Stop the war!
Остановите войну!
for scientists:
default search action
29th USENIX Security Symposium 2020
- Srdjan Capkun, Franziska Roesner:
29th USENIX Security Symposium, USENIX Security 2020, August 12-14, 2020. USENIX Association 2020, ISBN 978-1-939133-17-5
Wireless Security
- Cas Cremers, Benjamin Kiesl, Niklas Medinger:
A Formal Analysis of IEEE 802.11's WPA2: Countering the Kracks Caused by Cracking the Counters. 1-17 - Jan Ruge, Jiska Classen, Francesco Gringoli, Matthias Hollick:
Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets. 19-36 - Yue Zhang, Jian Weng, Rajib Dey, Yier Jin, Zhiqiang Lin, Xinwen Fu:
Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks. 37-54 - Lingjing Yu, Bo Luo, Jun Ma, Zhaoyu Zhou, Qingyun Liu:
You Are What You Broadcast: Identification of Mobile and IoT Devices from (Public) WiFi. 55-72 - David Rupprecht, Katharina Kohls, Thorsten Holz, Christina Pöpper:
Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE. 73-88
Human Factors
- Elissa M. Redmiles, Noel Warford, Amritha Jayanti, Aravind Koneru, Sean Kross, Miraida Morales, Rock Stevens, Michelle L. Mazurek:
A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web. 89-108 - Daniel Votipka, Kelsey R. Fulton, James Parker, Matthew Hou, Michelle L. Mazurek, Michael Hicks:
Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It. 109-126 - Joshua Reynolds, Nikita Samarin, Joseph D. Barnes, Taylor Judd, Joshua Mason, Michael D. Bailey, Serge Egelman:
Empirical Measurement of Systemic 2FA Usability. 127-143 - Miranda Wei, Madison Stamos, Sophie Veys, Nathan Reitinger, Justin Goodman, Margot Herman, Dorota Filipczuk, Ben Weinshel, Michelle L. Mazurek, Blase Ur:
What Twitter Knows: Characterizing Ad Targeting Practices, User Perceptions, and Ad Explanations Through Users' Own Twitter Data. 145-162 - Alisa Frik, Amelia Haviland, Alessandro Acquisti:
The Impact of Ad-Blockers on Product Search and Purchase Behavior: A Lab Experiment. 163-179
Software Security and Verification
- Sebastian Poeplau, Aurélien Francillon:
Symbolic execution with SymCC: Don't interpret, compile! 181-198 - Fraser Brown, Deian Stefan, Dawson R. Engler:
Sys: A Static/Symbolic Tool for Finding Good Bugs in Good (Browser) Code. 199-216 - Daniel Lehmann, Johannes Kinder, Michael Pradel:
Everything Old is New Again: Binary Security of WebAssembly. 217-234 - Tim Blazytko, Moritz Schlögel, Cornelius Aschermann, Ali Abbasi, Joel Frank, Simon Wörner, Thorsten Holz:
AURORA: Statistical Crash Analysis for Automated Root Cause Explanation. 235-252 - Yan Xiong, Cheng Su, Wenchao Huang, Fuyou Miao, Wansen Wang, Hengyi Ouyang:
SmartVerif: Push the Limit of Automation Capability of Verifying Security Protocols by Dynamic Strategies. 253-270
Mobile 1
- Grant Hernandez, Dave (Jing) Tian, Anurag Swarnim Yadav, Byron J. Williams, Kevin R. B. Butler:
BigMAC: Fine-Grained Policy Analysis of Android Firmware. 271-287 - Charles Weir, Ben Hermann, Sascha Fahl:
From Needs to Actions to Secure Apps? The Effect of Requirements and Developer Practices on App Security. 289-305 - Baozheng Liu, Chao Zhang, Guang Gong, Yishun Zeng, Haifeng Ruan, Jianwei Zhuge:
FANS: Fuzzing Android Native System Services via Automated Interface Analysis. 307-323 - Jiayi Chen, Urs Hengartner, Hassan Khan, Mohammad Mannan:
Chaperone: Real-time Locking and Loss Prevention for Smartphones. 325-342 - Andrea Possemato, Yanick Fratantonio:
