USENIX Security '19 | Detecting and Characterizing Lateral Phishing at Scale | Grant Ho, Asaf Cidon, Lior Gavish, Marco Schweighauser, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David Wagner |
USENIX Security '19 | 50 Ways to Leak Your Data: An Exploration of Apps' Circumvention of the Android Permissions System | Joel Reardon, Álvaro Feal, Primal Wijesekera, Amit Elazari Bar On, Narseo Vallina-Rodriguez, Serge Egelman |
USENIX Security '19 | Protecting accounts from credential stuffing with password breach alerting | Kurt Thomas, Jennifer Pullman, Kevin Yeo, Ananth Raghunathan, Patrick Gage Kelley, Luca Invernizzi, Borbala Benko, Tadek Pietraszek, Sarvar Patel, Dan Boneh, Elie Bursztein |
USENIX Security '19 | Users Really Do Answer Telephone Scams | Huahong Tu, Adam Doupé, Ziming Zhao, Gail-Joon Ahn |
USENIX Security '19 | ERIM: Secure, Efficient In-process Isolation with Protection Keys (MPK) | Anjo Vahldiek-Oberwagner, Eslam Elnikety, Nuno O. Duarte, Michael Sammler, Peter Druschel, Deepak Garg |
USENIX Security '18 | Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks | Ben Gras, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida |
USENIX Security '18 | A Sense of Time for JavaScript and Node.js: First-Class Timeouts as a Cure for Event Handler Poisoning | James C. Davis, Eric R. Williamson, Dongyoon Lee |
USENIX Security '18 | The Broken Shield: Measuring Revocation Effectiveness in the Windows Code-Signing PKI | Doowon Kim, Bum Jun Kwon, Kristián Kozák, Christopher Gates, Tudor Dumitraș |
USENIX Security '18 | Guarder: A Tunable Secure Allocator | Sam Silvestro, Hongyu Liu, Tianyi Liu, Zhiqiang Lin, Tongping Liu |
USENIX Security '18 | teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts | Johannes Krupp, Christian Rossow |
USENIX Security '18 | How Do Tor Users Interact With Onion Services? | Philipp Winter, Anne Edmundson, Laura M. Roberts, Agnieszka Dutkowska-Żuk, Marshini Chetty, Nick Feamster |
USENIX Security '18 | Shielding Software From Privileged Side-Channel Attacks | Xiaowan Dong, Zhuojia Shen, John Criswell, Alan L. Cox, Sandhya Dwarkadas |
USENIX Security '18 | Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning | Hamza Harkous, Kassem Fawaz, Rémi Lebret, Florian Schaub, Kang G. Shin, Karl Aberer |
USENIX Security '18 | Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts | Lorenz Breidenbach, Phil Daian, Florian Tramer, Ari Juels |
USENIX Security '18 | Tackling runtime-based obfuscation in Android with TIRO | Michelle Y. Wong, David Lie |
USENIX Security '18 | All Your GPS Are Belong To Us: Towards Stealthy Manipulation of Road Navigation Systems | Kexiong (Curtis) Zeng, Shinan Liu, Yuanchao Shu, Dong Wang, Haoyu Li, Yanzhi Dou, Gang Wang, Yaling Yang |
USENIX Security '18 | Meltdown: Reading Kernel Memory from User Space | Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg |
USENIX Security '18 | FANCI : Feature-based Automated NXDomain Classification and Intelligence | Samuel Schüppen, Dominik Teubert, Patrick Herrmann, Ulrike Meyer |
USENIX Security '18 | With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning | Bolun Wang, Yuanshun Yao, Bimal Viswanath, Haitao Zheng, Ben Y. Zhao |
USENIX Security '18 | DIZK: A Distributed Zero Knowledge Proof System | Howard Wu, Wenting Zheng, Alessandro Chiesa, Raluca Ada Popa, Ion Stoica |
USENIX Security '18 | When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks | Octavian Suciu, Radu Marginean, Yigitcan Kaya, Hal Daume III, Tudor Dumitras |
USENIX Security '18 | HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security | Moritz Eckert, Antonio Bianchi, Ruoyu Wang, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna |
USENIX Security '18 | Unveiling and Quantifying Facebook Exploitation of Sensitive Personal Data for Advertising Purposes | José González Cabañas, Ángel Cuevas, Rubén Cuevas |
USENIX Security '18 | Effective Detection of Multimedia Protocol Tunneling using Machine Learning | Diogo Barradas, Nuno Santos, Luís Rodrigues |
USENIX Security '18 | Return Of Bleichenbacher’s Oracle Threat (ROBOT) | Hanno Böck, Juraj Somorovsky, Craig Young |