Search results

    USENIX Security '20Pancake: Frequency Smoothing for Encrypted Data StoresPaul Grubbs, Anurag Khandelwal, Marie-Sarah Lacharité, Lloyd Brown, Lucy Li, Rachit Agarwal, Thomas Ristenpart
    USENIX Security '20SkillExplorer: Understanding the Behavior of Skills in Large ScaleZhixiu Guo, Zijin Lin, Pan Li, Kai Chen
    USENIX Security '20USBFuzz: A Framework for Fuzzing USB Drivers by Device EmulationHui Peng, Mathias Payer
    USENIX Security '20TXSPECTOR: Uncovering Attacks in Ethereum from TransactionsMengya Zhang, Xiaokuan Zhang, Yinqian Zhang, Zhiqiang Lin
    USENIX Security '20BlockSci: Design and applications of a blockchain analysis platformHarry Kalodner, Malte Möser, Kevin Lee, Steven Goldfeder, Martin Plattner, Alishah Chator, Arvind Narayanan
    USENIX Security '20Droplet: Decentralized Authorization and Access Control for Encrypted Data StreamsHossein Shafagh, Lukas Burkhalter, Sylvia Ratnasamy, Anwar Hithnawi
    USENIX Security '20Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at ScaleAdam Oest, Penghui Zhang, Brad Wardman, Eric Nunes, Jakub Burgis, Ali Zand, Kurt Thomas, Adam Doupé, Gail-Joon Ahn
    FOCI '20Identifying Disinformation Websites Using Infrastructure FeaturesAustin Hounsel, Jordan Holland, Ben Kaiser, Kevin Borgolte, Nick Feamster, Jonathan Mayer
    FOCI '20A Comprehensive Study of DNS-over-HTTPS Downgrade AttackQing Huang, Deliang Chang, Zhou Li
    FOCI '20Detecting and Evading Censorship-in-Depth: A Case Study of Iran’s Protocol WhitelisterKevin Bock, Yair Fax, Kyle Reese, Jasraj Singh, Dave Levin
    FOCI '20MIMIQ: Masking IPs with Migration in QUICYashodhar Govil, Liang Wang, Jennifer Rexford
    FOCI '20Slitheen++: Stealth TLS-based Decoy RoutingBenedikt Birtel, Christian Rossow
    FOCI '20Padding Ain't Enough: Assessing the Privacy Guarantees of Encrypted DNSJonas Bushart, Christian Rossow
    FOCI '20Turbo Tunnel, a good way to design censorship circumvention protocolsDavid Fifield
    FOCI '20HTTPT: A Probe-Resistant ProxySergey Frolov, Eric Wustrow
    FOCI '20Opening Digital Borders Cautiously yet Decisively: Digital Filtering in Saudi ArabiaFatemah Alharbi, Michalis Faloutsos, Nael Abu-Ghazaleh
    FOCI '20Bystanders’ Privacy: The Perspectives of Nannies on Smart Home SurveillanceJulia Bernd, Ruba Abu-Salma, Alisa Frik
    FOCI '20Triplet Censors: Demystifying Great Firewall’s DNS Censorship BehaviorArian Akhavan Niaki, Nguyen Phong Hoang, Phillipa Gill, Amir Houmansadr
    WOOT '20Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel PointersHaehyun Cho, Jinbum Park, Joonwon Kang, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn
    WOOT '20ToothPicker: Apple Picking in the iOS Bluetooth StackDennis Heinze, Jiska Classen, Matthias Hollick
    WOOT '20Bankrupt Covert Channel: Turning Network Predictability into VulnerabilityDmitrii Ustiugov, Plamen Petrov, M. R. Siavash Katebzadeh, Boris Grot
    WOOT '20NFCGate: Opening the Door for NFC Security Research with a Smartphone-Based ToolkitSteffen Klee, Alexandros Roussos, Max Maass, Matthias Hollick
    WOOT '20Office Document Security and PrivacyJens Müller, Fabian Ising, Christian Mainka, Vladislav Mladenov, Sebastian Schinzel, Jörg Schwenk
    WOOT '20One Exploit to Rule them All? On the Security of Drop-in Replacement and Counterfeit MicrocontrollersJohannes Obermaier, Marc Schink, Kosma Moczek
    WOOT '20Automatic Generation of Compact Printable Shellcodes for x86Dhrumil Patel, Aditya Basu, Anish Mathuria