Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '20Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix ItDaniel Votipka, Kelsey R. Fulton, James Parker, Matthew Hou, Michelle L. Mazurek, Michael Hicks
    USENIX Security '20The Impact of Ad-Blockers on Product Search and Purchase Behavior: A Lab ExperimentAlisa Frik, Amelia Haviland, Alessandro Acquisti
    USENIX Security '20Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTEDavid Rupprecht, Katharina Kohls, Thorsten Holz, Christina Pöpper
    USENIX Security '20You Are What You Broadcast: Identification of Mobile and IoT Devices from (Public) WiFiLingjing Yu, Bo Luo, Jun Ma, Zhaoyu Zhou, Qingyun Liu
    USENIX Security '20Empirical Measurement of Systemic 2FA UsabilityJoshua Reynolds, Nikita Samarin, Joseph Barnes, Taylor Judd, Joshua Mason, Michael Bailey, Serge Egelman
    USENIX Security '20What Twitter Knows: Characterizing Ad Targeting Practices, User Perceptions, and Ad Explanations Through Users' Own Twitter DataMiranda Wei, Madison Stamos, Sophie Veys, Nathan Reitinger, Justin Goodman, Margot Herman, Dorota Filipczuk, Ben Weinshel, Michelle L. Mazurek, Blase Ur
    USENIX Security '20Sys: A Static/Symbolic Tool for Finding Good Bugs in Good (Browser) CodeFraser Brown, Deian Stefan, Dawson Engler
    USENIX Security '20Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade AttacksYue Zhang, Jian Weng, Rajib Dey, Yier Jin, Zhiqiang Lin, Xinwen Fu
    USENIX Security '20Interpretable Deep Learning under FireXinyang Zhang, Ningfei Wang, Hua Shen, Shouling Ji, Xiapu Luo, Ting Wang
    USENIX Security '20P2IM: Scalable and Hardware-independent Firmware Testing via Automatic Peripheral Interface ModelingBo Feng, Alejandro Mera, Long Lu
    USENIX Security '20Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheckBenjamin Andow, Samin Yaseer Mahmud, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, Serge Egelman
    USENIX Security '20Exploring Connections Between Active Learning and Model ExtractionVarun Chandrasekaran, Kamalika Chaudhuri, Irene Giacomelli, Somesh Jha, Songbai Yan
    USENIX Security '20KOOBE: Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write VulnerabilitiesWeiteng Chen, Xiaochen Zou, Guoren Li, Zhiyun Qian
    USENIX Security '20BScout: Direct Whole Patch Presence Test for Java ExecutablesJiarun Dai, Yuan Zhang, Zheyue Jiang, Yingtian Zhou, Junyan Chen, Xinyu Xing, Xiaohan Zhang, Xin Tan, Min Yang, Zhemin Yang
    USENIX Security '20Local Model Poisoning Attacks to Byzantine-Robust Federated LearningMinghong Fang, Xiaoyu Cao, Jinyuan Jia, Neil Gong
    USENIX Security '20PCKV: Locally Differentially Private Correlated Key-Value Data Collection with Optimized UtilityXiaolan Gu, Ming Li, Yueqiang Cheng, Li Xiong, Yang Cao
    USENIX Security '20Data Recovery from “Scrubbed” NAND Flash Storage: Need for Analog SanitizationMd Mehedi Hasan, Biswajit Ray
    USENIX Security '20Security Analysis of Unified Payments Interface and Payment Apps in IndiaRenuka Kumar, Sreesh Kishore, Hao Lu, Atul Prakash
    USENIX Security '20Stealthy Tracking of Autonomous Vehicles with Cache Side ChannelsMulong Luo, Andrew C. Myers, G. Edward Suh
    USENIX Security '20(Mostly) Exitless VM Protection from Untrusted Hypervisor through Disaggregated Nested VirtualizationZeyu Mi, Dingji Li, Haibo Chen, Binyu Zang, Haibing Guan
    USENIX Security '20SAVIOR: Securing Autonomous Vehicles with Robust Physical InvariantsRaul Quinonez, Jairo Giraldo, Luis Salazar, Erick Bauman, Alvaro Cardenas, Zhiqiang Lin
    USENIX Security '20Updates-Leak: Data Set Inference and Reconstruction Attacks in Online LearningAhmed Salem, Apratim Bhattacharya, Michael Backes, Mario Fritz, Yang Zhang
    USENIX Security '20Plug-N-Pwned: Comprehensive Vulnerability Analysis of OBD-II Dongles as A New Over-the-Air Attack Surface in Automotive IoTHaohuang Wen, Qi Alfred Chen, Zhiqiang Lin
    USENIX Security '20MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability SignaturesYang Xiao, Bihuan Chen, Chendong Yu, Zhengzi Xu, Zimu Yuan, Feng Li, Binghong Liu, Yang Liu, Wei Huo, Wei Zou, Wenchang Shi
    USENIX Security '20Cardpliance: PCI DSS Compliance of Android ApplicationsSamin Yaseer Mahmud, Akhil Acharya, Benjamin Andow, William Enck, Bradley Reaves

Pages