Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '21DRMI: A Dataset Reduction Technology based on Mutual Information for Black-box AttacksYingzhe He, Guozhu Meng, Kai Chen, Xingbo Hu, Jinwen He
    USENIX Security '21Fantastic Four: Honest-Majority Four-Party Secure Computation With Malicious SecurityAnders Dalskov, Daniel Escudero, Marcel Keller
    USENIX Security '21Locally Differentially Private Analysis of Graph StatisticsJacob Imola, Takao Murakami, Kamalika Chaudhuri
    USENIX Security '21EOSAFE: Security Analysis of EOSIO Smart ContractsNingyu He, Ruiyi Zhang, Haoyu Wang, Lei Wu, Xiapu Luo, Yao Guo, Ting Yu, Xuxian Jiang
    USENIX Security '21Blitz: Secure Multi-Hop Payments Without Two-Phase CommitsLukas Aumayr, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei
    USENIX Security '21Messy States of Wiring: Vulnerabilities in Emerging Personal Payment SystemsJiadong Lou, Xu Yuan, Ning Zhang
    USENIX Security '21SWIFT: Super-fast and Robust Privacy-Preserving Machine LearningNishat Koti, Mahak Pancholi, Arpita Patra, Ajith Suresh
    USENIX Security '21Privacy-Preserving and Standard-Compatible AKA Protocol for 5GYuchen Wang, Zhenfeng Zhang, Yongquan Xie
    USENIX Security '21SEApp: Bringing Mandatory Access Control to Android AppsMatthew Rossi, Dario Facchinetti, Enrico Bacis, Marco Rosa, Stefano Paraboschi
    USENIX Security '21A11y and Privacy don't have to be mutually exclusive: Constraining Accessibility Service Misuse on AndroidJie Huang, Michael Backes, Sven Bugiel
    USENIX Security '21DICE*: A Formally Verified Implementation of DICE Measured BootZhe Tao, Aseem Rastogi, Naman Gupta, Kapil Vaswani, Aditya V. Thakur
    USENIX Security '21Research on the Security of Visual Reasoning CAPTCHAYipeng Gao, Haichang Gao, Sainan Luo, Yang Zi, Shudong Zhang, Wenjie Mao, Ping Wang, Yulong Shen, Jeff Yan
    USENIX Security '21SmarTest: Effectively Hunting Vulnerable Transaction Sequences in Smart Contracts through Language Model-Guided Symbolic ExecutionSunbeom So, Seongjoon Hong, Hakjoo Oh
    USENIX Security '21GForce: GPU-Friendly Oblivious and Rapid Neural Network InferenceLucien K. L. Ng, Sherman S. M. Chow
    USENIX Security '21Acoustics to the Rescue: Physical Key Inference Attack RevisitedSoundarya Ramesh, Rui Xiao, Anindya Maiti, Jong Taek Lee, Harini Ramprasad, Ananda Kumar, Murtuza Jadliwala, Jun Han
    USENIX Security '21DOLMA: Securing Speculation with the Principle of Transient Non-ObservabilityKevin Loughlin, Ian Neal, Jiacheng Ma, Elisa Tsai, Ofir Weisse, Satish Narayanasamy, Baris Kasikci
    USENIX Security '21Weaponizing Middleboxes for TCP Reflected AmplificationKevin Bock, Abdulrahman Alaraj, Yair Fax, Kyle Hurley, Eric Wustrow, Dave Levin
    USENIX Security '21Swiped: Analyzing Ground-truth Data of a Marketplace for Stolen Debit and Credit CardsMaxwell Aliapoulios, Cameron Ballard, Rasika Bhalerao, Tobias Lauinger, Damon McCoy
    USENIX Security '21Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-ServiceZhibo Sun, Adam Oest, Penghui Zhang, Carlos Rubio-Medrano, Tiffany Bao, Ruoyu Wang, Ziming Zhao, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn
    USENIX Security '21Automatic Extraction of Secrets from the Transistor Jungle using Laser-Assisted Side-Channel AttacksThilo Krachenfels, Tuba Kiyan, Shahin Tajik, Jean-Pierre Seifert
    NSDI '21Oblique: Accelerating Page Loads Using Symbolic ExecutionRonny Ko, James Mickens, Blake Loring, Ravi Netravali
    NSDI '21Alohamora: Reviving HTTP/2 Push and Preload by Adapting Policies On the FlyNikhil Kansal, Murali Ramanujam, Ravi Netravali
    NSDI '21Contracting Wide-area Network Topologies to Solve Flow Problems QuicklyFiras Abuzaid, Srikanth Kandula, Behnaz Arzani, Ishai Menache, Matei Zaharia, Peter Bailis
    NSDI '21Programming Network Stack for Middleboxes with RubikHao Li, Changhao Wu, Guangda Sun, Peng Zhang, Danfeng Shan, Tian Pan, Chengchen Hu
    NSDI '21Unifying Timestamp with Transaction Ordering for MVCC with Decentralized Scalar TimestampXingda Wei, Rong Chen, Haibo Chen, Zhaoguo Wang, Zhenhan Gong, Binyu Zang

Pages