USENIX Security '21 | On the Usability of Authenticity Checks for Hardware Security Tokens | Katharina Pfeffer, Alexandra Mai, Adrian Dabrowski, Matthias Gusenbauer, Philipp Schindler, Edgar Weippl, Michael Franz, Katharina Krombholz |
USENIX Security '21 | Phishpedia: A Hybrid Deep Learning Based Approach to Visually Identify Phishing Webpages | Yun Lin, Ruofan Liu, Dinil Mon Divakaran, Jun Yang Ng, Qing Zhou Chan, Yiwen Lu, Yuxuan Si, Fan Zhang, Jin Song Dong |
USENIX Security '21 | AdCube: WebVR Ad Fraud and Practical Confinement of Third-Party Ads | Hyunjoo Lee, Jiyeon Lee, Daejun Kim, Suman Jana, Insik Shin, Sooel Son |
USENIX Security '21 | Where's Crypto?: Automated Identification and Classification of Proprietary Cryptographic Primitives in Binary Code | Carlo Meijer, Veelasha Moonsamy, Jos Wetzels |
USENIX Security '21 | SEAL: Storage-efficient Causality Analysis on Enterprise Logs with Query-friendly Compression | Peng Fei, Zhou Li, Zhiying Wang, Xiao Yu, Ding Li, Kangkook Jee |
USENIX Security '21 | Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing | Yousra Aafer, Wei You, Yi Sun, Yu Shi, Xiangyu Zhang, Heng Yin |
USENIX Security '21 | Exposing New Vulnerabilities of Error Handling Mechanism in CAN | Khaled Serag, Rohit Bhatia, Vireshwar Kumar, Z. Berkay Celik, Dongyan Xu |
USENIX Security '21 | Defeating DNN-Based Traffic Analysis Systems in Real-Time With Blind Adversarial Perturbations | Milad Nasr, Alireza Bahramali, Amir Houmansadr |
USENIX Security '21 | Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical | Riccardo Paccagnella, Licheng Luo, Christopher W. Fletcher |
USENIX Security '21 | Automatic Firmware Emulation through Invalidity-guided Knowledge Inference | Wei Zhou, Le Guan, Peng Liu, Yuqing Zhang |
USENIX Security '21 | Reducing HSM Reliance in Payments through Proxy Re-Encryption | Sivanarayana Gaddam, Atul Luykx, Rohit Sinha, Gaven Watson |
USENIX Security '21 | Examining the Efficacy of Decoy-based and Psychological Cyber Deception | Kimberly J. Ferguson-Walter, Maxine M. Major, Chelsea K. Johnson, Daniel H. Muhleman |
USENIX Security '21 | Does logic locking work with EDA tools? | Zhaokun Han, Muhammad Yasin, Jeyavijayan (JV) Rajendran |
USENIX Security '21 | ExpRace: Exploiting Kernel Races through Raising Interrupts | Yoochan Lee, Changwoo Min, Byoungyoung Lee |
USENIX Security '21 | Cerebro: A Platform for Multi-Party Cryptographic Collaborative Learning | Wenting Zheng, Ryan Deng, Weikeng Chen, Raluca Ada Popa, Aurojit Panda, Ion Stoica |
USENIX Security '21 | A Large-Scale Interview Study on Information Security in and Attacks against Small and Medium-sized Enterprises | Nicolas Huaman, Bennet von Skarczinski, Christian Stransky, Dominik Wermke, Yasemin Acar, Arne Dreißigacker, Sascha Fahl |
USENIX Security '21 | Jetset: Targeted Firmware Rehosting for Embedded Systems | Evan Johnson, Maxwell Bland, YiFei Zhu, Joshua Mason, Stephen Checkoway, Stefan Savage, Kirill Levchenko |
USENIX Security '21 | T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-based Text Classification | Ahmadreza Azizi, Ibrahim Asadullah Tahmid, Asim Waheed, Neal Mangaokar, Jiameng Pu, Mobin Javed, Chandan K. Reddy, Bimal Viswanath |
USENIX Security '21 | On the Design and Misuse of Microcoded (Embedded) Processors — A Cautionary Note | Nils Albartus, Clemens Nasenberg, Florian Stolz, Marc Fyrbiak, Christof Paar, Russell Tessier |
USENIX Security '21 | Constraint-guided Directed Greybox Fuzzing | Gwangmu Lee, Woochul Shim, Byoungyoung Lee |
USENIX Security '21 | Automatic Extraction of Secrets from the Transistor Jungle using Laser-Assisted Side-Channel Attacks | Thilo Krachenfels, Tuba Kiyan, Shahin Tajik, Jean-Pierre Seifert |
USENIX Security '21 | Fingerprinting in Style: Detecting Browser Extensions via Injected Style Sheets | Pierre Laperdrix, Oleksii Starov, Quan Chen, Alexandros Kapravelos, Nick Nikiforakis |
USENIX Security '21 | Fine Grained Dataflow Tracking with Proximal Gradients | Gabriel Ryan, Abhishek Shah, Dongdong She, Koustubha Bhat, Suman Jana |
USENIX Security '21 | Card Brand Mixup Attack: Bypassing the PIN in non-Visa Cards by Using Them for Visa Transactions | David Basin, Ralf Sasse, Jorge Toro-Pozo |
USENIX Security '21 | Disrupting Continuity of Apple's Wireless Ecosystem Security: New Tracking, DoS, and MitM Attacks on iOS and macOS Through Bluetooth Low Energy, AWDL, and Wi-Fi | Milan Stute, Alexander Heinrich, Jannik Lorenz, Matthias Hollick |