Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '16Poking Holes in Information HidingAngelos Oikonomopoulos, Elias Athanasopoulos, Herbert Bos, Cristiano Giuffrida
    USENIX Security '16Making USB Great Again with USBFILTERDave (Jing) Tian, Nolen Scaife, Adam Bates, Kevin Butler, Patrick Traynor
    USENIX Security '16Off-Path TCP Exploits: Global Rate Limit Considered DangerousYue Cao, Zhiyun Qian, Zhongjie Wang, Tuan Dao, Srikanth V. Krishnamurthy, Lisa M. Marvel
    USENIX Security '16Secure, Precise, and Fast Floating-Point Operations on x86 ProcessorsAshay Rane, Calvin Lin, Mohit Tiwari
    USENIX Security '16Request and Conquer: Exposing Cross-Origin Resource SizeTom Van Goethem, Mathy Vanhoef, Frank Piessens, Wouter Joosen
    USENIX Security '16Faster Malicious 2-Party Secure Computation with Online/Offline Dual ExecutionPeter Rindal, Mike Rosulek
    USENIX Security '16Predicting, Decrypting, and Abusing WPA2/802.11 Group KeysMathy Vanhoef, Frank Piessens
    USENIX Security '16Flip Feng Shui: Hammering a Needle in the Software StackKaveh Razavi, Ben Gras, Erik Bosman, Bart Preneel, Cristiano Giuffrida, Herbert Bos
    USENIX Security '16The Cut-and-Choose Game and Its Application to Cryptographic ProtocolsRuiyu Zhu, Yan Huang, Jonathan Katz, Abhi Shelat
    USENIX Security '16Tracing Information Flows Between Ad Exchanges Using Retargeted AdsMuhammad Ahmad Bashir, Sajjad Arshad, William Robertson, Christo Wilson
    USENIX Security '16You've Got Vulnerability: Exploring Effective Vulnerability NotificationsFrank Li, Zakir Durumeric, Jakub Czyz, Mohammad Karami, Michael Bailey, Damon McCoy, Stefan Savage, Vern Paxson
    USENIX Security '16Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016Ada Lerner, Anna Kornfeld Simpson, Tadayoshi Kohno, Franziska Roesner
    USENIX Security '15EVILCOHORT: Detecting Communities of Malicious Accounts on Online ServicesGianluca Stringhini, Pierre Mourlanne, Gregoire Jacob, Manuel Egele, Christopher Kruegel, Giovanni Vigna
    USENIX Security '15De-anonymizing Programmers via Code StylometryAylin Caliskan-Islam, Richard Harang, Andrew Liu, Arvind Narayanan, Clare Voss, Fabian Yamaguchi, Rachel Greenstadt
    USENIX Security '15Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLSChristina Garman, Kenneth G. Paterson, Thyla Van der Merwe
    USENIX Security '15Post-Mortem of a Zombie: Conficker Cleanup After Six YearsHadi Asghari, Michael Ciere, Michel J.G. van Eeten
    USENIX Security '15Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing WorldBradley Reaves, Nolen Scaife, Adam Bates, Patrick Traynor, Kevin R.B. Butler
    USENIX Security '15Measuring the Longitudinal Evolution of the Online Anonymous Marketplace EcosystemKyle Soska, Nicolas Christin
    USENIX Security '15All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLSMathy Vanhoef, Frank Piessens
    USENIX Security '15Eclipse Attacks on Bitcoin’s Peer-to-Peer NetworkEthan Heilman, Alison Kendler, Aviv Zohar, Sharon Goldberg
    USENIX Security '15Protocol State Fuzzing of TLS ImplementationsJoeri de Ruiter, Erik Poll
    USENIX Security '15Verified Correctness and Security of OpenSSL HMACLennart Beringer, Adam Petcher, Katherine Q. Ye, Andrew W. Appel
    USENIX Security '15Not-Quite-So-Broken TLS: Lessons in Re-Engineering a Security Protocol Specification and ImplementationDavid Kaloper-Meršinjak, Hannes Mehnert, Anil Madhavapeddy, Peter Sewell
    USENIX Security '15To Pin or Not to Pin—Helping App Developers Bullet Proof Their TLS ConnectionsMarten Oltrogge, Yasemin Acar, Sergej Dechand, Matthew Smith, Sascha Fahl
    USENIX Security '15Trustworthy Whole-System Provenance for the Linux KernelAdam Bates, Dave (Jing) Tian, Kevin R.B. Butler, Thomas Moyer

Pages