USENIX Security '18 | WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring | Stefano Calzavara, Riccardo Focardi, Matteo Maffei, Clara Schneidewind, Marco Squarcina, Mauro Tempesta |
USENIX Security '18 | Analysis of Privacy Protections in Fitness Tracking Social Networks -or- You can run, but can you hide? | Wajih Ul Hassan, Saad Hussain, Adam Bates |
USENIX Security '18 | Inception: System-Wide Security Testing of Real-World Embedded Systems Software | Nassim Corteggiani, Giovanni Camurati, Aurélien Francillon |
USENIX Security '18 | Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer | Thanh Bui, Siddharth Prakash Rao, Markku Antikainen, Viswanathan Manihatty Bojan, Tuomas Aura |
USENIX Security '18 | ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem | Dave (Jing) Tian, Grant Hernandez, Joseph I. Choi, Vanessa Frost, Christie Raules, Patrick Traynor, Hayawardh Vijayakumar, Lee Harrison, Amir Rahmati, Michael Grace, Kevin R. B. Butler |
USENIX Security '18 | FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities | Wei Wu, Yueqi Chen, Jun Xu, Xinyu Xing, Xiaorui Gong, Wei Zou |
USENIX Security '18 | The Rewards and Costs of Stronger Passwords in a University: Linking Password Lifetime to Strength | Ingolf Becker, Simon Parkin, M. Angela Sasse |
USENIX Security '18 | Practical Accountability of Secret Processes | Jonathan Frankle, Sunoo Park, Daniel Shaar, Shafi Goldwasser, Daniel Weitzner |
USENIX Security '18 | Sensitive Information Tracking in Commodity IoT | Z. Berkay Celik, Leonardo Babun, Amit Kumar Sikder, Hidayet Aksu, Gang Tan, Patrick McDaniel, A. Selcuk Uluagac |
USENIX Security '18 | Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels | Damian Poddebniak, Christian Dresen, Jens Müller, Fabian Ising, Sebastian Schinzel, Simon Friedberger, Juraj Somorovsky, Jörg Schwenk |
USENIX Security '18 | The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX | Andrea Biondo, Mauro Conti, Lucas Davi, Tommaso Frassetto, Ahmad-Reza Sadeghi |
USENIX Security '18 | Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow Tagging and Tracking | Yang Ji, Sangho Lee, Mattia Fazzini, Joey Allen, Evan Downing, Taesoo Kim, Alessandro Orso, Wenke Lee |
USENIX Security '18 | Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks | Ben Gras, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida |
USENIX Security '18 | The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level | Rock Stevens, Daniel Votipka, Elissa M. Redmiles, Colin Ahern, Patrick Sweeney, Michelle L. Mazurek |
USENIX Security '18 | A Sense of Time for JavaScript and Node.js: First-Class Timeouts as a Cure for Event Handler Poisoning | James C. Davis, Eric R. Williamson, Dongyoon Lee |
USENIX Security '18 | The Broken Shield: Measuring Revocation Effectiveness in the Windows Code-Signing PKI | Doowon Kim, Bum Jun Kwon, Kristián Kozák, Christopher Gates, Tudor Dumitraș |
USENIX Security '18 | Guarder: A Tunable Secure Allocator | Sam Silvestro, Hongyu Liu, Tianyi Liu, Zhiqiang Lin, Tongping Liu |
USENIX Security '18 | teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts | Johannes Krupp, Christian Rossow |
USENIX Security '18 | How Do Tor Users Interact With Onion Services? | Philipp Winter, Anne Edmundson, Laura M. Roberts, Agnieszka Dutkowska-Żuk, Marshini Chetty, Nick Feamster |
USENIX Security '18 | Shielding Software From Privileged Side-Channel Attacks | Xiaowan Dong, Zhuojia Shen, John Criswell, Alan L. Cox, Sandhya Dwarkadas |
USENIX Security '18 | Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning | Hamza Harkous, Kassem Fawaz, Rémi Lebret, Florian Schaub, Kang G. Shin, Karl Aberer |
USENIX Security '18 | Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts | Lorenz Breidenbach, Phil Daian, Florian Tramer, Ari Juels |
USENIX Security '18 | Tackling runtime-based obfuscation in Android with TIRO | Michelle Y. Wong, David Lie |
USENIX Security '18 | All Your GPS Are Belong To Us: Towards Stealthy Manipulation of Road Navigation Systems | Kexiong (Curtis) Zeng, Shinan Liu, Yuanchao Shu, Dong Wang, Haoyu Li, Yanzhi Dou, Gang Wang, Yaling Yang |
USENIX Security '18 | Meltdown: Reading Kernel Memory from User Space | Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg |