USENIX Security '19 | CANvas: Fast and Inexpensive Automotive Network Mapping | Sekar Kulandaivel, Tushar Goyal, Arnav Kumar Agrawal, Vyas Sekar |
USENIX Security '19 | JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT | Sam Kumar, Yuncong Hu, Michael P Andersen, Raluca Ada Popa, David E. Culler |
USENIX Security '19 | All Things Considered: An Analysis of IoT Devices on Home Networks | Deepak Kumar, Kelly Shen, Benton Case, Deepali Garg, Galina Alperovich, Dmitry Kuznetsov, Rajarshi Gupta, Zakir Durumeric |
USENIX Security '19 | uXOM: Efficient eXecute-Only Memory on ARM Cortex-M | Donghyun Kwon, Jangseop Shin, Giyeol Kim, Byoungyoung Lee, Yeongpil Cho, Yunheung Paek |
USENIX Security '19 | Understanding iOS-based Crowdturfing Through Hidden UI Analysis | Yeonjoon Lee, Xueqiang Wang, Kwangwuk Lee, Xiaojing Liao, XiaoFeng Wang, Tongxin Li, Xianghang Mi |
USENIX Security '19 | Fuzzification: Anti-Fuzzing Techniques | Jinho Jung, Hong Hu, David Solodukhin, Daniel Pagan, Kyu Hyung Lee, Taesoo Kim |
USENIX Security '19 | Leaky Images: Targeted Privacy Attacks in the Web | Cristian-Alexandru Staicu, Michael Pradel |
USENIX Security '19 | All Your Clicks Belong to Me: Investigating Click Interception on the Web | Mingxue Zhang, Wei Meng, Sangho Lee, Byoungyoung Lee, Xinyu Xing |
USENIX Security '19 | Evaluating the Contextual Integrity of Privacy Regulation: Parents' IoT Toy Privacy Norms Versus COPPA | Noah Apthorpe, Sarah Varghese, Nick Feamster |
USENIX Security '19 | Stack Overflow Considered Helpful! Deep Learning Security Nudges Towards Stronger Cryptography | Felix Fischer, Huang Xiao, Ching-Yu Kao, Yannick Stachelscheid, Benjamin Johnson, Danial Razar, Paul Fawkesley, Nat Buckley, Konstantin Böttinger, Paul Muntean, Jens Grossklags |
USENIX Security '19 | FastKitten: Practical Smart Contracts on Bitcoin | Poulami Das, Lisa Eckey, Tommaso Frassetto, David Gens, Kristina Hostáková, Patrick Jauernig, Sebastian Faust, Ahmad-Reza Sadeghi |
USENIX Security '19 | Towards the Detection of Inconsistencies in Public Security Vulnerability Reports | Ying Dong, Wenbo Guo, Yueqi Chen, Xinyu Xing, Yuqing Zhang, Gang Wang |
USENIX Security '19 | Robust Website Fingerprinting Through the Cache Occupancy Channel | Anatoly Shusterman, Lachlan Kang, Yarden Haskal, Yosef Meltser, Prateek Mittal, Yossi Oren, Yuval Yarom |
USENIX Security '19 | XONN: XNOR-based Oblivious Deep Neural Network Inference | M. Sadegh Riazi, Mohammad Samragh, Hao Chen, Kim Laine, Kristin Lauter, Farinaz Koushanfar |
USENIX Security '19 | “Johnny, you are fired!” – Spoofing OpenPGP and S/MIME Signatures in Emails | Jens Müller, Marcus Brinkmann, Damian Poddebniak, Hanno Böck, Sebastian Schinzel, Juraj Somorovsky, Jörg Schwenk |
USENIX Security '19 | TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time | Feargus Pendlebury, Fabio Pierazzi, Roberto Jordaney, Johannes Kinder, Lorenzo Cavallaro |
USENIX Security '19 | Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities | Robert Merget, Juraj Somorovsky, Nimrod Aviram, Craig Young, Janis Fliegenschmidt, Jörg Schwenk, Yuval Shavitt |
USENIX Security '19 | When the Signal is in the Noise: Exploiting Diffix's Sticky Noise | Andrea Gadotti, Florimond Houssiau, Luc Rocher, Benjamin Livshits, Yves-Alexandre de Montjoye |
USENIX Security '19 | AntiFuzz: Impeding Fuzzing Audits of Binary Executables | Emre Güler, Cornelius Aschermann, Ali Abbasi, Thorsten Holz |
USENIX Security '19 | Computer Security and Privacy in the Interactions Between Victim Service Providers and Human Trafficking Survivors | Christine Chen, Nicola Dell, Franziska Roesner |
USENIX Security '19 | UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband | Mridula Singh, Patrick Leu, AbdelRahman Abdou, Srdjan Capkun |
USENIX Security '19 | The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR | Daniele Antonioli, Nils Ole Tippenhauer, Kasper B. Rasmussen |
USENIX Security '19 | Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques | Fabio Pagani, Davide Balzarotti |
USENIX Security '19 | Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor | Rob Jansen, Tavish Vaidya, Micah Sherr |
USENIX Security '19 | Reading the Tea leaves: A Comparative Analysis of Threat Intelligence | Vector Guo Li, Matthew Dunn, Paul Pearce, Damon McCoy, Geoffrey M. Voelker, Stefan Savage |