USENIX Security '18 | ACES: Automatic Compartments for Embedded Systems | Abraham A Clements, Naif Saleh Almakhdhub, Saurabh Bagchi, Mathias Payer |
USENIX Security '18 | Discovering Flaws in Security-Focused Static Analysis Tools for Android using Systematic Mutation | Richard Bonett, Kaushal Kafle, Kevin Moran, Adwait Nadkarni, Denys Poshyvanyk |
USENIX Security '18 | FlowCog: Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android Apps | Xiang Pan, Yinzhi Cao, Xuechao Du, Boyuan He, Gan Fang, Rui Shao, Yan Chen |
USENIX Security '18 | Who Is Answering My Queries: Understanding and Characterizing Interception of the DNS Resolution Path | Baojun Liu, Chaoyi Lu, Haixin Duan, Ying Liu, Zhou Li, Shuang Hao, Min Yang |
USENIX Security '18 | End-to-End Measurements of Email Spoofing Attacks | Hang Hu, Gang Wang |
USENIX Security '18 | End-Users Get Maneuvered: Empirical Analysis of Redirection Hijacking in Content Delivery Networks | Shuai Hao, Yubao Zhang, Haining Wang, Angelos Stavrou |
USENIX Security '18 | Schrödinger’s RAT: Profiling the Stakeholders in the Remote Access Trojan Ecosystem | Mohammad Rezaeirad, Brown Farinholt, Hitesh Dharmdasani, Paul Pearce, Kirill Levchenko, Damon McCoy |
USENIX Security '18 | Towards a Secure Zero-rating Framework with Three Parties | Zhiheng Liu, Zhen Zhang, Yinzhi Cao, Zhaohan Xi, Shihao Jing, Humberto La Roche |
USENIX Security '18 | The aftermath of a crypto-ransomware attack at a large academic institution | Leah Zhang-Kennedy, Hala Assal, Jessica Rocheleau, Reham Mohamed, Khadija Baig, Sonia Chiasson |
USENIX Security '18 | Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial Sensors | Yazhou Tu, Zhiqiang Lin, Insup Lee, Xiali Hei |
USENIX Security '18 | Understanding the Reproducibility of Crowd-reported Security Vulnerabilities | Dongliang Mu, Alejandro Cuevas, Limin Yang, Hang Hu, Xinyu Xing, Bing Mao, Gang Wang |
USENIX Security '18 | Fast and Service-preserving Recovery from Malware Infections Using CRIU | Ashton Webster, Ryan Eckenrod, James Purtilo |
USENIX Security '18 | From Patching Delays to Infection Symptoms: Using Risk Profiles for an Early Discovery of Vulnerabilities Exploited in the Wild | Chaowei Xiao, Armin Sarabi, Yang Liu, Bo Li, Mingyan Liu, Tudor Dumitras |
USENIX Security '18 | MoonShine: Optimizing OS Fuzzer Seed Selection with Trace Distillation | Shankara Pailoor, Andrew Aday, Suman Jana |
USENIX Security '18 | Skill Squatting Attacks on Amazon Alexa | Deepak Kumar, Riccardo Paccagnella, Paul Murley, Eric Hennenfent, Joshua Mason, Adam Bates, Michael Bailey |
USENIX Security '18 | Charm: Facilitating Dynamic Analysis of Device Drivers of Mobile Systems | Seyed Mohammadjavad Seyed Talebi, Hamid Tavakoli, Hang Zhang, Zheng Zhang, Ardalan Amiri Sani, Zhiyun Qian |
USENIX Security '18 | Dependence-Preserving Data Compaction for Scalable Forensic Analysis | Md Nahid Hossain, Junao Wang, R. Sekar, Scott D. Stoller |
USENIX Security '18 | Precise and Accurate Patch Presence Test for Binaries | Hang Zhang, Zhiyun Qian |
USENIX Security '18 | Erays: Reverse Engineering Ethereum's Opaque Smart Contracts | Yi Zhou, Deepak Kumar, Surya Bakshi, Joshua Mason, Andrew Miller, Michael Bailey |
USENIX Security '18 | The Dangers of Key Reuse: Practical Attacks on IPsec IKE | Dennis Felsch, Martin Grothe, Jörg Schwenk, Adam Czubak, Marcin Szymanek |
USENIX Security '18 | Quack: Scalable Remote Measurement of Application-Layer Censorship | Benjamin VanderSloot, Allison McDonald, Will Scott, J. Alex Halderman, Roya Ensafi |
USENIX Security '18 | Malicious Management Unit: Why Stopping Cache Attacks in Software is Harder Than You Think | Stephan van Schaik, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi |
USENIX Security '18 | Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring | Yossi Adi, Carsten Baum, Moustapha Cisse, Benny Pinkas, Joseph Keshet |
USENIX Security '18 | Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse | Sanam Ghorbani Lyastani, Michael Schilling, Sascha Fahl, Michael Backes, Sven Bugiel |
USENIX Security '18 | Formal Security Analysis of Neural Networks using Symbolic Intervals | Shiqi Wang, Kexin Pei, Justin Whitehouse, Junfeng Yang, Suman Jana |