Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '18ACES: Automatic Compartments for Embedded SystemsAbraham A Clements, Naif Saleh Almakhdhub, Saurabh Bagchi, Mathias Payer
    USENIX Security '18Discovering Flaws in Security-Focused Static Analysis Tools for Android using Systematic MutationRichard Bonett, Kaushal Kafle, Kevin Moran, Adwait Nadkarni, Denys Poshyvanyk
    USENIX Security '18FlowCog: Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android AppsXiang Pan, Yinzhi Cao, Xuechao Du, Boyuan He, Gan Fang, Rui Shao, Yan Chen
    USENIX Security '18Who Is Answering My Queries: Understanding and Characterizing Interception of the DNS Resolution PathBaojun Liu, Chaoyi Lu, Haixin Duan, Ying Liu, Zhou Li, Shuang Hao, Min Yang
    USENIX Security '18End-to-End Measurements of Email Spoofing AttacksHang Hu, Gang Wang
    USENIX Security '18End-Users Get Maneuvered: Empirical Analysis of Redirection Hijacking in Content Delivery NetworksShuai Hao, Yubao Zhang, Haining Wang, Angelos Stavrou
    USENIX Security '18Schrödinger’s RAT: Profiling the Stakeholders in the Remote Access Trojan EcosystemMohammad Rezaeirad, Brown Farinholt, Hitesh Dharmdasani, Paul Pearce, Kirill Levchenko, Damon McCoy
    USENIX Security '18Towards a Secure Zero-rating Framework with Three PartiesZhiheng Liu, Zhen Zhang, Yinzhi Cao, Zhaohan Xi, Shihao Jing, Humberto La Roche
    USENIX Security '18The aftermath of a crypto-ransomware attack at a large academic institutionLeah Zhang-Kennedy, Hala Assal, Jessica Rocheleau, Reham Mohamed, Khadija Baig, Sonia Chiasson
    USENIX Security '18Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial SensorsYazhou Tu, Zhiqiang Lin, Insup Lee, Xiali Hei
    USENIX Security '18Understanding the Reproducibility of Crowd-reported Security VulnerabilitiesDongliang Mu, Alejandro Cuevas, Limin Yang, Hang Hu, Xinyu Xing, Bing Mao, Gang Wang
    USENIX Security '18Fast and Service-preserving Recovery from Malware Infections Using CRIUAshton Webster, Ryan Eckenrod, James Purtilo
    USENIX Security '18From Patching Delays to Infection Symptoms: Using Risk Profiles for an Early Discovery of Vulnerabilities Exploited in the WildChaowei Xiao, Armin Sarabi, Yang Liu, Bo Li, Mingyan Liu, Tudor Dumitras
    USENIX Security '18MoonShine: Optimizing OS Fuzzer Seed Selection with Trace DistillationShankara Pailoor, Andrew Aday, Suman Jana
    USENIX Security '18Skill Squatting Attacks on Amazon AlexaDeepak Kumar, Riccardo Paccagnella, Paul Murley, Eric Hennenfent, Joshua Mason, Adam Bates, Michael Bailey
    USENIX Security '18Charm: Facilitating Dynamic Analysis of Device Drivers of Mobile SystemsSeyed Mohammadjavad Seyed Talebi, Hamid Tavakoli, Hang Zhang, Zheng Zhang, Ardalan Amiri Sani, Zhiyun Qian
    USENIX Security '18Dependence-Preserving Data Compaction for Scalable Forensic AnalysisMd Nahid Hossain, Junao Wang, R. Sekar, Scott D. Stoller
    USENIX Security '18Precise and Accurate Patch Presence Test for BinariesHang Zhang, Zhiyun Qian
    USENIX Security '18Erays: Reverse Engineering Ethereum's Opaque Smart ContractsYi Zhou, Deepak Kumar, Surya Bakshi, Joshua Mason, Andrew Miller, Michael Bailey
    USENIX Security '18The Dangers of Key Reuse: Practical Attacks on IPsec IKEDennis Felsch, Martin Grothe, Jörg Schwenk, Adam Czubak, Marcin Szymanek
    USENIX Security '18Quack: Scalable Remote Measurement of Application-Layer CensorshipBenjamin VanderSloot, Allison McDonald, Will Scott, J. Alex Halderman, Roya Ensafi
    USENIX Security '18Malicious Management Unit: Why Stopping Cache Attacks in Software is Harder Than You ThinkStephan van Schaik, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi
    USENIX Security '18Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by BackdooringYossi Adi, Carsten Baum, Moustapha Cisse, Benny Pinkas, Joseph Keshet
    USENIX Security '18Better managed than memorized? Studying the Impact of Managers on Password Strength and ReuseSanam Ghorbani Lyastani, Michael Schilling, Sascha Fahl, Michael Backes, Sven Bugiel
    USENIX Security '18Formal Security Analysis of Neural Networks using Symbolic IntervalsShiqi Wang, Kexin Pei, Justin Whitehouse, Junfeng Yang, Suman Jana

Pages