Towards HTTPS Everywhere on Android: We Are Not There Yet. 343-360
Phishing, Spam, and Threat Intelligence
- Adam Oest, Penghui Zhang, Brad Wardman, Eric Nunes, Jakub Burgis, Ali Zand, Kurt Thomas, Adam Doupé, Gail-Joon Ahn:
Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale. 361-377 - Adam Oest, Yeganeh Safaei, Penghui Zhang, Brad Wardman, Kevin Tyers, Yan Shoshitaishvili, Adam Doupé:
PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists. 379-396 - Sathvik Prasad, Elijah Robert Bouma-Sims, Athishay Kiran Mylappan, Bradley Reaves:
Who's Calling? Characterizing Robocalls through Audio and Metadata Analysis. 397-414 - Güliz Seray Tuncay, Jingyu Qian, Carl A. Gunter:
See No Evil: Phishing for Permissions with False Transparency. 415-432 - Xander Bouwman, Harm Griffioen, Jelle Egbers, Christian Doerr, Bram Klievink, Michel van Eeten:
A different cup of TI? The added value of commercial threat intelligence. 433-450
Trusted Execution Environments 1
- Ghada Dessouky, Tommaso Frassetto, Ahmad-Reza Sadeghi:
HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments. 451-468 - Daniel Moghimi, Jo Van Bulck, Nadia Heninger, Frank Piessens, Berk Sunar:
CopyCat: Controlled Instruction-Level Attacks on Enclaves. 469-486 - Dayeol Lee, Dongha Jung, Ian T. Fang, Chia-Che Tsai, Raluca Ada Popa:
An Off-Chip Attack on Hardware Enclaves via the Memory Bus. 487-504 - Chia-Che Tsai, Jeongseok Son, Bhushan Jain, John McAvey, Raluca Ada Popa, Donald E. Porter:
Civet: An Efficient Java Partitioning Framework for Hardware Enclaves. 505-522 - Shweta Shinde, Shengyi Wang, Pinghai Yuan, Aquinas Hobor, Abhik Roychoudhury, Prateek Saxena:
BesFS: A POSIX Filesystem for Enclaves with a Mechanized Safety Proof. 523-540
Network Security
- Markus Legner, Tobias Klenze, Marc Wyss, Christoph Sprenger, Adrian Perrig:
EPIC: Every Packet Is Checked in the Data Plane of a Path-Aware Internet. 541-558 - Amirreza Niakanlahiji, Jinpeng Wei, Md Rabbi Alam, Qingyang Wang, Bei-Tseng Chu:
ShadowMove: A Stealthy Lateral Movement Strategy. 559-576 - Xiaofeng Zheng, Chaoyi Lu, Jian Peng, Qiushi Yang, Dongjie Zhou, Baojun Liu, Keyu Man, Shuang Hao, Haixin Duan, Zhiyun Qian:
Poison Over Troubled Forwarders: A Cache Poisoning Attack Targeting DNS Forwarding Devices. 577-593 - Qiao Kang, Lei Xue, Adam Morrison, Yuxin Tang, Ang Chen, Xiapu Luo:
Programmable In-Network Security for Context-aware BYOD Policies. 595-612 - Hyeonmin Lee, Aniketh Gireesh, Roland van Rijswijk-Deij, Taekyoung Kwon, Taejoong Chung:
A Longitudinal and Comprehensive Study of the DANE Ecosystem in Email. 613-630 - Yehuda Afek, Anat Bremler-Barr, Lior Shafir:
NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities. 631-648
Web Security and Privacy
- Frank Li:
Shim Shimmeny: Evaluating the Security and Privacy Contributions of Link Shimming in the Modern Web. 649-664 - Seyed Ali Mirheidari, Sajjad Arshad, Kaan Onarlioglu, Bruno Crispo, Engin Kirda, William Robertson:
Cached and Confused: Web Cache Deception in the Wild. 665-682 - Stefano Calzavara, Sebastian Roth, Alvise Rabitti, Michael Backes, Ben Stock:
A Tale of Two Headers: A Formal Analysis of Inconsistent Click-Jacking Protection on the Web. 683-697 - Shravan Narayan, Craig Disselkoen, Tal Garfinkel, Nathan Froyd, Eric Rahm, Sorin Lerner, Hovav Shacham, Deian Stefan:
Retrofitting Fine Grain Isolation in the Firefox Renderer. 699-716 - Jiajun Gong, Tao Wang:
Zero-delay Lightweight Defenses against Website Fingerprinting. 717-734 - Stephen Herwig, Christina Garman, Dave Levin:
Achieving Keyless CDNs with Conclaves. 735-751
Trusted Execution Environments 2
- Fabian Schwarz, Christian Rossow:
SENG, the SGX-Enforcing Network Gateway: Authorizing Communication from Shielded Clients. 753-770 - Ivan De Oliveira Nunes, Karim Eldefrawy, Norrathep Rattanavipanon, Gene Tsudik:
APEX: A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise. 771-788 - Lee Harrison, Hayawardh Vijayakumar, Rohan Padhye, Koushik Sen, Michael Grace:
PARTEMU: Enabling Dynamic Analysis of Real-World TrustZone Software Using Emulation. 789-806 - Leila Delshadtehrani, Sadullah Canakci, Boyou Zhou, Schuyler Eldridge, Ajay Joshi, Manuel Egele:
PHMon: A Programmable Hardware Monitor and Its Security Use Cases. 807-824 - Darius Suciu, Stephen E. McLaughlin, Laurent Simon, Radu Sion:
Horizontal Privilege Escalation in Trusted Applications. - Tobias Cloosters, Michael Rodler, Lucas Davi:
TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves. 841-858
Panel
- Avi Rubin:
The 2020 Election: Remote Voting, Disinformation, and Audit.
Automotive and Drone Security
- Mulong Luo, Andrew C. Myers, G. Edward Suh:
Stealthy Tracking of Autonomous Vehicles with Cache Side Channels. 859-876 - Jiachen Sun, Yulong Cao, Qi Alfred Chen, Z. Morley Mao:
Towards Robust LiDAR-based Perception in Autonomous Driving: General Black-box Adversarial Sensor Attack and Countermeasures. 877-894 - Raul Quinonez, Jairo Giraldo, Luis E. Salazar, Erick Bauman, Alvaro A. Cárdenas, Zhiqiang Lin:
SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants. 895-912 - Taegyu Kim, Chung Hwan Kim, Altay Ozen, Fan Fei, Zhan Tu, Xiangyu Zhang, Xinyan Deng, Dave (Jing) Tian, Dongyan Xu:
From Control Model to Program: Investigating Robotic Aerial Vehicle Accidents with MAYDAY. 913-930 - Junjie Shen, Jun Yeon Won, Zeyuan Chen, Qi Alfred Chen:
Drift with Devil: Security of Multi-Sensor Fusion based Localization in High-Level Autonomous Driving under GPS Spoofing. 931-948 - Haohuang Wen, Qi Alfred Chen, Zhiqiang Lin:
Plug-N-Pwned: Comprehensive Vulnerability Analysis of OBD-II Dongles as A New Over-the-Air Attack Surface in Automotive IoT. 949-965
Privacy Enhancing Technologies
- Xiaolan Gu, Ming Li, Yueqiang Cheng, Li Xiong, Yang Cao:
PCKV: Locally Differentially Private Correlated Key-Value Data Collection with Optimized Utility. 967-984 - Benjamin Andow, Samin Yaseer Mahmud, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, Serge Egelman:
Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheck. 985-1002 - Chelsea Komlo, Nick Mathewson, Ian Goldberg:
Walking Onions: Scaling Anonymity Networks while Protecting Users. 1003-1020 - Hailong Zhang, Sufian Latif, Raef Bassily, Atanas Rountev:
Differentially-Private Control-Flow Node Coverage for Software Usage Analysis. 1021-1038 - Rishabh Poddar, Ganesh Ananthanarayanan, Srinath T. V. Setty, Stavros Volos, Raluca Ada Popa:
Visor: Privacy-Preserving Video Analytics as a Cloud Service. 1039-1056 - Katriel Cohn-Gordon, Georgios Damaskinos, Divino Neto, Joshi Cordova, Benoît Reitz, Benjamin Strahs, Daniel Obenshain, Paul Pearce, Ioannis Papagiannis, Available Media:
DELF: Safeguarding deletion correctness in Online Social Networks.
Software Security
- Antonio Flores-Montoya, Eric M. Schulte:
Datalog Disassembly. 1075-1092 - Weiteng Chen, Xiaochen Zou, Guoren Li, Zhiyun Qian:
KOOBE: Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities. 1093-1110 - Insu Yun, Dhaval Kapil, Taesoo Kim:
Automatic Techniques to Systematically Discover New Heap Exploitation Primitives. 1111-1128 - Timothy Nosco, Jared Ziegler, Zechariah Clark, Davy Marrero, Todd Finkler, Andrew Barbarello, W. Michael Petullo:
The Industrial Age of Hacking. 1129-1146 - Jiarun Dai, Yuan Zhang, Zheyue Jiang, Yingtian Zhou, Junyan Chen, Xinyu Xing, Xiaohan Zhang, Xin Tan, Min Yang, Zhemin Yang:
BScout: Direct Whole Patch Presence Test for Java Executables. 1147-1164 - Yang Xiao, Bihuan Chen, Chendong Yu, Zhengzi Xu, Zimu Yuan, Feng Li, Binghong Liu, Yang Liu, Wei Huo, Wei Zou, Wenchang Shi:
MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures. 1165-1182
Embedded/IoT Security
- Bin Yuan, Yan Jia, Luyi Xing, Dongfang Zhao, XiaoFeng Wang, Deqing Zou, Hai Jin, Yuqing Zhang:
Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation. 1183-1200 - Abraham A. Clements, Eric Gustafson, Tobias Scharnowski, Paul Grosen, David Fritz, Christopher Kruegel, Giovanni Vigna, Saurabh Bagchi, Mathias Payer:
HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation. 1201-1218 - Jie Zhou, Yufei Du, Zhuojia Shen, Lele Ma, John Criswell, Robert J. Walls:
Silhouette: Efficient Protected Shadow Stacks for Embedded Systems. 1219-1236 - Bo Feng, Alejandro Mera, Long Lu:
P2IM: Scalable and Hardware-independent Firmware Testing via Automatic Peripheral Interface Modeling. 1237-1254 - Siva Nishok Dhanuskodi, Xiang Li, Daniel E. Holcomb:
COUNTERFOIL: Verifying Provenance of Integrated Circuits using Intrinsic Package Fingerprints and Inexpensive Cameras. 1255-1272 - Anomadarshi Barua, Mohammad Abdullah Al Faruque:
Hall Spoofing: A Non-Invasive DoS Attack on Grid-Tied Solar Inverter. 1273-1290
Machine Learning 1
- Ahmed Salem, Apratim Bhattacharya, Michael Backes, Mario Fritz, Yang Zhang:
Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning. 1291-1308 - Varun Chandrasekaran, Kamalika Chaudhuri, Irene Giacomelli, Somesh Jha, Songbai Yan:
Exploring Connections Between Active Learning and Model Extraction. 1309-1326 - Fnu Suya, Jianfeng Chi, David Evans, Yuan Tian:
Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries. 1327-1344 - Matthew Jagielski, Nicholas Carlini, David Berthelot, Alex Kurakin, Nicolas Papernot:
High Accuracy and High Fidelity Extraction of Neural Networks. 1345-1362 - Erwin Quiring, David Klein, Daniel Arp, Martin Johns, Konrad Rieck:
Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks in Machine Learning. 1363-1380 - Jinfeng Li, Tianyu Du, Shouling Ji, Rong Zhang, Quan Lu, Min Yang, Ting Wang:
TextShield: Robust Text Classification Based on Multimodal Embedding and Neural Machine Translation. 1381-1398
Microarchitectural Attacks
- Md. Mehedi Hasan, Biswajit Ray:
