Search results

    USENIX Security '20ShadowMove: A Stealthy Lateral Movement StrategyAmirreza Niakanlahiji, Jinpeng Wei, Md Rabbi Alam, Qingyang Wang, Bei-Tseng Chu
    USENIX Security '20That Was Then, This Is Now: A Security Evaluation of Password Generation, Storage, and Autofill in Browser-Based Password Managers
    USENIX Security '20Estonian Electronic Identity Card: Security Flaws in Key ManagementArnis Parsovs
    USENIX Security '20SAVIOR: Securing Autonomous Vehicles with Robust Physical InvariantsRaul Quinonez, Jairo Giraldo, Luis Salazar, Erick Bauman, Alvaro Cardenas, Zhiqiang Lin
    USENIX Security '20Updates-Leak: Data Set Inference and Reconstruction Attacks in Online LearningAhmed Salem, Apratim Bhattacharya, Michael Backes, Mario Fritz, Yang Zhang
    USENIX Security '20Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited QueriesFnu Suya, Jianfeng Chi, David Evans, Yuan Tian
    USENIX Security '20Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix ItDaniel Votipka, Kelsey R. Fulton, James Parker, Matthew Hou, Michelle L. Mazurek, Michael Hicks
    USENIX Security '20An Observational Investigation of Reverse Engineers’ ProcessesDaniel Votipka, Seth Rabin, Kristopher Micinski, Jeffrey S. Foster, Michelle L. Mazurek
    USENIX Security '20Big Numbers - Big Troubles: Systematically Analyzing Nonce Leakage in (EC)DSA ImplementationsSamuel Weiser, David Schrammel, Lukas Bodner, Raphael Spreitzer
    USENIX Security '20Plug-N-Pwned: Comprehensive Vulnerability Analysis of OBD-II Dongles as A New Over-the-Air Attack Surface in Automotive IoTHaohuang Wen, Qi Alfred Chen, Zhiqiang Lin
    USENIX Security '20SmartVerif: Push the Limit of Automation Capability of Verifying Security Protocols by Dynamic StrategiesYan Xiong, Cheng Su, Wenchao Huang, Fuyou Miao, Wansen Wang, Hengyi Ouyang
    USENIX Security '20FuzzGuard: Filtering out Unreachable Inputs in Directed Grey-box Fuzzing through Deep LearningPeiyuan Zong, Tao Lv, Dawei Wang, Zizhuang Deng, Ruigang Liang, Kai Chen
    USENIX Security '20MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability SignaturesYang Xiao, Bihuan Chen, Chendong Yu, Zhengzi Xu, Zimu Yuan, Feng Li, Binghong Liu, Yang Liu, Wei Huo, Wei Zou, Wenchang Shi
    USENIX Security '20The Impact of Ad-Blockers on Product Search and Purchase Behavior: A Lab ExperimentAlisa Frik, Amelia Haviland, Alessandro Acquisti
    USENIX Security '20Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at ScaleAdam Oest, Penghui Zhang, Brad Wardman, Eric Nunes, Jakub Burgis, Ali Zand, Kurt Thomas, Adam Doupé, Gail-Joon Ahn
    USENIX Security '20Cardpliance: PCI DSS Compliance of Android ApplicationsSamin Yaseer Mahmud, Akhil Acharya, Benjamin Andow, William Enck, Bradley Reaves
    USENIX Security '20Composition Kills: A Case Study of Email Sender AuthenticationJianjun Chen, Vern Paxson, Jian Jiang
    USENIX Security '20High Accuracy and High Fidelity Extraction of Neural NetworksMatthew Jagielski, Nicholas Carlini, David Berthelot, Alex Kurakin, Nicolas Papernot
    USENIX Security '20'I have too much respect for my elders': Understanding South African Mobile Users' Perceptions of Privacy and Current Behaviors on Facebook and WhatsAppJake Reichel, Fleming Peck, Mikako Inaba, Bisrat Moges, Brahmnoor Singh Chawla, Marshini Chetty
    USENIX Security '20SpecFuzz: Bringing Spectre-type vulnerabilities to the surfaceOleksii Oleksenko, Bohdan Trach, Mark Silberstein, Christof Fetzer
    USENIX Security '20APEX: A Verified Architecture for Proofs of Execution on Remote Devices under Full Software CompromiseIvan De Oliveira Nunes, Karim Eldefrawy, Norrathep Rattanavipanon, Gene Tsudik
    USENIX Security '20The Unpatchable Silicon: A Full Break of the Bitstream Encryption of Xilinx 7-Series FPGAsMaik Ender, Amir Moradi, Christof Paar
    USENIX Security '20From Needs to Actions to Secure Apps? The Effect of Requirements and Developer Practices on App SecurityCharles Weir, Ben Hermann, Sascha Fahl
    USENIX Security '20Datalog DisassemblyAntonio Flores-Montoya, Eric Schulte
    USENIX Security '20NetWarden: Mitigating Network Covert Channels while Preserving PerformanceJiarong Xing, Qiao Kang, Ang Chen