Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '19TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and TimeFeargus Pendlebury, Fabio Pierazzi, Roberto Jordaney, Johannes Kinder, Lorenzo Cavallaro
    USENIX Security '19The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile BackendsOmar Alrawi, Chaoshun Zuo, Ruian Duan, Ranjita Pai Kasturi, Zhiqiang Lin, Brendan Saltaformaggio
    USENIX Security '19CSI NN: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side ChannelLejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek
    USENIX Security '19Devils in the Guidance: Predicting Logic Vulnerabilities in Payment Syndication Services through Automated Documentation AnalysisYi Chen, Luyi Xing, Yue Qin, Xiaojing Liao, XiaoFeng Wang, Kai Chen, Wei Zou
    USENIX Security '19CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep LearningYisroel Mirsky, Tom Mahler, Ilan Shelef, Yuval Elovici
    USENIX Security '19EnTrust: Regulating Sensor Access by Cooperating Programs via Delegation GraphsGiuseppe Petracca, Yuqiong Sun, Ahmad-Atamli Reineh, Patrick McDaniel, Jens Grossklags, Trent Jaeger
    USENIX Security '1950 Ways to Leak Your Data: An Exploration of Apps' Circumvention of the Android Permissions SystemJoel Reardon, Álvaro Feal, Primal Wijesekera, Amit Elazari Bar On, Narseo Vallina-Rodriguez, Serge Egelman
    USENIX Security '19Pythia: Remote Oracles for the MassesShin-Yeh Tsai, Mathias Payer, Yiying Zhang
    USENIX Security '19Computer Security and Privacy in the Interactions Between Victim Service Providers and Human Trafficking SurvivorsChristine Chen, Nicola Dell, Franziska Roesner
    USENIX Security '19A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct LinkMilan Stute, Sashank Narain, Alex Mariotto, Alexander Heinrich, David Kreitschmann, Guevara Noubir, Matthias Hollick
    USENIX Security '19Please Pay Inside: Evaluating Bluetooth-based Detection of Gas Pump SkimmersNishant Bhaskar, Maxwell Bland, Kirill Levchenko, Aaron Schulman
    USENIX Security '19A Systematic Evaluation of Transient Execution Attacks and DefensesClaudio Canella, Jo Van Bulck, Michael Schwarz, Moritz Lipp, Benjamin von Berg, Philipp Ortner, Frank Piessens, Dmitry Evtyushkin, Daniel Gruss
    USENIX Security '19Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning AttacksAmbra Demontis, Marco Melis, Maura Pintor, Matthew Jagielski, Battista Biggio, Alina Oprea, Cristina Nita-Rotaru, Fabio Roli
    USENIX Security '19Terminal Brain Damage: Exposing the Graceless Degradation in Deep Neural Networks Under Hardware Fault AttacksSanghyun Hong, Pietro Frigo, Yiğitcan Kaya, Cristiano Giuffrida, Tudor Dumitraș
    USENIX Security '19Origin-sensitive Control Flow IntegrityMustakimur Rahman Khandaker, Wenqing Liu, Abu Naser, Zhi Wang, Jie Yang
    USENIX Security '19HideMyApp: Hiding the Presence of Sensitive Apps on AndroidAnh Pham, Italo Dacosta, Eleonora Losiouk, John Stephan, Kévin Huguenin, Jean-Pierre Hubaux
    USENIX Security '19Understanding and Improving Security and Privacy in Multi-User Smart Homes: A Design Exploration and In-Home User StudyEric Zeng, Franziska Roesner
    USENIX Security '19Robust Website Fingerprinting Through the Cache Occupancy ChannelAnatoly Shusterman, Lachlan Kang, Yarden Haskal, Yosef Meltser, Prateek Mittal, Yossi Oren, Yuval Yarom
    USENIX Security '19PolicyLint: Investigating Internal Privacy Policy Contradictions on Google PlayBenjamin Andow, Samin Yaseer Mahmud, Wenyu Wang, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, Tao Xie
    USENIX Security '19The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural NetworksNicholas Carlini, Chang Liu, Úlfar Erlingsson, Jernej Kos, Dawn Song
    USENIX Security '19Clinical Computer Security for Victims of Intimate Partner ViolenceSam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, Thomas Ristenpart
    USENIX Security '19RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through Control-Guided TestingTaegyu Kim, Chung Hwan Kim, Junghwan Rhee, Fan Fei, Zhan Tu, Gregory Walkup, Xiangyu Zhang, Xinyan Deng, Dongyan Xu
    USENIX Security '19uXOM: Efficient eXecute-Only Memory on ARM Cortex-MDonghyun Kwon, Jangseop Shin, Giyeol Kim, Byoungyoung Lee, Yeongpil Cho, Yunheung Paek
    USENIX Security '19ALOHA: Auxiliary Loss Optimization for Hypothesis AugmentationEthan M. Rudd, Felipe N. Ducau, Cody Wild, Konstantin Berlin, Richard Harang
    USENIX Security '19Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved FeaturesLiang Tong, Bo Li, Chen Hajaj, Chaowei Xiao, Ning Zhang, Yevgeniy Vorobeychik

Pages