Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '21Entangled Watermarks as a Defense against Model ExtractionHengrui Jia, Christopher A. Choquette-Choo, Varun Chandrasekaran, Nicolas Papernot
    USENIX Security '21Mind Your Weight(s): A Large-scale Study on Insufficient Machine Learning Model Protection in Mobile AppsZhichuang Sun, Ruimin Sun, Long Lu, Alan Mislove
    USENIX Security '21Breaking Through Binaries: Compiler-quality Instrumentation for Better Binary-only FuzzingStefan Nagy, Anh Nguyen-Tuong, Jason D. Hiser, Jack W. Davidson, Matthew Hicks
    USENIX Security '21Cost-Aware Robust Tree Ensembles for Security ApplicationsYizheng Chen, Shiqi Wang, Weifan Jiang, Asaf Cidon, Suman Jana
    USENIX Security '21Too Good to Be Safe: Tricking Lane Detection in Autonomous Driving with Crafted PerturbationsPengfei Jing, Qiyi Tang, Yuefeng Du, Lei Xue, Xiapu Luo, Ting Wang, Sen Nie, Shi Wu
    USENIX Security '21On the Routing-Aware Peering against Network-Eclipse Attacks in BitcoinMuoi Tran, Akshaye Shenoi, Min Suk Kang
    USENIX Security '21MBA-Blast: Unveiling and Simplifying Mixed Boolean-Arithmetic ObfuscationBinbin Liu, Junfu Shen, Jiang Ming, Qilong Zheng, Jing Li, Dongpeng Xu
    USENIX Security '21VScape: Assessing and Escaping Virtual Call ProtectionsKaixiang Chen, Chao Zhang, Tingting Yin, Xingman Chen, Lei Zhao
    USENIX Security '21MIRAGE: Mitigating Conflict-Based Cache Attacks with a Practical Fully-Associative DesignGururaj Saileshwar, Moinuddin Qureshi
    USENIX Security '21Sharing More and Checking Less: Leveraging Common Input Keywords to Detect Bugs in Embedded SystemsLibo Chen, Yanhao Wang, Quanpu Cai, Yunfan Zhan, Hong Hu, Jiaqi Linghu, Qinsheng Hou, Chao Zhang, Haixin Duan, Zhi Xue
    USENIX Security '21ObliCheck: Efficient Verification of Oblivious Algorithms with Unobservable StateJeongseok Son, Griffin Prechter, Rishabh Poddar, Raluca Ada Popa, Koushik Sen
    USENIX Security '21Understanding Malicious Cross-library Data Harvesting on AndroidJice Wang, Yue Xiao, Xueqiang Wang, Yuhong Nan, Luyi Xing, Xiaojing Liao, JinWei Dong, Nicolas Serrano, Haoran Lu, XiaoFeng Wang, Yuqing Zhang
    USENIX Security '21DRMI: A Dataset Reduction Technology based on Mutual Information for Black-box AttacksYingzhe He, Guozhu Meng, Kai Chen, Xingbo Hu, Jinwen He
    USENIX Security '21Fantastic Four: Honest-Majority Four-Party Secure Computation With Malicious SecurityAnders Dalskov, Daniel Escudero, Marcel Keller
    USENIX Security '21Locally Differentially Private Analysis of Graph StatisticsJacob Imola, Takao Murakami, Kamalika Chaudhuri
    USENIX Security '21EOSAFE: Security Analysis of EOSIO Smart ContractsNingyu He, Ruiyi Zhang, Haoyu Wang, Lei Wu, Xiapu Luo, Yao Guo, Ting Yu, Xuxian Jiang
    USENIX Security '21Blitz: Secure Multi-Hop Payments Without Two-Phase CommitsLukas Aumayr, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei
    USENIX Security '21Messy States of Wiring: Vulnerabilities in Emerging Personal Payment SystemsJiadong Lou, Xu Yuan, Ning Zhang
    USENIX Security '21SWIFT: Super-fast and Robust Privacy-Preserving Machine LearningNishat Koti, Mahak Pancholi, Arpita Patra, Ajith Suresh
    USENIX Security '21Privacy-Preserving and Standard-Compatible AKA Protocol for 5GYuchen Wang, Zhenfeng Zhang, Yongquan Xie
    USENIX Security '21SEApp: Bringing Mandatory Access Control to Android AppsMatthew Rossi, Dario Facchinetti, Enrico Bacis, Marco Rosa, Stefano Paraboschi
    USENIX Security '21A11y and Privacy don't have to be mutually exclusive: Constraining Accessibility Service Misuse on AndroidJie Huang, Michael Backes, Sven Bugiel
    USENIX Security '21DICE*: A Formally Verified Implementation of DICE Measured BootZhe Tao, Aseem Rastogi, Naman Gupta, Kapil Vaswani, Aditya V. Thakur
    USENIX Security '21Research on the Security of Visual Reasoning CAPTCHAYipeng Gao, Haichang Gao, Sainan Luo, Yang Zi, Shudong Zhang, Wenjie Mao, Ping Wang, Yulong Shen, Jeff Yan
    USENIX Security '21SmarTest: Effectively Hunting Vulnerable Transaction Sequences in Smart Contracts through Language Model-Guided Symbolic ExecutionSunbeom So, Seongjoon Hong, Hakjoo Oh

Pages