Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '20Symbolic execution with SymCC: Don't interpret, compile!Sebastian Poeplau, Aurélien Francillon
    USENIX Security '20Who's Calling? Characterizing Robocalls through Audio and Metadata AnalysisSathvik Prasad, Elijah Bouma-Sims, Athishay Kiran Mylappan, Bradley Reaves
    USENIX Security '20Composition Kills: A Case Study of Email Sender AuthenticationJianjun Chen, Vern Paxson, Jian Jiang
    USENIX Security '20Datalog DisassemblyAntonio Flores-Montoya, Eric Schulte
    SOUPS 2020Blind and Human: Exploring More Usable Audio CAPTCHA DesignsValerie Fanelle, Sepideh Karimi, Aditi Shah, Bharath Subramanian, Sauvik Das
    USENIX Security '20A Comprehensive Quality Evaluation of Security and Privacy Advice on the WebElissa M. Redmiles, Noel Warford, Amritha Jayanti, Aravind Koneru, Sean Kross, Miraida Morales, Rock Stevens, Michelle L. Mazurek
    USENIX Security '20The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity ForumsEmily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart
    USENIX Security '20Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at ScaleAdam Oest, Penghui Zhang, Brad Wardman, Eric Nunes, Jakub Burgis, Ali Zand, Kurt Thomas, Adam Doupé, Gail-Joon Ahn
    USENIX Security '20The Unpatchable Silicon: A Full Break of the Bitstream Encryption of Xilinx 7-Series FPGAsMaik Ender, Amir Moradi, Christof Paar
    USENIX Security '20Retrofitting Fine Grain Isolation in the Firefox RendererShravan Narayan, Craig Disselkoen, Tal Garfinkel, Nathan Froyd, Eric Rahm, Sorin Lerner, Hovav Shacham, Deian Stefan
    USENIX Security '20Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix ItDaniel Votipka, Kelsey R. Fulton, James Parker, Matthew Hou, Michelle L. Mazurek, Michael Hicks
    USENIX ATC '20Serverless in the Wild: Characterizing and Optimizing the Serverless Workload at a Large Cloud ProviderMohammad Shahrad, Rodrigo Fonseca, Íñigo Goiri, Gohar Chaudhry, Paul Batum, Jason Cooke, Eduardo Laureano, Colby Tresness, Mark Russinovich, Ricardo Bianchini
    NSDI '20Learning in situ: a randomized experiment in video streaming Francis Y. Yan, Hudson Ayers, Chenzhi Zhu, Sadjad Fouladi, James Hong, Keyi Zhang, Philip Levis, Keith Winstein
    USENIX Security '19Users Really Do Answer Telephone ScamsHuahong Tu, Adam Doupé, Ziming Zhao, Gail-Joon Ahn
    USENIX Security '19Computer Security and Privacy in the Interactions Between Victim Service Providers and Human Trafficking SurvivorsChristine Chen, Nicola Dell, Franziska Roesner
    USENIX Security '19Protecting accounts from credential stuffing with password breach alertingKurt Thomas, Jennifer Pullman, Kevin Yeo, Ananth Raghunathan, Patrick Gage Kelley, Luca Invernizzi, Borbala Benko, Tadek Pietraszek, Sarvar Patel, Dan Boneh, Elie Bursztein
    USENIX Security '19Detecting and Characterizing Lateral Phishing at ScaleGrant Ho, Asaf Cidon, Lior Gavish, Marco Schweighauser, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David Wagner
    SOUPS 2019Keepers of the Machines: Examining How System Administrators Manage Software Updates For Multiple MachinesFrank Li, Lisa Rogers, Arunesh Mathur, Nathan Malkin, Marshini Chetty
    USENIX Security '1950 Ways to Leak Your Data: An Exploration of Apps' Circumvention of the Android Permissions SystemJoel Reardon, Álvaro Feal, Primal Wijesekera, Amit Elazari Bar On, Narseo Vallina-Rodriguez, Serge Egelman
    USENIX Security '19ERIM: Secure, Efficient In-process Isolation with Protection Keys (MPK)Anjo Vahldiek-Oberwagner, Eslam Elnikety, Nuno O. Duarte, Michael Sammler, Peter Druschel, Deepak Garg
    NSDI '19Scaling Community Cellular Networks with CommunityCellularManagerShaddi Hasan, Mary Claire Barela, Matthew Johnson, Eric Brewer, Kurtis Heimerl
    USENIX Security '18NAVEX: Precise and Scalable Exploit Generation for Dynamic Web ApplicationsAbeer Alhuzali, Rigel Gjomemo, Birhanu Eshete, V.N. Venkatakrishnan
    USENIX Security '18The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise LevelRock Stevens, Daniel Votipka, Elissa M. Redmiles, Colin Ahern, Patrick Sweeney, Michelle L. Mazurek
    USENIX Security '18Fear the Reaper: Characterization and Fast Detection of Card SkimmersNolen Scaife, Christian Peeters, Patrick Traynor
    USENIX Security '18Who Left Open the Cookie Jar? A Comprehensive Evaluation of Third-Party Cookie PoliciesGertjan Franken, Tom Van Goethem, Wouter Joosen

Pages