USENIX Security '19 | BITE: Bitcoin Lightweight Client Privacy using Trusted Execution | Sinisa Matetic, Karl Wüst, Moritz Schneider, Kari Kostiainen, Ghassan Karame, Srdjan Capkun |
USENIX Security '19 | PAC it up: Towards Pointer Integrity using ARM Pointer Authentication | Hans Liljestrand, Thomas Nyman, Kui Wang, Carlos Chinea Perez, Jan-Erik Ekberg, N. Asokan |
USENIX Security '19 | Fuzzification: Anti-Fuzzing Techniques | Jinho Jung, Hong Hu, David Solodukhin, Daniel Pagan, Kyu Hyung Lee, Taesoo Kim |
USENIX Security '19 | Leaky Images: Targeted Privacy Attacks in the Web | Cristian-Alexandru Staicu, Michael Pradel |
USENIX Security '19 | All Your Clicks Belong to Me: Investigating Click Interception on the Web | Mingxue Zhang, Wei Meng, Sangho Lee, Byoungyoung Lee, Xinyu Xing |
USENIX Security '19 | Evaluating the Contextual Integrity of Privacy Regulation: Parents' IoT Toy Privacy Norms Versus COPPA | Noah Apthorpe, Sarah Varghese, Nick Feamster |
USENIX Security '19 | Stack Overflow Considered Helpful! Deep Learning Security Nudges Towards Stronger Cryptography | Felix Fischer, Huang Xiao, Ching-Yu Kao, Yannick Stachelscheid, Benjamin Johnson, Danial Razar, Paul Fawkesley, Nat Buckley, Konstantin Böttinger, Paul Muntean, Jens Grossklags |
USENIX Security '19 | FastKitten: Practical Smart Contracts on Bitcoin | Poulami Das, Lisa Eckey, Tommaso Frassetto, David Gens, Kristina Hostáková, Patrick Jauernig, Sebastian Faust, Ahmad-Reza Sadeghi |
USENIX Security '19 | Towards the Detection of Inconsistencies in Public Security Vulnerability Reports | Ying Dong, Wenbo Guo, Yueqi Chen, Xinyu Xing, Yuqing Zhang, Gang Wang |
USENIX Security '19 | Robust Website Fingerprinting Through the Cache Occupancy Channel | Anatoly Shusterman, Lachlan Kang, Yarden Haskal, Yosef Meltser, Prateek Mittal, Yossi Oren, Yuval Yarom |
USENIX Security '19 | XONN: XNOR-based Oblivious Deep Neural Network Inference | M. Sadegh Riazi, Mohammad Samragh, Hao Chen, Kim Laine, Kristin Lauter, Farinaz Koushanfar |
USENIX Security '19 | “Johnny, you are fired!” – Spoofing OpenPGP and S/MIME Signatures in Emails | Jens Müller, Marcus Brinkmann, Damian Poddebniak, Hanno Böck, Sebastian Schinzel, Juraj Somorovsky, Jörg Schwenk |
USENIX Security '19 | TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time | Feargus Pendlebury, Fabio Pierazzi, Roberto Jordaney, Johannes Kinder, Lorenzo Cavallaro |
USENIX Security '19 | Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities | Robert Merget, Juraj Somorovsky, Nimrod Aviram, Craig Young, Janis Fliegenschmidt, Jörg Schwenk, Yuval Shavitt |
USENIX Security '19 | When the Signal is in the Noise: Exploiting Diffix's Sticky Noise | Andrea Gadotti, Florimond Houssiau, Luc Rocher, Benjamin Livshits, Yves-Alexandre de Montjoye |
USENIX Security '19 | AntiFuzz: Impeding Fuzzing Audits of Binary Executables | Emre Güler, Cornelius Aschermann, Ali Abbasi, Thorsten Holz |
USENIX Security '19 | The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile Backends | Omar Alrawi, Chaoshun Zuo, Ruian Duan, Ranjita Pai Kasturi, Zhiqiang Lin, Brendan Saltaformaggio |
USENIX Security '19 | WAVE: A Decentralized Authorization Framework with Transitive Delegation | Michael P Andersen, Sam Kumar, Moustafa AbdelBaky, Gabe Fierro, John Kolb, Hyung-Sin Kim, David E. Culler, Raluca Ada Popa |
USENIX Security '19 | PolicyLint: Investigating Internal Privacy Policy Contradictions on Google Play | Benjamin Andow, Samin Yaseer Mahmud, Wenyu Wang, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, Tao Xie |
USENIX Security '19 | Less is More: Quantifying the Security Benefits of Debloating Web Applications | Babak Amin Azad, Pierre Laperdrix, Nick Nikiforakis |
USENIX Security '19 | Losing the Car Keys: Wireless PHY-Layer Insecurity in EV Charging | Richard Baker, Ivan Martinovic |
USENIX Security '19 | CSI NN: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel | Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek |
USENIX Security '19 | Please Pay Inside: Evaluating Bluetooth-based Detection of Gas Pump Skimmers | Nishant Bhaskar, Maxwell Bland, Kirill Levchenko, Aaron Schulman |
USENIX Security '19 | Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale | Hugo L.J. Bijmans, Tim M. Booij, Christian Doerr |
USENIX Security '19 | GRIMOIRE: Synthesizing Structure while Fuzzing | Tim Blazytko, Cornelius Aschermann, Moritz Schlögel, Ali Abbasi, Sergej Schumilo, Simon Wörner, Thorsten Holz |