USENIX Security '17 | When the Weakest Link is Strong: Secure Collaboration in the Case of the Panama Papers | Susan E. McGregor, Elizabeth Anne Watkins, Mahdi Nasrullah Al-Ameen, Kelly Caine, Franziska Roesner |
USENIX Security '17 | Qapla: Policy compliance for database-backed systems | Aastha Mehta, Eslam Elnikety, Katura Harvey, Deepak Garg, Peter Druschel |
USENIX Security '17 | BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking | Jiang Ming, Dongpeng Xu, Yufei Jiang, Dinghao Wu |
USENIX Security '17 | Computer Security, Privacy, and DNA Sequencing: Compromising Computers with Synthesized DNA, Privacy Leaks, and More | Peter Ney, Karl Koscher, Lee Organick, Luis Ceze, Tadayoshi Kohno |
USENIX Security '17 | CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds | Kirill Nikitin, Eleftherios Kokoris-Kogias, Philipp Jovanovic, Nicolas Gailly, Linus Gasser, Ismail Khoffi, Justin Cappos, Bryan Ford |
USENIX Security '17 | Ninja: Towards Transparent Tracing and Debugging on ARM | Zhenyu Ning, Fengwei Zhang |
USENIX Security '17 | TrustBase: An Architecture to Repair and Strengthen Certificate-based Authentication | Mark O'Neill, Scott Heidbrink, Scott Ruoti, Jordan Whitehead, Dan Bunker, Luke Dickinson, Travis Hendershot, Joshua Reynolds, Kent Seamons, Daniel Zappala |
USENIX Security '17 | Digtool: A Virtualization-Based Framework for Detecting Kernel Vulnerabilities | Jianfeng Pan, Guanglu Yan, Xiaocao Fan |
USENIX Security '17 | Global Measurement of DNS Manipulation | Paul Pearce, Ben Jones, Frank Li, Roya Ensafi, Nick Feamster, Nick Weaver, Vern Paxson |
USENIX Security '17 | AWare: Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings | Giuseppe Petracca, Ahmad-Atamli Reineh, Yuqiong Sun, Jens Grossklags, Trent Jaeger |
USENIX Security '17 | ORide: A Privacy-Preserving yet Accountable Ride-Hailing Service | Anh Pham, Italo Dacosta, Guillaume Endignoux, Juan Ramon Troncoso Pastoriza, Kevin Huguenin, Jean-Pierre Hubaux |
USENIX Security '17 | The Loopix Anonymity System | Ania M. Piotrowska, Jamie Hayes, Tariq Elahi, Sebastian Meiser, George Danezis |
USENIX Security '17 | Exploring User Perceptions of Discrimination in Online Targeted Advertising | Angelisa C. Plane, Elissa M. Redmiles, Michelle L. Mazurek, Michael Carl Tschantz |
USENIX Security '17 | AuthentiCall: Efficient Identity and Content Authentication for Phone Calls | Bradley Reaves, Logan Blue, Hadi Abdullah, Luis Vargas, Patrick Traynor, Thomas Shrimpton |
USENIX Security '17 | BootStomp: On the Security of Bootloaders in Mobile Devices | Nilo Redini, Aravind Machiry, Dipanjan Das, Yanick Fratantonio, Antonio Bianchi, Eric Gustafson, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna |
USENIX Security '17 | Extension Breakdown: Security Analysis of Browsers Extension Resources Control Policies | Iskander Sanchez-Rola, Igor Santos, Davide Balzarotti |
USENIX Security '17 | kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels | Sergej Schumilo, Cornelius Aschermann, Robert Gawlik, Sebastian Schinzel, Thorsten Holz |
USENIX Security '17 | Beauty and the Burst: Remote Identification of Encrypted Video Streams | Roei Schuster, Vitaly Shmatikov, Eran Tromer |
USENIX Security '17 | Same-Origin Policy: Evaluation in Modern Browsers | Jörg Schwenk, Marcus Niemietz, Christian Mainka |
USENIX Security '17 | 6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices | Amit Kumar Sikder, Hidayet Aksu, A. Selcuk Uluagac |
USENIX Security '17 | Characterizing the Nature and Dynamics of Tor Exit Blocking | Rachee Singh, Rishab Nithyanand, Sadia Afroz, Paul Pearce, Michael Carl Tschantz, Phillipa Gill, Vern Paxson |
USENIX Security '17 | Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions | Marc Stevens, Daniel Shumow |
USENIX Security '17 | How the Web Tangled Itself: Uncovering the History of Client-Side Web (In)Security | Ben Stock, Martin Johns, Marius Steffens, Michael Backes |
USENIX Security '17 | USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs | Yang Su, Daniel Genkin, Damith Ranasinghe, Yuval Yarom |
USENIX Security '17 | CLKSCREW: Exposing the Perils of Security-Oblivious Energy Management | Adrian Tang, Simha Sethumadhavan, Salvatore Stolfo |