Search results

    USENIX Security '19ScatterCache: Thwarting Cache Attacks via Cache Set RandomizationMario Werner, Thomas Unterluggauer, Lukas Giner, Michael Schwarz, Daniel Gruss, Stefan Mangard
    USENIX Security '19UWB-ED: Distance Enlargement Attack Detection in Ultra-WidebandMridula Singh, Patrick Leu, AbdelRahman Abdou, Srdjan Capkun
    USENIX Security '19Evaluating the Contextual Integrity of Privacy Regulation: Parents' IoT Toy Privacy Norms Versus COPPANoah Apthorpe, Sarah Varghese, Nick Feamster
    USENIX Security '19Stack Overflow Considered Helpful! Deep Learning Security Nudges Towards Stronger CryptographyFelix Fischer, Huang Xiao, Ching-Yu Kao, Yannick Stachelscheid, Benjamin Johnson, Danial Razar, Paul Fawkesley, Nat Buckley, Konstantin Böttinger, Paul Muntean, Jens Grossklags
    USENIX Security '19simTPM: User-centric TPM for Mobile DevicesDhiman Chakraborty, Lucjan Hanzlik, Sven Bugiel
    USENIX Security '19HardFails: Insights into Software-Exploitable Hardware BugsGhada Dessouky, David Gens, Patrick Haney, Garrett Persyn, Arun Kanuparthi, Hareesh Khattri, Jason M. Fung, Ahmad-Reza Sadeghi, Jeyavijayan Rajendran
    USENIX Security '19SPOILER: Speculative Load Hazards Boost Rowhammer and Cache AttacksSaad Islam, Ahmad Moghimi, Ida Bruhns, Moritz Krebbel, Berk Gulmezoglu, Thomas Eisenbarth, Berk Sunar
    USENIX Security '19Misleading Authorship Attribution of Source Code using Adversarial LearningErwin Quiring, Alwin Maier, Konrad Rieck
    USENIX Security '19Secure Multi-User Content Sharing for Augmented Reality ApplicationsKimberly Ruth, Tadayoshi Kohno, Franziska Roesner
    USENIX Security '19Hiding in Plain Signal: Physical Signal Overshadowing Attack on LTEHojoon Yang, Sangwook Bae, Mincheol Son, Hongil Kim, Song Min Kim, Yongdae Kim
    USENIX Security '19Losing the Car Keys: Wireless PHY-Layer Insecurity in EV ChargingRichard Baker, Ivan Martinovic
    USENIX Security '19CANvas: Fast and Inexpensive Automotive Network MappingSekar Kulandaivel, Tushar Goyal, Arnav Kumar Agrawal, Vyas Sekar
    USENIX Security '19A Study of the Feasibility of Co-located App Attacks against BLE and a Large-Scale Analysis of the Current Application-Layer Security LandscapePallavi Sivakumaran, Jorge Blasco
    USENIX Security '19Identifying Cache-Based Side Channels through Secret-Augmented Abstract InterpretationShuai Wang, Yuyan Bao, Xiao Liu, Pei Wang, Danfeng Zhang, Dinghao Wu
    USENIX Security '19When the Signal is in the Noise: Exploiting Diffix's Sticky NoiseAndrea Gadotti, Florimond Houssiau, Luc Rocher, Benjamin Livshits, Yves-Alexandre de Montjoye
    USENIX Security '19PAC it up: Towards Pointer Integrity using ARM Pointer AuthenticationHans Liljestrand, Thomas Nyman, Kui Wang, Carlos Chinea Perez, Jan-Erik Ekberg, N. Asokan
    USENIX Security '19All Your Clicks Belong to Me: Investigating Click Interception on the WebMingxue Zhang, Wei Meng, Sangho Lee, Byoungyoung Lee, Xinyu Xing
    FOCI '19Artifice: A Deniable Steganographic File SystemAusten Barker, Staunton Sample, Yash Gupta, Anastasia McTaggart, Ethan L. Miller, Darrell D. E. Long
    FOCI '19SPINE: Surveillance Protection in the Network ElementsTrisha Datta, Nick Feamster, Jennifer Rexford, Liang Wang
    FOCI '19Entanglements and Exploits: Sociotechnical Security as an Analytic FrameworkMatt Goerzen, ​Elizabeth Anne Watkins, Gabrielle Lim
    FOCI '19An Efficient Method to Determine which Combination of Keywords Triggered Automatic Filtering of a MessageRuohan Xiong, Jeffrey Knockel
    FOCI '19Improving Meek With Adversarial TechniquesSteven Sheffey, Ferrol Aderholdt
    FOCI '19Measuring I2P Censorship at a Global ScaleNguyen Phong Hoang, Sadie Doreen, Michalis Polychronakis
    FOCI '19On the Importance of Encrypted-SNI (ESNI) to Censorship CircumventionZimo Chai, Amirhossein Ghafari, Amir Houmansadr
    WOOT '19RISC-V: #AlphanumericShellcodingHadrien Barral, Rémi Géraud-Stewart, Georges-Axel Jaloyan, David Naccache