Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '20Civet: An Efficient Java Partitioning Framework for Hardware EnclavesChia-Che Tsai, Jeongseok Son, Bhushan Jain, John McAvey, Raluca Ada Popa, Donald E. Porter
    USENIX Security '20"I am uncomfortable sharing what I can't see": Privacy Concerns of the Visually Impaired with Camera Based Assistive ApplicationsTaslima Akter, Bryan Dosono, Tousif Ahmed, Apu Kapadia, Bryan Semaan
    USENIX Security '20Delphi: A Cryptographic Inference Service for Neural NetworksPratyush Mishra, Ryan Lehmkuhl, Akshayaram Srinivasan, Wenting Zheng, Raluca Ada Popa
    USENIX Security '20PHMon: A Programmable Hardware Monitor and Its Security Use CasesLeila Delshadtehrani, Sadullah Canakci, Boyou Zhou, Schuyler Eldridge, Ajay Joshi, Manuel Egele
    USENIX Security '20Interpretable Deep Learning under FireXinyang Zhang, Ningfei Wang, Hua Shen, Shouling Ji, Xiapu Luo, Ting Wang
    USENIX Security '20BesFS: A POSIX Filesystem for Enclaves with a Mechanized Safety Proof
    USENIX Security '20Automatic Hot Patch Generation for Android Kernels
    USENIX Security '20Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures
    USENIX Security '20HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments
    USENIX Security '20GREYONE: Data Flow Sensitive Fuzzing
    USENIX Security '20P2IM: Scalable and Hardware-independent Firmware Testing via Automatic Peripheral Interface Modeling
    USENIX Security '20Void: A fast and light voice liveness detection system
    USENIX Security '20Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheck
    USENIX Security '20Human Distinguishable Visual Key Fingerprints
    USENIX Security '20Exploring Connections Between Active Learning and Model Extraction
    USENIX Security '20KOOBE: Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities
    USENIX Security '20Devil’s Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices
    USENIX Security '20On Training Robust PDF Malware Classifiers
    USENIX Security '20HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation
    USENIX Security '20Pixel: Multi-signatures for Consensus
    USENIX Security '20Local Model Poisoning Attacks to Byzantine-Robust Federated Learning
    USENIX Security '20Zero-delay Lightweight Defenses against Website Fingerprinting
    USENIX Security '20PCKV: Locally Differentially Private Correlated Key-Value Data Collection with Optimized Utility
    USENIX Security '20PARTEMU: Enabling Dynamic Analysis of Real-World TrustZone Software Using Emulation
    USENIX Security '20Data Recovery from “Scrubbed” NAND Flash Storage: Need for Analog Sanitization

Pages