USENIX Security '21 | PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-Metal Embedded Applications | Taegyu Kim, Vireshwar Kumar, Junghwan Rhee, Jizhou Chen, Kyungtae Kim, Chung Hwan Kim, Dongyan Xu, Dave (Jing) Tian |
USENIX Security '21 | LZR: Identifying Unexpected Internet Services | Liz Izhikevich, Renata Teixeira, Zakir Durumeric |
USENIX Security '21 | Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers | Giorgio Severi, Jim Meyer, Scott Coull, Alina Oprea |
USENIX Security '21 | Cerebro: A Platform for Multi-Party Cryptographic Collaborative Learning | Wenting Zheng, Ryan Deng, Weikeng Chen, Raluca Ada Popa, Aurojit Panda, Ion Stoica |
USENIX Security '21 | A Large-Scale Interview Study on Information Security in and Attacks against Small and Medium-sized Enterprises | Nicolas Huaman, Bennet von Skarczinski, Christian Stransky, Dominik Wermke, Yasemin Acar, Arne Dreißigacker, Sascha Fahl |
USENIX Security '21 | Jetset: Targeted Firmware Rehosting for Embedded Systems | Evan Johnson, Maxwell Bland, YiFei Zhu, Joshua Mason, Stephen Checkoway, Stefan Savage, Kirill Levchenko |
USENIX Security '21 | T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-based Text Classification | Ahmadreza Azizi, Ibrahim Asadullah Tahmid, Asim Waheed, Neal Mangaokar, Jiameng Pu, Mobin Javed, Chandan K. Reddy, Bimal Viswanath |
USENIX Security '21 | On the Design and Misuse of Microcoded (Embedded) Processors — A Cautionary Note | Nils Albartus, Clemens Nasenberg, Florian Stolz, Marc Fyrbiak, Christof Paar, Russell Tessier |
USENIX Security '21 | Constraint-guided Directed Greybox Fuzzing | Gwangmu Lee, Woochul Shim, Byoungyoung Lee |
USENIX Security '21 | Automatic Extraction of Secrets from the Transistor Jungle using Laser-Assisted Side-Channel Attacks | Thilo Krachenfels, Tuba Kiyan, Shahin Tajik, Jean-Pierre Seifert |
USENIX Security '21 | Fingerprinting in Style: Detecting Browser Extensions via Injected Style Sheets | Pierre Laperdrix, Oleksii Starov, Quan Chen, Alexandros Kapravelos, Nick Nikiforakis |
USENIX Security '21 | Fine Grained Dataflow Tracking with Proximal Gradients | Gabriel Ryan, Abhishek Shah, Dongdong She, Koustubha Bhat, Suman Jana |
USENIX Security '21 | Card Brand Mixup Attack: Bypassing the PIN in non-Visa Cards by Using Them for Visa Transactions | David Basin, Ralf Sasse, Jorge Toro-Pozo |
USENIX Security '21 | SEAL: Storage-efficient Causality Analysis on Enterprise Logs with Query-friendly Compression | Peng Fei, Zhou Li, Zhiying Wang, Xiao Yu, Ding Li, Kangkook Jee |
USENIX Security '21 | Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing | Yousra Aafer, Wei You, Yi Sun, Yu Shi, Xiangyu Zhang, Heng Yin |
USENIX Security '21 | Exposing New Vulnerabilities of Error Handling Mechanism in CAN | Khaled Serag, Rohit Bhatia, Vireshwar Kumar, Z. Berkay Celik, Dongyan Xu |
USENIX Security '21 | Defeating DNN-Based Traffic Analysis Systems in Real-Time With Blind Adversarial Perturbations | Milad Nasr, Alireza Bahramali, Amir Houmansadr |
USENIX Security '21 | Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical | Riccardo Paccagnella, Licheng Luo, Christopher W. Fletcher |
USENIX Security '21 | Automatic Firmware Emulation through Invalidity-guided Knowledge Inference | Wei Zhou, Le Guan, Peng Liu, Yuqing Zhang |
USENIX Security '21 | Reducing HSM Reliance in Payments through Proxy Re-Encryption | Sivanarayana Gaddam, Atul Luykx, Rohit Sinha, Gaven Watson |
USENIX Security '21 | Examining the Efficacy of Decoy-based and Psychological Cyber Deception | Kimberly J. Ferguson-Walter, Maxine M. Major, Chelsea K. Johnson, Daniel H. Muhleman |
USENIX Security '21 | Does logic locking work with EDA tools? | Zhaokun Han, Muhammad Yasin, Jeyavijayan (JV) Rajendran |
USENIX Security '21 | ExpRace: Exploiting Kernel Races through Raising Interrupts | Yoochan Lee, Changwoo Min, Byoungyoung Lee |
USENIX Security '21 | CANARY - a reactive defense mechanism for Controller Area Networks based on Active RelaYs | Bogdan Groza, Lucian Popa, Pal-Stefan Murvay, Yuval Elovici, Asaf Shabtai |
USENIX Security '21 | CLARION: Sound and Clear Provenance Tracking for Microservice Deployments | Xutong Chen, Hassaan Irshad, Yan Chen, Ashish Gehani, Vinod Yegneswaran |