Search results

    USENIX Security '20Local Model Poisoning Attacks to Byzantine-Robust Federated Learning
    USENIX Security '20Zero-delay Lightweight Defenses against Website Fingerprinting
    USENIX Security '20Devil’s Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices
    USENIX Security '20HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation
    USENIX Security '20That Was Then, This Is Now: A Security Evaluation of Password Generation, Storage, and Autofill in Browser-Based Password Managers
    USENIX Security '20Estonian Electronic Identity Card: Security Flaws in Key Management
    USENIX Security '20PCKV: Locally Differentially Private Correlated Key-Value Data Collection with Optimized Utility
    USENIX Security '20Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning
    USENIX Security '20Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheck
    USENIX Security '20Exploring Connections Between Active Learning and Model Extraction
    USENIX Security '20Achieving Keyless CDNs with Conclaves
    USENIX Security '20On Training Robust PDF Malware Classifiers
    USENIX Security '20Programmable In-Network Security for Context-aware BYOD Policies
    USENIX Security '20FuzzGuard: Filtering out Unreachable Inputs in Directed Grey-box Fuzzing through Deep Learning
    USENIX Security '20Data Recovery from “Scrubbed” NAND Flash Storage: Need for Analog Sanitization
    USENIX Security '20Pixel: Multi-signatures for Consensus
    USENIX Security '20Secure parallel computation on national scale volumes of data
    USENIX Security '20Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries
    USENIX Security '20BigMAC: Fine-Grained Policy Analysis of Android Firmware
    USENIX Security '20McTiny: Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers
    USENIX Security '20Security Analysis of Unified Payments Interface and Payment Apps in India
    USENIX Security '20Void: A fast and light voice liveness detection system
    NSDI '20Experiences with Modeling Network Topologies at Multiple Levels of Abstraction Jeffrey C. Mogul, Drago Goricanec, Martin Pool, Anees Shaikh, Douglas Turk, Bikash Koley, Xiaoxue Zhao
    NSDI '20Frequency Configuration for Low-Power Wide-Area Networks in a Heartbeat Akshay Gadre, Revathy Narayanan, Anh Luong, Anthony Rowe, Bob Iannucci, Swarun Kumar
    NSDI '20Re-architecting Congestion Management in Lossless EthernetWenxue Cheng, Kun Qian, Wanchun Jiang, Tong Zhang, Fengyuan Ren