Search results

    USENIX Security '21Identifying Harmful Media in End-to-End Encrypted Communication: Efficient Private Membership ComputationAnunay Kulshrestha, Jonathan Mayer
    USENIX Security '21Why Older Adults (Don't) Use Password ManagersHirak Ray, Flynn Wolf, Ravi Kuber, Adam J. Aviv
    USENIX Security '21Charger-Surfing: Exploiting a Power Line Side-Channel for Smartphone Information LeakagePatrick Cronin, Xing Gao, Chengmo Yang, Haining Wang
    USENIX Security '21Finding Bugs Using Your Own Code: Detecting Functionally-similar yet Inconsistent CodeMansour Ahmadi, Reza Mirzazade Farkhani, Ryan Williams, Long Lu
    USENIX Security '21Assessing Browser-level Defense against IDN-based PhishingHang Hu, Steve T.K. Jan, Yang Wang, Gang Wang
    USENIX Security '21An Investigation of the Android Kernel Patch EcosystemZheng Zhang, Hang Zhang, Zhiyun Qian, Billy Lau
    USENIX Security '21Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E)Robert Merget, Marcus Brinkmann, Nimrod Aviram, Juraj Somorovsky, Johannes Mittmann, Jörg Schwenk
    USENIX Security '21" quiet!" Reducing the Unwanted Interruptions of Notification Permission Prompts on ChromeIgor Bilogrevic, Balazs Engedy, Judson L. Porter III, Nina Taft, Kamila Hasanbega, Andrew Paseltiner, Hwi Kyoung Lee, Edward Jung, Meggyn Watkins, PJ McLachlan, Jason James
    USENIX Security '21Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android ApplicationsMarten Oltrogge, Nicolas Huaman, Sabrina Amft, Yasemin Acar, Michael Backes, Sascha Fahl
    USENIX Security '21Poseidon: A New Hash Function for Zero-Knowledge Proof SystemsLorenzo Grassi, Dmitry Khovratovich, Christian Rechberger, Arnab Roy, Markus Schofnegger
    USENIX Security '21ATLAS: A Sequence-based Learning Approach for Attack InvestigationAbdulellah Alsaheel, Yuhong Nan, Shiqing Ma, Le Yu, Gregory Walkup, Z. Berkay Celik, Xiangyu Zhang, Dongyan Xu
    USENIX Security '21CADE: Detecting and Explaining Concept Drift Samples for Security ApplicationsLimin Yang, Wenbo Guo, Qingying Hao, Arridhana Ciptadi, Ali Ahmadzadeh, Xinyu Xing, Gang Wang
    USENIX Security '21Adversarial Policy Training against Deep Reinforcement LearningXian Wu, Wenbo Guo, Hua Wei, Xinyu Xing
    USENIX Security '21Security Analysis of the Democracy Live Online Voting SystemMichael Specter, J. Alex Halderman
    USENIX Security '21PriSEC: A Privacy Settings Enforcement ControllerRishabh Khandelwal, Thomas Linden, Hamza Harkous, Kassem Fawaz
    USENIX Security '21Ripple: A Programmable, Decentralized Link-Flooding Defense Against Adaptive AdversariesJiarong Xing, Wenqing Wu, Ang Chen
    USENIX Security '21Blinder: Partition-Oblivious Hierarchical SchedulingMan-Ki Yoon, Mengqi Liu, Hao Chen, Jung-Eun Kim, Zhong Shao
    USENIX Security '21Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine TypesSergej Schumilo, Cornelius Aschermann, Ali Abbasi, Simon Wör­ner, Thorsten Holz
    USENIX Security '21Saphire: Sandboxing PHP Applications with Tailored System Call AllowlistsAlexander Bulekov, Rasoul Jahanshahi, Manuel Egele
    USENIX Security '21KeyForge: Non-Attributable Email from Forward-Forgeable SignaturesMichael A. Specter, Sunoo Park, Matthew Green
    USENIX Security '21PEARL: Plausibly Deniable Flash Translation Layer using WOM codingChen Chen, Anrin Chakraborti, Radu Sion
    USENIX Security '21SHARD: Fine-Grained Kernel Specialization with Context-Aware HardeningMuhammad Abubakar, Adil Ahmad, Pedro Fonseca, Dongyan Xu
    USENIX Security '21Preventing Use-After-Free Attacks with Fast Forward AllocationBrian Wickman, Hong Hu, Insu Yun, Daehee Jang, JungWon Lim, Sanidhya Kashyap, Taesoo Kim
    USENIX Security '21Partitioning Oracle AttacksJulia Len, Paul Grubbs, Thomas Ristenpart
    USENIX Security '21Understanding and Detecting Disordered Error Handling with Precise Function PairingQiushi Wu, Aditya Pakki, Navid Emamdoost, Stephen McCamant, Kangjie Lu