Search results

    USENIX Security '20FuzzGen: Automatic Fuzzer GenerationKyriakos Ispoglou, Daniel Austin, Vishwath Mohan, Mathias Payer
    USENIX Security '20SANNS: Scaling Up Secure Approximate k-Nearest Neighbors SearchHao Chen, Ilaria Chillotti, Yihe Dong, Oxana Poburinnaya, Ilya Razenshteyn, M. Sadegh Riazi
    USENIX Security '20Fuzzing Error Handling Code using Context-Sensitive Software Fault InjectionZu-Ming Jiang, Jia-Ju Bai, Kangjie Lu, Shi-Min Hu
    USENIX Security '20FIRMSCOPE: Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android FirmwareMohamed Elsabagh, Ryan Johnson, Angelos Stavrou, Chaoshun Zuo, Qingchuan Zhao, Zhiqiang Lin
    USENIX Security '20EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed BanditTai Yue, Pengfei Wang, Yong Tang, Enze Wang, Bo Yu, Kai Lu, Xu Zhou
    USENIX Security '20PKU Pitfalls: Attacks on PKU-based Memory Isolation SystemsR. Joseph Connor, Tyler McDaniel, Jared M. Smith, Max Schuchard
    USENIX Security '20Automatic Techniques to Systematically Discover New Heap Exploitation PrimitivesInsu Yun, Dhaval Kapil, Taesoo Kim
    USENIX Security '20Liveness is Not Enough: Enhancing Fingerprint Authentication with Behavioral Biometrics to Defeat Puppet AttacksCong Wu, Kun He, Jing Chen, Ziming Zhao, Ruiying Du
    USENIX Security '20A Tale of Two Headers: A Formal Analysis of Inconsistent Click-Jacking Protection on the WebStefano Calzavara, Sebastian Roth, Alvise Rabitti, Michael Backes, Ben Stock
    USENIX Security '20Automating the Development of Chosen Ciphertext AttacksGabrielle Beck, Maximilian Zinkus, Matthew Green
    USENIX Security '20Analysis of DTLS Implementations Using Protocol State FuzzingPaul Fiterau-Brostean, Bengt Jonsson, Robert Merget, Joeri de Ruiter, Konstantinos Sagonas, Juraj Somorovsky
    USENIX Security '20Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks in Machine LearningErwin Quiring, David Klein, Daniel Arp, Martin Johns, Konrad Rieck
    USENIX Security '20Retrofitting Fine Grain Isolation in the Firefox RendererShravan Narayan, Craig Disselkoen, Tal Garfinkel, Nathan Froyd, Eric Rahm, Sorin Lerner, Hovav Shacham, Deian Stefan
    USENIX Security '20TextShield: Robust Text Classification Based on Multimodal Embedding and Neural Machine TranslationJinfeng Li, Tianyu Du, Shouling Ji, Rong Zhang, Quan Lu, Min Yang, Ting Wang
    USENIX Security '20MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKsAhmed Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Dawn Song
    USENIX Security '20A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman ProtocolsGuillaume Girol, Lucca Hirschi, Ralf Sasse, Dennis Jackson, Cas Cremers, David Basin
    USENIX Security '20Measuring and Modeling the Label Dynamics of Online Anti-Malware EnginesShuofei Zhu, Jianjun Shi, Limin Yang, Boqin Qin, Ziyi Zhang, Linhai Song, Gang Wang
    USENIX Security '20Medusa: Microarchitectural Data Leakage via Automated Attack SynthesisDaniel Moghimi, Moritz Lipp, Berk Sunar, Michael Schwarz
    USENIX Security '20V0LTpwn: Attacking x86 Processor Integrity from SoftwareZijo Kenjar, Tommaso Frassetto, David Gens, Michael Franz, Ahmad-Reza Sadeghi
    USENIX Security '20SEAL: Attack Mitigation for Encrypted Databases via Adjustable LeakageIoannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou, Saurabh Shintre
    USENIX Security '20Shim Shimmeny: Evaluating the Security and Privacy Contributions of Link Shimming in the Modern WebFrank Li
    USENIX Security '20COUNTERFOIL: Verifying Provenance of Integrated Circuits using Intrinsic Package Fingerprints and Inexpensive CamerasSiva Nishok Dhanuskodi, Xiang Li, Daniel Holcomb
    USENIX Security '20AURORA: Statistical Crash Analysis for Automated Root Cause ExplanationTim Blazytko, Moritz Schlögel, Cornelius Aschermann, Ali Abbasi, Joel Frank, Simon Wörner, Thorsten Holz
    USENIX Security '20FANS: Fuzzing Android Native System Services via Automated Interface AnalysisBaozheng Liu, Chao Zhang, Guang Gong, Yishun Zeng, Haifeng Ruan, Jianwei Zhuge
    USENIX Security '20Detecting Stuffing of a User’s Credentials at Her Own AccountsKe Coby Wang, Michael K. Reiter