USENIX Security '21 | Experiences Deploying Multi-Vantage-Point Domain Validation at Let's Encrypt | Henry Birge-Lee, Liang Wang, Daniel McCarney, Roland Shoemaker, Jennifer Rexford, Prateek Mittal |
USENIX Security '21 | Coco: Co-Design and Co-Verification of Masked Software Implementations on CPUs | Barbara Gigerl, Vedad Hadzic, Robert Primas, Stefan Mangard, Roderick Bloem |
USENIX Security '21 | Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries | Dario Pasquini, Marco Cianfriglia, Giuseppe Ateniese, Massimo Bernaschi |
USENIX Security '21 | WaveGuard: Understanding and Mitigating Audio Adversarial Examples | Shehzeen Hussain, Paarth Neekhara, Shlomo Dubnov, Julian McAuley, Farinaz Koushanfar |
USENIX Security '21 | Using Amnesia to Detect Credential Database Breaches | Ke Coby Wang, Michael K. Reiter |
USENIX Security '21 | Undo Workarounds for Kernel Bugs | Seyed Mohammadjavad Seyed Talebi, Zhihao Yao, Ardalan Amiri Sani, Zhiyun Qian, Daniel Austin |
USENIX Security '21 | SMASH: Synchronized Many-sided Rowhammer Attacks from JavaScript | Finn de Ridder, Pietro Frigo, Emanuele Vannacci, Herbert Bos, Cristiano Giuffrida, Kaveh Razavi |
USENIX Security '21 | ICSFuzz: Manipulating I/Os and Repurposing Binary Code to Enable Instrumented Fuzzing in ICS Control Applications | Dimitrios Tychalas, Hadjer Benkraouda, Michail Maniatakos |
USENIX Security '21 | DeepReflect: Discovering Malicious Functionality through Binary Reconstruction | Evan Downing, Yisroel Mirsky, Kyuhong Park, Wenke Lee |
USENIX Security '21 | What's in a Name? Exploring CA Certificate Control | Zane Ma, Joshua Mason, Manos Antonakakis, Zakir Durumeric, Michael Bailey |
USENIX Security '21 | PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop | Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, Christian Weinert |
USENIX Security '21 | Graph Backdoor | Zhaohan Xi, Ren Pang, Shouling Ji, Ting Wang |
USENIX Security '21 | Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses | Anatoly Shusterman, Ayush Agarwal, Sioli O'Connell, Daniel Genkin, Yossi Oren, Yuval Yarom |
USENIX Security '21 | Swivel: Hardening WebAssembly against Spectre | Shravan Narayan, Craig Disselkoen, Daniel Moghimi, Sunjay Cauligi, Evan Johnson, Zhao Gang, Anjo Vahldiek-Oberwagner, Ravi Sahita, Hovav Shacham, Dean Tullsen, Deian Stefan |
USENIX Security '21 | Entangled Watermarks as a Defense against Model Extraction | Hengrui Jia, Christopher A. Choquette-Choo, Varun Chandrasekaran, Nicolas Papernot |
USENIX Security '21 | Mind Your Weight(s): A Large-scale Study on Insufficient Machine Learning Model Protection in Mobile Apps | Zhichuang Sun, Ruimin Sun, Long Lu, Alan Mislove |
USENIX Security '21 | Breaking Through Binaries: Compiler-quality Instrumentation for Better Binary-only Fuzzing | Stefan Nagy, Anh Nguyen-Tuong, Jason D. Hiser, Jack W. Davidson, Matthew Hicks |
USENIX Security '21 | Cost-Aware Robust Tree Ensembles for Security Applications | Yizheng Chen, Shiqi Wang, Weifan Jiang, Asaf Cidon, Suman Jana |
USENIX Security '21 | Too Good to Be Safe: Tricking Lane Detection in Autonomous Driving with Crafted Perturbations | Pengfei Jing, Qiyi Tang, Yuefeng Du, Lei Xue, Xiapu Luo, Ting Wang, Sen Nie, Shi Wu |
USENIX Security '21 | On the Routing-Aware Peering against Network-Eclipse Attacks in Bitcoin | Muoi Tran, Akshaye Shenoi, Min Suk Kang |
USENIX Security '21 | MBA-Blast: Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation | Binbin Liu, Junfu Shen, Jiang Ming, Qilong Zheng, Jing Li, Dongpeng Xu |
USENIX Security '21 | VScape: Assessing and Escaping Virtual Call Protections | Kaixiang Chen, Chao Zhang, Tingting Yin, Xingman Chen, Lei Zhao |
USENIX Security '21 | MIRAGE: Mitigating Conflict-Based Cache Attacks with a Practical Fully-Associative Design | Gururaj Saileshwar, Moinuddin Qureshi |
USENIX Security '21 | Sharing More and Checking Less: Leveraging Common Input Keywords to Detect Bugs in Embedded Systems | Libo Chen, Yanhao Wang, Quanpu Cai, Yunfan Zhan, Hong Hu, Jiaqi Linghu, Qinsheng Hou, Chao Zhang, Haixin Duan, Zhi Xue |
USENIX Security '21 | ObliCheck: Efficient Verification of Oblivious Algorithms with Unobservable State | Jeongseok Son, Griffin Prechter, Rishabh Poddar, Raluca Ada Popa, Koushik Sen |