Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '19Less is More: Quantifying the Security Benefits of Debloating Web ApplicationsBabak Amin Azad, Pierre Laperdrix, Nick Nikiforakis
    USENIX Security '19GRIMOIRE: Synthesizing Structure while FuzzingTim Blazytko, Cornelius Aschermann, Moritz Schlögel, Ali Abbasi, Sergej Schumilo, Simon Wörner, Thorsten Holz
    USENIX Security '19EnFuzz: Ensemble Fuzzing with Seed Synchronization among Diverse FuzzersYuanliang Chen, Yu Jiang, Fuchen Ma, Jie Liang, Mingzhe Wang, Chijin Zhou, Xun Jiao, Zhuo Su
    USENIX Security '19Evaluating Differentially Private Machine Learning in PracticeBargav Jayaraman, David Evans
    USENIX Security '19Detecting Missing-Check Bugs via Semantic- and Context-Aware Criticalness and Constraints InferencesKangjie Lu, Aditya Pakki, Qiushi Wu
    USENIX Security '19MOPT: Optimized Mutation Scheduling for FuzzersChenyang Lyu, Shouling Ji, Chao Zhang, Yuwei Li, Wei-Han Lee, Yu Song, Raheem Beyah
    USENIX Security '19Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic TechniquesFabio Pagani, Davide Balzarotti
    USENIX Security '19On (The Lack Of) Location Privacy in Crowdsourcing ApplicationsSpyros Boukoros, Mathias Humbert, Stefan Katzenbeisser, Carmela Troncoso
    USENIX Security '19The Art of The Scam: Demystifying Honeypots in Ethereum Smart ContractsChristof Ferreira Torres, Mathis Steichen, Radu State
    USENIX Security '19DEEPVSA: Facilitating Value-set Analysis with Deep Learning for Postmortem Program AnalysisWenbo Guo, Dongliang Mu, Xinyu Xing, Min Du, Dawn Song
    USENIX Security '19No Right to Remain Silent: Isolating Malicious MixesHemi Leibowitz, Ania M. Piotrowska, George Danezis, Amir Herzberg
    USENIX Security '19Site Isolation: Process Separation for Web Sites within the BrowserCharles Reis, Alexander Moshchuk, Nasko Oskov
    USENIX Security '19The Web's Identity Crisis: Understanding the Effectiveness of Website Identity IndicatorsChristopher Thompson, Martin Shelton, Emily Stark, Maximilian Walker, Emily Schechter, Adrienne Porter Felt
    USENIX Security '19The Anatomy of a Cryptocurrency Pump-and-Dump SchemeJiahua Xu, Benjamin Livshits
    USENIX Security '19CONFIRM: Evaluating Compatibility and Relevance of Control-flow Integrity Protections for Modern SoftwareXiaoyang Xu, Masoud Ghaffarinia, Wenhao Wang, Kevin W. Hamlen, Zhiqiang Lin
    USENIX Security '19Point Break: A Study of Bandwidth Denial-of-Service Attacks against TorRob Jansen, Tavish Vaidya, Micah Sherr
    USENIX Security '19Reading the Tea leaves: A Comparative Analysis of Threat IntelligenceVector Guo Li, Matthew Dunn, Paul Pearce, Damon McCoy, Geoffrey M. Voelker, Stefan Savage
    USENIX Security '19Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet ScaleHugo L.J. Bijmans, Tim M. Booij, Christian Doerr
    USENIX Security '19Blind Bernoulli Trials: A Noninteractive Protocol For Hidden-Weight Coin FlipsR. Joseph Connor, Max Schuchard
    USENIX Security '19Utility-Optimized Local Differential Privacy Mechanisms for Distribution EstimationTakao Murakami, Yusuke Kawamoto
    USENIX Security '19RAZOR: A Framework for Post-deployment Software DebloatingChenxiong Qian, Hong Hu, Mansour Alharthi, Pak Ho Chung, Taesoo Kim, Wenke Lee
    USENIX Security '19ERIM: Secure, Efficient In-process Isolation with Protection Keys (MPK)Anjo Vahldiek-Oberwagner, Eslam Elnikety, Nuno O. Duarte, Michael Sammler, Peter Druschel, Deepak Garg
    USENIX Security '19SafeHidden: An Efficient and Secure Information Hiding Technique Using Re-randomizationZhe Wang, Chenggang Wu, Yinqian Zhang, Bowen Tang, Pen-Chung Yew, Mengyao Xie, Yuanming Lai, Yan Kang, Yueqiang Cheng, Zhiping Shi
    USENIX Security '19XONN: XNOR-based Oblivious Deep Neural Network InferenceM. Sadegh Riazi, Mohammad Samragh, Hao Chen, Kim Laine, Kristin Lauter, Farinaz Koushanfar
    USENIX Security '19Understanding and Securing Device Vulnerabilities through Automated Bug Report AnalysisXuan Feng, Xiaojing Liao, XiaoFeng Wang, Haining Wang, Qiang Li, Kai Yang, Hongsong Zhu, Limin Sun

Pages