Data Recovery from "Scrubbed" NAND Flash Storage: Need for Analog Sanitization. 1399-1408 - R. Joseph Connor, Tyler McDaniel, Jared M. Smith, Max Schuchard:
PKU Pitfalls: Attacks on PKU-based Memory Isolation Systems. 1409-1426 - Daniel Moghimi, Moritz Lipp, Berk Sunar, Michael Schwarz:
Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis. 1427-1444 - Zijo Kenjar, Tommaso Frassetto, David Gens, Michael Franz, Ahmad-Reza Sadeghi:
V0LTpwn: Attacking x86 Processor Integrity from Software. 1445-1461 - Fan Yao, Adnan Siraj Rakin, Deliang Fan:
DeepHammer: Depleting the Intelligence of Deep Neural Networks through Targeted Chain of Bit Flips. 1463-1480 - Oleksii Oleksenko, Bohdan Trach, Mark Silberstein, Christof Fetzer:
SpecFuzz: Bringing Spectre-type vulnerabilities to the surface. 1481-1498
Panel
- Srdjan Capkun:
Digital Contact Tracing.
Financial Tech and Voting
- Renuka Kumar, Sreesh Kishore, Hao Lu, Atul Prakash:
Security Analysis of Unified Payments Interface and Payment Apps in India. 1499-1516 - Samin Yaseer Mahmud, Akhil Acharya, Benjamin Andow, William Enck, Bradley Reaves:
Cardpliance: PCI DSS Compliance of Android Applications. 1517-1533 - Michael A. Specter, James Koppel, Daniel J. Weitzner:
The Ballot is Busted Before the Blockchain: A Security Analysis of Voatz, the First Internet Voting Application Used in U.S. Federal Elections. 1535-1553 - Wouter Lueks, Iñigo Querejeta-Azurmendi, Carmela Troncoso:
VoteAgain: A scalable coercion-resistant voting system. 1553-1570 - Zain ul Abi Din, Hari Venugopalan, Jaime Park, Andy Li, Weisu Yin, Haohui Mai, Yong Jae Lee, Steven Liu, Samuel T. King:
Boxer: Preventing fraud by scanning credit cards. 1571-1588
Machine Learning 2
- Shawn Shan, Emily Wenger, Jiayun Zhang, Huiying Li, Haitao Zheng, Ben Y. Zhao:
Fawkes: Protecting Privacy against Unauthorized Deep Learning Models. 1589-1604 - Klas Leino, Matt Fredrikson:
Stolen Memories: Leveraging Model Memorization for Calibrated White-Box Membership Inference. 1605-1622 - Minghong Fang, Xiaoyu Cao, Jinyuan Jia, Neil Zhenqiang Gong:
Local Model Poisoning Attacks to Byzantine-Robust Federated Learning. 1605-1622 - Xudong Pan, Mi Zhang, Duocai Wu, Qifan Xiao, Shouling Ji, Min Yang:
Justinian's GAAvernor: Robust Distributed Learning with Gradient Aggregation Agent. 1641-1658 - Xinyang Zhang, Ningfei Wang, Hua Shen, Shouling Ji, Xiapu Luo, Ting Wang:
Interpretable Deep Learning under Fire. 1659-1676
Systems Security
- David Schrammel, Samuel Weiser, Stefan Steinegger, Martin Schwarzl, Michael Schwarz, Stefan Mangard, Daniel Gruss:
Donky: Domain Keys - Efficient In-Process Isolation for RISC-V and x86. 1677-1694 - Zeyu Mi, Dingji Li, Haibo Chen, Binyu Zang, Haibing Guan:
(Mostly) Exitless VM Protection from Untrusted Hypervisor through Disaggregated Nested Virtualization. 1695-1712 - Jake Christensen, Ionut Mugurel Anghel, Rob Taglang, Mihai Chiroiu, Radu Sion:
DECAF: Automatic, Adaptive De-bloating and Hardening of COTS Firmware. 1713-1730 - Daniel J. Bernstein, Tanja Lange:
