Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '19Detecting and Characterizing Lateral Phishing at ScaleGrant Ho, Asaf Cidon, Lior Gavish, Marco Schweighauser, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David Wagner
    USENIX Security '1950 Ways to Leak Your Data: An Exploration of Apps' Circumvention of the Android Permissions SystemJoel Reardon, Álvaro Feal, Primal Wijesekera, Amit Elazari Bar On, Narseo Vallina-Rodriguez, Serge Egelman
    USENIX Security '19Protecting accounts from credential stuffing with password breach alertingKurt Thomas, Jennifer Pullman, Kevin Yeo, Ananth Raghunathan, Patrick Gage Kelley, Luca Invernizzi, Borbala Benko, Tadek Pietraszek, Sarvar Patel, Dan Boneh, Elie Bursztein
    USENIX Security '19Users Really Do Answer Telephone ScamsHuahong Tu, Adam Doupé, Ziming Zhao, Gail-Joon Ahn
    USENIX Security '19ERIM: Secure, Efficient In-process Isolation with Protection Keys (MPK)Anjo Vahldiek-Oberwagner, Eslam Elnikety, Nuno O. Duarte, Michael Sammler, Peter Druschel, Deepak Garg
    USENIX Security '18Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB AttacksBen Gras, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida
    USENIX Security '18A Sense of Time for JavaScript and Node.js: First-Class Timeouts as a Cure for Event Handler PoisoningJames C. Davis, Eric R. Williamson, Dongyoon Lee
    USENIX Security '18The Broken Shield: Measuring Revocation Effectiveness in the Windows Code-Signing PKIDoowon Kim, Bum Jun Kwon, Kristián Kozák, Christopher Gates, Tudor Dumitraș
    USENIX Security '18Guarder: A Tunable Secure AllocatorSam Silvestro, Hongyu Liu, Tianyi Liu, Zhiqiang Lin, Tongping Liu
    USENIX Security '18teEther: Gnawing at Ethereum to Automatically Exploit Smart ContractsJohannes Krupp, Christian Rossow
    USENIX Security '18How Do Tor Users Interact With Onion Services?Philipp Winter, Anne Edmundson, Laura M. Roberts, Agnieszka Dutkowska-Żuk, Marshini Chetty, Nick Feamster
    USENIX Security '18Shielding Software From Privileged Side-Channel AttacksXiaowan Dong, Zhuojia Shen, John Criswell, Alan L. Cox, Sandhya Dwarkadas
    USENIX Security '18Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep LearningHamza Harkous, Kassem Fawaz, Rémi Lebret, Florian Schaub, Kang G. Shin, Karl Aberer
    USENIX Security '18Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart ContractsLorenz Breidenbach, Phil Daian, Florian Tramer, Ari Juels
    USENIX Security '18Tackling runtime-based obfuscation in Android with TIROMichelle Y. Wong, David Lie
    USENIX Security '18All Your GPS Are Belong To Us: Towards Stealthy Manipulation of Road Navigation SystemsKexiong (Curtis) Zeng, Shinan Liu, Yuanchao Shu, Dong Wang, Haoyu Li, Yanzhi Dou, Gang Wang, Yaling Yang
    USENIX Security '18Meltdown: Reading Kernel Memory from User SpaceMoritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg
    USENIX Security '18FANCI : Feature-based Automated NXDomain Classification and IntelligenceSamuel Schüppen, Dominik Teubert, Patrick Herrmann, Ulrike Meyer
    USENIX Security '18With Great Training Comes Great Vulnerability: Practical Attacks against Transfer LearningBolun Wang, Yuanshun Yao, Bimal Viswanath, Haitao Zheng, Ben Y. Zhao
    USENIX Security '18DIZK: A Distributed Zero Knowledge Proof SystemHoward Wu, Wenting Zheng, Alessandro Chiesa, Raluca Ada Popa, Ion Stoica
    USENIX Security '18When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning AttacksOctavian Suciu, Radu Marginean, Yigitcan Kaya, Hal Daume III, Tudor Dumitras
    USENIX Security '18HeapHopper: Bringing Bounded Model Checking to Heap Implementation SecurityMoritz Eckert, Antonio Bianchi, Ruoyu Wang, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna
    USENIX Security '18Unveiling and Quantifying Facebook Exploitation of Sensitive Personal Data for Advertising PurposesJosé González Cabañas, Ángel Cuevas, Rubén Cuevas
    USENIX Security '18Effective Detection of Multimedia Protocol Tunneling using Machine LearningDiogo Barradas, Nuno Santos, Luís Rodrigues
    USENIX Security '18Return Of Bleichenbacher’s Oracle Threat (ROBOT)Hanno Böck, Juraj Somorovsky, Craig Young

Pages