USENIX Security '16 | Poking Holes in Information Hiding | Angelos Oikonomopoulos, Elias Athanasopoulos, Herbert Bos, Cristiano Giuffrida |
USENIX Security '16 | Making USB Great Again with USBFILTER | Dave (Jing) Tian, Nolen Scaife, Adam Bates, Kevin Butler, Patrick Traynor |
USENIX Security '16 | Off-Path TCP Exploits: Global Rate Limit Considered Dangerous | Yue Cao, Zhiyun Qian, Zhongjie Wang, Tuan Dao, Srikanth V. Krishnamurthy, Lisa M. Marvel |
USENIX Security '16 | Secure, Precise, and Fast Floating-Point Operations on x86 Processors | Ashay Rane, Calvin Lin, Mohit Tiwari |
USENIX Security '16 | Request and Conquer: Exposing Cross-Origin Resource Size | Tom Van Goethem, Mathy Vanhoef, Frank Piessens, Wouter Joosen |
USENIX Security '16 | Faster Malicious 2-Party Secure Computation with Online/Offline Dual Execution | Peter Rindal, Mike Rosulek |
USENIX Security '16 | Predicting, Decrypting, and Abusing WPA2/802.11 Group Keys | Mathy Vanhoef, Frank Piessens |
USENIX Security '16 | Flip Feng Shui: Hammering a Needle in the Software Stack | Kaveh Razavi, Ben Gras, Erik Bosman, Bart Preneel, Cristiano Giuffrida, Herbert Bos |
USENIX Security '16 | The Cut-and-Choose Game and Its Application to Cryptographic Protocols | Ruiyu Zhu, Yan Huang, Jonathan Katz, Abhi Shelat |
USENIX Security '16 | Tracing Information Flows Between Ad Exchanges Using Retargeted Ads | Muhammad Ahmad Bashir, Sajjad Arshad, William Robertson, Christo Wilson |
USENIX Security '16 | You've Got Vulnerability: Exploring Effective Vulnerability Notifications | Frank Li, Zakir Durumeric, Jakub Czyz, Mohammad Karami, Michael Bailey, Damon McCoy, Stefan Savage, Vern Paxson |
USENIX Security '16 | Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016 | Ada Lerner, Anna Kornfeld Simpson, Tadayoshi Kohno, Franziska Roesner |
USENIX Security '15 | EVILCOHORT: Detecting Communities of Malicious Accounts on Online Services | Gianluca Stringhini, Pierre Mourlanne, Gregoire Jacob, Manuel Egele, Christopher Kruegel, Giovanni Vigna |
USENIX Security '15 | De-anonymizing Programmers via Code Stylometry | Aylin Caliskan-Islam, Richard Harang, Andrew Liu, Arvind Narayanan, Clare Voss, Fabian Yamaguchi, Rachel Greenstadt |
USENIX Security '15 | Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS | Christina Garman, Kenneth G. Paterson, Thyla Van der Merwe |
USENIX Security '15 | Post-Mortem of a Zombie: Conficker Cleanup After Six Years | Hadi Asghari, Michael Ciere, Michel J.G. van Eeten |
USENIX Security '15 | Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World | Bradley Reaves, Nolen Scaife, Adam Bates, Patrick Traynor, Kevin R.B. Butler |
USENIX Security '15 | Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem | Kyle Soska, Nicolas Christin |
USENIX Security '15 | All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS | Mathy Vanhoef, Frank Piessens |
USENIX Security '15 | Eclipse Attacks on Bitcoin’s Peer-to-Peer Network | Ethan Heilman, Alison Kendler, Aviv Zohar, Sharon Goldberg |
USENIX Security '15 | Protocol State Fuzzing of TLS Implementations | Joeri de Ruiter, Erik Poll |
USENIX Security '15 | Verified Correctness and Security of OpenSSL HMAC | Lennart Beringer, Adam Petcher, Katherine Q. Ye, Andrew W. Appel |
USENIX Security '15 | Not-Quite-So-Broken TLS: Lessons in Re-Engineering a Security Protocol Specification and Implementation | David Kaloper-Meršinjak, Hannes Mehnert, Anil Madhavapeddy, Peter Sewell |
USENIX Security '15 | To Pin or Not to Pin—Helping App Developers Bullet Proof Their TLS Connections | Marten Oltrogge, Yasemin Acar, Sergej Dechand, Matthew Smith, Sascha Fahl |
USENIX Security '15 | Trustworthy Whole-System Provenance for the Linux Kernel | Adam Bates, Dave (Jing) Tian, Kevin R.B. Butler, Thomas Moyer |