Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '21PTAuth: Temporal Memory Safety via Robust Points-to AuthenticationReza Mirzazade Farkhani, Mansour Ahmadi, Long Lu
    USENIX Security '21VoltPillager: Hardware-based fault injection attacks against Intel SGX Enclaves using the SVID voltage scaling interfaceZitai Chen, Georgios Vasilakis, Kit Murdock, Edward Dean, David Oswald, Flavio D. Garcia
    USENIX Security '21PEARL: Plausibly Deniable Flash Translation Layer using WOM codingChen Chen, Anrin Chakraborti, Radu Sion
    USENIX Security '21CURE: A Security Architecture with CUstomizable and Resilient EnclavesRaad Bahmani, Ferdinand Brasser, Ghada Dessouky, Patrick Jauernig, Matthias Klimmek, Ahmad-Reza Sadeghi, Emmanuel Stapf
    USENIX Security '21Protecting Cryptography Against Compelled Self-IncriminationSarah Scheffler, Mayank Varia
    USENIX Security '21Hiding the Access Pattern is Not Enough: Exploiting Search Pattern Leakage in Searchable EncryptionSimon Oya, Florian Kerschbaum
    USENIX Security '21Why Older Adults (Don't) Use Password ManagersHirak Ray, Flynn Wolf, Ravi Kuber, Adam J. Aviv
    USENIX Security '21Charger-Surfing: Exploiting a Power Line Side-Channel for Smartphone Information LeakagePatrick Cronin, Xing Gao, Chengmo Yang, Haining Wang
    USENIX Security '21PriSEC: A Privacy Settings Enforcement ControllerRishabh Khandelwal, Thomas Linden, Hamza Harkous, Kassem Fawaz
    USENIX Security '21Effective Notification Campaigns on the Web: A Matter of Trust, Framing, and SupportMax Maass, Alina Stöver, Henning Pridöhl, Sebastian Bretthauer, Dominik Herrmann, Matthias Hollick, Indra Spiecker
    USENIX Security '21UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating FuzzersYuwei Li, Shouling Ji, Yuan Chen, Sizhuang Liang, Wei-Han Lee, Yueyao Chen, Chenyang Lyu, Chunming Wu, Raheem Beyah, Peng Cheng, Kangjie Lu, Ting Wang
    USENIX Security '21Stealing Links from Graph Neural NetworksXinlei He, Jinyuan Jia, Michael Backes, Neil Zhenqiang Gong, Yang Zhang
    USENIX Security '21SHARD: Fine-Grained Kernel Specialization with Context-Aware HardeningMuhammad Abubakar, Adil Ahmad, Pedro Fonseca, Dongyan Xu
    USENIX Security '21PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack Operations in Android SystemsYu-Tsung Lee, William Enck, Haining Chen, Hayawardh Vijayakumar, Ninghui Li, Zhiyun Qian, Daimeng Wang, Giuseppe Petracca, Trent Jaeger
    USENIX Security '21PatchGuard: A Provably Robust Defense against Adversarial Patches via Small Receptive Fields and MaskingChong Xiang, Arjun Nitin Bhagoji, Vikash Sehwag, Prateek Mittal
    USENIX Security '21Privacy and Integrity Preserving Computations with CRISPSylvain Chatel, Apostolos Pyrgelis, Juan Ramón Troncoso-Pastoriza, Jean-Pierre Hubaux
    USENIX Security '21Senate: A Maliciously-Secure MPC Platform for Collaborative AnalyticsRishabh Poddar, Sukrit Kalra, Avishay Yanai, Ryan Deng, Raluca Ada Popa, Joseph M. Hellerstein
    USENIX Security '21Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic PrivacySaba Eskandarian, Henry Corrigan-Gibbs, Matei Zaharia, Dan Boneh
    USENIX Security '21KeyForge: Non-Attributable Email from Forward-Forgeable SignaturesMichael A. Specter, Sunoo Park, Matthew Green
    USENIX Security '21You Autocomplete Me: Poisoning Vulnerabilities in Neural Code CompletionRoei Schuster, Congzheng Song, Eran Tromer, Vitaly Shmatikov
    USENIX Security '21ARCUS: Symbolic Root Cause Analysis of Exploits in Production SystemsCarter Yagemann, Matthew Pruett, Simon P. Chung, Kennon Bittick, Brendan Saltaformaggio, Wenke Lee
    USENIX Security '21Virtual Secure Platform: A Five-Stage Pipeline Processor over TFHEKotaro Matsuoka, Ryotaro Banno, Naoki Matsumoto, Takashi Sato, Song Bian
    USENIX Security '21ReDMArk: Bypassing RDMA Security MechanismsBenjamin Rothenberger, Konstantin Taranov, Adrian Perrig, Torsten Hoefler
    USENIX Security '21Ripple: A Programmable, Decentralized Link-Flooding Defense Against Adaptive AdversariesJiarong Xing, Wenqing Wu, Ang Chen
    USENIX Security '21A Stealthy Location Identification Attack Exploiting Carrier Aggregation in Cellular NetworksNitya Lakshmanan, Nishant Budhdev, Min Suk Kang, Mun Choon Chan, Jun Han

Pages