Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '19CANvas: Fast and Inexpensive Automotive Network MappingSekar Kulandaivel, Tushar Goyal, Arnav Kumar Agrawal, Vyas Sekar
    USENIX Security '19JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoTSam Kumar, Yuncong Hu, Michael P Andersen, Raluca Ada Popa, David E. Culler
    USENIX Security '19All Things Considered: An Analysis of IoT Devices on Home NetworksDeepak Kumar, Kelly Shen, Benton Case, Deepali Garg, Galina Alperovich, Dmitry Kuznetsov, Rajarshi Gupta, Zakir Durumeric
    USENIX Security '19uXOM: Efficient eXecute-Only Memory on ARM Cortex-MDonghyun Kwon, Jangseop Shin, Giyeol Kim, Byoungyoung Lee, Yeongpil Cho, Yunheung Paek
    USENIX Security '19Understanding iOS-based Crowdturfing Through Hidden UI AnalysisYeonjoon Lee, Xueqiang Wang, Kwangwuk Lee, Xiaojing Liao, XiaoFeng Wang, Tongxin Li, Xianghang Mi
    USENIX Security '19Fuzzification: Anti-Fuzzing TechniquesJinho Jung, Hong Hu, David Solodukhin, Daniel Pagan, Kyu Hyung Lee, Taesoo Kim
    USENIX Security '19Leaky Images: Targeted Privacy Attacks in the WebCristian-Alexandru Staicu, Michael Pradel
    USENIX Security '19All Your Clicks Belong to Me: Investigating Click Interception on the WebMingxue Zhang, Wei Meng, Sangho Lee, Byoungyoung Lee, Xinyu Xing
    USENIX Security '19Evaluating the Contextual Integrity of Privacy Regulation: Parents' IoT Toy Privacy Norms Versus COPPANoah Apthorpe, Sarah Varghese, Nick Feamster
    USENIX Security '19Stack Overflow Considered Helpful! Deep Learning Security Nudges Towards Stronger CryptographyFelix Fischer, Huang Xiao, Ching-Yu Kao, Yannick Stachelscheid, Benjamin Johnson, Danial Razar, Paul Fawkesley, Nat Buckley, Konstantin Böttinger, Paul Muntean, Jens Grossklags
    USENIX Security '19FastKitten: Practical Smart Contracts on BitcoinPoulami Das, Lisa Eckey, Tommaso Frassetto, David Gens, Kristina Hostáková, Patrick Jauernig, Sebastian Faust, Ahmad-Reza Sadeghi
    USENIX Security '19Towards the Detection of Inconsistencies in Public Security Vulnerability ReportsYing Dong, Wenbo Guo, Yueqi Chen, Xinyu Xing, Yuqing Zhang, Gang Wang
    USENIX Security '19Robust Website Fingerprinting Through the Cache Occupancy ChannelAnatoly Shusterman, Lachlan Kang, Yarden Haskal, Yosef Meltser, Prateek Mittal, Yossi Oren, Yuval Yarom
    USENIX Security '19XONN: XNOR-based Oblivious Deep Neural Network InferenceM. Sadegh Riazi, Mohammad Samragh, Hao Chen, Kim Laine, Kristin Lauter, Farinaz Koushanfar
    USENIX Security '19“Johnny, you are fired!” – Spoofing OpenPGP and S/MIME Signatures in EmailsJens Müller, Marcus Brinkmann, Damian Poddebniak, Hanno Böck, Sebastian Schinzel, Juraj Somorovsky, Jörg Schwenk
    USENIX Security '19TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and TimeFeargus Pendlebury, Fabio Pierazzi, Roberto Jordaney, Johannes Kinder, Lorenzo Cavallaro
    USENIX Security '19Scalable Scanning and Automatic Classification of TLS Padding Oracle VulnerabilitiesRobert Merget, Juraj Somorovsky, Nimrod Aviram, Craig Young, Janis Fliegenschmidt, Jörg Schwenk, Yuval Shavitt
    USENIX Security '19When the Signal is in the Noise: Exploiting Diffix's Sticky NoiseAndrea Gadotti, Florimond Houssiau, Luc Rocher, Benjamin Livshits, Yves-Alexandre de Montjoye
    USENIX Security '19AntiFuzz: Impeding Fuzzing Audits of Binary ExecutablesEmre Güler, Cornelius Aschermann, Ali Abbasi, Thorsten Holz
    USENIX Security '19Computer Security and Privacy in the Interactions Between Victim Service Providers and Human Trafficking SurvivorsChristine Chen, Nicola Dell, Franziska Roesner
    USENIX Security '19UWB-ED: Distance Enlargement Attack Detection in Ultra-WidebandMridula Singh, Patrick Leu, AbdelRahman Abdou, Srdjan Capkun
    USENIX Security '19The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDRDaniele Antonioli, Nils Ole Tippenhauer, Kasper B. Rasmussen
    USENIX Security '19Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic TechniquesFabio Pagani, Davide Balzarotti
    USENIX Security '19Point Break: A Study of Bandwidth Denial-of-Service Attacks against TorRob Jansen, Tavish Vaidya, Micah Sherr
    USENIX Security '19Reading the Tea leaves: A Comparative Analysis of Threat IntelligenceVector Guo Li, Matthew Dunn, Paul Pearce, Damon McCoy, Geoffrey M. Voelker, Stefan Savage

Pages