Search results

    Too Good to Be Safe: Tricking Lane Detection in Autonomous Driving with Crafted PerturbationsUSENIX Security '21Pengfei Jing, Qiyi Tang, Yuefeng Du, Lei Xue, Xiapu Luo, Ting Wang, Sen Nie, Shi Wu
    Messy States of Wiring: Vulnerabilities in Emerging Personal Payment SystemsUSENIX Security '21Jiadong Lou, Xu Yuan, Ning Zhang
    Privacy-Preserving and Standard-Compatible AKA Protocol for 5GUSENIX Security '21Yuchen Wang, Zhenfeng Zhang, Yongquan Xie
    SEApp: Bringing Mandatory Access Control to Android AppsUSENIX Security '21Matthew Rossi, Dario Facchinetti, Enrico Bacis, Marco Rosa, Stefano Paraboschi
    A11y and Privacy don't have to be mutually exclusive: Constraining Accessibility Service Misuse on AndroidUSENIX Security '21Jie Huang, Michael Backes, Sven Bugiel
    Research on the Security of Visual Reasoning CAPTCHAUSENIX Security '21Yipeng Gao, Haichang Gao, Sainan Luo, Yang Zi, Shudong Zhang, Wenjie Mao, Ping Wang, Yulong Shen, Jeff Yan
    Acoustics to the Rescue: Physical Key Inference Attack RevisitedUSENIX Security '21Soundarya Ramesh, Rui Xiao, Anindya Maiti, Jong Taek Lee, Harini Ramprasad, Ananda Kumar, Murtuza Jadliwala, Jun Han
    Weaponizing Middleboxes for TCP Reflected AmplificationUSENIX Security '21Kevin Bock, Abdulrahman Alaraj, Yair Fax, Kyle Hurley, Eric Wustrow, Dave Levin
    YARIX: Scalable YARA-based Malware IntelligenceUSENIX Security '21Michael Brengel, Christian Rossow
    Hopper: Modeling and Detecting Lateral MovementUSENIX Security '21Grant Ho, Mayank Dhiman, Devdatta Akhawe, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David Wagner
    Collective Information Security in Large-Scale Urban Protests: the Case of Hong KongUSENIX Security '21Martin R. Albrecht, Jorge Blasco, Rikke Bjerg Jensen, Lenka Mareková
    Rollercoaster: An Efficient Group-Multicast Scheme for Mix NetworksUSENIX Security '21Daniel Hugenroth, Martin Kleppmann, Alastair R. Beresford
    The Hijackers Guide To The Galaxy: Off-Path Taking Over Internet ResourcesUSENIX Security '21Tianxiang Dai, Philipp Jeitner, Haya Shulman, Michael Waidner
    How Great is the Great Firewall? Measuring China's DNS CensorshipUSENIX Security '21Nguyen Phong Hoang, Arian Akhavan Niaki, Jakub Dalek, Jeffrey Knockel, Pellaeon Lin, Bill Marczak, Masashi Crete-Nishihata, Phillipa Gill, Michalis Polychronakis
    Balboa: Bobbing and Weaving around Network CensorshipUSENIX Security '21Marc B. Rosen, James Parker, Alex J. Malozemoff
    When Malware Changed Its Mind: An Empirical Study of Variable Program Behaviors in the Real WorldUSENIX Security '21Erin Avllazagaj, Ziyun Zhu, Leyla Bilge, Davide Balzarotti, Tudor Dumitraș
    Dirty Road Can Attack: Security of Deep Learning based Automated Lane Centering under Physical-World AttackUSENIX Security '21Takami Sato, Junjie Shen, Ningfei Wang, Yunhan Jia, Xue Lin, Qi Alfred Chen
    ELISE: A Storage Efficient Logging System Powered by Redundancy Reduction and Representation LearningUSENIX Security '21Hailun Ding, Shenao Yan, Juan Zhai, Shiqing Ma
    V0Finder: Discovering the Correct Origin of Publicly Reported Software VulnerabilitiesUSENIX Security '21Seunghoon Woo, Dongwook Lee, Sunghan Park, Heejo Lee, Sven Dietrich
    Minerva– An Efficient Risk-Limiting Ballot Polling AuditUSENIX Security '21Filip Zagórski, Grant McClearn, Sarah Morin, Neal McBurnett, Poorvi L. Vora
    Once is Never Enough: Foundations for Sound Statistical Inference in Tor Network ExperimentationUSENIX Security '21Rob Jansen, Justin Tracey, Ian Goldberg
    Adapting Security Warnings to Counter Online DisinformationUSENIX Security '21Ben Kaiser, Jerry Wei, Eli Lucherini, Kevin Lee, J. Nathan Matias, Jonathan Mayer
    Solitude: A privacy analysis toolSOUPS 2021Dan Hastings
    Trust by design: a new old requirementSOUPS 2021Ana Ferreira
    Proposing the ‘Signature’ Auth Scheme: More Usable AND Secure Than Status Quo Solutions!SOUPS 2021Ben Towne