Security '19Anatoly Shusterman, Lachlan Kang, Yarden Haskal, Yosef Meltser, Prateek Mittal, Yossi Oren, Yuval Yarom
    PolicyLint: Investigating Internal Privacy Policy Contradictions on Google PlayUSENIX Security '19Benjamin Andow, Samin Yaseer Mahmud, Wenyu Wang, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, Tao Xie
    The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural NetworksUSENIX Security '19Nicholas Carlini, Chang Liu, Úlfar Erlingsson, Jernej Kos, Dawn Song
    Clinical Computer Security for Victims of Intimate Partner ViolenceUSENIX Security '19Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, Thomas Ristenpart
    RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through Control-Guided TestingUSENIX Security '19Taegyu Kim, Chung Hwan Kim, Junghwan Rhee, Fan Fei, Zhan Tu, Gregory Walkup, Xiangyu Zhang, Xinyan Deng, Dongyan Xu
    uXOM: Efficient eXecute-Only Memory on ARM Cortex-MUSENIX Security '19Donghyun Kwon, Jangseop Shin, Giyeol Kim, Byoungyoung Lee, Yeongpil Cho, Yunheung Paek
    ALOHA: Auxiliary Loss Optimization for Hypothesis AugmentationUSENIX Security '19Ethan M. Rudd, Felipe N. Ducau, Cody Wild, Konstantin Berlin, Richard Harang
    Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved FeaturesUSENIX Security '19Liang Tong, Bo Li, Chen Hajaj, Chaowei Xiao, Ning Zhang, Yevgeniy Vorobeychik
    ScatterCache: Thwarting Cache Attacks via Cache Set RandomizationUSENIX Security '19Mario Werner, Thomas Unterluggauer, Lukas Giner, Michael Schwarz, Daniel Gruss, Stefan Mangard

Pages