USENIX Security '21 | Understanding Malicious Cross-library Data Harvesting on Android | Jice Wang, Yue Xiao, Xueqiang Wang, Yuhong Nan, Luyi Xing, Xiaojing Liao, JinWei Dong, Nicolas Serrano, Haoran Lu, XiaoFeng Wang, Yuqing Zhang |
USENIX Security '21 | DRMI: A Dataset Reduction Technology based on Mutual Information for Black-box Attacks | Yingzhe He, Guozhu Meng, Kai Chen, Xingbo Hu, Jinwen He |
USENIX Security '21 | Fantastic Four: Honest-Majority Four-Party Secure Computation With Malicious Security | Anders Dalskov, Daniel Escudero, Marcel Keller |
USENIX Security '21 | Locally Differentially Private Analysis of Graph Statistics | Jacob Imola, Takao Murakami, Kamalika Chaudhuri |
USENIX Security '21 | EOSAFE: Security Analysis of EOSIO Smart Contracts | Ningyu He, Ruiyi Zhang, Haoyu Wang, Lei Wu, Xiapu Luo, Yao Guo, Ting Yu, Xuxian Jiang |
USENIX Security '21 | Blitz: Secure Multi-Hop Payments Without Two-Phase Commits | Lukas Aumayr, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei |
USENIX Security '21 | Messy States of Wiring: Vulnerabilities in Emerging Personal Payment Systems | Jiadong Lou, Xu Yuan, Ning Zhang |
USENIX Security '21 | SWIFT: Super-fast and Robust Privacy-Preserving Machine Learning | Nishat Koti, Mahak Pancholi, Arpita Patra, Ajith Suresh |
USENIX Security '21 | Privacy-Preserving and Standard-Compatible AKA Protocol for 5G | Yuchen Wang, Zhenfeng Zhang, Yongquan Xie |
USENIX Security '21 | SEApp: Bringing Mandatory Access Control to Android Apps | Matthew Rossi, Dario Facchinetti, Enrico Bacis, Marco Rosa, Stefano Paraboschi |
USENIX Security '21 | A11y and Privacy don't have to be mutually exclusive: Constraining Accessibility Service Misuse on Android | Jie Huang, Michael Backes, Sven Bugiel |
USENIX Security '21 | DICE*: A Formally Verified Implementation of DICE Measured Boot | Zhe Tao, Aseem Rastogi, Naman Gupta, Kapil Vaswani, Aditya V. Thakur |
USENIX Security '21 | Research on the Security of Visual Reasoning CAPTCHA | Yipeng Gao, Haichang Gao, Sainan Luo, Yang Zi, Shudong Zhang, Wenjie Mao, Ping Wang, Yulong Shen, Jeff Yan |
USENIX Security '21 | SmarTest: Effectively Hunting Vulnerable Transaction Sequences in Smart Contracts through Language Model-Guided Symbolic Execution | Sunbeom So, Seongjoon Hong, Hakjoo Oh |
USENIX Security '21 | GForce: GPU-Friendly Oblivious and Rapid Neural Network Inference | Lucien K. L. Ng, Sherman S. M. Chow |
USENIX Security '21 | Acoustics to the Rescue: Physical Key Inference Attack Revisited | Soundarya Ramesh, Rui Xiao, Anindya Maiti, Jong Taek Lee, Harini Ramprasad, Ananda Kumar, Murtuza Jadliwala, Jun Han |
USENIX Security '21 | SIGL: Securing Software Installations Through Deep Graph Learning | Xueyuan Han, Xiao Yu, Thomas Pasquier, Ding Li, Junghwan Rhee, James Mickens, Margo Seltzer, Haifeng Chen |
USENIX Security '21 | Weaponizing Middleboxes for TCP Reflected Amplification | Kevin Bock, Abdulrahman Alaraj, Yair Fax, Kyle Hurley, Eric Wustrow, Dave Levin |
USENIX Security '21 | Evaluating In-Workflow Messages for Improving Mental Models of End-to-End Encryption | Omer Akgul, Wei Bai, Shruti Das, Michelle L. Mazurek |
USENIX Security '21 | LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks | Jianliang Wu, Ruoyu Wu, Daniele Antonioli, Mathias Payer, Nils Ole Tippenhauer, Dongyan Xu, Dave (Jing) Tian, Antonio Bianchi |
USENIX Security '21 | PrivSyn: Differentially Private Data Synthesis | Zhikun Zhang, Tianhao Wang, Ninghui Li, Jean Honorio, Michael Backes, Shibo He, Jiming Chen, Yang Zhang |
USENIX Security '21 | Disrupting Continuity of Apple's Wireless Ecosystem Security: New Tracking, DoS, and MitM Attacks on iOS and macOS Through Bluetooth Low Energy, AWDL, and Wi-Fi | Milan Stute, Alexander Heinrich, Jannik Lorenz, Matthias Hollick |
USENIX Security '21 | Muse: Secure Inference Resilient to Malicious Clients | Ryan Lehmkuhl, Pratyush Mishra, Akshayaram Srinivasan, Raluca Ada Popa |
USENIX Security '21 | I Always Feel Like Somebody's Sensing Me! A Framework to Detect, Identify, and Localize Clandestine Wireless Sensors | Akash Deep Singh, Luis Garcia, Joseph Noor, Mani Srivastava |
USENIX Security '21 | M2MON: Building an MMIO-based Security Reference Monitor for Unmanned Vehicles | Arslan Khan, Hyungsub Kim, Byoungyoung Lee, Dongyan Xu, Antonio Bianchi, Dave (Jing) Tian |