Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '20Stealthy Tracking of Autonomous Vehicles with Cache Side Channels
    USENIX Security '20Secure parallel computation on national scale volumes of data
    USENIX Security '20(Mostly) Exitless VM Protection from Untrusted Hypervisor through Disaggregated Nested Virtualization
    USENIX Security '20Cached and Confused: Web Cache Deception in the Wild
    USENIX Security '20ShadowMove: A Stealthy Lateral Movement Strategy
    USENIX Security '20Estonian Electronic Identity Card: Security Flaws in Key Management
    USENIX Security '20SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants
    USENIX Security '20Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning
    USENIX Security '20Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries
    USENIX Security '20Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It
    USENIX Security '20An Observational Investigation of Reverse Engineers’ Processes
    USENIX Security '20Big Numbers - Big Troubles: Systematically Analyzing Nonce Leakage in (EC)DSA Implementations
    USENIX Security '20SmartVerif: Push the Limit of Automation Capability of Verifying Security Protocols by Dynamic Strategies
    USENIX Security '20The Impact of Ad-Blockers on Product Search and Purchase Behavior: A Lab ExperimentAlisa Frik, Amelia Haviland, Alessandro Acquisti
    USENIX Security '20Cardpliance: PCI DSS Compliance of Android ApplicationsSamin Yaseer Mahmud, Akhil Acharya, Benjamin Andow, William Enck, Bradley Reaves
    USENIX Security '20Composition Kills: A Case Study of Email Sender AuthenticationJianjun Chen, Vern Paxson, Jian Jiang
    USENIX Security '20High Accuracy and High Fidelity Extraction of Neural NetworksMatthew Jagielski, Nicholas Carlini, David Berthelot, Alex Kurakin, Nicolas Papernot
    USENIX Security '20'I have too much respect for my elders': Understanding South African Mobile Users' Perceptions of Privacy and Current Behaviors on Facebook and WhatsAppJake Reichel, Fleming Peck, Mikako Inaba, Bisrat Moges, Brahmnoor Singh Chawla, Marshini Chetty
    USENIX Security '20SpecFuzz: Bringing Spectre-type vulnerabilities to the surfaceOleksii Oleksenko, Bohdan Trach, Mark Silberstein, Christof Fetzer
    USENIX Security '20APEX: A Verified Architecture for Proofs of Execution on Remote Devices under Full Software CompromiseIvan De Oliveira Nunes, Karim Eldefrawy, Norrathep Rattanavipanon, Gene Tsudik
    USENIX Security '20From Needs to Actions to Secure Apps? The Effect of Requirements and Developer Practices on App SecurityCharles Weir, Ben Hermann, Sascha Fahl
    USENIX Security '20Datalog DisassemblyAntonio Flores-Montoya, Eric Schulte
    USENIX Security '20NetWarden: Mitigating Network Covert Channels while Preserving PerformanceJiarong Xing, Qiao Kang, Ang Chen
    USENIX Security '20RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache AttacksSamira Briongos, Pedro Malagon, Jose M. Moya, Thomas Eisenbarth
    USENIX Security '20ParmeSan: Sanitizer-guided Greybox FuzzingSebastian Österlund, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida

Pages