Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '17When the Weakest Link is Strong: Secure Collaboration in the Case of the Panama PapersSusan E. McGregor, Elizabeth Anne Watkins, Mahdi Nasrullah Al-Ameen, Kelly Caine, Franziska Roesner
    USENIX Security '17Qapla: Policy compliance for database-backed systemsAastha Mehta, Eslam Elnikety, Katura Harvey, Deepak Garg, Peter Druschel
    USENIX Security '17BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence CheckingJiang Ming, Dongpeng Xu, Yufei Jiang, Dinghao Wu
    USENIX Security '17Computer Security, Privacy, and DNA Sequencing: Compromising Computers with Synthesized DNA, Privacy Leaks, and MorePeter Ney, Karl Koscher, Lee Organick, Luis Ceze, Tadayoshi Kohno
    USENIX Security '17CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified BuildsKirill Nikitin, Eleftherios Kokoris-Kogias, Philipp Jovanovic, Nicolas Gailly, Linus Gasser, Ismail Khoffi, Justin Cappos, Bryan Ford
    USENIX Security '17Ninja: Towards Transparent Tracing and Debugging on ARMZhenyu Ning, Fengwei Zhang
    USENIX Security '17TrustBase: An Architecture to Repair and Strengthen Certificate-based AuthenticationMark O'Neill, Scott Heidbrink, Scott Ruoti, Jordan Whitehead, Dan Bunker, Luke Dickinson, Travis Hendershot, Joshua Reynolds, Kent Seamons, Daniel Zappala
    USENIX Security '17Digtool: A Virtualization-Based Framework for Detecting Kernel VulnerabilitiesJianfeng Pan, Guanglu Yan, Xiaocao Fan
    USENIX Security '17Global Measurement of DNS ManipulationPaul Pearce, Ben Jones, Frank Li, Roya Ensafi, Nick Feamster, Nick Weaver, Vern Paxson
    USENIX Security '17AWare: Preventing Abuse of Privacy-Sensitive Sensors via Operation BindingsGiuseppe Petracca, Ahmad-Atamli Reineh, Yuqiong Sun, Jens Grossklags, Trent Jaeger
    USENIX Security '17ORide: A Privacy-Preserving yet Accountable Ride-Hailing ServiceAnh Pham, Italo Dacosta, Guillaume Endignoux, Juan Ramon Troncoso Pastoriza, Kevin Huguenin, Jean-Pierre Hubaux
    USENIX Security '17The Loopix Anonymity SystemAnia M. Piotrowska, Jamie Hayes, Tariq Elahi, Sebastian Meiser, George Danezis
    USENIX Security '17Exploring User Perceptions of Discrimination in Online Targeted AdvertisingAngelisa C. Plane, Elissa M. Redmiles, Michelle L. Mazurek, Michael Carl Tschantz
    USENIX Security '17AuthentiCall: Efficient Identity and Content Authentication for Phone CallsBradley Reaves, Logan Blue, Hadi Abdullah, Luis Vargas, Patrick Traynor, Thomas Shrimpton
    USENIX Security '17BootStomp: On the Security of Bootloaders in Mobile DevicesNilo Redini, Aravind Machiry, Dipanjan Das, Yanick Fratantonio, Antonio Bianchi, Eric Gustafson, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna
    USENIX Security '17Extension Breakdown: Security Analysis of Browsers Extension Resources Control PoliciesIskander Sanchez-Rola, Igor Santos, Davide Balzarotti
    USENIX Security '17kAFL: Hardware-Assisted Feedback Fuzzing for OS KernelsSergej Schumilo, Cornelius Aschermann, Robert Gawlik, Sebastian Schinzel, Thorsten Holz
    USENIX Security '17Beauty and the Burst: Remote Identification of Encrypted Video StreamsRoei Schuster, Vitaly Shmatikov, Eran Tromer
    USENIX Security '17Same-Origin Policy: Evaluation in Modern BrowsersJörg Schwenk, Marcus Niemietz, Christian Mainka
    USENIX Security '176thSense: A Context-aware Sensor-based Attack Detector for Smart DevicesAmit Kumar Sikder, Hidayet Aksu, A. Selcuk Uluagac
    USENIX Security '17Characterizing the Nature and Dynamics of Tor Exit BlockingRachee Singh, Rishab Nithyanand, Sadia Afroz, Paul Pearce, Michael Carl Tschantz, Phillipa Gill, Vern Paxson
    USENIX Security '17Speeding up detection of SHA-1 collision attacks using unavoidable attack conditionsMarc Stevens, Daniel Shumow
    USENIX Security '17How the Web Tangled Itself: Uncovering the History of Client-Side Web (In)SecurityBen Stock, Martin Johns, Marius Steffens, Michael Backes
    USENIX Security '17USB Snooping Made Easy: Crosstalk Leakage Attacks on USB HubsYang Su, Daniel Genkin, Damith Ranasinghe, Yuval Yarom
    USENIX Security '17CLKSCREW: Exposing the Perils of Security-Oblivious Energy ManagementAdrian Tang, Simha Sethumadhavan, Salvatore Stolfo

    Pages