Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '20Interpretable Deep Learning under FireXinyang Zhang, Ningfei Wang, Hua Shen, Shouling Ji, Xiapu Luo, Ting Wang
    USENIX Security '20P2IM: Scalable and Hardware-independent Firmware Testing via Automatic Peripheral Interface ModelingBo Feng, Alejandro Mera, Long Lu
    USENIX Security '20Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheckBenjamin Andow, Samin Yaseer Mahmud, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, Serge Egelman
    USENIX Security '20McTiny: Fast High-Confidence Post-Quantum Key Erasure for Tiny Network ServersDaniel J. Bernstein, Tanja Lange
    USENIX Security '20Exploring Connections Between Active Learning and Model ExtractionVarun Chandrasekaran, Kamalika Chaudhuri, Irene Giacomelli, Somesh Jha, Songbai Yan
    USENIX Security '20KOOBE: Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write VulnerabilitiesWeiteng Chen, Xiaochen Zou, Guoren Li, Zhiyun Qian
    USENIX Security '20HALucinator: Firmware Re-hosting Through Abstraction Layer EmulationAbraham A Clements, Eric Gustafson, Tobias Scharnowski, Paul Grosen, David Fritz, Christopher Kruegel, Giovanni Vigna, Saurabh Bagchi, Mathias Payer
    USENIX Security '20BScout: Direct Whole Patch Presence Test for Java ExecutablesJiarun Dai, Yuan Zhang, Zheyue Jiang, Yingtian Zhou, Junyan Chen, Xinyu Xing, Xiaohan Zhang, Xin Tan, Min Yang, Zhemin Yang
    USENIX Security '20Local Model Poisoning Attacks to Byzantine-Robust Federated LearningMinghong Fang, Xiaoyu Cao, Jinyuan Jia, Neil Gong
    USENIX Security '20PCKV: Locally Differentially Private Correlated Key-Value Data Collection with Optimized UtilityXiaolan Gu, Ming Li, Yueqiang Cheng, Li Xiong, Yang Cao
    USENIX Security '20Data Recovery from “Scrubbed” NAND Flash Storage: Need for Analog SanitizationMd Mehedi Hasan, Biswajit Ray
    USENIX Security '20Security Analysis of Unified Payments Interface and Payment Apps in IndiaRenuka Kumar, Sreesh Kishore, Hao Lu, Atul Prakash
    USENIX Security '20Stealthy Tracking of Autonomous Vehicles with Cache Side ChannelsMulong Luo, Andrew C. Myers, G. Edward Suh
    USENIX Security '20(Mostly) Exitless VM Protection from Untrusted Hypervisor through Disaggregated Nested VirtualizationZeyu Mi, Dingji Li, Haibo Chen, Binyu Zang, Haibing Guan
    USENIX Security '20SAVIOR: Securing Autonomous Vehicles with Robust Physical InvariantsRaul Quinonez, Jairo Giraldo, Luis Salazar, Erick Bauman, Alvaro Cardenas, Zhiqiang Lin
    USENIX Security '20Updates-Leak: Data Set Inference and Reconstruction Attacks in Online LearningAhmed Salem, Apratim Bhattacharya, Michael Backes, Mario Fritz, Yang Zhang
    USENIX Security '20Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited QueriesFnu Suya, Jianfeng Chi, David Evans, Yuan Tian
    USENIX Security '20Plug-N-Pwned: Comprehensive Vulnerability Analysis of OBD-II Dongles as A New Over-the-Air Attack Surface in Automotive IoTHaohuang Wen, Qi Alfred Chen, Zhiqiang Lin
    USENIX Security '20MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability SignaturesYang Xiao, Bihuan Chen, Chendong Yu, Zhengzi Xu, Zimu Yuan, Feng Li, Binghong Liu, Yang Liu, Wei Huo, Wei Zou, Wenchang Shi
    USENIX Security '20Cardpliance: PCI DSS Compliance of Android ApplicationsSamin Yaseer Mahmud, Akhil Acharya, Benjamin Andow, William Enck, Bradley Reaves
    USENIX Security '20High Accuracy and High Fidelity Extraction of Neural NetworksMatthew Jagielski, Nicholas Carlini, David Berthelot, Alex Kurakin, Nicolas Papernot
    USENIX Security '20SpecFuzz: Bringing Spectre-type vulnerabilities to the surfaceOleksii Oleksenko, Bohdan Trach, Mark Silberstein, Christof Fetzer
    USENIX Security '20Datalog DisassemblyAntonio Flores-Montoya, Eric Schulte
    USENIX Security '20PKU Pitfalls: Attacks on PKU-based Memory Isolation SystemsR. Joseph Connor, Tyler McDaniel, Jared M. Smith, Max Schuchard
    USENIX Security '20Automatic Techniques to Systematically Discover New Heap Exploitation PrimitivesInsu Yun, Dhaval Kapil, Taesoo Kim

Pages