Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '19All Things Considered: An Analysis of IoT Devices on Home NetworksDeepak Kumar, Kelly Shen, Benton Case, Deepali Garg, Galina Alperovich, Dmitry Kuznetsov, Rajarshi Gupta, Zakir Durumeric
    USENIX Security '19uXOM: Efficient eXecute-Only Memory on ARM Cortex-MDonghyun Kwon, Jangseop Shin, Giyeol Kim, Byoungyoung Lee, Yeongpil Cho, Yunheung Paek
    USENIX Security '19Understanding iOS-based Crowdturfing Through Hidden UI AnalysisYeonjoon Lee, Xueqiang Wang, Kwangwuk Lee, Xiaojing Liao, XiaoFeng Wang, Tongxin Li, Xianghang Mi
    USENIX Security '19No Right to Remain Silent: Isolating Malicious MixesHemi Leibowitz, Ania M. Piotrowska, George Danezis, Amir Herzberg
    USENIX Security '19Protecting Cloud Virtual Machines from Hypervisor and Host Operating System ExploitsShih-Wei Li, John S. Koh, Jason Nieh
    USENIX Security '19Exploiting Unprotected I/O Operations in AMD’s Secure Encrypted VirtualizationMengyuan Li, Yinqian Zhang, Zhiqiang Lin, Yan Solihin
    USENIX Security '19Detecting Missing-Check Bugs via Semantic- and Context-Aware Criticalness and Constraints InferencesKangjie Lu, Aditya Pakki, Qiushi Wu
    USENIX Security '19MOPT: Optimized Mutation Scheduling for FuzzersChenyang Lyu, Shouling Ji, Chao Zhang, Yuwei Li, Wei-Han Lee, Yu Song, Raheem Beyah
    USENIX Security '19CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep LearningYisroel Mirsky, Tom Mahler, Ilan Shelef, Yuval Elovici
    USENIX Security '19What Are You Searching For? A Remote Keylogging Attack on Search Engine AutocompleteJohn V. Monaco
    USENIX Security '19Utility-Optimized Local Differential Privacy Mechanisms for Distribution EstimationTakao Murakami, Yusuke Kawamoto
    USENIX Security '19Platforms in Everything: Analyzing Ground-Truth Data on the Anatomy and Economics of Bullet-Proof HostingArman Noroozian, Jan Koenders, Eelco van Veldhuizen, Carlos H. Ganan, Sumayah Alrwais, Damon McCoy, Michel van Eeten
    USENIX Security '19EnTrust: Regulating Sensor Access by Cooperating Programs via Delegation GraphsGiuseppe Petracca, Yuqiong Sun, Ahmad-Atamli Reineh, Patrick McDaniel, Jens Grossklags, Trent Jaeger
    USENIX Security '19HideMyApp: Hiding the Presence of Sensitive Apps on AndroidAnh Pham, Italo Dacosta, Eleonora Losiouk, John Stephan, Kévin Huguenin, Jean-Pierre Hubaux
    USENIX Security '19RAZOR: A Framework for Post-deployment Software DebloatingChenxiong Qian, Hong Hu, Mansour Alharthi, Pak Ho Chung, Taesoo Kim, Wenke Lee
    USENIX Security '19Misleading Authorship Attribution of Source Code using Adversarial LearningErwin Quiring, Alwin Maier, Konrad Rieck
    USENIX Security '1950 Ways to Leak Your Data: An Exploration of Apps' Circumvention of the Android Permissions SystemJoel Reardon, Álvaro Feal, Primal Wijesekera, Amit Elazari Bar On, Narseo Vallina-Rodriguez, Serge Egelman
    USENIX Security '19Site Isolation: Process Separation for Web Sites within the BrowserCharles Reis, Alexander Moshchuk, Nasko Oskov
    USENIX Security '19ALOHA: Auxiliary Loss Optimization for Hypothesis AugmentationEthan M. Rudd, Felipe N. Ducau, Cody Wild, Konstantin Berlin, Richard Harang
    USENIX Security '19Secure Multi-User Content Sharing for Augmented Reality ApplicationsKimberly Ruth, Tadayoshi Kohno, Franziska Roesner
    USENIX Security '19Wireless Attacks on Aircraft Instrument Landing SystemsHarshad Sathaye, Domien Schepers, Aanjhan Ranganathan, Guevara Noubir
    USENIX Security '19ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the Evolution of CyberattacksYun Shen, Gianluca Stringhini
    USENIX Security '19A Study of the Feasibility of Co-located App Attacks against BLE and a Large-Scale Analysis of the Current Application-Layer Security LandscapePallavi Sivakumaran, Jorge Blasco
    USENIX Security '19StrongChain: Transparent and Collaborative Proof-of-Work ConsensusPawel Szalachowski, Daniël Reijsbergen, Ivan Homoliak, Siwei Sun
    USENIX Security '19Protecting accounts from credential stuffing with password breach alertingKurt Thomas, Jennifer Pullman, Kevin Yeo, Ananth Raghunathan, Patrick Gage Kelley, Luca Invernizzi, Borbala Benko, Tadek Pietraszek, Sarvar Patel, Dan Boneh, Elie Bursztein

Pages