Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '20Devil’s Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition DevicesYuxuan Chen, Xuejing Yuan, Jiangshan Zhang, Yue Zhao, Shengzhi Zhang, Kai Chen, XiaoFeng Wang
    USENIX Security '20Secure parallel computation on national scale volumes of dataSahar Mazloom, Phi Hung Le, Samuel Ranellucci, S. Dov Gordon
    USENIX Security '20ETHBMC: A Bounded Model Checker for Smart ContractsJoel Frank, Cornelius Aschermann, Thorsten Holz
    USENIX Security '20Fuzzing Error Handling Code using Context-Sensitive Software Fault InjectionZu-Ming Jiang, Jia-Ju Bai, Kangjie Lu, Shi-Min Hu
    USENIX Security '20SEAL: Attack Mitigation for Encrypted Databases via Adjustable LeakageIoannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou, Saurabh Shintre
    USENIX Security '20Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable SystemsTakeshi Sugawara, Benjamin Cyr, Sara Rampazzi, Daniel Genkin, Kevin Fu
    USENIX Security '20Remote Side-Channel Attacks on Anonymous TransactionsFlorian Tramer, Dan Boneh, Kenny Paterson
    USENIX Security '20Preech: A System for Privacy-Preserving Speech TranscriptionShimaa Ahmed, Amrita Roy Chowdhury, Kassem Fawaz, Parmesh Ramanathan
    USENIX Security '20Pancake: Frequency Smoothing for Encrypted Data StoresPaul Grubbs, Anurag Khandelwal, Marie-Sarah Lacharité, Lloyd Brown, Lucy Li, Rachit Agarwal, Thomas Ristenpart
    USENIX Security '20SkillExplorer: Understanding the Behavior of Skills in Large ScaleZhixiu Guo, Zijin Lin, Pan Li, Kai Chen
    USENIX Security '20USBFuzz: A Framework for Fuzzing USB Drivers by Device EmulationHui Peng, Mathias Payer
    USENIX Security '20TXSPECTOR: Uncovering Attacks in Ethereum from TransactionsMengya Zhang, Xiaokuan Zhang, Yinqian Zhang, Zhiqiang Lin
    USENIX Security '20Droplet: Decentralized Authorization and Access Control for Encrypted Data StreamsHossein Shafagh, Lukas Burkhalter, Sylvia Ratnasamy, Anwar Hithnawi
    USENIX Security '20PHMon: A Programmable Hardware Monitor and Its Security Use CasesLeila Delshadtehrani, Sadullah Canakci, Boyou Zhou, Schuyler Eldridge, Ajay Joshi, Manuel Egele
    USENIX Security '20McTiny: Fast High-Confidence Post-Quantum Key Erasure for Tiny Network ServersDaniel J. Bernstein, Tanja Lange
    USENIX Security '20HALucinator: Firmware Re-hosting Through Abstraction Layer EmulationAbraham A Clements, Eric Gustafson, Tobias Scharnowski, Paul Grosen, David Fritz, Christopher Kruegel, Giovanni Vigna, Saurabh Bagchi, Mathias Payer
    USENIX Security '20Achieving Keyless CDNs with ConclavesStephen Herwig, Christina Garman, Dave Levin
    USENIX Security '20Montage: A Neural Network Language Model-Guided JavaScript Engine FuzzerSuyoung Lee, HyungSeok Han, Sang Kil Cha, Sooel Son
    USENIX Security '20Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited QueriesFnu Suya, Jianfeng Chi, David Evans, Yuan Tian
    USENIX Security '20Big Numbers - Big Troubles: Systematically Analyzing Nonce Leakage in (EC)DSA ImplementationsSamuel Weiser, David Schrammel, Lukas Bodner, Raphael Spreitzer
    USENIX Security '20APEX: A Verified Architecture for Proofs of Execution on Remote Devices under Full Software CompromiseIvan De Oliveira Nunes, Karim Eldefrawy, Norrathep Rattanavipanon, Gene Tsudik
    USENIX Security '20From Needs to Actions to Secure Apps? The Effect of Requirements and Developer Practices on App SecurityCharles Weir, Ben Hermann, Sascha Fahl
    USENIX Security '20Datalog DisassemblyAntonio Flores-Montoya, Eric Schulte
    USENIX Security '20RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache AttacksSamira Briongos, Pedro Malagón, José M. Moya, Thomas Eisenbarth
    USENIX Security '20EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed BanditTai Yue, Pengfei Wang, Yong Tang, Enze Wang, Bo Yu, Kai Lu, Xu Zhou

Pages