USENIX Security '20 | Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks in Machine Learning | Erwin Quiring, David Klein, Daniel Arp, Martin Johns, Konrad Rieck |
USENIX Security '20 | Retrofitting Fine Grain Isolation in the Firefox Renderer | Shravan Narayan, Craig Disselkoen, Tal Garfinkel, Nathan Froyd, Eric Rahm, Sorin Lerner, Hovav Shacham, Deian Stefan |
USENIX Security '20 | TextShield: Robust Text Classification Based on Multimodal Embedding and Neural Machine Translation | Jinfeng Li, Tianyu Du, Shouling Ji, Rong Zhang, Quan Lu, Min Yang, Ting Wang |
USENIX Security '20 | A Longitudinal and Comprehensive Study of the DANE Ecosystem in Email | Hyeonmin Lee, Aniketh Gireesh, Roland van Rijswijk-Deij, Taekyoung "Ted" Kwon, Taejoong Chung |
USENIX Security '20 | Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE | David Rupprecht, Katharina Kohls, Thorsten Holz, Christina Pöpper |
USENIX Security '20 | MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs | Ahmed Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Dawn Song |
USENIX Security '20 | TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves | Tobias Cloosters, Michael Rodler, Lucas Davi |
USENIX Security '20 | A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols | Guillaume Girol, Lucca Hirschi, Ralf Sasse, Dennis Jackson, Cas Cremers, David Basin |
USENIX Security '20 | Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines | Shuofei Zhu, Jianjun Shi, Limin Yang, Boqin Qin, Ziyi Zhang, Linhai Song, Gang Wang |
USENIX Security '20 | Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis | Daniel Moghimi, Moritz Lipp, Berk Sunar, Michael Schwarz |
USENIX Security '20 | V0LTpwn: Attacking x86 Processor Integrity from Software | Zijo Kenjar, Tommaso Frassetto, David Gens, Michael Franz, Ahmad-Reza Sadeghi |
USENIX Security '20 | SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage | Ioannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou, Saurabh Shintre |
USENIX Security '20 | Shim Shimmeny: Evaluating the Security and Privacy Contributions of Link Shimming in the Modern Web | Frank Li |
USENIX Security '20 | COUNTERFOIL: Verifying Provenance of Integrated Circuits using Intrinsic Package Fingerprints and Inexpensive Cameras | Siva Nishok Dhanuskodi, Xiang Li, Daniel Holcomb |
USENIX Security '20 | AURORA: Statistical Crash Analysis for Automated Root Cause Explanation | Tim Blazytko, Moritz Schlögel, Cornelius Aschermann, Ali Abbasi, Joel Frank, Simon Wörner, Thorsten Holz |
USENIX Security '20 | FANS: Fuzzing Android Native System Services via Automated Interface Analysis | Baozheng Liu, Chao Zhang, Guang Gong, Yishun Zeng, Haifeng Ruan, Jianwei Zhuge |
USENIX Security '20 | Detecting Stuffing of a User’s Credentials at Her Own Accounts | Ke Coby Wang, Michael K. Reiter |
USENIX Security '20 | Void: A fast and light voice liveness detection system | Muhammad Ejaz Ahmed, Il-Youp Kwak, Jun Ho Huh, Iljoo Kim, Taekkyung Oh, Hyoungshick Kim |
USENIX Security '20 | Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheck | Benjamin Andow, Samin Yaseer Mahmud, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, Serge Egelman |
USENIX Security '20 | Human Distinguishable Visual Key Fingerprints | Mozhgan Azimpourkivi, Umut Topkara, Bogdan Carbunar |
USENIX Security '20 | McTiny: Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers | Daniel J. Bernstein, Tanja Lange |
USENIX Security '20 | Exploring Connections Between Active Learning and Model Extraction | Varun Chandrasekaran, Kamalika Chaudhuri, Irene Giacomelli, Somesh Jha, Songbai Yan |
USENIX Security '20 | KOOBE: Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities | Weiteng Chen, Xiaochen Zou, Guoren Li, Zhiyun Qian |
USENIX Security '20 | Devil’s Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices | Yuxuan Chen, Xuejing Yuan, Jiangshan Zhang, Yue Zhao, Shengzhi Zhang, Kai Chen, XiaoFeng Wang |
USENIX Security '20 | On Training Robust PDF Malware Classifiers | Yizheng Chen, Shiqi Wang, Dongdong She, Suman Jana |