Search results

    USENIX Security '21PEARL: Plausibly Deniable Flash Translation Layer using WOM coding
    USENIX Security '21SHARD: Fine-Grained Kernel Specialization with Context-Aware Hardening
    USENIX Security '21Preventing Use-After-Free Attacks with Fast Forward Allocation
    USENIX Security '21Partitioning Oracle Attacks
    USENIX Security '21Understanding and Detecting Disordered Error Handling with Precise Function Pairing
    USENIX Security '21HAWatcher: Semantics-Aware Anomaly Detection for Appified Smart Homes
    USENIX Security '21Kalεido: Real-Time Privacy Control for Eye-Tracking Systems
    USENIX Security '21CURE: A Security Architecture with CUstomizable and Resilient Enclaves
    USENIX Security '21A Stealthy Location Identification Attack Exploiting Carrier Aggregation in Cellular Networks
    USENIX Security '21Adversarial Policy Training against Deep Reinforcement Learning
    USENIX Security '21Security Analysis of the Democracy Live Online Voting System
    USENIX Security '21PriSEC: A Privacy Settings Enforcement Controller
    USENIX Security '21Ripple: A Programmable, Decentralized Link-Flooding Defense Against Adaptive Adversaries
    USENIX Security '21Blinder: Partition-Oblivious Hierarchical Scheduling
    USENIX Security '21Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types
    USENIX Security '21Saphire: Sandboxing PHP Applications with Tailored System Call Allowlists
    USENIX Security '21Smart Contract Vulnerabilities: Vulnerable Does Not Imply Exploited
    USENIX Security '21KeyForge: Non-Attributable Email from Forward-Forgeable Signatures
    USENIX Security '21You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion
    USENIX Security '21Finding Bugs Using Your Own Code: Detecting Functionally-similar yet Inconsistent Code
    USENIX Security '21Assessing Browser-level Defense against IDN-based Phishing
    USENIX Security '21Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E)
    USENIX Security '21" quiet!" Reducing the Unwanted Interruptions of Notification Permission Prompts on Chrome
    USENIX Security '21Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications
    USENIX Security '21Poseidon: A New Hash Function for Zero-Knowledge Proof Systems