Search results

    USENIX Security '19JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoTSam Kumar, Yuncong Hu, Michael P Andersen, Raluca Ada Popa, David E. Culler
    USENIX Security '19Protecting Cloud Virtual Machines from Hypervisor and Host Operating System ExploitsShih-Wei Li, John S. Koh, Jason Nieh
    USENIX Security '19ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the Evolution of CyberattacksYun Shen, Gianluca Stringhini
    USENIX Security '19Everyone is Different: Client-side Diversification for Defending Against Extension FingerprintingErik Trickel, Oleksii Starov, Alexandros Kapravelos, Nick Nikiforakis, Adam Doupé
    USENIX Security '19Birthday, Name and Bifacial-security: Understanding Passwords of Chinese Web UsersDing Wang, Ping Wang, Debiao He, Yuan Tian
    USENIX Security '19Tracing Transactions Across Cryptocurrency LedgersHaaroon Yousaf, George Kappos, Sarah Meiklejohn
    USENIX Security '19Small World with High Risks: A Study of Security Threats in the npm EcosystemMarkus Zimmermann, Cristian-Alexandru Staicu, Cam Tenny, Michael Pradel
    USENIX Security '19Towards the Detection of Inconsistencies in Public Security Vulnerability ReportsYing Dong, Wenbo Guo, Yueqi Chen, Xinyu Xing, Yuqing Zhang, Gang Wang
    USENIX Security '19Scalable Scanning and Automatic Classification of TLS Padding Oracle VulnerabilitiesRobert Merget, Juraj Somorovsky, Nimrod Aviram, Craig Young, Janis Fliegenschmidt, Jörg Schwenk, Yuval Shavitt
    USENIX Security '19Probability Model Transforming Encoders Against Encoding AttacksHaibo Cheng, Zhixiong Zheng, Wenting Li, Ping Wang, Chao-Hsien Chu
    USENIX Security '19Not Everything is Dark and Gloomy: Power Grid Protections Against IoT Demand AttacksBing Huang, Alvaro A. Cardenas, Ross Baldick
    USENIX Security '19All Things Considered: An Analysis of IoT Devices on Home NetworksDeepak Kumar, Kelly Shen, Benton Case, Deepali Garg, Galina Alperovich, Dmitry Kuznetsov, Rajarshi Gupta, Zakir Durumeric
    USENIX Security '19What Are You Searching For? A Remote Keylogging Attack on Search Engine AutocompleteJohn V. Monaco
    USENIX Security '19Cognitive Triaging of Phishing AttacksAmber van der Heijden, Luca Allodi
    USENIX Security '19Looking from the Mirror: Evaluating IoT Device Security through Mobile Companion AppsXueqiang Wang, Yuqiong Sun, Susanta Nanda, XiaoFeng Wang
    USENIX Security '19BITE: Bitcoin Lightweight Client Privacy using Trusted ExecutionSinisa Matetic, Karl Wüst, Moritz Schneider, Kari Kostiainen, Ghassan Karame, Srdjan Capkun
    USENIX Security '19High Precision Detection of Business Email CompromiseAsaf Cidon, Lior Gavish, Itay Bleier, Nadia Korshun, Marco Schweighauser, Alexey Tsitkin
    USENIX Security '19Exploiting Unprotected I/O Operations in AMD’s Secure Encrypted VirtualizationMengyuan Li, Yinqian Zhang, Zhiqiang Lin, Yan Solihin
    USENIX Security '19Wireless Attacks on Aircraft Instrument Landing SystemsHarshad Sathaye, Domien Schepers, Aanjhan Ranganathan, Guevara Noubir
    USENIX Security '19StrongChain: Transparent and Collaborative Proof-of-Work ConsensusPawel Szalachowski, Daniël Reijsbergen, Ivan Homoliak, Siwei Sun
    USENIX Security '19Users Really Do Answer Telephone ScamsHuahong Tu, Adam Doupé, Ziming Zhao, Gail-Joon Ahn
    USENIX Security '19IODINE: Verifying Constant-Time Execution of HardwareKlaus v. Gleissenthall, Rami Gökhan Kıcı, Deian Stefan, Ranjit Jhala
    USENIX Security '19Seeing is Not Believing: Camouflage Attacks on Image Scaling AlgorithmsQixue Xiao, Yufei Chen, Chao Shen, Yu Chen, Kang Li
    USENIX Security '19PeX: A Permission Check Analysis Framework for Linux KernelTong Zhang, Wenbo Shen, Dongyoon Lee, Changhee Jung, Ahmed M. Azab, Ruowen Wang
    USENIX Security '19The CrossPath Attack: Disrupting the SDN Control Channel via Shared LinksJiahao Cao, Qi Li, Renjie Xie, Kun Sun, Guofei Gu, Mingwei Xu, Yuan Yang