USENIX Security '20 | Everything Old is New Again: Binary Security of WebAssembly | Daniel Lehmann, Johannes Kinder, Michael Pradel |
USENIX Security '20 | SmartVerif: Push the Limit of Automation Capability of Verifying Security Protocols by Dynamic Strategies | Yan Xiong, Cheng Su, Wenchao Huang, Fuyou Miao, Wansen Wang, Hengyi Ouyang |
USENIX Security '20 | BigMAC: Fine-Grained Policy Analysis of Android Firmware | Grant Hernandez, Dave (Jing) Tian, Anurag Swarnim Yadav, Byron J. Williams, Kevin R.B. Butler |
USENIX Security '20 | PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists | Adam Oest, Yeganeh Safaei, Penghui Zhang, Brad Wardman, Kevin Tyers, Yan Shoshitaishvili, Adam Doupé |
USENIX Security '20 | See No Evil: Phishing for Permissions with False Transparency | Güliz Seray Tuncay, Jingyu Qian, Carl A. Gunter |
USENIX Security '20 | A different cup of TI? The added value of commercial threat intelligence | Xander Bouwman, Harm Griffioen, Jelle Egbers, Christian Doerr, Bram Klievink, Michel van Eeten |
USENIX Security '20 | HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments | Ghada Dessouky, Tommaso Frassetto, Ahmad-Reza Sadeghi |
USENIX Security '20 | TPM-FAIL: TPM meets Timing and Lattice Attacks | Daniel Moghimi, Berk Sunar, Thomas Eisenbarth, Nadia Heninger |
USENIX Security '20 | CopyCat: Controlled Instruction-Level Attacks on Enclaves | Daniel Moghimi, Jo Van Bulck, Nadia Heninger, Frank Piessens, Berk Sunar |
USENIX Security '20 | Civet: An Efficient Java Partitioning Framework for Hardware Enclaves | Chia-Che Tsai, Jeongseok Son, Bhushan Jain, John McAvey, Raluca Ada Popa, Donald E. Porter |
USENIX Security '20 | An Off-Chip Attack on Hardware Enclaves via the Memory Bus | Dayeol Lee, Dongha Jung, Ian T. Fang, Chia-Che Tsai, Raluca Ada Popa |
USENIX Security '20 | BesFS: A POSIX Filesystem for Enclaves with a Mechanized Safety Proof | Shweta Shinde, Shengyi Wang, Pinghai Yuan, Aquinas Hobor, Abhik Roychoudhury, Prateek Saxena |
USENIX Security '20 | EPIC: Every Packet Is Checked in the Data Plane of a Path-Aware Internet | Markus Legner, Tobias Klenze, Marc Wyss, Christoph Sprenger, Adrian Perrig |
USENIX Security '20 | ShadowMove: A Stealthy Lateral Movement Strategy | Amirreza Niakanlahiji, Jinpeng Wei, Md Rabbi Alam, Qingyang Wang, Bei-Tseng Chu |
USENIX Security '20 | Poison Over Troubled Forwarders: A Cache Poisoning Attack Targeting DNS Forwarding Devices | Xiaofeng Zheng, Chaoyi Lu, Jian Peng, Qiushi Yang, Dongjie Zhou, Baojun Liu, Keyu Man, Shuang Hao, Haixin Duan, Zhiyun Qian |
USENIX Security '20 | Programmable In-Network Security for Context-aware BYOD Policies | Qiao Kang, Lei Xue, Adam Morrison, Yuxin Tang, Ang Chen, Xiapu Luo |
USENIX Security '20 | Cached and Confused: Web Cache Deception in the Wild | Seyed Ali Mirheidari, Sajjad Arshad, Kaan Onarlioglu, Bruno Crispo, Engin Kirda, William Robertson |
USENIX Security '20 | Zero-delay Lightweight Defenses against Website Fingerprinting | Jiajun Gong, Tao Wang |
USENIX Security '20 | Horizontal Privilege Escalation in Trusted Applications | Darius Suciu, Stephen McLaughlin, Laurent Simon, Radu Sion |
USENIX Security '20 | TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves | Tobias Cloosters, Michael Rodler, Lucas Davi |
USENIX Security '20 | NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities | Yehuda Afek, Anat Bremler-Barr, Lior Shafir |
USENIX Security '20 | PARTEMU: Enabling Dynamic Analysis of Real-World TrustZone Software Using Emulation | Lee Harrison, Hayawardh Vijayakumar, Rohan Padhye, Koushik Sen, Michael Grace |
USENIX Security '20 | Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It | Daniel Votipka, Kelsey R. Fulton, James Parker, Matthew Hou, Michelle L. Mazurek, Michael Hicks |
USENIX Security '20 | The Impact of Ad-Blockers on Product Search and Purchase Behavior: A Lab Experiment | Alisa Frik, Amelia Haviland, Alessandro Acquisti |
USENIX Security '20 | Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE | David Rupprecht, Katharina Kohls, Thorsten Holz, Christina Pöpper |