USENIX Security '21 | ReDMArk: Bypassing RDMA Security Mechanisms | Benjamin Rothenberger, Konstantin Taranov, Adrian Perrig, Torsten Hoefler |
USENIX Security '21 | Ripple: A Programmable, Decentralized Link-Flooding Defense Against Adaptive Adversaries | Jiarong Xing, Wenqing Wu, Ang Chen |
USENIX Security '21 | A Stealthy Location Identification Attack Exploiting Carrier Aggregation in Cellular Networks | Nitya Lakshmanan, Nishant Budhdev, Min Suk Kang, Mun Choon Chan, Jun Han |
USENIX Security '21 | Automatic Policy Generation for Inter-Service Access Control of Microservices | Xing Li, Yan Chen, Zhiqiang Lin, Xiao Wang, Jim Hao Chen |
USENIX Security '21 | Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks | Kaiwen Shen, Chuhan Wang, Minglei Guo, Xiaofeng Zheng, Chaoyi Lu, Baojun Liu, Yuxuan Zhao, Shuang Hao, Haixin Duan, Qingfeng Pan, Min Yang |
USENIX Security '21 | ATLAS: A Sequence-based Learning Approach for Attack Investigation | Abdulellah Alsaheel, Yuhong Nan, Shiqing Ma, Le Yu, Gregory Walkup, Z. Berkay Celik, Xiangyu Zhang, Dongyan Xu |
USENIX Security '21 | Security Analysis of the Democracy Live Online Voting System | Michael Specter, J. Alex Halderman |
USENIX Security '21 | Domain Shadowing: Leveraging Content Delivery Networks for Robust Blocking-Resistant Communications | Mingkui Wei |
USENIX Security '21 | mID: Tracing Screen Photos via Moiré Patterns | Yushi Cheng, Xiaoyu Ji, Lixu Wang, Qi Pang, Yi-Chao Chen, Wenyuan Xu |
USENIX Security '21 | Accurately Measuring Global Risk of Amplification Attacks using AmpMap | Soo-Jin Moon, Yucheng Yin, Rahul Anand Sharma, Yifei Yuan, Jonathan M. Spring, Vyas Sekar |
USENIX Security '21 | CADE: Detecting and Explaining Concept Drift Samples for Security Applications | Limin Yang, Wenbo Guo, Qingying Hao, Arridhana Ciptadi, Ali Ahmadzadeh, Xinyu Xing, Gang Wang |
USENIX Security '21 | Adversarial Policy Training against Deep Reinforcement Learning | Xian Wu, Wenbo Guo, Hua Wei, Xinyu Xing |
USENIX Security '21 | Research on the Security of Visual Reasoning CAPTCHA | Yipeng Gao, Haichang Gao, Sainan Luo, Yang Zi, Shudong Zhang, Wenjie Mao, Ping Wang, Yulong Shen, Jeff Yan |
USENIX Security '21 | SmarTest: Effectively Hunting Vulnerable Transaction Sequences in Smart Contracts through Language Model-Guided Symbolic Execution | Sunbeom So, Seongjoon Hong, Hakjoo Oh |
USENIX Security '21 | GForce: GPU-Friendly Oblivious and Rapid Neural Network Inference | Lucien K. L. Ng, Sherman S. M. Chow |
USENIX Security '21 | Acoustics to the Rescue: Physical Key Inference Attack Revisited | Soundarya Ramesh, Rui Xiao, Anindya Maiti, Jong Taek Lee, Harini Ramprasad, Ananda Kumar, Murtuza Jadliwala, Jun Han |
USENIX Security '21 | SIGL: Securing Software Installations Through Deep Graph Learning | Xueyuan Han, Xiao Yu, Thomas Pasquier, Ding Li, Junghwan Rhee, James Mickens, Margo Seltzer, Haifeng Chen |
USENIX Security '21 | Weaponizing Middleboxes for TCP Reflected Amplification | Kevin Bock, Abdulrahman Alaraj, Yair Fax, Kyle Hurley, Eric Wustrow, Dave Levin |
USENIX Security '21 | Swiped: Analyzing Ground-truth Data of a Marketplace for Stolen Debit and Credit Cards | Maxwell Aliapoulios, Cameron Ballard, Rasika Bhalerao, Tobias Lauinger, Damon McCoy |
USENIX Security '21 | YARIX: Scalable YARA-based Malware Intelligence | Michael Brengel, Christian Rossow |
USENIX Security '21 | Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service | Zhibo Sun, Adam Oest, Penghui Zhang, Carlos Rubio-Medrano, Tiffany Bao, Ruoyu Wang, Ziming Zhao, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn |
USENIX Security '21 | Fantastic Four: Honest-Majority Four-Party Secure Computation With Malicious Security | Anders Dalskov, Daniel Escudero, Marcel Keller |
USENIX Security '21 | Locally Differentially Private Analysis of Graph Statistics | Jacob Imola, Takao Murakami, Kamalika Chaudhuri |
USENIX Security '21 | EOSAFE: Security Analysis of EOSIO Smart Contracts | Ningyu He, Ruiyi Zhang, Haoyu Wang, Lei Wu, Xiapu Luo, Yao Guo, Ting Yu, Xuxian Jiang |
USENIX Security '21 | Blitz: Secure Multi-Hop Payments Without Two-Phase Commits | Lukas Aumayr, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei |