Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '21ABY2.0: Improved Mixed-Protocol Secure Two-Party ComputationArpita Patra, Thomas Schneider, Ajith Suresh, Hossein Yalame
    USENIX Security '21"It's the Company, the Government, You and I": User Perceptions of Responsibility for Smart Home Privacy and SecurityJulie Haney, Yasemin Acar, Susanne Furman
    USENIX Security '21Identifying Harmful Media in End-to-End Encrypted Communication: Efficient Private Membership ComputationAnunay Kulshrestha, Jonathan Mayer
    USENIX Security '21Why Older Adults (Don't) Use Password ManagersHirak Ray, Flynn Wolf, Ravi Kuber, Adam J. Aviv
    USENIX Security '21Charger-Surfing: Exploiting a Power Line Side-Channel for Smartphone Information LeakagePatrick Cronin, Xing Gao, Chengmo Yang, Haining Wang
    USENIX Security '21Finding Bugs Using Your Own Code: Detecting Functionally-similar yet Inconsistent CodeMansour Ahmadi, Reza Mirzazade Farkhani, Ryan Williams, Long Lu
    USENIX Security '21Assessing Browser-level Defense against IDN-based PhishingHang Hu, Steve T.K. Jan, Yang Wang, Gang Wang
    USENIX Security '21An Investigation of the Android Kernel Patch EcosystemZheng Zhang, Hang Zhang, Zhiyun Qian, Billy Lau
    USENIX Security '21Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E)Robert Merget, Marcus Brinkmann, Nimrod Aviram, Juraj Somorovsky, Johannes Mittmann, Jörg Schwenk
    USENIX Security '21"Shhh...be quiet!" Reducing the Unwanted Interruptions of Notification Permission Prompts on ChromeIgor Bilogrevic, Balazs Engedy, Judson L. Porter III, Nina Taft, Kamila Hasanbega, Andrew Paseltiner, Hwi Kyoung Lee, Edward Jung, Meggyn Watkins, PJ McLachlan, Jason James
    USENIX Security '21Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android ApplicationsMarten Oltrogge, Nicolas Huaman, Sabrina Amft, Yasemin Acar, Michael Backes, Sascha Fahl
    USENIX Security '21Poseidon: A New Hash Function for Zero-Knowledge Proof SystemsLorenzo Grassi, Dmitry Khovratovich, Christian Rechberger, Arnab Roy, Markus Schofnegger
    USENIX Security '21ATLAS: A Sequence-based Learning Approach for Attack InvestigationAbdulellah Alsaheel, Yuhong Nan, Shiqing Ma, Le Yu, Gregory Walkup, Z. Berkay Celik, Xiangyu Zhang, Dongyan Xu
    USENIX Security '21CADE: Detecting and Explaining Concept Drift Samples for Security ApplicationsLimin Yang, Wenbo Guo, Qingying Hao, Arridhana Ciptadi, Ali Ahmadzadeh, Xinyu Xing, Gang Wang
    USENIX Security '21Adversarial Policy Training against Deep Reinforcement LearningXian Wu, Wenbo Guo, Hua Wei, Xinyu Xing
    USENIX Security '21Security Analysis of the Democracy Live Online Voting SystemMichael Specter, J. Alex Halderman
    USENIX Security '21PriSEC: A Privacy Settings Enforcement ControllerRishabh Khandelwal, Thomas Linden, Hamza Harkous, Kassem Fawaz
    USENIX Security '21Ripple: A Programmable, Decentralized Link-Flooding Defense Against Adaptive AdversariesJiarong Xing, Wenqing Wu, Ang Chen
    USENIX Security '21Blinder: Partition-Oblivious Hierarchical SchedulingMan-Ki Yoon, Mengqi Liu, Hao Chen, Jung-Eun Kim, Zhong Shao
    USENIX Security '21Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine TypesSergej Schumilo, Cornelius Aschermann, Ali Abbasi, Simon Wör­ner, Thorsten Holz
    USENIX Security '21Saphire: Sandboxing PHP Applications with Tailored System Call AllowlistsAlexander Bulekov, Rasoul Jahanshahi, Manuel Egele
    USENIX Security '21Smart Contract Vulnerabilities: Vulnerable Does Not Imply ExploitedDaniel Perez, Ben Livshits
    USENIX Security '21KeyForge: Non-Attributable Email from Forward-Forgeable SignaturesMichael A. Specter, Sunoo Park, Matthew Green
    USENIX Security '21You Autocomplete Me: Poisoning Vulnerabilities in Neural Code CompletionRoei Schuster, Congzheng Song, Eran Tromer, Vitaly Shmatikov
    USENIX Security '21PEARL: Plausibly Deniable Flash Translation Layer using WOM codingChen Chen, Anrin Chakraborti, Radu Sion

Pages