Search results

    USENIX Security '2299% False Positives: A Qualitative Study of SOC Analysts' Perspectives on Security Alarms
    USENIX Security '22Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing
    USENIX Security '22SIMC: ML Inference Secure Against Malicious Clients at Semi-Honest Cost
    USENIX Security '22HyperDegrade: From GHz to MHz Effective CPU Frequencies
    USENIX Security '22DoLTEst: In-depth Downlink Negative Testing Framework for LTE Devices
    USENIX Security '22GhostTouch: Targeted Attacks on Touchscreens without Physical Touch
    USENIX Security '22RE-Mind: a First Look Inside the Mind of a Reverse Engineer
    USENIX Security '22RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices
    USENIX Security '22Towards Automatically Reverse Engineering Vehicle Diagnostic Protocols
    USENIX Security '22Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition
    USENIX Security '22Watching the Watchers: Practical Video Identification Attack in LTE Networks
    USENIX Security '22FOAP: Fine-Grained Open-World Android App Fingerprinting
    USENIX Security '22Behind the Tube: Exploitative Monetization of Content on YouTube
    USENIX Security '22SkillDetective: Automated Policy-Violation Detection of Voice Assistant Applications in the Wild
    USENIX Security '22Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand
    USENIX Security '22SyzScope: Revealing High-Risk Security Impacts of Fuzzer-Exposed Bugs in Linux kernel
    USENIX Security '22Under the Hood of DANE Mismanagement in SMTP
    USENIX Security '22Lend Me Your Ear: Passive Remote Physical Side Channels on PCs
    USENIX Security '22Empirical Understanding of Deletion Privacy: Experiences, Expectations, and Measures
    USENIX Security '22Hiding in Plain Sight? On the Efficacy of Power Side Channel-Based Control Flow Monitoring
    USENIX Security '22FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities
    USENIX Security '22A Large-scale Investigation into Geodifferences in Mobile Apps
    USENIX Security '22Ferry: State-Aware Symbolic Execution for Exploring State-Dependent Program Paths
    USENIX Security '22Polynomial Commitment with a One-to-Many Prover and Applications
    USENIX Security '22SGXLock: Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX