| Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheck | USENIX Security '20 | Benjamin Andow, Samin Yaseer Mahmud, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, Serge Egelman |
| Exploring Connections Between Active Learning and Model Extraction | USENIX Security '20 | Varun Chandrasekaran, Kamalika Chaudhuri, Irene Giacomelli, Somesh Jha, Songbai Yan |
| KOOBE: Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities | USENIX Security '20 | Weiteng Chen, Xiaochen Zou, Guoren Li, Zhiyun Qian |
| BScout: Direct Whole Patch Presence Test for Java Executables | USENIX Security '20 | Jiarun Dai, Yuan Zhang, Zheyue Jiang, Yingtian Zhou, Junyan Chen, Xinyu Xing, Xiaohan Zhang, Xin Tan, Min Yang, Zhemin Yang |
| Local Model Poisoning Attacks to Byzantine-Robust Federated Learning | USENIX Security '20 | Minghong Fang, Xiaoyu Cao, Jinyuan Jia, Neil Gong |
| PCKV: Locally Differentially Private Correlated Key-Value Data Collection with Optimized Utility | USENIX Security '20 | Xiaolan Gu, Ming Li, Yueqiang Cheng, Li Xiong, Yang Cao |
| Data Recovery from “Scrubbed” NAND Flash Storage: Need for Analog Sanitization | USENIX Security '20 | Md Mehedi Hasan, Biswajit Ray |
| Security Analysis of Unified Payments Interface and Payment Apps in India | USENIX Security '20 | Renuka Kumar, Sreesh Kishore, Hao Lu, Atul Prakash |
| Stealthy Tracking of Autonomous Vehicles with Cache Side Channels | USENIX Security '20 | Mulong Luo, Andrew C. Myers, G. Edward Suh |
| (Mostly) Exitless VM Protection from Untrusted Hypervisor through Disaggregated Nested Virtualization | USENIX Security '20 | Zeyu Mi, Dingji Li, Haibo Chen, Binyu Zang, Haibing Guan |
| SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants | USENIX Security '20 | Raul Quinonez, Jairo Giraldo, Luis Salazar, Erick Bauman, Alvaro Cardenas, Zhiqiang Lin |
| Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning | USENIX Security '20 | Ahmed Salem, Apratim Bhattacharya, Michael Backes, Mario Fritz, Yang Zhang |
| Plug-N-Pwned: Comprehensive Vulnerability Analysis of OBD-II Dongles as A New Over-the-Air Attack Surface in Automotive IoT | USENIX Security '20 | Haohuang Wen, Qi Alfred Chen, Zhiqiang Lin |
| MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures | USENIX Security '20 | Yang Xiao, Bihuan Chen, Chendong Yu, Zhengzi Xu, Zimu Yuan, Feng Li, Binghong Liu, Yang Liu, Wei Huo, Wei Zou, Wenchang Shi |
| Cardpliance: PCI DSS Compliance of Android Applications | USENIX Security '20 | Samin Yaseer Mahmud, Akhil Acharya, Benjamin Andow, William Enck, Bradley Reaves |
| High Accuracy and High Fidelity Extraction of Neural Networks | USENIX Security '20 | Matthew Jagielski, Nicholas Carlini, David Berthelot, Alex Kurakin, Nicolas Papernot |
| SpecFuzz: Bringing Spectre-type vulnerabilities to the surface | USENIX Security '20 | Oleksii Oleksenko, Bohdan Trach, Mark Silberstein, Christof Fetzer |
| PKU Pitfalls: Attacks on PKU-based Memory Isolation Systems | USENIX Security '20 | R. Joseph Connor, Tyler McDaniel, Jared M. Smith, Max Schuchard |
| TextShield: Robust Text Classification Based on Multimodal Embedding and Neural Machine Translation | USENIX Security '20 | Jinfeng Li, Tianyu Du, Shouling Ji, Rong Zhang, Quan Lu, Min Yang, Ting Wang |
| Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis | USENIX Security '20 | Daniel Moghimi, Moritz Lipp, Berk Sunar, Michael Schwarz |
| V0LTpwn: Attacking x86 Processor Integrity from Software | USENIX Security '20 | Zijo Kenjar, Tommaso Frassetto, David Gens, Michael Franz, Ahmad-Reza Sadeghi |
| COUNTERFOIL: Verifying Provenance of Integrated Circuits using Intrinsic Package Fingerprints and Inexpensive Cameras | USENIX Security '20 | Siva Nishok Dhanuskodi, Xiang Li, Daniel Holcomb |
| Towards Robust LiDAR-based Perception in Autonomous Driving: General Black-box Adversarial Sensor Attack and Countermeasures | USENIX Security '20 | Jiachen Sun, Yulong Cao, Qi Alfred Chen, Z. Morley Mao |
| VoteAgain: A scalable coercion-resistant voting system | USENIX Security '20 | Wouter Lueks, Iñigo Querejeta-Azurmendi, Carmela Troncoso |
| The Industrial Age of Hacking | USENIX Security '20 | Timothy Nosco, Jared Ziegler, Zechariah Clark, Davy Marrero, Todd Finkler, Andrew Barbarello, W. Michael Petullo |