USENIX Security '20 | Automatic Techniques to Systematically Discover New Heap Exploitation Primitives | Insu Yun, Dhaval Kapil, Taesoo Kim |
USENIX Security '20 | A Tale of Two Headers: A Formal Analysis of Inconsistent Click-Jacking Protection on the Web | Stefano Calzavara, Sebastian Roth, Alvise Rabitti, Michael Backes, Ben Stock |
USENIX Security '20 | Automating the Development of Chosen Ciphertext Attacks | Gabrielle Beck, Maximilian Zinkus, Matthew Green |
USENIX Security '20 | Analysis of DTLS Implementations Using Protocol State Fuzzing | Paul Fiterau-Brostean, Bengt Jonsson, Robert Merget, Joeri de Ruiter, Konstantinos Sagonas, Juraj Somorovsky |
USENIX Security '20 | Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks in Machine Learning | Erwin Quiring, David Klein, Daniel Arp, Martin Johns, Konrad Rieck |
USENIX Security '20 | Retrofitting Fine Grain Isolation in the Firefox Renderer | Shravan Narayan, Craig Disselkoen, Tal Garfinkel, Nathan Froyd, Eric Rahm, Sorin Lerner, Hovav Shacham, Deian Stefan |
USENIX Security '20 | A Longitudinal and Comprehensive Study of the DANE Ecosystem in Email | Hyeonmin Lee, Aniketh Gireesh, Roland van Rijswijk-Deij, Taekyoung "Ted" Kwon, Taejoong Chung |
USENIX Security '20 | A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols | Guillaume Girol, Lucca Hirschi, Ralf Sasse, Dennis Jackson, Cas Cremers, David Basin |
USENIX Security '20 | Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines | Shuofei Zhu, Jianjun Shi, Limin Yang, Boqin Qin, Ziyi Zhang, Linhai Song, Gang Wang |
USENIX Security '20 | FANS: Fuzzing Android Native System Services via Automated Interface Analysis | Baozheng Liu, Chao Zhang, Guang Gong, Yishun Zeng, Haifeng Ruan, Jianwei Zhuge |
USENIX Security '20 | Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets | Jan Ruge, Jiska Classen, Francesco Gringoli, Matthias Hollick |
USENIX Security '20 | Certified Side Channels | Cesar Pereida García, Sohaib ul Hassan, Nicola Tuveri, Iaroslav Gridin, Alejandro Cabrera Aldaya, Billy Bob Brumley |
USENIX Security '20 | Silhouette: Efficient Protected Shadow Stacks for Embedded Systems | Jie Zhou, Yufei Du, Zhuojia Shen, Lele Ma, John Criswell, Robert J. Walls |
USENIX Security '20 | An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem | Shunfan Zhou, Zhemin Yang, Jie Xiang, Yinzhi Cao, Zhemin Yang, Yuan Zhang |
USENIX Security '20 | Scaling Verifiable Computation Using Efficient Set Accumulators | Alex Ozdemir, Riad Wahby, Barry Whitehat, Dan Boneh |
USENIX Security '20 | Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints | Dokyung Song, Felicitas Hetzelt, Jonghwan Kim, Brent Byunghoon Kang, Jean-Pierre Seifert, Michael Franz |
USENIX Security '20 | SENG, the SGX-Enforcing Network Gateway: Authorizing Communication from Shielded Clients | Fabian Schwarz, Christian Rossow |
USENIX Security '20 | A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web | Elissa M. Redmiles, Noel Warford, Amritha Jayanti, Aravind Koneru, Sean Kross, Miraida Morales, Rock Stevens, Michelle L. Mazurek |
USENIX Security '20 | Donky: Domain Keys – Efficient In-Process Isolation for RISC-V and x86 | David Schrammel, Samuel Weiser, Stefan Steinegger, Martin Schwarzl, Michael Schwarz, Stefan Mangard, Daniel Gruss |
USENIX Security '20 | Temporal System Call Specialization for Attack Surface Reduction | Seyedhamed Ghavamnia, Tapti Palit, Shachee Mishra, Michalis Polychronakis |
USENIX Security '20 | Symbolic execution with SymCC: Don't interpret, compile! | Sebastian Poeplau, Aurélien Francillon |
USENIX Security '20 | Chaperone: Real-time Locking and Loss Prevention for Smartphones | Jiayi Chen, Urs Hengartner, Hassan Khan, Mohammad Mannan |
USENIX Security '20 | A Formal Analysis of IEEE 802.11's WPA2: Countering the Kracks Caused by Cracking the Counters | Cas Cremers, Benjamin Kiesl, Niklas Medinger |
USENIX Security '20 | Towards HTTPS Everywhere on Android: We Are Not There Yet | Andrea Possemato, Yanick Fratantonio |
USENIX Security '20 | BlockSci: Design and applications of a blockchain analysis platform | Harry Kalodner, Malte Möser, Kevin Lee, Steven Goldfeder, Martin Plattner, Alishah Chator, Arvind Narayanan |