USENIX Security '21 | WaveGuard: Understanding and Mitigating Audio Adversarial Examples | Shehzeen Hussain, Paarth Neekhara, Shlomo Dubnov, Julian McAuley, Farinaz Koushanfar |
USENIX Security '21 | Using Amnesia to Detect Credential Database Breaches | Ke Coby Wang, Michael K. Reiter |
USENIX Security '21 | Undo Workarounds for Kernel Bugs | Seyed Mohammadjavad Seyed Talebi, Zhihao Yao, Ardalan Amiri Sani, Zhiyun Qian, Daniel Austin |
USENIX Security '21 | SMASH: Synchronized Many-sided Rowhammer Attacks from JavaScript | Finn de Ridder, Pietro Frigo, Emanuele Vannacci, Herbert Bos, Cristiano Giuffrida, Kaveh Razavi |
USENIX Security '21 | ICSFuzz: Manipulating I/Os and Repurposing Binary Code to Enable Instrumented Fuzzing in ICS Control Applications | Dimitrios Tychalas, Hadjer Benkraouda, Michail Maniatakos |
USENIX Security '21 | DeepReflect: Discovering Malicious Functionality through Binary Reconstruction | Evan Downing, Yisroel Mirsky, Kyuhong Park, Wenke Lee |
USENIX Security '21 | What's in a Name? Exploring CA Certificate Control | Zane Ma, Joshua Mason, Manos Antonakakis, Zakir Durumeric, Michael Bailey |
USENIX Security '21 | PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop | Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, Christian Weinert |
USENIX Security '21 | Graph Backdoor | Zhaohan Xi, Ren Pang, Shouling Ji, Ting Wang |
USENIX Security '21 | Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses | Anatoly Shusterman, Ayush Agarwal, Sioli O'Connell, Daniel Genkin, Yossi Oren, Yuval Yarom |
USENIX Security '21 | Swivel: Hardening WebAssembly against Spectre | Shravan Narayan, Craig Disselkoen, Daniel Moghimi, Sunjay Cauligi, Evan Johnson, Zhao Gang, Anjo Vahldiek-Oberwagner, Ravi Sahita, Hovav Shacham, Dean Tullsen, Deian Stefan |
USENIX Security '21 | Entangled Watermarks as a Defense against Model Extraction | Hengrui Jia, Christopher A. Choquette-Choo, Varun Chandrasekaran, Nicolas Papernot |
USENIX Security '21 | Mind Your Weight(s): A Large-scale Study on Insufficient Machine Learning Model Protection in Mobile Apps | Zhichuang Sun, Ruimin Sun, Long Lu, Alan Mislove |
USENIX Security '21 | Breaking Through Binaries: Compiler-quality Instrumentation for Better Binary-only Fuzzing | Stefan Nagy, Anh Nguyen-Tuong, Jason D. Hiser, Jack W. Davidson, Matthew Hicks |
USENIX Security '21 | Cost-Aware Robust Tree Ensembles for Security Applications | Yizheng Chen, Shiqi Wang, Weifan Jiang, Asaf Cidon, Suman Jana |
USENIX Security '21 | Too Good to Be Safe: Tricking Lane Detection in Autonomous Driving with Crafted Perturbations | Pengfei Jing, Qiyi Tang, Yuefeng Du, Lei Xue, Xiapu Luo, Ting Wang, Sen Nie, Shi Wu |
USENIX Security '21 | On the Routing-Aware Peering against Network-Eclipse Attacks in Bitcoin | Muoi Tran, Akshaye Shenoi, Min Suk Kang |
USENIX Security '21 | MBA-Blast: Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation | Binbin Liu, Junfu Shen, Jiang Ming, Qilong Zheng, Jing Li, Dongpeng Xu |
USENIX Security '21 | VScape: Assessing and Escaping Virtual Call Protections | Kaixiang Chen, Chao Zhang, Tingting Yin, Xingman Chen, Lei Zhao |
USENIX Security '21 | MIRAGE: Mitigating Conflict-Based Cache Attacks with a Practical Fully-Associative Design | Gururaj Saileshwar, Moinuddin Qureshi |
USENIX Security '21 | Sharing More and Checking Less: Leveraging Common Input Keywords to Detect Bugs in Embedded Systems | Libo Chen, Yanhao Wang, Quanpu Cai, Yunfan Zhan, Hong Hu, Jiaqi Linghu, Qinsheng Hou, Chao Zhang, Haixin Duan, Zhi Xue |
USENIX Security '21 | ObliCheck: Efficient Verification of Oblivious Algorithms with Unobservable State | Jeongseok Son, Griffin Prechter, Rishabh Poddar, Raluca Ada Popa, Koushik Sen |
USENIX Security '21 | Understanding Malicious Cross-library Data Harvesting on Android | Jice Wang, Yue Xiao, Xueqiang Wang, Yuhong Nan, Luyi Xing, Xiaojing Liao, JinWei Dong, Nicolas Serrano, Haoran Lu, XiaoFeng Wang, Yuqing Zhang |
USENIX Security '21 | DRMI: A Dataset Reduction Technology based on Mutual Information for Black-box Attacks | Yingzhe He, Guozhu Meng, Kai Chen, Xingbo Hu, Jinwen He |
USENIX Security '21 | Fantastic Four: Honest-Majority Four-Party Secure Computation With Malicious Security | Anders Dalskov, Daniel Escudero, Marcel Keller |