USENIX Security '21 | Entangled Watermarks as a Defense against Model Extraction | Hengrui Jia, Christopher A. Choquette-Choo, Varun Chandrasekaran, Nicolas Papernot |
USENIX Security '21 | Mind Your Weight(s): A Large-scale Study on Insufficient Machine Learning Model Protection in Mobile Apps | Zhichuang Sun, Ruimin Sun, Long Lu, Alan Mislove |
USENIX Security '21 | Breaking Through Binaries: Compiler-quality Instrumentation for Better Binary-only Fuzzing | Stefan Nagy, Anh Nguyen-Tuong, Jason D. Hiser, Jack W. Davidson, Matthew Hicks |
USENIX Security '21 | Cost-Aware Robust Tree Ensembles for Security Applications | Yizheng Chen, Shiqi Wang, Weifan Jiang, Asaf Cidon, Suman Jana |
USENIX Security '21 | Too Good to Be Safe: Tricking Lane Detection in Autonomous Driving with Crafted Perturbations | Pengfei Jing, Qiyi Tang, Yuefeng Du, Lei Xue, Xiapu Luo, Ting Wang, Sen Nie, Shi Wu |
USENIX Security '21 | On the Routing-Aware Peering against Network-Eclipse Attacks in Bitcoin | Muoi Tran, Akshaye Shenoi, Min Suk Kang |
USENIX Security '21 | MBA-Blast: Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation | Binbin Liu, Junfu Shen, Jiang Ming, Qilong Zheng, Jing Li, Dongpeng Xu |
USENIX Security '21 | VScape: Assessing and Escaping Virtual Call Protections | Kaixiang Chen, Chao Zhang, Tingting Yin, Xingman Chen, Lei Zhao |
USENIX Security '21 | MIRAGE: Mitigating Conflict-Based Cache Attacks with a Practical Fully-Associative Design | Gururaj Saileshwar, Moinuddin Qureshi |
USENIX Security '21 | Sharing More and Checking Less: Leveraging Common Input Keywords to Detect Bugs in Embedded Systems | Libo Chen, Yanhao Wang, Quanpu Cai, Yunfan Zhan, Hong Hu, Jiaqi Linghu, Qinsheng Hou, Chao Zhang, Haixin Duan, Zhi Xue |
USENIX Security '21 | ObliCheck: Efficient Verification of Oblivious Algorithms with Unobservable State | Jeongseok Son, Griffin Prechter, Rishabh Poddar, Raluca Ada Popa, Koushik Sen |
USENIX Security '21 | Understanding Malicious Cross-library Data Harvesting on Android | Jice Wang, Yue Xiao, Xueqiang Wang, Yuhong Nan, Luyi Xing, Xiaojing Liao, JinWei Dong, Nicolas Serrano, Haoran Lu, XiaoFeng Wang, Yuqing Zhang |
USENIX Security '21 | DRMI: A Dataset Reduction Technology based on Mutual Information for Black-box Attacks | Yingzhe He, Guozhu Meng, Kai Chen, Xingbo Hu, Jinwen He |
USENIX Security '21 | Fantastic Four: Honest-Majority Four-Party Secure Computation With Malicious Security | Anders Dalskov, Daniel Escudero, Marcel Keller |
USENIX Security '21 | Locally Differentially Private Analysis of Graph Statistics | Jacob Imola, Takao Murakami, Kamalika Chaudhuri |
USENIX Security '21 | EOSAFE: Security Analysis of EOSIO Smart Contracts | Ningyu He, Ruiyi Zhang, Haoyu Wang, Lei Wu, Xiapu Luo, Yao Guo, Ting Yu, Xuxian Jiang |
USENIX Security '21 | Blitz: Secure Multi-Hop Payments Without Two-Phase Commits | Lukas Aumayr, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei |
USENIX Security '21 | Messy States of Wiring: Vulnerabilities in Emerging Personal Payment Systems | Jiadong Lou, Xu Yuan, Ning Zhang |
USENIX Security '21 | SWIFT: Super-fast and Robust Privacy-Preserving Machine Learning | Nishat Koti, Mahak Pancholi, Arpita Patra, Ajith Suresh |
USENIX Security '21 | Privacy-Preserving and Standard-Compatible AKA Protocol for 5G | Yuchen Wang, Zhenfeng Zhang, Yongquan Xie |
USENIX Security '21 | SEApp: Bringing Mandatory Access Control to Android Apps | Matthew Rossi, Dario Facchinetti, Enrico Bacis, Marco Rosa, Stefano Paraboschi |
USENIX Security '21 | A11y and Privacy don't have to be mutually exclusive: Constraining Accessibility Service Misuse on Android | Jie Huang, Michael Backes, Sven Bugiel |
USENIX Security '21 | DICE*: A Formally Verified Implementation of DICE Measured Boot | Zhe Tao, Aseem Rastogi, Naman Gupta, Kapil Vaswani, Aditya V. Thakur |
USENIX Security '21 | Research on the Security of Visual Reasoning CAPTCHA | Yipeng Gao, Haichang Gao, Sainan Luo, Yang Zi, Shudong Zhang, Wenjie Mao, Ping Wang, Yulong Shen, Jeff Yan |
USENIX Security '21 | SmarTest: Effectively Hunting Vulnerable Transaction Sequences in Smart Contracts through Language Model-Guided Symbolic Execution | Sunbeom So, Seongjoon Hong, Hakjoo Oh |