USENIX Security '20 | Devil’s Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices | Yuxuan Chen, Xuejing Yuan, Jiangshan Zhang, Yue Zhao, Shengzhi Zhang, Kai Chen, XiaoFeng Wang |
USENIX Security '20 | Secure parallel computation on national scale volumes of data | Sahar Mazloom, Phi Hung Le, Samuel Ranellucci, S. Dov Gordon |
USENIX Security '20 | ETHBMC: A Bounded Model Checker for Smart Contracts | Joel Frank, Cornelius Aschermann, Thorsten Holz |
USENIX Security '20 | Fuzzing Error Handling Code using Context-Sensitive Software Fault Injection | Zu-Ming Jiang, Jia-Ju Bai, Kangjie Lu, Shi-Min Hu |
USENIX Security '20 | SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage | Ioannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou, Saurabh Shintre |
USENIX Security '20 | Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems | Takeshi Sugawara, Benjamin Cyr, Sara Rampazzi, Daniel Genkin, Kevin Fu |
USENIX Security '20 | Remote Side-Channel Attacks on Anonymous Transactions | Florian Tramer, Dan Boneh, Kenny Paterson |
USENIX Security '20 | Preech: A System for Privacy-Preserving Speech Transcription | Shimaa Ahmed, Amrita Roy Chowdhury, Kassem Fawaz, Parmesh Ramanathan |
USENIX Security '20 | Pancake: Frequency Smoothing for Encrypted Data Stores | Paul Grubbs, Anurag Khandelwal, Marie-Sarah Lacharité, Lloyd Brown, Lucy Li, Rachit Agarwal, Thomas Ristenpart |
USENIX Security '20 | SkillExplorer: Understanding the Behavior of Skills in Large Scale | Zhixiu Guo, Zijin Lin, Pan Li, Kai Chen |
USENIX Security '20 | USBFuzz: A Framework for Fuzzing USB Drivers by Device Emulation | Hui Peng, Mathias Payer |
USENIX Security '20 | TXSPECTOR: Uncovering Attacks in Ethereum from Transactions | Mengya Zhang, Xiaokuan Zhang, Yinqian Zhang, Zhiqiang Lin |
USENIX Security '20 | Droplet: Decentralized Authorization and Access Control for Encrypted Data Streams | Hossein Shafagh, Lukas Burkhalter, Sylvia Ratnasamy, Anwar Hithnawi |
USENIX Security '20 | PHMon: A Programmable Hardware Monitor and Its Security Use Cases | Leila Delshadtehrani, Sadullah Canakci, Boyou Zhou, Schuyler Eldridge, Ajay Joshi, Manuel Egele |
USENIX Security '20 | McTiny: Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers | Daniel J. Bernstein, Tanja Lange |
USENIX Security '20 | HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation | Abraham A Clements, Eric Gustafson, Tobias Scharnowski, Paul Grosen, David Fritz, Christopher Kruegel, Giovanni Vigna, Saurabh Bagchi, Mathias Payer |
USENIX Security '20 | Achieving Keyless CDNs with Conclaves | Stephen Herwig, Christina Garman, Dave Levin |
USENIX Security '20 | Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer | Suyoung Lee, HyungSeok Han, Sang Kil Cha, Sooel Son |
USENIX Security '20 | Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries | Fnu Suya, Jianfeng Chi, David Evans, Yuan Tian |
USENIX Security '20 | Big Numbers - Big Troubles: Systematically Analyzing Nonce Leakage in (EC)DSA Implementations | Samuel Weiser, David Schrammel, Lukas Bodner, Raphael Spreitzer |
USENIX Security '20 | APEX: A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise | Ivan De Oliveira Nunes, Karim Eldefrawy, Norrathep Rattanavipanon, Gene Tsudik |
USENIX Security '20 | From Needs to Actions to Secure Apps? The Effect of Requirements and Developer Practices on App Security | Charles Weir, Ben Hermann, Sascha Fahl |
USENIX Security '20 | Datalog Disassembly | Antonio Flores-Montoya, Eric Schulte |
USENIX Security '20 | RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks | Samira Briongos, Pedro Malagón, José M. Moya, Thomas Eisenbarth |
USENIX Security '20 | EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed Bandit | Tai Yue, Pengfei Wang, Yong Tang, Enze Wang, Bo Yu, Kai Lu, Xu Zhou |