USENIX Security '21 | Fine Grained Dataflow Tracking with Proximal Gradients | Gabriel Ryan, Abhishek Shah, Dongdong She, Koustubha Bhat, Suman Jana |
USENIX Security '21 | Card Brand Mixup Attack: Bypassing the PIN in non-Visa Cards by Using Them for Visa Transactions | David Basin, Ralf Sasse, Jorge Toro-Pozo |
USENIX Security '21 | SEAL: Storage-efficient Causality Analysis on Enterprise Logs with Query-friendly Compression | Peng Fei, Zhou Li, Zhiying Wang, Xiao Yu, Ding Li, Kangkook Jee |
USENIX Security '21 | Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing | Yousra Aafer, Wei You, Yi Sun, Yu Shi, Xiangyu Zhang, Heng Yin |
USENIX Security '21 | Exposing New Vulnerabilities of Error Handling Mechanism in CAN | Khaled Serag, Rohit Bhatia, Vireshwar Kumar, Z. Berkay Celik, Dongyan Xu |
USENIX Security '21 | Defeating DNN-Based Traffic Analysis Systems in Real-Time With Blind Adversarial Perturbations | Milad Nasr, Alireza Bahramali, Amir Houmansadr |
USENIX Security '21 | Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical | Riccardo Paccagnella, Licheng Luo, Christopher W. Fletcher |
USENIX Security '21 | Automatic Firmware Emulation through Invalidity-guided Knowledge Inference | Wei Zhou, Le Guan, Peng Liu, Yuqing Zhang |
USENIX Security '21 | Reducing HSM Reliance in Payments through Proxy Re-Encryption | Sivanarayana Gaddam, Atul Luykx, Rohit Sinha, Gaven Watson |
USENIX Security '21 | Examining the Efficacy of Decoy-based and Psychological Cyber Deception | Kimberly J. Ferguson-Walter, Maxine M. Major, Chelsea K. Johnson, Daniel H. Muhleman |
USENIX Security '21 | Does logic locking work with EDA tools? | Zhaokun Han, Muhammad Yasin, Jeyavijayan (JV) Rajendran |
USENIX Security '21 | ExpRace: Exploiting Kernel Races through Raising Interrupts | Yoochan Lee, Changwoo Min, Byoungyoung Lee |
USENIX Security '21 | CANARY - a reactive defense mechanism for Controller Area Networks based on Active RelaYs | Bogdan Groza, Lucian Popa, Pal-Stefan Murvay, Yuval Elovici, Asaf Shabtai |
USENIX Security '21 | CLARION: Sound and Clear Provenance Tracking for Microservice Deployments | Xutong Chen, Hassaan Irshad, Yan Chen, Ashish Gehani, Vinod Yegneswaran |
USENIX Security '21 | Blind In/On-Path Attacks and Applications to VPNs | William J. Tolley, Beau Kujath, Mohammad Taha Khan, Narseo Vallina-Rodriguez, Jedidiah R. Crandall |
USENIX Security '21 | Jaqen: A High-Performance Switch-Native Approach for Detecting and Mitigating Volumetric DDoS Attacks with Programmable Switches | Zaoxing Liu, Hun Namkung, Georgios Nikolaidis, Jeongkeun Lee, Changhoon Kim, Xin Jin, Vladimir Braverman, Minlan Yu, Vyas Sekar |
USENIX Security '21 | JAW: Studying Client-side CSRF with Hybrid Property Graphs and Declarative Traversals | Soheil Khodayari, Giancarlo Pellegrino |
USENIX Security '21 | On the Usability of Authenticity Checks for Hardware Security Tokens | Katharina Pfeffer, Alexandra Mai, Adrian Dabrowski, Matthias Gusenbauer, Philipp Schindler, Edgar Weippl, Michael Franz, Katharina Krombholz |
USENIX Security '21 | Phishpedia: A Hybrid Deep Learning Based Approach to Visually Identify Phishing Webpages | Yun Lin, Ruofan Liu, Dinil Mon Divakaran, Jun Yang Ng, Qing Zhou Chan, Yiwen Lu, Yuxuan Si, Fan Zhang, Jin Song Dong |
USENIX Security '21 | AdCube: WebVR Ad Fraud and Practical Confinement of Third-Party Ads | Hyunjoo Lee, Jiyeon Lee, Daejun Kim, Suman Jana, Insik Shin, Sooel Son |
USENIX Security '21 | Where's Crypto?: Automated Identification and Classification of Proprietary Cryptographic Primitives in Binary Code | Carlo Meijer, Veelasha Moonsamy, Jos Wetzels |
USENIX Security '21 | SocialHEISTing: Understanding Stolen Facebook Accounts | Jeremiah Onaolapo, Nektarios Leontiadis, Despoina Magka, Gianluca Stringhini |
USENIX Security '21 | Static Detection of Unsafe DMA Accesses in Device Drivers | Jia-Ju Bai, Tuo Li, Kangjie Lu, Shi-Min Hu |
USENIX Security '21 | Causal Analysis for Software-Defined Networking Attacks | Benjamin E. Ujcich, Samuel Jero, Richard Skowyra, Adam Bates, William H. Sanders, Hamed Okhravi |
USENIX Security '21 | Data Poisoning Attacks to Local Differential Privacy Protocols | Xiaoyu Cao, Jinyuan Jia, Neil Zhenqiang Gong |