Search results

    USENIX Security '21Muse: Secure Inference Resilient to Malicious ClientsRyan Lehmkuhl, Pratyush Mishra, Akshayaram Srinivasan, Raluca Ada Popa
    USENIX Security '21I Always Feel Like Somebody's Sensing Me! A Framework to Detect, Identify, and Localize Clandestine Wireless SensorsAkash Deep Singh, Luis Garcia, Joseph Noor, Mani Srivastava
    USENIX Security '21M2MON: Building an MMIO-based Security Reference Monitor for Unmanned VehiclesArslan Khan, Hyungsub Kim, Byoungyoung Lee, Dongyan Xu, Antonio Bianchi, Dave (Jing) Tian
    USENIX Security '21Systematic Evaluation of Privacy Risks of Machine Learning ModelsLiwei Song, Prateek Mittal
    USENIX Security '21"It's stressful having all these phones": Investigating Sex Workers' Safety Goals, Risks, and Practices OnlineAllison McDonald, Catherine Barwulor, Michelle L. Mazurek, Florian Schaub, Elissa M. Redmiles
    USENIX Security '21"Now I'm a bit angry:" Individuals' Awareness, Perception, and Responses to Data Breaches that Affected ThemPeter Mayer, Yixin Zou, Florian Schaub, Adam J. Aviv
    USENIX Security '21PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-Metal Embedded ApplicationsTaegyu Kim, Vireshwar Kumar, Junghwan Rhee, Jizhou Chen, Kyungtae Kim, Chung Hwan Kim, Dongyan Xu, Dave (Jing) Tian
    USENIX Security '21LZR: Identifying Unexpected Internet ServicesLiz Izhikevich, Renata Teixeira, Zakir Durumeric
    USENIX Security '21Explanation-Guided Backdoor Poisoning Attacks Against Malware ClassifiersGiorgio Severi, Jim Meyer, Scott Coull, Alina Oprea
    USENIX Security '21Scalable Detection of Promotional Website Defacements in Black Hat SEO CampaignsRonghai Yang, Xianbo Wang, Cheng Chi, Dawei Wang, Jiawei He, Siming Pang, Wing Cheong Lau
    USENIX Security '21Evaluating In-Workflow Messages for Improving Mental Models of End-to-End EncryptionOmer Akgul, Wei Bai, Shruti Das, Michelle L. Mazurek
    USENIX Security '21LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth StacksJianliang Wu, Ruoyu Wu, Daniele Antonioli, Mathias Payer, Nils Ole Tippenhauer, Dongyan Xu, Dave (Jing) Tian, Antonio Bianchi
    USENIX Security '21PrivSyn: Differentially Private Data SynthesisZhikun Zhang, Tianhao Wang, Ninghui Li, Jean Honorio, Michael Backes, Shibo He, Jiming Chen, Yang Zhang
    USENIX Security '21"It's the Company, the Government, You and I": User Perceptions of Responsibility for Smart Home Privacy and SecurityJulie Haney, Yasemin Acar, Susanne Furman
    USENIX Security '21CACTI: Captcha Avoidance via Client-side TEE IntegrationYoshimichi Nakatsuka, Ercan Ozturk, Andrew Paverd, Gene Tsudik
    USENIX Security '21Obfuscation-Resilient Executable Payload Extraction From Packed MalwareBinlin Cheng, Jiang Ming, Erika A Leal, Haotian Zhang, Jianming Fu, Guojun Peng, Jean-Yves Marion
    USENIX Security '21Effect of Mood, Location, Trust, and Presence of Others on Video-Based Social AuthenticationCheng Guo, Brianne Campbell, Apu Kapadia, Michael K. Reiter, Kelly Caine
    USENIX Security '21Abusing Hidden Properties to Attack the Node.js EcosystemFeng Xiao, Jianwei Huang, Yichang Xiong, Guangliang Yang, Hong Hu, Guofei Gu, Wenke Lee
    USENIX Security '21'Passwords Keep Me Safe' – Understanding What Children Think about PasswordsMary Theofanos, Yee-Yin Choong, Olivia Murphy
    USENIX Security '21Preventing Use-After-Free Attacks with Fast Forward AllocationBrian Wickman, Hong Hu, Insu Yun, Daehee Jang, JungWon Lim, Sanidhya Kashyap, Taesoo Kim
    USENIX Security '21Forecasting Malware Capabilities From Cyber Attack Memory ImagesOmar Alrawi, Moses Ike, Matthew Pruett, Ranjita Pai Kasturi, Srimanta Barua, Taleb Hirani, Brennan Hill, Brendan Saltaformaggio
    USENIX Security '21Partitioning Oracle AttacksJulia Len, Paul Grubbs, Thomas Ristenpart
    USENIX Security '21Understanding and Detecting Disordered Error Handling with Precise Function PairingQiushi Wu, Aditya Pakki, Navid Emamdoost, Stephen McCamant, Kangjie Lu
    USENIX Security '21HAWatcher: Semantics-Aware Anomaly Detection for Appified Smart HomesChenglong Fu, Qiang Zeng, Xiaojiang Du
    USENIX Security '21Kalεido: Real-Time Privacy Control for Eye-Tracking SystemsJingjie Li, Amrita Roy Chowdhury, Kassem Fawaz, Younghyun Kim