Search results

    USENIX Security '20Civet: An Efficient Java Partitioning Framework for Hardware EnclavesChia-Che Tsai, Jeongseok Son, Bhushan Jain, John McAvey, Raluca Ada Popa, Donald E. Porter
    USENIX Security '20"I am uncomfortable sharing what I can't see": Privacy Concerns of the Visually Impaired with Camera Based Assistive ApplicationsTaslima Akter, Bryan Dosono, Tousif Ahmed, Apu Kapadia, Bryan Semaan
    USENIX Security '20Delphi: A Cryptographic Inference Service for Neural NetworksPratyush Mishra, Ryan Lehmkuhl, Akshayaram Srinivasan, Wenting Zheng, Raluca Ada Popa
    USENIX Security '20PHMon: A Programmable Hardware Monitor and Its Security Use CasesLeila Delshadtehrani, Sadullah Canakci, Boyou Zhou, Schuyler Eldridge, Ajay Joshi, Manuel Egele
    USENIX Security '20BesFS: A POSIX Filesystem for Enclaves with a Mechanized Safety Proof
    USENIX Security '20Automatic Hot Patch Generation for Android Kernels
    USENIX Security '20Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures
    USENIX Security '20HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments
    USENIX Security '20GREYONE: Data Flow Sensitive Fuzzing
    USENIX Security '20P2IM: Scalable and Hardware-independent Firmware Testing via Automatic Peripheral Interface Modeling
    USENIX Security '20Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheck
    USENIX Security '20Human Distinguishable Visual Key Fingerprints
    USENIX Security '20Devil’s Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices
    USENIX Security '20On Training Robust PDF Malware Classifiers
    USENIX Security '20Pixel: Multi-signatures for Consensus
    USENIX Security '20Zero-delay Lightweight Defenses against Website Fingerprinting
    USENIX Security '20PCKV: Locally Differentially Private Correlated Key-Value Data Collection with Optimized Utility
    USENIX Security '20PARTEMU: Enabling Dynamic Analysis of Real-World TrustZone Software Using Emulation
    USENIX Security '20Data Recovery from “Scrubbed” NAND Flash Storage: Need for Analog Sanitization
    USENIX Security '20BigMAC: Fine-Grained Policy Analysis of Android Firmware
    USENIX Security '20Achieving Keyless CDNs with Conclaves
    USENIX Security '20Programmable In-Network Security for Context-aware BYOD Policies
    USENIX Security '20Security Analysis of Unified Payments Interface and Payment Apps in India
    USENIX Security '20Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer
    USENIX Security '20An Off-Chip Attack on Hardware Enclaves via the Memory Bus