Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '21Weaponizing Middleboxes for TCP Reflected AmplificationKevin Bock, Abdulrahman Alaraj, Yair Fax, Kyle Hurley, Eric Wustrow, Dave Levin
    USENIX Security '21Swiped: Analyzing Ground-truth Data of a Marketplace for Stolen Debit and Credit CardsMaxwell Aliapoulios, Cameron Ballard, Rasika Bhalerao, Tobias Lauinger, Damon McCoy
    USENIX Security '21Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-ServiceZhibo Sun, Adam Oest, Penghui Zhang, Carlos Rubio-Medrano, Tiffany Bao, Ruoyu Wang, Ziming Zhao, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn
    USENIX Security '21Automatic Extraction of Secrets from the Transistor Jungle using Laser-Assisted Side-Channel AttacksThilo Krachenfels, Tuba Kiyan, Shahin Tajik, Jean-Pierre Seifert
    USENIX Security '21Data Poisoning Attacks to Local Differential Privacy ProtocolsXiaoyu Cao, Jinyuan Jia, Neil Zhenqiang Gong
    USENIX Security '21HAWatcher: Semantics-Aware Anomaly Detection for Appified Smart HomesChenglong Fu, Qiang Zeng, Xiaojiang Du
    USENIX Security '21'Passwords Keep Me Safe' – Understanding What Children Think about PasswordsMary Theofanos, Yee-Yin Choong, Olivia Murphy
    USENIX Security '21Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and FragmentationMathy Vanhoef
    USENIX Security '21An Analysis of Speculative Type Confusion Vulnerabilities in the WildOfek Kirzner, Adam Morrison
    USENIX Security '21LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth StacksJianliang Wu, Ruoyu Wu, Daniele Antonioli, Mathias Payer, Nils Ole Tippenhauer, Dongyan Xu, Dave (Jing) Tian, Antonio Bianchi
    USENIX Security '21PrivSyn: Differentially Private Data SynthesisZhikun Zhang, Tianhao Wang, Ninghui Li, Jean Honorio, Michael Backes, Shibo He, Jiming Chen, Yang Zhang
    USENIX Security '21On the Design and Misuse of Microcoded (Embedded) Processors — A Cautionary NoteNils Albartus, Clemens Nasenberg, Florian Stolz, Marc Fyrbiak, Christof Paar, Russell Tessier
    USENIX Security '21A Large-Scale Interview Study on Information Security in and Attacks against Small and Medium-sized EnterprisesNicolas Huaman, Bennet von Skarczinski, Christian Stransky, Dominik Wermke, Yasemin Acar, Arne Dreißigacker, Sascha Fahl
    USENIX Security '21Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized ApplicationsLiya Su, Xinyue Shen, Xiangyu Du, Xiaojing Liao, XiaoFeng Wang, Luyi Xing, Baoxu Liu
    USENIX Security '21Smart Contract Vulnerabilities: Vulnerable Does Not Imply ExploitedDaniel Perez, Benjamin Livshits
    USENIX Security '21You Autocomplete Me: Poisoning Vulnerabilities in Neural Code CompletionRoei Schuster, Congzheng Song, Eran Tromer, Vitaly Shmatikov
    USENIX Security '21ICSFuzz: Manipulating I/Os and Repurposing Binary Code to Enable Instrumented Fuzzing in ICS Control ApplicationsDimitrios Tychalas, Hadjer Benkraouda, Michail Maniatakos
    USENIX Security '21Abusing Hidden Properties to Attack the Node.js EcosystemFeng Xiao, Jianwei Huang, Yichang Xiong, Guangliang Yang, Hong Hu, Guofei Gu, Wenke Lee
    USENIX Security '21Too Good to Be Safe: Tricking Lane Detection in Autonomous Driving with Crafted PerturbationsPengfei Jing, Qiyi Tang, Yuefeng Du, Lei Xue, Xiapu Luo, Ting Wang, Sen Nie, Shi Wu
    USENIX Security '21Automatic Policy Generation for Inter-Service Access Control of MicroservicesXing Li, Yan Chen, Zhiqiang Lin, Xiao Wang, Jim Hao Chen
    USENIX Security '21Deep Entity Classification: Abusive Account Detection for Online Social NetworksTeng Xu, Gerard Goossen, Huseyin Kerem Cevahir, Sara Khodeir, Yingyezhe Jin, Frank Li, Shawn Shan, Sagar Patel, David Freeman, Paul Pearce
    USENIX Security '21CANARY - a reactive defense mechanism for Controller Area Networks based on Active RelaYsBogdan Groza, Lucian Popa, Pal-Stefan Murvay, Yuval Elovici, Asaf Shabtai
    USENIX ATC '21FaaSNet: Scalable and Fast Provisioning of Custom Serverless Container Runtimes at Alibaba Cloud Function ComputeAo Wang, Shuai Chang, Huangshi Tian, Hongqi Wang, Haoran Yang, Huiba Li, Rui Du, Yue Cheng
    NSDI '21Oblique: Accelerating Page Loads Using Symbolic ExecutionRonny Ko, James Mickens, Blake Loring, Ravi Netravali
    NSDI '21Alohamora: Reviving HTTP/2 Push and Preload by Adapting Policies On the FlyNikhil Kansal, Murali Ramanujam, Ravi Netravali

Pages