McTiny: Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers. 1731-1748 - Seyedhamed Ghavamnia, Tapti Palit, Shachee Mishra, Michalis Polychronakis:
Temporal System Call Specialization for Attack Surface Reduction. 1749-1766
Analysis of Crypto
- Samuel Weiser, David Schrammel, Lukas Bodner, Raphael Spreitzer:
Big Numbers - Big Troubles: Systematically Analyzing Nonce Leakage in (EC)DSA Implementations. 1767-1784 - Arnis Parsovs:
Estonian Electronic Identity Card: Security Flaws in Key Management. 1785-1802 - Maik Ender, Amir Moradi, Christof Paar:
The Unpatchable Silicon: A Full Break of the Bitstream Encryption of Xilinx 7-Series FPGAs. 1803-1819 - Gabrielle Beck, Maximilian Zinkus, Matthew Green:
Automating the Development of Chosen Ciphertext Attacks. 1821-1837 - Gaëtan Leurent, Thomas Peyrin:
SHA-1 is a Shambles: First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust. 1839-1856 - Guillaume Girol, Lucca Hirschi, Ralf Sasse, Dennis Jackson, Cas Cremers, David A. Basin:
A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols. 1857-1874
Specific User Populations
- Daniel Votipka, Seth M. Rabin, Kristopher K. Micinski, Jeffrey S. Foster, Michelle L. Mazurek:
An Observational Investigation of Reverse Engineers' Processes. 1875-1892 - Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart:
The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums. 1893-1909 - Kasra Edalatnejad, Wouter Lueks, Julien Pierre Martin, Soline Ledésert, Anne L'Hôte, Bruno Thomas, Laurent Girod, Carmela Troncoso:
DatashareNetwork: A Decentralized Privacy-Preserving Search Engine for Investigative Journalists. 1911-1927 - Taslima Akter, Bryan Dosono, Tousif Ahmed, Apu Kapadia, Bryan C. Semaan:
"I am uncomfortable sharing what I can't see": Privacy Concerns of the Visually Impaired with Camera Based Assistive Applications. 1929-1948 - Jake Reichel, Fleming C. Peck, Mikako Inaba, Bisrat Moges, Brahmnoor Singh Chawla, Marshini Chetty:
'I have too much respect for my elders': Understanding South African Mobile Users' Perceptions of Privacy and Current Behaviors on Facebook and WhatsApp. 1949-1966
Side Channel Attacks
- Samira Briongos, Pedro Malagón, José Manuel Moya, Thomas Eisenbarth:
RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks. 1967-1984 - Tom van Goethem, Christina Pöpper, Wouter Joosen, Mathy Vanhoef:
Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections. 1985-2002 - Mengjia Yan, Christopher W. Fletcher, Josep Torrellas:
Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures. 2003-2020 - Cesar Pereida García, Sohaib ul Hassan, Nicola Tuveri, Iaroslav Gridin, Alejandro Cabrera Aldaya, Billy Bob Brumley:
Certified Side Channels. 2021-2038 - Jiarong Xing, Qiao Kang, Ang Chen:
NetWarden: Mitigating Network Covert Channels while Preserving Performance. 2039-2056 - Daniel Moghimi, Berk Sunar, Thomas Eisenbarth, Nadia Heninger:
TPM-FAIL: TPM meets Timing and Lattice Attacks. 2057-2073