Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '17AutoLock: Why Cache Attacks on ARM Are Harder Than You ThinkMarc Green, Leandro Rodrigues-Lima, Andreas Zankl, Gorka Irazoqui, Johann Heyszl, Thomas Eisenbarth
    USENIX Security '17Strong and Efficient Cache Side-Channel Protection using Hardware Transactional MemoryDaniel Gruss, Julian Lettner, Felix Schuster, Olya Ohrimenko, Istvan Haller, Manuel Costa
    USENIX Security '17SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit DataMd Nahid Hossain, Sadegh M. Milajerdi, Junao Wang, Birhanu Eshete, Rigel Gjomemo, R. Sekar, Scott Stoller, V.N. Venkatakrishnan
    USENIX Security '17vTZ: Virtualizing ARM TrustZoneZhichao Hua, Jinyu Gu, Yubin Xia, Haibo Chen, Binyu Zang, Haibing Guan
    USENIX Security '17Identifier Binding Attacks and Defenses in Software-Defined NetworksSamuel Jero, William Koch, Richard Skowyra, Hamed Okhravi, Cristina Nita-Rotaru, David Bigelow
    USENIX Security '17Towards Efficient Heap Overflow DiscoveryXiangkun Jia, Chao Zhang, Purui Su, Yi Yang, Huafeng Huang, Dengguo Feng
    USENIX Security '17Transcend: Detecting Concept Drift in Malware Classification ModelsRoberto Jordaney, Kumar Sharad, Santanu K. Dash, Zhi Wang, Davide Papini, Ilia Nouretdinov, Lorenzo Cavallaro
    USENIX Security '17On the effectiveness of mitigations against floating-point timing channelsDavid Kohlbrenner, Hovav Shacham
    USENIX Security '17Reverse Engineering x86 Processor MicrocodePhilipp Koppe, Benjamin Kollenda, Marc Fyrbiak, Christian Kison, Robert Gawlik, Christof Paar, Thorsten Holz
    USENIX Security '17"I Have No Idea What I'm Doing" - On the Usability of Deploying HTTPSKatharina Krombholz, Wilfried Mayer, Martin Schmiedecker, Edgar Weippl
    USENIX Security '17Phoenix: Rebirth of a Cryptographic Password-Hardening ServiceRussell W. F. Lai, Christoph Egger, Dominique Schröder, Sherman S. M. Chow
    USENIX Security '17CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel MemoryFerdinand Brasser, Lucas Davi, David Gens, Christopher Liebchen, Ahmad-Reza Sadeghi
    USENIX Security '17Hacking in Darkness: Return-oriented Programming against Secure EnclavesJaehyuk Lee, Jinsoo Jang, Yeongjin Jang, Nohyun Kwak, Yeseul Choi, Changho Choi, Taesoo Kim, Marcus Peinado, Brent Byunghoon Kang
    USENIX Security '17Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch ShadowingSangho Lee, Ming-Wei Shih, Prasun Gera, Taesoo Kim, Hyesoon Kim, Marcus Peinado
    USENIX Security '17DeTor: Provably Avoiding Geographic Regions in TorZhihao Li, Stephen Herwig, Dave Levin
    USENIX Security '17Measuring the Insecurity of Mobile Deep Links of AndroidFang Liu, Chun Wang, Andres Pico, Danfeng Yao, Gang Wang
    USENIX Security '17SmartPool: Practical Decentralized Pooled MiningLoi Luu, Yaron Velner, Jason Teutsch, Prateek Saxena
    USENIX Security '17DR. CHECKER: A Soundy Analysis for Linux Kernel DriversAravind Machiry, Chad Spensky, Jake Corina, Nick Stephens, Christopher Kruegel, Giovanni Vigna
    USENIX Security '17PDF Mirage: Content Masking Attack Against Information-Based Online ServicesIan Markwood, Dakun Shen, Yao Liu, Zhuo Lu
    USENIX Security '17ROTE: Rollback Protection for Trusted ExecutionSinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David Sommer, Arthur Gervais, Ari Juels, Srdjan Capkun
    USENIX Security '17Towards Practical Tools for Side Channel Aware Software Engineering: 'Grey Box' Modelling for Instruction LeakagesDavid McCann, Elisabeth Oswald, Carolyn Whitnall
    USENIX Security '17When the Weakest Link is Strong: Secure Collaboration in the Case of the Panama PapersSusan E. McGregor, Elizabeth Anne Watkins, Mahdi Nasrullah Al-Ameen, Kelly Caine, Franziska Roesner
    USENIX Security '17Qapla: Policy compliance for database-backed systemsAastha Mehta, Eslam Elnikety, Katura Harvey, Deepak Garg, Peter Druschel
    USENIX Security '17BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence CheckingJiang Ming, Dongpeng Xu, Yufei Jiang, Dinghao Wu
    USENIX Security '17Computer Security, Privacy, and DNA Sequencing: Compromising Computers with Synthesized DNA, Privacy Leaks, and MorePeter Ney, Karl Koscher, Lee Organick, Luis Ceze, Tadayoshi Kohno

Pages