Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '21Coco: Co-Design and Co-Verification of Masked Software Implementations on CPUsBarbara Gigerl, Vedad Hadzic, Robert Primas, Stefan Mangard, Roderick Bloem
    USENIX Security '21Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic DictionariesDario Pasquini, Marco Cianfriglia, Giuseppe Ateniese, Massimo Bernaschi
    USENIX Security '21WaveGuard: Understanding and Mitigating Audio Adversarial ExamplesShehzeen Hussain, Paarth Neekhara, Shlomo Dubnov, Julian McAuley, Farinaz Koushanfar
    USENIX Security '21Using Amnesia to Detect Credential Database BreachesKe Coby Wang, Michael K. Reiter
    USENIX Security '21Undo Workarounds for Kernel BugsSeyed Mohammadjavad Seyed Talebi, Zhihao Yao, Ardalan Amiri Sani, Zhiyun Qian, Daniel Austin
    USENIX Security '21SMASH: Synchronized Many-sided Rowhammer Attacks from JavaScriptFinn de Ridder, Pietro Frigo, Emanuele Vannacci, Herbert Bos, Cristiano Giuffrida, Kaveh Razavi
    USENIX Security '21ICSFuzz: Manipulating I/Os and Repurposing Binary Code to Enable Instrumented Fuzzing in ICS Control ApplicationsDimitrios Tychalas, Hadjer Benkraouda, Michail Maniatakos
    USENIX Security '21DeepReflect: Discovering Malicious Functionality through Binary ReconstructionEvan Downing, Yisroel Mirsky, Kyuhong Park, Wenke Lee
    USENIX Security '21What's in a Name? Exploring CA Certificate ControlZane Ma, Joshua Mason, Manos Antonakakis, Zakir Durumeric, Michael Bailey
    USENIX Security '21PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDropAlexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, Christian Weinert
    USENIX Security '21Graph BackdoorZhaohan Xi, Ren Pang, Shouling Ji, Ting Wang
    USENIX Security '21Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel DefensesAnatoly Shusterman, Ayush Agarwal, Sioli O'Connell, Daniel Genkin, Yossi Oren, Yuval Yarom
    USENIX Security '21Swivel: Hardening WebAssembly against SpectreShravan Narayan, Craig Disselkoen, Daniel Moghimi, Sunjay Cauligi, Evan Johnson, Zhao Gang, Anjo Vahldiek-Oberwagner, Ravi Sahita, Hovav Shacham, Dean Tullsen, Deian Stefan
    USENIX Security '21Entangled Watermarks as a Defense against Model ExtractionHengrui Jia, Christopher A. Choquette-Choo, Varun Chandrasekaran, Nicolas Papernot
    USENIX Security '21Mind Your Weight(s): A Large-scale Study on Insufficient Machine Learning Model Protection in Mobile AppsZhichuang Sun, Ruimin Sun, Long Lu, Alan Mislove
    USENIX Security '21Breaking Through Binaries: Compiler-quality Instrumentation for Better Binary-only FuzzingStefan Nagy, Anh Nguyen-Tuong, Jason D. Hiser, Jack W. Davidson, Matthew Hicks
    USENIX Security '21Cost-Aware Robust Tree Ensembles for Security ApplicationsYizheng Chen, Shiqi Wang, Weifan Jiang, Asaf Cidon, Suman Jana
    USENIX Security '21Too Good to Be Safe: Tricking Lane Detection in Autonomous Driving with Crafted PerturbationsPengfei Jing, Qiyi Tang, Yuefeng Du, Lei Xue, Xiapu Luo, Ting Wang, Sen Nie, Shi Wu
    USENIX Security '21On the Routing-Aware Peering against Network-Eclipse Attacks in BitcoinMuoi Tran, Akshaye Shenoi, Min Suk Kang
    USENIX Security '21MBA-Blast: Unveiling and Simplifying Mixed Boolean-Arithmetic ObfuscationBinbin Liu, Junfu Shen, Jiang Ming, Qilong Zheng, Jing Li, Dongpeng Xu
    USENIX Security '21VScape: Assessing and Escaping Virtual Call ProtectionsKaixiang Chen, Chao Zhang, Tingting Yin, Xingman Chen, Lei Zhao
    USENIX Security '21MIRAGE: Mitigating Conflict-Based Cache Attacks with a Practical Fully-Associative DesignGururaj Saileshwar, Moinuddin Qureshi
    USENIX Security '21Sharing More and Checking Less: Leveraging Common Input Keywords to Detect Bugs in Embedded SystemsLibo Chen, Yanhao Wang, Quanpu Cai, Yunfan Zhan, Hong Hu, Jiaqi Linghu, Qinsheng Hou, Chao Zhang, Haixin Duan, Zhi Xue
    USENIX Security '21ObliCheck: Efficient Verification of Oblivious Algorithms with Unobservable StateJeongseok Son, Griffin Prechter, Rishabh Poddar, Raluca Ada Popa, Koushik Sen
    USENIX Security '21Understanding Malicious Cross-library Data Harvesting on AndroidJice Wang, Yue Xiao, Xueqiang Wang, Yuhong Nan, Luyi Xing, Xiaojing Liao, JinWei Dong, Nicolas Serrano, Haoran Lu, XiaoFeng Wang, Yuqing Zhang

Pages