Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '21Understanding Malicious Cross-library Data Harvesting on AndroidJice Wang, Yue Xiao, Xueqiang Wang, Yuhong Nan, Luyi Xing, Xiaojing Liao, JinWei Dong, Nicolas Serrano, Haoran Lu, XiaoFeng Wang, Yuqing Zhang
    USENIX Security '21DRMI: A Dataset Reduction Technology based on Mutual Information for Black-box AttacksYingzhe He, Guozhu Meng, Kai Chen, Xingbo Hu, Jinwen He
    USENIX Security '21Fantastic Four: Honest-Majority Four-Party Secure Computation With Malicious SecurityAnders Dalskov, Daniel Escudero, Marcel Keller
    USENIX Security '21Locally Differentially Private Analysis of Graph StatisticsJacob Imola, Takao Murakami, Kamalika Chaudhuri
    USENIX Security '21EOSAFE: Security Analysis of EOSIO Smart ContractsNingyu He, Ruiyi Zhang, Haoyu Wang, Lei Wu, Xiapu Luo, Yao Guo, Ting Yu, Xuxian Jiang
    USENIX Security '21Blitz: Secure Multi-Hop Payments Without Two-Phase CommitsLukas Aumayr, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei
    USENIX Security '21Messy States of Wiring: Vulnerabilities in Emerging Personal Payment SystemsJiadong Lou, Xu Yuan, Ning Zhang
    USENIX Security '21SWIFT: Super-fast and Robust Privacy-Preserving Machine LearningNishat Koti, Mahak Pancholi, Arpita Patra, Ajith Suresh
    USENIX Security '21Privacy-Preserving and Standard-Compatible AKA Protocol for 5GYuchen Wang, Zhenfeng Zhang, Yongquan Xie
    USENIX Security '21SEApp: Bringing Mandatory Access Control to Android AppsMatthew Rossi, Dario Facchinetti, Enrico Bacis, Marco Rosa, Stefano Paraboschi
    USENIX Security '21A11y and Privacy don't have to be mutually exclusive: Constraining Accessibility Service Misuse on AndroidJie Huang, Michael Backes, Sven Bugiel
    USENIX Security '21DICE*: A Formally Verified Implementation of DICE Measured BootZhe Tao, Aseem Rastogi, Naman Gupta, Kapil Vaswani, Aditya V. Thakur
    USENIX Security '21Research on the Security of Visual Reasoning CAPTCHAYipeng Gao, Haichang Gao, Sainan Luo, Yang Zi, Shudong Zhang, Wenjie Mao, Ping Wang, Yulong Shen, Jeff Yan
    USENIX Security '21SmarTest: Effectively Hunting Vulnerable Transaction Sequences in Smart Contracts through Language Model-Guided Symbolic ExecutionSunbeom So, Seongjoon Hong, Hakjoo Oh
    USENIX Security '21GForce: GPU-Friendly Oblivious and Rapid Neural Network InferenceLucien K. L. Ng, Sherman S. M. Chow
    USENIX Security '21Acoustics to the Rescue: Physical Key Inference Attack RevisitedSoundarya Ramesh, Rui Xiao, Anindya Maiti, Jong Taek Lee, Harini Ramprasad, Ananda Kumar, Murtuza Jadliwala, Jun Han
    USENIX Security '21SIGL: Securing Software Installations Through Deep Graph LearningXueyuan Han, Xiao Yu, Thomas Pasquier, Ding Li, Junghwan Rhee, James Mickens, Margo Seltzer, Haifeng Chen
    USENIX Security '21Weaponizing Middleboxes for TCP Reflected AmplificationKevin Bock, Abdulrahman Alaraj, Yair Fax, Kyle Hurley, Eric Wustrow, Dave Levin
    USENIX Security '21Evaluating In-Workflow Messages for Improving Mental Models of End-to-End EncryptionOmer Akgul, Wei Bai, Shruti Das, Michelle L. Mazurek
    USENIX Security '21LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth StacksJianliang Wu, Ruoyu Wu, Daniele Antonioli, Mathias Payer, Nils Ole Tippenhauer, Dongyan Xu, Dave (Jing) Tian, Antonio Bianchi
    USENIX Security '21PrivSyn: Differentially Private Data SynthesisZhikun Zhang, Tianhao Wang, Ninghui Li, Jean Honorio, Michael Backes, Shibo He, Jiming Chen, Yang Zhang
    USENIX Security '21Disrupting Continuity of Apple's Wireless Ecosystem Security: New Tracking, DoS, and MitM Attacks on iOS and macOS Through Bluetooth Low Energy, AWDL, and Wi-FiMilan Stute, Alexander Heinrich, Jannik Lorenz, Matthias Hollick
    USENIX Security '21Muse: Secure Inference Resilient to Malicious ClientsRyan Lehmkuhl, Pratyush Mishra, Akshayaram Srinivasan, Raluca Ada Popa
    USENIX Security '21I Always Feel Like Somebody's Sensing Me! A Framework to Detect, Identify, and Localize Clandestine Wireless SensorsAkash Deep Singh, Luis Garcia, Joseph Noor, Mani Srivastava
    USENIX Security '21M2MON: Building an MMIO-based Security Reference Monitor for Unmanned VehiclesArslan Khan, Hyungsub Kim, Byoungyoung Lee, Dongyan Xu, Antonio Bianchi, Dave (Jing) Tian

Pages