Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '20An Observational Investigation of Reverse Engineers’ ProcessesDaniel Votipka, Seth Rabin, Kristopher Micinski, Jeffrey S. Foster, Michelle L. Mazurek
    USENIX Security '20Big Numbers - Big Troubles: Systematically Analyzing Nonce Leakage in (EC)DSA ImplementationsSamuel Weiser, David Schrammel, Lukas Bodner, Raphael Spreitzer
    USENIX Security '20Plug-N-Pwned: Comprehensive Vulnerability Analysis of OBD-II Dongles as A New Over-the-Air Attack Surface in Automotive IoTHaohuang Wen, Qi Alfred Chen, Zhiqiang Lin
    USENIX Security '20SmartVerif: Push the Limit of Automation Capability of Verifying Security Protocols by Dynamic StrategiesYan Xiong, Cheng Su, Wenchao Huang, Fuyou Miao, Wansen Wang, Hengyi Ouyang
    USENIX Security '20FuzzGuard: Filtering out Unreachable Inputs in Directed Grey-box Fuzzing through Deep LearningPeiyuan Zong, Tao Lv, Dawei Wang, Zizhuang Deng, Ruigang Liang, Kai Chen
    USENIX Security '20Civet: An Efficient Java Partitioning Framework for Hardware EnclavesChia-Che Tsai, Jeongseok Son, Bhushan Jain, John McAvey, Raluca Ada Popa, Donald E. Porter
    USENIX Security '20"I am uncomfortable sharing what I can't see": Privacy Concerns of the Visually Impaired with Camera Based Assistive ApplicationsTaslima Akter, Bryan Dosono, Tousif Ahmed, Apu Kapadia, Bryan Semaan
    USENIX Security '20Delphi: A Cryptographic Inference Service for Neural NetworksPratyush Mishra, Ryan Lehmkuhl, Akshayaram Srinivasan, Wenting Zheng, Raluca Ada Popa
    USENIX Security '20PHMon: A Programmable Hardware Monitor and Its Security Use CasesLeila Delshadtehrani, Sadullah Canakci, Boyou Zhou, Schuyler Eldridge, Ajay Joshi, Manuel Egele
    USENIX Security '20Interpretable Deep Learning under FireXinyang Zhang, Ningfei Wang, Hua Shen, Shouling Ji, Xiapu Luo, Ting Wang
    USENIX Security '20BesFS: A POSIX Filesystem for Enclaves with a Mechanized Safety ProofShweta Shinde, Shengyi Wang, Pinghai Yuan, Aquinas Hobor, Abhik Roychoudhury, Prateek Saxena
    USENIX Security '20Automatic Hot Patch Generation for Android KernelsZhengzi Xu, Yulong Zhang, Longri Zheng, Liangzhao Xia, Chenfu Bao, Zhi Wang, Yang Liu
    USENIX Security '20Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN ArchitecturesMengjia Yan, Christopher W. Fletcher, Josep Torrellas
    USENIX Security '20HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution EnvironmentsGhada Dessouky, Tommaso Frassetto, Ahmad-Reza Sadeghi
    USENIX Security '20GREYONE: Data Flow Sensitive FuzzingShuitao Gan, Chao Zhang, Peng Chen, Bodong Zhao, Xiaojun Qin, Dong Wu, Zuoning Chen
    USENIX Security '20TPM-FAIL: TPM meets Timing and Lattice AttacksDaniel Moghimi, Berk Sunar, Thomas Eisenbarth, Nadia Heninger
    USENIX Security '20P2IM: Scalable and Hardware-independent Firmware Testing via Automatic Peripheral Interface ModelingBo Feng, Alejandro Mera, Long Lu
    USENIX Security '19No Right to Remain Silent: Isolating Malicious MixesHemi Leibowitz, Ania M. Piotrowska, George Danezis, Amir Herzberg
    USENIX Security '19Protecting Cloud Virtual Machines from Hypervisor and Host Operating System ExploitsShih-Wei Li, John S. Koh, Jason Nieh
    USENIX Security '19Exploiting Unprotected I/O Operations in AMD’s Secure Encrypted VirtualizationMengyuan Li, Yinqian Zhang, Zhiqiang Lin, Yan Solihin
    USENIX Security '19Detecting Missing-Check Bugs via Semantic- and Context-Aware Criticalness and Constraints InferencesKangjie Lu, Aditya Pakki, Qiushi Wu
    USENIX Security '19MOPT: Optimized Mutation Scheduling for FuzzersChenyang Lyu, Shouling Ji, Chao Zhang, Yuwei Li, Wei-Han Lee, Yu Song, Raheem Beyah
    USENIX Security '19CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep LearningYisroel Mirsky, Tom Mahler, Ilan Shelef, Yuval Elovici
    USENIX Security '19What Are You Searching For? A Remote Keylogging Attack on Search Engine AutocompleteJohn V. Monaco
    USENIX Security '19Utility-Optimized Local Differential Privacy Mechanisms for Distribution EstimationTakao Murakami, Yusuke Kawamoto

Pages