Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '20"I am uncomfortable sharing what I can't see": Privacy Concerns of the Visually Impaired with Camera Based Assistive Applications
    USENIX Security '20PHMon: A Programmable Hardware Monitor and Its Security Use Cases
    USENIX Security '20Interpretable Deep Learning under Fire
    USENIX Security '20BesFS: A POSIX Filesystem for Enclaves with a Mechanized Safety Proof
    USENIX Security '20Automatic Hot Patch Generation for Android Kernels
    USENIX Security '20Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures
    USENIX Security '20HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments
    USENIX Security '20GREYONE: Data Flow Sensitive Fuzzing
    USENIX Security '20P2IM: Scalable and Hardware-independent Firmware Testing via Automatic Peripheral Interface Modeling
    USENIX Security '20Delphi: A Cryptographic Inference Service for Neural Networks
    USENIX Security '20Civet: An Efficient Java Partitioning Framework for Hardware Enclaves
    USENIX Security '20Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It
    USENIX Security '20Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer
    USENIX Security '20Big Numbers - Big Troubles: Systematically Analyzing Nonce Leakage in (EC)DSA Implementations
    USENIX Security '20(Mostly) Exitless VM Protection from Untrusted Hypervisor through Disaggregated Nested Virtualization
    USENIX Security '20Stealthy Tracking of Autonomous Vehicles with Cache Side Channels
    USENIX Security '20An Off-Chip Attack on Hardware Enclaves via the Memory Bus
    USENIX Security '20SmartVerif: Push the Limit of Automation Capability of Verifying Security Protocols by Dynamic Strategies
    USENIX Security '20An Observational Investigation of Reverse Engineers’ Processes
    USENIX Security '20Cached and Confused: Web Cache Deception in the Wild
    USENIX Security '20ShadowMove: A Stealthy Lateral Movement Strategy
    USENIX Security '20Human Distinguishable Visual Key Fingerprints
    USENIX Security '20KOOBE: Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities
    USENIX Security '20PARTEMU: Enabling Dynamic Analysis of Real-World TrustZone Software Using Emulation
    USENIX Security '20SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants

Pages