Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '20Interpretable Deep Learning under FireXinyang Zhang, Ningfei Wang, Hua Shen, Shouling Ji, Xiapu Luo, Ting Wang
    USENIX Security '20BesFS: A POSIX Filesystem for Enclaves with a Mechanized Safety ProofShweta Shinde, Shengyi Wang, Pinghai Yuan, Aquinas Hobor, Abhik Roychoudhury, Prateek Saxena
    USENIX Security '20Automatic Hot Patch Generation for Android KernelsZhengzi Xu, Yulong Zhang, Longri Zheng, Liangzhao Xia, Chenfu Bao, Zhi Wang, Yang Liu
    USENIX Security '20Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN ArchitecturesMengjia Yan, Christopher W. Fletcher, Josep Torrellas
    USENIX Security '20HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution EnvironmentsGhada Dessouky, Tommaso Frassetto, Ahmad-Reza Sadeghi
    USENIX Security '20GREYONE: Data Flow Sensitive FuzzingShuitao Gan, Chao Zhang, Peng Chen, Bodong Zhao, Xiaojun Qin, Dong Wu, Zuoning Chen
    USENIX Security '20TPM-FAIL: TPM meets Timing and Lattice AttacksDaniel Moghimi, Berk Sunar, Thomas Eisenbarth, Nadia Heninger
    USENIX Security '20P2IM: Scalable and Hardware-independent Firmware Testing via Automatic Peripheral Interface ModelingBo Feng, Alejandro Mera, Long Lu
    USENIX Security '20Void: A fast and light voice liveness detection systemMuhammad Ejaz Ahmed, Il-Youp Kwak, Jun Ho Huh, Iljoo Kim, Taekkyung Oh, Hyoungshick Kim
    USENIX Security '20Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheckBenjamin Andow, Samin Yaseer Mahmud, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, Serge Egelman
    USENIX Security '20Human Distinguishable Visual Key FingerprintsMozhgan Azimpourkivi, Umut Topkara, Bogdan Carbunar
    USENIX Security '20McTiny: Fast High-Confidence Post-Quantum Key Erasure for Tiny Network ServersDaniel J. Bernstein, Tanja Lange
    USENIX Security '20Exploring Connections Between Active Learning and Model ExtractionVarun Chandrasekaran, Kamalika Chaudhuri, Irene Giacomelli, Somesh Jha, Songbai Yan
    USENIX Security '20KOOBE: Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write VulnerabilitiesWeiteng Chen, Xiaochen Zou, Guoren Li, Zhiyun Qian
    USENIX Security '20Devil’s Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition DevicesYuxuan Chen, Xuejing Yuan, Jiangshan Zhang, Yue Zhao, Shengzhi Zhang, Kai Chen, XiaoFeng Wang
    USENIX Security '20On Training Robust PDF Malware ClassifiersYizheng Chen, Shiqi Wang, Dongdong She, Suman Jana
    USENIX Security '20HALucinator: Firmware Re-hosting Through Abstraction Layer EmulationAbraham A Clements, Eric Gustafson, Tobias Scharnowski, Paul Grosen, David Fritz, Christopher Kruegel, Giovanni Vigna, Saurabh Bagchi, Mathias Payer
    USENIX Security '20BScout: Direct Whole Patch Presence Test for Java ExecutablesJiarun Dai, Yuan Zhang, Zheyue Jiang, Yingtian Zhou, Junyan Chen, Xinyu Xing, Xiaohan Zhang, Xin Tan, Min Yang, Zhemin Yang
    USENIX Security '20Pixel: Multi-signatures for ConsensusManu Drijvers, Sergey Gorbunov, Gregory Neven, Hoeteck Wee
    USENIX Security '20Local Model Poisoning Attacks to Byzantine-Robust Federated LearningMinghong Fang, Xiaoyu Cao, Jinyuan Jia, Neil Gong
    USENIX Security '20Zero-delay Lightweight Defenses against Website FingerprintingJiajun Gong, Tao Wang
    USENIX Security '20PCKV: Locally Differentially Private Correlated Key-Value Data Collection with Optimized UtilityXiaolan Gu, Ming Li, Yueqiang Cheng, Li Xiong, Yang Cao
    USENIX Security '20PARTEMU: Enabling Dynamic Analysis of Real-World TrustZone Software Using EmulationLee Harrison, Hayawardh Vijayakumar, Rohan Padhye, Koushik Sen, Michael Grace
    USENIX Security '20Data Recovery from “Scrubbed” NAND Flash Storage: Need for Analog SanitizationMd Mehedi Hasan, Biswajit Ray
    USENIX Security '20BigMAC: Fine-Grained Policy Analysis of Android FirmwareGrant Hernandez, Dave (Jing) Tian, Anurag Swarnim Yadav, Byron J. Williams, Kevin R.B. Butler

Pages