Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '21Android SmartTVs Vulnerability Discovery via Log-Guided FuzzingYousra Aafer, Wei You, Yi Sun, Yu Shi, Xiangyu Zhang, Heng Yin
    USENIX Security '21Defeating DNN-Based Traffic Analysis Systems in Real-Time With Blind Adversarial PerturbationsMilad Nasr, Alireza Bahramali, Amir Houmansadr
    USENIX Security '21ExpRace: Exploiting Kernel Races through Raising InterruptsYoochan Lee, Changwoo Min, Byoungyoung Lee
    USENIX Security '21JAW: Studying Client-side CSRF with Hybrid Property Graphs and Declarative TraversalsSoheil Khodayari, Giancarlo Pellegrino
    USENIX Security '21AdCube: WebVR Ad Fraud and Practical Confinement of Third-Party AdsHyunjoo Lee, Jiyeon Lee, Daejun Kim, Suman Jana, Insik Shin, Sooel Son
    USENIX Security '21WaveGuard: Understanding and Mitigating Audio Adversarial ExamplesShehzeen Hussain, Paarth Neekhara, Shlomo Dubnov, Julian McAuley, Farinaz Koushanfar
    USENIX Security '21Undo Workarounds for Kernel BugsSeyed Mohammadjavad Seyed Talebi, Zhihao Yao, Ardalan Amiri Sani, Zhiyun Qian, Daniel Austin
    USENIX Security '21ICSFuzz: Manipulating I/Os and Repurposing Binary Code to Enable Instrumented Fuzzing in ICS Control ApplicationsDimitrios Tychalas, Hadjer Benkraouda, Michail Maniatakos
    USENIX Security '21Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel DefensesAnatoly Shusterman, Ayush Agarwal, Sioli O'Connell, Daniel Genkin, Yossi Oren, Yuval Yarom
    USENIX Security '21Cost-Aware Robust Tree Ensembles for Security ApplicationsYizheng Chen, Shiqi Wang, Weifan Jiang, Asaf Cidon, Suman Jana
    USENIX Security '21ObliCheck: Efficient Verification of Oblivious Algorithms with Unobservable StateJeongseok Son, Griffin Prechter, Rishabh Poddar, Raluca Ada Popa, Koushik Sen
    USENIX Security '21Fantastic Four: Honest-Majority Four-Party Secure Computation With Malicious SecurityAnders Dalskov, Daniel Escudero, Marcel Keller
    USENIX Security '21SWIFT: Super-fast and Robust Privacy-Preserving Machine LearningNishat Koti, Mahak Pancholi, Arpita Patra, Ajith Suresh
    USENIX Security '21SIGL: Securing Software Installations Through Deep Graph LearningXueyuan Han, Xiao Yu, Thomas Pasquier, Ding Li, Junghwan Rhee, James Mickens, Margo Seltzer, Haifeng Chen
    USENIX Security '21Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor Contamination DetectionDi Tang, XiaoFeng Wang, Haixu Tang, Kehuan Zhang
    USENIX Security '21Privacy and Integrity Preserving Computations with CRISPSylvain Chatel, Apostolos Pyrgelis, Juan Ramón Troncoso-Pastoriza, Jean-Pierre Hubaux
    USENIX Security '21Senate: A Maliciously-Secure MPC Platform for Collaborative AnalyticsRishabh Poddar, Sukrit Kalra, Avishay Yanai, Ryan Deng, Raluca Ada Popa, Joseph M. Hellerstein
    USENIX Security '21Hermes Attack: Steal DNN Models with Lossless Inference AccuracyYuankun Zhu, Yueqiang Cheng, Husheng Zhou, Yantao Lu
    USENIX Security '21ABY2.0: Improved Mixed-Protocol Secure Two-Party ComputationArpita Patra, Thomas Schneider, Ajith Suresh, Hossein Yalame
    USENIX Security '21Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic PrivacySaba Eskandarian, Henry Corrigan-Gibbs, Matei Zaharia, Dan Boneh
    USENIX Security '21Finding Bugs Using Your Own Code: Detecting Functionally-similar yet Inconsistent CodeMansour Ahmadi, Reza Mirzazade Farkhani, Ryan Williams, Long Lu
    USENIX Security '21Adversarial Policy Training against Deep Reinforcement LearningXian Wu, Wenbo Guo, Hua Wei, Xinyu Xing
    USENIX Security '21KeyForge: Non-Attributable Email from Forward-Forgeable SignaturesMichael A. Specter, Sunoo Park, Matthew Green
    USENIX Security '21You Autocomplete Me: Poisoning Vulnerabilities in Neural Code CompletionRoei Schuster, Congzheng Song, Eran Tromer, Vitaly Shmatikov
    USENIX Security '21Understanding and Detecting Disordered Error Handling with Precise Function PairingQiushi Wu, Aditya Pakki, Navid Emamdoost, Stephen McCamant, Kangjie Lu

Pages