USENIX Security '20 | An Observational Investigation of Reverse Engineers’ Processes | Daniel Votipka, Seth Rabin, Kristopher Micinski, Jeffrey S. Foster, Michelle L. Mazurek |
USENIX Security '20 | Big Numbers - Big Troubles: Systematically Analyzing Nonce Leakage in (EC)DSA Implementations | Samuel Weiser, David Schrammel, Lukas Bodner, Raphael Spreitzer |
USENIX Security '20 | Plug-N-Pwned: Comprehensive Vulnerability Analysis of OBD-II Dongles as A New Over-the-Air Attack Surface in Automotive IoT | Haohuang Wen, Qi Alfred Chen, Zhiqiang Lin |
USENIX Security '20 | SmartVerif: Push the Limit of Automation Capability of Verifying Security Protocols by Dynamic Strategies | Yan Xiong, Cheng Su, Wenchao Huang, Fuyou Miao, Wansen Wang, Hengyi Ouyang |
USENIX Security '20 | FuzzGuard: Filtering out Unreachable Inputs in Directed Grey-box Fuzzing through Deep Learning | Peiyuan Zong, Tao Lv, Dawei Wang, Zizhuang Deng, Ruigang Liang, Kai Chen |
USENIX Security '20 | Civet: An Efficient Java Partitioning Framework for Hardware Enclaves | Chia-Che Tsai, Jeongseok Son, Bhushan Jain, John McAvey, Raluca Ada Popa, Donald E. Porter |
USENIX Security '20 | "I am uncomfortable sharing what I can't see": Privacy Concerns of the Visually Impaired with Camera Based Assistive Applications | Taslima Akter, Bryan Dosono, Tousif Ahmed, Apu Kapadia, Bryan Semaan |
USENIX Security '20 | Delphi: A Cryptographic Inference Service for Neural Networks | Pratyush Mishra, Ryan Lehmkuhl, Akshayaram Srinivasan, Wenting Zheng, Raluca Ada Popa |
USENIX Security '20 | PHMon: A Programmable Hardware Monitor and Its Security Use Cases | Leila Delshadtehrani, Sadullah Canakci, Boyou Zhou, Schuyler Eldridge, Ajay Joshi, Manuel Egele |
USENIX Security '20 | Interpretable Deep Learning under Fire | Xinyang Zhang, Ningfei Wang, Hua Shen, Shouling Ji, Xiapu Luo, Ting Wang |
USENIX Security '20 | BesFS: A POSIX Filesystem for Enclaves with a Mechanized Safety Proof | Shweta Shinde, Shengyi Wang, Pinghai Yuan, Aquinas Hobor, Abhik Roychoudhury, Prateek Saxena |
USENIX Security '20 | Automatic Hot Patch Generation for Android Kernels | Zhengzi Xu, Yulong Zhang, Longri Zheng, Liangzhao Xia, Chenfu Bao, Zhi Wang, Yang Liu |
USENIX Security '20 | Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures | Mengjia Yan, Christopher W. Fletcher, Josep Torrellas |
USENIX Security '20 | HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments | Ghada Dessouky, Tommaso Frassetto, Ahmad-Reza Sadeghi |
USENIX Security '20 | GREYONE: Data Flow Sensitive Fuzzing | Shuitao Gan, Chao Zhang, Peng Chen, Bodong Zhao, Xiaojun Qin, Dong Wu, Zuoning Chen |
USENIX Security '20 | TPM-FAIL: TPM meets Timing and Lattice Attacks | Daniel Moghimi, Berk Sunar, Thomas Eisenbarth, Nadia Heninger |
USENIX Security '20 | P2IM: Scalable and Hardware-independent Firmware Testing via Automatic Peripheral Interface Modeling | Bo Feng, Alejandro Mera, Long Lu |
USENIX Security '19 | No Right to Remain Silent: Isolating Malicious Mixes | Hemi Leibowitz, Ania M. Piotrowska, George Danezis, Amir Herzberg |
USENIX Security '19 | Protecting Cloud Virtual Machines from Hypervisor and Host Operating System Exploits | Shih-Wei Li, John S. Koh, Jason Nieh |
USENIX Security '19 | Exploiting Unprotected I/O Operations in AMD’s Secure Encrypted Virtualization | Mengyuan Li, Yinqian Zhang, Zhiqiang Lin, Yan Solihin |
USENIX Security '19 | Detecting Missing-Check Bugs via Semantic- and Context-Aware Criticalness and Constraints Inferences | Kangjie Lu, Aditya Pakki, Qiushi Wu |
USENIX Security '19 | MOPT: Optimized Mutation Scheduling for Fuzzers | Chenyang Lyu, Shouling Ji, Chao Zhang, Yuwei Li, Wei-Han Lee, Yu Song, Raheem Beyah |
USENIX Security '19 | CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning | Yisroel Mirsky, Tom Mahler, Ilan Shelef, Yuval Elovici |
USENIX Security '19 | What Are You Searching For? A Remote Keylogging Attack on Search Engine Autocomplete | John V. Monaco |
USENIX Security '19 | Utility-Optimized Local Differential Privacy Mechanisms for Distribution Estimation | Takao Murakami, Yusuke Kawamoto |