USENIX Security '17 | AutoLock: Why Cache Attacks on ARM Are Harder Than You Think | Marc Green, Leandro Rodrigues-Lima, Andreas Zankl, Gorka Irazoqui, Johann Heyszl, Thomas Eisenbarth |
USENIX Security '17 | Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory | Daniel Gruss, Julian Lettner, Felix Schuster, Olya Ohrimenko, Istvan Haller, Manuel Costa |
USENIX Security '17 | SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data | Md Nahid Hossain, Sadegh M. Milajerdi, Junao Wang, Birhanu Eshete, Rigel Gjomemo, R. Sekar, Scott Stoller, V.N. Venkatakrishnan |
USENIX Security '17 | vTZ: Virtualizing ARM TrustZone | Zhichao Hua, Jinyu Gu, Yubin Xia, Haibo Chen, Binyu Zang, Haibing Guan |
USENIX Security '17 | Identifier Binding Attacks and Defenses in Software-Defined Networks | Samuel Jero, William Koch, Richard Skowyra, Hamed Okhravi, Cristina Nita-Rotaru, David Bigelow |
USENIX Security '17 | Towards Efficient Heap Overflow Discovery | Xiangkun Jia, Chao Zhang, Purui Su, Yi Yang, Huafeng Huang, Dengguo Feng |
USENIX Security '17 | Transcend: Detecting Concept Drift in Malware Classification Models | Roberto Jordaney, Kumar Sharad, Santanu K. Dash, Zhi Wang, Davide Papini, Ilia Nouretdinov, Lorenzo Cavallaro |
USENIX Security '17 | On the effectiveness of mitigations against floating-point timing channels | David Kohlbrenner, Hovav Shacham |
USENIX Security '17 | Reverse Engineering x86 Processor Microcode | Philipp Koppe, Benjamin Kollenda, Marc Fyrbiak, Christian Kison, Robert Gawlik, Christof Paar, Thorsten Holz |
USENIX Security '17 | "I Have No Idea What I'm Doing" - On the Usability of Deploying HTTPS | Katharina Krombholz, Wilfried Mayer, Martin Schmiedecker, Edgar Weippl |
USENIX Security '17 | Phoenix: Rebirth of a Cryptographic Password-Hardening Service | Russell W. F. Lai, Christoph Egger, Dominique Schröder, Sherman S. M. Chow |
USENIX Security '17 | CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory | Ferdinand Brasser, Lucas Davi, David Gens, Christopher Liebchen, Ahmad-Reza Sadeghi |
USENIX Security '17 | Hacking in Darkness: Return-oriented Programming against Secure Enclaves | Jaehyuk Lee, Jinsoo Jang, Yeongjin Jang, Nohyun Kwak, Yeseul Choi, Changho Choi, Taesoo Kim, Marcus Peinado, Brent Byunghoon Kang |
USENIX Security '17 | Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing | Sangho Lee, Ming-Wei Shih, Prasun Gera, Taesoo Kim, Hyesoon Kim, Marcus Peinado |
USENIX Security '17 | DeTor: Provably Avoiding Geographic Regions in Tor | Zhihao Li, Stephen Herwig, Dave Levin |
USENIX Security '17 | Measuring the Insecurity of Mobile Deep Links of Android | Fang Liu, Chun Wang, Andres Pico, Danfeng Yao, Gang Wang |
USENIX Security '17 | SmartPool: Practical Decentralized Pooled Mining | Loi Luu, Yaron Velner, Jason Teutsch, Prateek Saxena |
USENIX Security '17 | DR. CHECKER: A Soundy Analysis for Linux Kernel Drivers | Aravind Machiry, Chad Spensky, Jake Corina, Nick Stephens, Christopher Kruegel, Giovanni Vigna |
USENIX Security '17 | PDF Mirage: Content Masking Attack Against Information-Based Online Services | Ian Markwood, Dakun Shen, Yao Liu, Zhuo Lu |
USENIX Security '17 | ROTE: Rollback Protection for Trusted Execution | Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David Sommer, Arthur Gervais, Ari Juels, Srdjan Capkun |
USENIX Security '17 | Towards Practical Tools for Side Channel Aware Software Engineering: 'Grey Box' Modelling for Instruction Leakages | David McCann, Elisabeth Oswald, Carolyn Whitnall |
USENIX Security '17 | When the Weakest Link is Strong: Secure Collaboration in the Case of the Panama Papers | Susan E. McGregor, Elizabeth Anne Watkins, Mahdi Nasrullah Al-Ameen, Kelly Caine, Franziska Roesner |
USENIX Security '17 | Qapla: Policy compliance for database-backed systems | Aastha Mehta, Eslam Elnikety, Katura Harvey, Deepak Garg, Peter Druschel |
USENIX Security '17 | BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking | Jiang Ming, Dongpeng Xu, Yufei Jiang, Dinghao Wu |
USENIX Security '17 | Computer Security, Privacy, and DNA Sequencing: Compromising Computers with Synthesized DNA, Privacy Leaks, and More | Peter Ney, Karl Koscher, Lee Organick, Luis Ceze, Tadayoshi Kohno |