Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '20Automatic Techniques to Systematically Discover New Heap Exploitation PrimitivesInsu Yun, Dhaval Kapil, Taesoo Kim
    USENIX Security '20A Tale of Two Headers: A Formal Analysis of Inconsistent Click-Jacking Protection on the WebStefano Calzavara, Sebastian Roth, Alvise Rabitti, Michael Backes, Ben Stock
    USENIX Security '20Automating the Development of Chosen Ciphertext AttacksGabrielle Beck, Maximilian Zinkus, Matthew Green
    USENIX Security '20Analysis of DTLS Implementations Using Protocol State FuzzingPaul Fiterau-Brostean, Bengt Jonsson, Robert Merget, Joeri de Ruiter, Konstantinos Sagonas, Juraj Somorovsky
    USENIX Security '20Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks in Machine LearningErwin Quiring, David Klein, Daniel Arp, Martin Johns, Konrad Rieck
    USENIX Security '20Retrofitting Fine Grain Isolation in the Firefox RendererShravan Narayan, Craig Disselkoen, Tal Garfinkel, Nathan Froyd, Eric Rahm, Sorin Lerner, Hovav Shacham, Deian Stefan
    USENIX Security '20A Longitudinal and Comprehensive Study of the DANE Ecosystem in EmailHyeonmin Lee, Aniketh Gireesh, Roland van Rijswijk-Deij, Taekyoung "Ted" Kwon, Taejoong Chung
    USENIX Security '20A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman ProtocolsGuillaume Girol, Lucca Hirschi, Ralf Sasse, Dennis Jackson, Cas Cremers, David Basin
    USENIX Security '20Measuring and Modeling the Label Dynamics of Online Anti-Malware EnginesShuofei Zhu, Jianjun Shi, Limin Yang, Boqin Qin, Ziyi Zhang, Linhai Song, Gang Wang
    USENIX Security '20FANS: Fuzzing Android Native System Services via Automated Interface AnalysisBaozheng Liu, Chao Zhang, Guang Gong, Yishun Zeng, Haifeng Ruan, Jianwei Zhuge
    USENIX Security '20Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation TargetsJan Ruge, Jiska Classen, Francesco Gringoli, Matthias Hollick
    USENIX Security '20Certified Side ChannelsCesar Pereida García, Sohaib ul Hassan, Nicola Tuveri, Iaroslav Gridin, Alejandro Cabrera Aldaya, Billy Bob Brumley
    USENIX Security '20Silhouette: Efficient Protected Shadow Stacks for Embedded SystemsJie Zhou, Yufei Du, Zhuojia Shen, Lele Ma, John Criswell, Robert J. Walls
    USENIX Security '20An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum EcosystemShunfan Zhou, Zhemin Yang, Jie Xiang, Yinzhi Cao, Zhemin Yang, Yuan Zhang
    USENIX Security '20Scaling Verifiable Computation Using Efficient Set AccumulatorsAlex Ozdemir, Riad Wahby, Barry Whitehat, Dan Boneh
    USENIX Security '20Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine CheckpointsDokyung Song, Felicitas Hetzelt, Jonghwan Kim, Brent Byunghoon Kang, Jean-Pierre Seifert, Michael Franz
    USENIX Security '20SENG, the SGX-Enforcing Network Gateway: Authorizing Communication from Shielded ClientsFabian Schwarz, Christian Rossow
    USENIX Security '20A Comprehensive Quality Evaluation of Security and Privacy Advice on the WebElissa M. Redmiles, Noel Warford, Amritha Jayanti, Aravind Koneru, Sean Kross, Miraida Morales, Rock Stevens, Michelle L. Mazurek
    USENIX Security '20Donky: Domain Keys – Efficient In-Process Isolation for RISC-V and x86David Schrammel, Samuel Weiser, Stefan Steinegger, Martin Schwarzl, Michael Schwarz, Stefan Mangard, Daniel Gruss
    USENIX Security '20Temporal System Call Specialization for Attack Surface ReductionSeyedhamed Ghavamnia, Tapti Palit, Shachee Mishra, Michalis Polychronakis
    USENIX Security '20Symbolic execution with SymCC: Don't interpret, compile!Sebastian Poeplau, Aurélien Francillon
    USENIX Security '20Chaperone: Real-time Locking and Loss Prevention for SmartphonesJiayi Chen, Urs Hengartner, Hassan Khan, Mohammad Mannan
    USENIX Security '20A Formal Analysis of IEEE 802.11's WPA2: Countering the Kracks Caused by Cracking the CountersCas Cremers, Benjamin Kiesl, Niklas Medinger
    USENIX Security '20Towards HTTPS Everywhere on Android: We Are Not There YetAndrea Possemato, Yanick Fratantonio
    USENIX Security '20BlockSci: Design and applications of a blockchain analysis platformHarry Kalodner, Malte Möser, Kevin Lee, Steven Goldfeder, Martin Plattner, Alishah Chator, Arvind Narayanan

Pages