Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '18WPSE: Fortifying Web Protocols via Browser-Side Security MonitoringStefano Calzavara, Riccardo Focardi, Matteo Maffei, Clara Schneidewind, Marco Squarcina, Mauro Tempesta
    USENIX Security '18Analysis of Privacy Protections in Fitness Tracking Social Networks -or- You can run, but can you hide?Wajih Ul Hassan, Saad Hussain, Adam Bates
    USENIX Security '18Inception: System-Wide Security Testing of Real-World Embedded Systems SoftwareNassim Corteggiani, Giovanni Camurati, Aurélien Francillon
    USENIX Security '18Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the ComputerThanh Bui, Siddharth Prakash Rao, Markku Antikainen, Viswanathan Manihatty Bojan, Tuomas Aura
    USENIX Security '18ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android EcosystemDave (Jing) Tian, Grant Hernandez, Joseph I. Choi, Vanessa Frost, Christie Raules, Patrick Traynor, Hayawardh Vijayakumar, Lee Harrison, Amir Rahmati, Michael Grace, Kevin R. B. Butler
    USENIX Security '18FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free VulnerabilitiesWei Wu, Yueqi Chen, Jun Xu, Xinyu Xing, Xiaorui Gong, Wei Zou
    USENIX Security '18The Rewards and Costs of Stronger Passwords in a University: Linking Password Lifetime to StrengthIngolf Becker, Simon Parkin, M. Angela Sasse
    USENIX Security '18Practical Accountability of Secret ProcessesJonathan Frankle, Sunoo Park, Daniel Shaar, Shafi Goldwasser, Daniel Weitzner
    USENIX Security '18Sensitive Information Tracking in Commodity IoTZ. Berkay Celik, Leonardo Babun, Amit Kumar Sikder, Hidayet Aksu, Gang Tan, Patrick McDaniel, A. Selcuk Uluagac
    USENIX Security '18Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration ChannelsDamian Poddebniak, Christian Dresen, Jens Müller, Fabian Ising, Sebastian Schinzel, Simon Friedberger, Juraj Somorovsky, Jörg Schwenk
    USENIX Security '18The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGXAndrea Biondo, Mauro Conti, Lucas Davi, Tommaso Frassetto, Ahmad-Reza Sadeghi
    USENIX Security '18Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow Tagging and TrackingYang Ji, Sangho Lee, Mattia Fazzini, Joey Allen, Evan Downing, Taesoo Kim, Alessandro Orso, Wenke Lee
    USENIX Security '18Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB AttacksBen Gras, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida
    USENIX Security '18The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise LevelRock Stevens, Daniel Votipka, Elissa M. Redmiles, Colin Ahern, Patrick Sweeney, Michelle L. Mazurek
    USENIX Security '18A Sense of Time for JavaScript and Node.js: First-Class Timeouts as a Cure for Event Handler PoisoningJames C. Davis, Eric R. Williamson, Dongyoon Lee
    USENIX Security '18The Broken Shield: Measuring Revocation Effectiveness in the Windows Code-Signing PKIDoowon Kim, Bum Jun Kwon, Kristián Kozák, Christopher Gates, Tudor Dumitraș
    USENIX Security '18Guarder: A Tunable Secure AllocatorSam Silvestro, Hongyu Liu, Tianyi Liu, Zhiqiang Lin, Tongping Liu
    USENIX Security '18teEther: Gnawing at Ethereum to Automatically Exploit Smart ContractsJohannes Krupp, Christian Rossow
    USENIX Security '18How Do Tor Users Interact With Onion Services?Philipp Winter, Anne Edmundson, Laura M. Roberts, Agnieszka Dutkowska-Żuk, Marshini Chetty, Nick Feamster
    USENIX Security '18Shielding Software From Privileged Side-Channel AttacksXiaowan Dong, Zhuojia Shen, John Criswell, Alan L. Cox, Sandhya Dwarkadas
    USENIX Security '18Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep LearningHamza Harkous, Kassem Fawaz, Rémi Lebret, Florian Schaub, Kang G. Shin, Karl Aberer
    USENIX Security '18Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart ContractsLorenz Breidenbach, Phil Daian, Florian Tramer, Ari Juels
    USENIX Security '18Tackling runtime-based obfuscation in Android with TIROMichelle Y. Wong, David Lie
    USENIX Security '18All Your GPS Are Belong To Us: Towards Stealthy Manipulation of Road Navigation SystemsKexiong (Curtis) Zeng, Shinan Liu, Yuanchao Shu, Dong Wang, Haoyu Li, Yanzhi Dou, Gang Wang, Yaling Yang
    USENIX Security '18Meltdown: Reading Kernel Memory from User SpaceMoritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg

Pages