USENIX Security '20 | You Are What You Broadcast: Identification of Mobile and IoT Devices from (Public) WiFi | Lingjing Yu, Bo Luo, Jun Ma, Zhaoyu Zhou, Qingyun Liu |
USENIX Security '20 | The Industrial Age of Hacking | Timothy Nosco, Jared Ziegler, Zechariah Clark, Davy Marrero, Todd Finkler, Andrew Barbarello, W. Michael Petullo |
USENIX Security '20 | SHA-1 is a Shambles: First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust | Gaëtan Leurent, Thomas Peyrin |
USENIX Security '20 | Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections | Tom Van Goethem, Christina Pöpper, Wouter Joosen, Mathy Vanhoef |
USENIX Security '20 | An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem | Shunfan Zhou, Zhemin Yang, Jie Xiang, Yinzhi Cao, Zhemin Yang, Yuan Zhang |
USENIX Security '20 | Empirical Measurement of Systemic 2FA Usability | Joshua Reynolds, Nikita Samarin, Joseph Barnes, Taylor Judd, Joshua Mason, Michael Bailey, Serge Egelman |
USENIX Security '20 | DECAF: Automatic, Adaptive De-bloating and Hardening of COTS Firmware | Jake Christensen, Ionut Mugurel Anghel, Rob Taglang, Mihai Chiroiu, Radu Sion |
USENIX Security '20 | Scaling Verifiable Computation Using Efficient Set Accumulators | Alex Ozdemir, Riad Wahby, Barry Whitehat, Dan Boneh |
USENIX Security '20 | Boxer: Preventing fraud by scanning credit cards | Zainul Abi Din, Hari Venugopalan, Jaime Park, Andy Li, Weisu Yin, Haohui Mai, Yong Jae Lee, Steven Liu, Samuel T. King |
USENIX Security '20 | Fawkes: Protecting Privacy against Unauthorized Deep Learning Models | Shawn Shan, Emily Wenger, Jiayun Zhang, Huiying Li, Haitao Zheng, Ben Y. Zhao |
USENIX Security '20 | Justinian's GAAvernor: Robust Distributed Learning with Gradient Aggregation Agent | Xudong Pan, Mi Zhang, Duocai Wu, Qifan Xiao, Shouling Ji, Zhemin Yang |
USENIX Security '20 | The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums | Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart |
USENIX Security '20 | Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints | Dokyung Song, Felicitas Hetzelt, Jonghwan Kim, Brent Byunghoon Kang, Jean-Pierre Seifert, Michael Franz |
USENIX Security '20 | EPIC: Every Packet Is Checked in the Data Plane of a Path-Aware Internet | Markus Legner, Tobias Klenze, Marc Wyss, Christoph Sprenger, Adrian Perrig |
USENIX Security '20 | DeepHammer: Depleting the Intelligence of Deep Neural Networks through Targeted Chain of Bit Flips | Fan Yao, Adnan Siraj Rakin, Deliang Fan |
USENIX Security '20 | Who's Calling? Characterizing Robocalls through Audio and Metadata Analysis | Sathvik Prasad, Elijah Bouma-Sims, Athishay Kiran Mylappan, Bradley Reaves |
USENIX Security '20 | Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems | Takeshi Sugawara, Benjamin Cyr, Sara Rampazzi, Daniel Genkin, Kevin Fu |
USENIX Security '20 | DELF: Safeguarding deletion correctness in Online Social Networks | Katriel Cohn-Gordon, Georgios Damaskinos, Divino Neto, Joshi Cordova, Benoît Reitz, Benjamin Strahs, Daniel Obenshain, Paul Pearce, Ioannis Papagiannis |
USENIX Security '20 | SENG, the SGX-Enforcing Network Gateway: Authorizing Communication from Shielded Clients | Fabian Schwarz, Christian Rossow |
USENIX Security '20 | Visor: Privacy-Preserving Video Analytics as a Cloud Service | Rishabh Poddar, Ganesh Ananthanarayanan, Srinath Setty, Stavros Volos, Raluca Ada Popa |
USENIX Security '20 | Remote Side-Channel Attacks on Anonymous Transactions | Florian Tramer, Dan Boneh, Kenny Paterson |
USENIX Security '20 | What Twitter Knows: Characterizing Ad Targeting Practices, User Perceptions, and Ad Explanations Through Users' Own Twitter Data | Miranda Wei, Madison Stamos, Sophie Veys, Nathan Reitinger, Justin Goodman, Margot Herman, Dorota Filipczuk, Ben Weinshel, Michelle L. Mazurek, Blase Ur |
USENIX Security '20 | See No Evil: Phishing for Permissions with False Transparency | Güliz Seray Tuncay, Jingyu Qian, Carl A. Gunter |
USENIX Security '20 | MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures | Yang Xiao, Bihuan Chen, Chendong Yu, Zhengzi Xu, Zimu Yuan, Feng Li, Binghong Liu, Yang Liu, Wei Huo, Wei Zou, Wenchang Shi |
USENIX Security '20 | The Impact of Ad-Blockers on Product Search and Purchase Behavior: A Lab Experiment | Alisa Frik, Amelia Haviland, Alessandro Acquisti |