Search results

    USENIX Security '21Kalεido: Real-Time Privacy Control for Eye-Tracking SystemsJingjie Li, Amrita Roy Chowdhury, Kassem Fawaz, Younghyun Kim
    USENIX Security '21CURE: A Security Architecture with CUstomizable and Resilient EnclavesRaad Bahmani, Ferdinand Brasser, Ghada Dessouky, Patrick Jauernig, Matthias Klimmek, Ahmad-Reza Sadeghi, Emmanuel Stapf
    USENIX Security '21A Stealthy Location Identification Attack Exploiting Carrier Aggregation in Cellular NetworksNitya Lakshmanan, Nishant Budhdev, Min Suk Kang, Mun Choon Chan, Jun Han
    USENIX Security '21SIGL: Securing Software Installations Through Deep Graph LearningXueyuan Han, Xiao Yu, Thomas Pasquier, Ding Li, Junghwan Rhee, James Mickens, Margo Seltzer, Haifeng Chen
    USENIX Security '21CACTI: Captcha Avoidance via Client-side TEE IntegrationYoshimichi Nakatsuka, Ercan Ozturk, Andrew Paverd, Gene Tsudik
    USENIX Security '21Obfuscation-Resilient Executable Payload Extraction From Packed MalwareBinlin Cheng, Jiang Ming, Erika A Leal, Haotian Zhang, Jianming Fu, Guojun Peng, Jean-Yves Marion
    USENIX Security '21Effect of Mood, Location, Trust, and Presence of Others on Video-Based Social AuthenticationCheng Guo, Brianne Campbell, Apu Kapadia, Michael K. Reiter, Kelly Caine
    USENIX Security '21Domain Shadowing: Leveraging Content Delivery Networks for Robust Blocking-Resistant CommunicationsMingkui Wei
    USENIX Security '21ARCUS: Symbolic Root Cause Analysis of Exploits in Production SystemsCarter Yagemann, Matthew Pruett, Simon P. Chung, Kennon Bittick, Brendan Saltaformaggio, Wenke Lee
    USENIX Security '21PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack Operations in Android SystemsYu-Tsung Lee, William Enck, Haining Chen, Hayawardh Vijayakumar, Ninghui Li, Zhiyun Qian, Daimeng Wang, Giuseppe Petracca, Trent Jaeger
    USENIX Security '21PatchGuard: A Provably Robust Defense against Adversarial Patches via Small Receptive Fields and MaskingChong Xiang, Arjun Nitin Bhagoji, Vikash Sehwag, Prateek Mittal
    USENIX Security '21mID: Tracing Screen Photos via Moiré PatternsYushi Cheng, Xiaoyu Ji, Lixu Wang, Qi Pang, Yi-Chao Chen, Wenyuan Xu
    USENIX Security '21Scalable Detection of Promotional Website Defacements in Black Hat SEO CampaignsRonghai Yang, Xianbo Wang, Cheng Chi, Dawei Wang, Jiawei He, Siming Pang, Wing Cheong Lau
    USENIX Security '21Evaluating In-Workflow Messages for Improving Mental Models of End-to-End EncryptionOmer Akgul, Wei Bai, Shruti Das, Michelle L. Mazurek
    USENIX Security '21Disrupting Continuity of Apple's Wireless Ecosystem Security: New Tracking, DoS, and MitM Attacks on iOS and macOS Through Bluetooth Low Energy, AWDL, and Wi-FiMilan Stute, Alexander Heinrich, Jannik Lorenz, Matthias Hollick
    USENIX Security '21Muse: Secure Inference Resilient to Malicious ClientsRyan Lehmkuhl, Pratyush Mishra, Akshayaram Srinivasan, Raluca Ada Popa
    USENIX Security '21I Always Feel Like Somebody's Sensing Me! A Framework to Detect, Identify, and Localize Clandestine Wireless SensorsAkash Deep Singh, Luis Garcia, Joseph Noor, Mani Srivastava
    USENIX Security '21M2MON: Building an MMIO-based Security Reference Monitor for Unmanned VehiclesArslan Khan, Hyungsub Kim, Byoungyoung Lee, Dongyan Xu, Antonio Bianchi, Dave (Jing) Tian
    USENIX Security '21Systematic Evaluation of Privacy Risks of Machine Learning ModelsLiwei Song, Prateek Mittal
    USENIX Security '21"It's stressful having all these phones": Investigating Sex Workers' Safety Goals, Risks, and Practices OnlineAllison McDonald, Catherine Barwulor, Michelle L. Mazurek, Florian Schaub, Elissa M. Redmiles
    USENIX Security '21"Now I'm a bit angry:" Individuals' Awareness, Perception, and Responses to Data Breaches that Affected ThemPeter Mayer, Yixin Zou, Florian Schaub, Adam J. Aviv
    USENIX Security '21PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-Metal Embedded ApplicationsTaegyu Kim, Vireshwar Kumar, Junghwan Rhee, Jizhou Chen, Kyungtae Kim, Chung Hwan Kim, Dongyan Xu, Dave (Jing) Tian
    USENIX Security '21LZR: Identifying Unexpected Internet ServicesLiz Izhikevich, Renata Teixeira, Zakir Durumeric
    USENIX Security '21Explanation-Guided Backdoor Poisoning Attacks Against Malware ClassifiersGiorgio Severi, Jim Meyer, Scott Coull, Alina Oprea
    USENIX Security '21Cerebro: A Platform for Multi-Party Cryptographic Collaborative LearningWenting Zheng, Ryan Deng, Weikeng Chen, Raluca Ada Popa, Aurojit Panda, Ion Stoica