Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '20AURORA: Statistical Crash Analysis for Automated Root Cause ExplanationTim Blazytko, Moritz Schlögel, Cornelius Aschermann, Ali Abbasi, Joel Frank, Simon Wörner, Thorsten Holz
    USENIX Security '20Shim Shimmeny: Evaluating the Security and Privacy Contributions of Link Shimming in the Modern WebFrank Li
    USENIX Security '20Everything Old is New Again: Binary Security of WebAssemblyDaniel Lehmann, Johannes Kinder, Michael Pradel
    USENIX Security '20SmartVerif: Push the Limit of Automation Capability of Verifying Security Protocols by Dynamic StrategiesYan Xiong, Cheng Su, Wenchao Huang, Fuyou Miao, Wansen Wang, Hengyi Ouyang
    USENIX Security '20BigMAC: Fine-Grained Policy Analysis of Android FirmwareGrant Hernandez, Dave (Jing) Tian, Anurag Swarnim Yadav, Byron J. Williams, Kevin R.B. Butler
    USENIX Security '20PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing BlacklistsAdam Oest, Yeganeh Safaei, Penghui Zhang, Brad Wardman, Kevin Tyers, Yan Shoshitaishvili, Adam Doupé
    USENIX Security '20See No Evil: Phishing for Permissions with False TransparencyGüliz Seray Tuncay, Jingyu Qian, Carl A. Gunter
    USENIX Security '20A different cup of TI? The added value of commercial threat intelligenceXander Bouwman, Harm Griffioen, Jelle Egbers, Christian Doerr, Bram Klievink, Michel van Eeten
    USENIX Security '20HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution EnvironmentsGhada Dessouky, Tommaso Frassetto, Ahmad-Reza Sadeghi
    USENIX Security '20TPM-FAIL: TPM meets Timing and Lattice AttacksDaniel Moghimi, Berk Sunar, Thomas Eisenbarth, Nadia Heninger
    USENIX Security '20CopyCat: Controlled Instruction-Level Attacks on EnclavesDaniel Moghimi, Jo Van Bulck, Nadia Heninger, Frank Piessens, Berk Sunar
    USENIX Security '20Civet: An Efficient Java Partitioning Framework for Hardware EnclavesChia-Che Tsai, Jeongseok Son, Bhushan Jain, John McAvey, Raluca Ada Popa, Donald E. Porter
    USENIX Security '20An Off-Chip Attack on Hardware Enclaves via the Memory BusDayeol Lee, Dongha Jung, Ian T. Fang, Chia-Che Tsai, Raluca Ada Popa
    USENIX Security '20BesFS: A POSIX Filesystem for Enclaves with a Mechanized Safety ProofShweta Shinde, Shengyi Wang, Pinghai Yuan, Aquinas Hobor, Abhik Roychoudhury, Prateek Saxena
    USENIX Security '20EPIC: Every Packet Is Checked in the Data Plane of a Path-Aware InternetMarkus Legner, Tobias Klenze, Marc Wyss, Christoph Sprenger, Adrian Perrig
    USENIX Security '20ShadowMove: A Stealthy Lateral Movement StrategyAmirreza Niakanlahiji, Jinpeng Wei, Md Rabbi Alam, Qingyang Wang, Bei-Tseng Chu
    USENIX Security '20Poison Over Troubled Forwarders: A Cache Poisoning Attack Targeting DNS Forwarding DevicesXiaofeng Zheng, Chaoyi Lu, Jian Peng, Qiushi Yang, Dongjie Zhou, Baojun Liu, Keyu Man, Shuang Hao, Haixin Duan, Zhiyun Qian
    USENIX Security '20Programmable In-Network Security for Context-aware BYOD PoliciesQiao Kang, Lei Xue, Adam Morrison, Yuxin Tang, Ang Chen, Xiapu Luo
    USENIX Security '20Cached and Confused: Web Cache Deception in the WildSeyed Ali Mirheidari, Sajjad Arshad, Kaan Onarlioglu, Bruno Crispo, Engin Kirda, William Robertson
    USENIX Security '20Zero-delay Lightweight Defenses against Website FingerprintingJiajun Gong, Tao Wang
    USENIX Security '20Horizontal Privilege Escalation in Trusted ApplicationsDarius Suciu, Stephen McLaughlin, Laurent Simon, Radu Sion
    USENIX Security '20TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX EnclavesTobias Cloosters, Michael Rodler, Lucas Davi
    USENIX Security '20NXNSAttack: Recursive DNS Inefficiencies and VulnerabilitiesYehuda Afek, Anat Bremler-Barr, Lior Shafir
    USENIX Security '20Temporal System Call Specialization for Attack Surface ReductionSeyedhamed Ghavamnia, Tapti Palit, Shachee Mishra, Michalis Polychronakis
    USENIX Security '20SENG, the SGX-Enforcing Network Gateway: Authorizing Communication from Shielded ClientsFabian Schwarz, Christian Rossow

Pages