Conferences

Search results

    TitleConferenceSpeaker(s)
    Understanding Malicious Cross-library Data Harvesting on AndroidUSENIX Security '21Jice Wang, Yue Xiao, Xueqiang Wang, Yuhong Nan, Luyi Xing, Xiaojing Liao, JinWei Dong, Nicolas Serrano, Haoran Lu, XiaoFeng Wang, Yuqing Zhang
    DRMI: A Dataset Reduction Technology based on Mutual Information for Black-box AttacksUSENIX Security '21Yingzhe He, Guozhu Meng, Kai Chen, Xingbo Hu, Jinwen He
    DeepReflect: Discovering Malicious Functionality through Binary ReconstructionUSENIX Security '21Evan Downing, Yisroel Mirsky, Kyuhong Park, Wenke Lee
    What's in a Name? Exploring CA Certificate ControlUSENIX Security '21Zane Ma, Joshua Mason, Manos Antonakakis, Zakir Durumeric, Michael Bailey
    ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS AuthenticationUSENIX Security '21Marcus Brinkmann, Christian Dresen, Robert Merget, Damian Poddebniak, Jens Müller, Juraj Somorovsky, Jörg Schwenk, Sebastian Schinzel
    PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDropUSENIX Security '21Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, Christian Weinert
    Graph BackdoorUSENIX Security '21Zhaohan Xi, Ren Pang, Shouling Ji, Ting Wang
    Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel DefensesUSENIX Security '21Anatoly Shusterman, Ayush Agarwal, Sioli O'Connell, Daniel Genkin, Yossi Oren, Yuval Yarom
    Swivel: Hardening WebAssembly against SpectreUSENIX Security '21Shravan Narayan, Craig Disselkoen, Daniel Moghimi, Sunjay Cauligi, Evan Johnson, Zhao Gang, Anjo Vahldiek-Oberwagner, Ravi Sahita, Hovav Shacham, Dean Tullsen, Deian Stefan
    Entangled Watermarks as a Defense against Model ExtractionUSENIX Security '21Hengrui Jia, Christopher A. Choquette-Choo, Varun Chandrasekaran, Nicolas Papernot
    Mind Your Weight(s): A Large-scale Study on Insufficient Machine Learning Model Protection in Mobile AppsUSENIX Security '21Zhichuang Sun, Ruimin Sun, Long Lu, Alan Mislove
    Breaking Through Binaries: Compiler-quality Instrumentation for Better Binary-only FuzzingUSENIX Security '21Stefan Nagy, Anh Nguyen-Tuong, Jason D. Hiser, Jack W. Davidson, Matthew Hicks
    MAZE: Towards Automated Heap Feng ShuiUSENIX Security '21Yan Wang, Chao Zhang, Zixuan Zhao, Bolun Zhang, Xiaorui Gong, Wei Zou
    SelectiveTaint: Efficient Data Flow Tracking With Static Binary RewritingUSENIX Security '21Sanchuan Chen, Zhiqiang Lin, Yinqian Zhang
    Experiences Deploying Multi-Vantage-Point Domain Validation at Let's EncryptUSENIX Security '21Henry Birge-Lee, Liang Wang, Daniel McCarney, Roland Shoemaker, Jennifer Rexford, Prateek Mittal
    Coco: Co-Design and Co-Verification of Masked Software Implementations on CPUsUSENIX Security '21Barbara Gigerl, Vedad Hadzic, Robert Primas, Stefan Mangard, Roderick Bloem
    Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic DictionariesUSENIX Security '21Dario Pasquini, Marco Cianfriglia, Giuseppe Ateniese, Massimo Bernaschi
    WaveGuard: Understanding and Mitigating Audio Adversarial ExamplesUSENIX Security '21Shehzeen Hussain, Paarth Neekhara, Shlomo Dubnov, Julian McAuley, Farinaz Koushanfar
    Using Amnesia to Detect Credential Database BreachesUSENIX Security '21Ke Coby Wang, Michael K. Reiter
    Undo Workarounds for Kernel BugsUSENIX Security '21Seyed Mohammadjavad Seyed Talebi, Zhihao Yao, Ardalan Amiri Sani, Zhiyun Qian, Daniel Austin
    SMASH: Synchronized Many-sided Rowhammer Attacks from JavaScriptUSENIX Security '21Finn de Ridder, Pietro Frigo, Emanuele Vannacci, Herbert Bos, Cristiano Giuffrida, Kaveh Razavi
    ICSFuzz: Manipulating I/Os and Repurposing Binary Code to Enable Instrumented Fuzzing in ICS Control ApplicationsUSENIX Security '21Dimitrios Tychalas, Hadjer Benkraouda, Michail Maniatakos
    SocialHEISTing: Understanding Stolen Facebook AccountsUSENIX Security '21Jeremiah Onaolapo, Nektarios Leontiadis, Despoina Magka, Gianluca Stringhini
    Static Detection of Unsafe DMA Accesses in Device DriversUSENIX Security '21Jia-Ju Bai, Tuo Li, Kangjie Lu, Shi-Min Hu
    Causal Analysis for Software-Defined Networking AttacksUSENIX Security '21Benjamin E. Ujcich, Samuel Jero, Richard Skowyra, Adam Bates, William H. Sanders, Hamed Okhravi

Pages