Papers

Search results

    ConferenceTitleAuthor(s)
    RAID 2019Exploring Syscall-Based Semantics Reconstruction of Android ApplicationsDario Nisi, Antonio Bianchi, Yanick Fratantonio
    RAID 2019Towards Large-Scale Hunting for Android Negative-Day MalwareLun-Pin Yuan, Wenjun Hu, Ting Yu, Peng Liu, Sencun Zhu
    RAID 2019DroidScraper: A Tool for Android In-Memory Object Recovery and ReconstructionAisha Ali-Gombe, Sneha Sudhakaran, Andrew Case, Golden G. Richard III
    RAID 2019TALON: An Automated Framework for Cross-Device Tracking DetectionKonstantinos Solomos, Panagiotis Ilia, Sotiris Ioannidis, Nicolas Kourtellis
    USENIX Security '19Rendered Private: Making GLSL Execution Uniform to Prevent WebGL-based Browser FingerprintingShujiang Wu, Song Li, Yinzhi Cao, Ningfei Wang
    USENIX Security '19Fuzzification: Anti-Fuzzing TechniquesJinho Jung, Hong Hu, David Solodukhin, Daniel Pagan, Kyu Hyung Lee, Taesoo Kim
    USENIX Security '19AntiFuzz: Impeding Fuzzing Audits of Binary ExecutablesEmre Güler, Cornelius Aschermann, Ali Abbasi, Thorsten Holz
    USENIX Security '19Less is More: Quantifying the Security Benefits of Debloating Web ApplicationsBabak Amin Azad, Pierre Laperdrix, Nick Nikiforakis
    USENIX Security '19GRIMOIRE: Synthesizing Structure while FuzzingTim Blazytko, Cornelius Aschermann, Moritz Schlögel, Ali Abbasi, Sergej Schumilo, Simon Wörner, Thorsten Holz
    USENIX Security '19EnFuzz: Ensemble Fuzzing with Seed Synchronization among Diverse FuzzersYuanliang Chen, Yu Jiang, Fuchen Ma, Jie Liang, Mingzhe Wang, Chijin Zhou, Xun Jiao, Zhuo Su
    USENIX Security '19Evaluating Differentially Private Machine Learning in PracticeBargav Jayaraman, David Evans
    USENIX Security '19Detecting Missing-Check Bugs via Semantic- and Context-Aware Criticalness and Constraints InferencesKangjie Lu, Aditya Pakki, Qiushi Wu
    USENIX Security '19MOPT: Optimized Mutation Scheduling for FuzzersChenyang Lyu, Shouling Ji, Chao Zhang, Yuwei Li, Wei-Han Lee, Yu Song, Raheem Beyah
    USENIX Security '19Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic TechniquesFabio Pagani, Davide Balzarotti
    USENIX Security '19On (The Lack Of) Location Privacy in Crowdsourcing ApplicationsSpyros Boukoros, Mathias Humbert, Stefan Katzenbeisser, Carmela Troncoso
    USENIX Security '19The Art of The Scam: Demystifying Honeypots in Ethereum Smart ContractsChristof Ferreira Torres, Mathis Steichen, Radu State
    USENIX Security '19DEEPVSA: Facilitating Value-set Analysis with Deep Learning for Postmortem Program AnalysisWenbo Guo, Dongliang Mu, Xinyu Xing, Min Du, Dawn Song
    USENIX Security '19No Right to Remain Silent: Isolating Malicious MixesHemi Leibowitz, Ania M. Piotrowska, George Danezis, Amir Herzberg
    USENIX Security '19Site Isolation: Process Separation for Web Sites within the BrowserCharles Reis, Alexander Moshchuk, Nasko Oskov
    USENIX Security '19The Web's Identity Crisis: Understanding the Effectiveness of Website Identity IndicatorsChristopher Thompson, Martin Shelton, Emily Stark, Maximilian Walker, Emily Schechter, Adrienne Porter Felt
    USENIX Security '19The Anatomy of a Cryptocurrency Pump-and-Dump SchemeJiahua Xu, Benjamin Livshits
    USENIX Security '19CONFIRM: Evaluating Compatibility and Relevance of Control-flow Integrity Protections for Modern SoftwareXiaoyang Xu, Masoud Ghaffarinia, Wenhao Wang, Kevin W. Hamlen, Zhiqiang Lin
    USENIX Security '19Point Break: A Study of Bandwidth Denial-of-Service Attacks against TorRob Jansen, Tavish Vaidya, Micah Sherr
    USENIX Security '19Reading the Tea leaves: A Comparative Analysis of Threat IntelligenceVector Guo Li, Matthew Dunn, Paul Pearce, Damon McCoy, Geoffrey M. Voelker, Stefan Savage
    USENIX Security '19Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet ScaleHugo L.J. Bijmans, Tim M. Booij, Christian Doerr

Pages