- Xuan Feng, Xiaojing Liao, XiaoFeng Wang, Haining Wang, Qiang Li, Kai Yang, Hongsong Zhu, Limin Sun:
Understanding and Securing Device Vulnerabilities through Automated Bug Report Analysis. USENIX Security Symposium 2019: 887-903 - Felix Fischer, Huang Xiao, Ching-yu Kao, Yannick Stachelscheid, Benjamin Johnson, Danial Razar, Paul Fawkesley, Nat Buckley, Konstantin Böttinger, Paul Muntean, Jens Grossklags:
Stack Overflow Considered Helpful! Deep Learning Security Nudges Towards Stronger Cryptography. USENIX Security Symposium 2019: 339-356 - Andrea Gadotti, Florimond Houssiau, Luc Rocher, Benjamin Livshits, Yves-Alexandre de Montjoye:
When the Signal is in the Noise: Exploiting Diffix's Sticky Noise. USENIX Security Symposium 2019: 1081-1098 - Klaus von Gleissenthall, Rami Gökhan Kici, Deian Stefan, Ranjit Jhala:
IODINE: Verifying Constant-Time Execution of Hardware. USENIX Security Symposium 2019: 1411-1428 - Emre Güler, Cornelius Aschermann, Ali Abbasi, Thorsten Holz:
AntiFuzz: Impeding Fuzzing Audits of Binary Executables. USENIX Security Symposium 2019: 1931-1947 - Wenbo Guo
, Dongliang Mu, Xinyu Xing, Min Du, Dawn Song:
DEEPVSA: Facilitating Value-set Analysis with Deep Learning for Postmortem Program Analysis. USENIX Security Symposium 2019: 1787-1804 - Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, Thomas Ristenpart:
Clinical Computer Security for Victims of Intimate Partner Violence. USENIX Security Symposium 2019: 105-122 - Amber van der Heijden, Luca Allodi:
Cognitive Triaging of Phishing Attacks. USENIX Security Symposium 2019: 1309-1326 - Grant Ho, Asaf Cidon, Lior Gavish, Marco Schweighauser, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David A. Wagner:
Detecting and Characterizing Lateral Phishing at Scale. USENIX Security Symposium 2019: 1273-1290 - Sanghyun Hong, Pietro Frigo, Yigitcan Kaya, Cristiano Giuffrida, Tudor Dumitras:
Terminal Brain Damage: Exposing the Graceless Degradation in Deep Neural Networks Under Hardware Fault Attacks. USENIX Security Symposium 2019: 497-514 - Bing Huang, Alvaro A. Cárdenas, Ross Baldick:
Not Everything is Dark and Gloomy: Power Grid Protections Against IoT Demand Attacks. USENIX Security Symposium 2019: 1115-1132 - Saad Islam, Ahmad Moghimi, Ida Bruhns, Moritz Krebbel, Berk Gülmezoglu, Thomas Eisenbarth, Berk Sunar:
SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks. USENIX Security Symposium 2019: 621-637 - Rob Jansen, Tavish Vaidya, Micah Sherr:
Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor. USENIX Security Symposium 2019: 1823-1840 - Bargav Jayaraman, David Evans:
Evaluating Differentially Private Machine Learning in Practice. USENIX Security Symposium 2019: 1895-1912 - Jinho Jung, Hong Hu, David Solodukhin, Daniel Pagan, Kyu Hyung Lee, Taesoo Kim:
Fuzzification: Anti-Fuzzing Techniques. USENIX Security Symposium 2019: 1913-1930 - Daniel Kales, Christian Rechberger, Thomas Schneider, Matthias Senker, Christian Weinert:
Mobile Private Contact Discovery at Scale. USENIX Security Symposium 2019: 1447-1464 - Mustakimur Khandaker, Wenqing Liu, Abu Naser, Zhi Wang, Jie Yang:
Origin-sensitive Control Flow Integrity. USENIX Security Symposium 2019: 195-211 - Taegyu Kim, Chung Hwan Kim, Junghwan Rhee, Fan Fei, Zhan Tu, Gregory Walkup, Xiangyu Zhang, Xinyan Deng, Dongyan Xu:
RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through Control-Guided Testing. USENIX Security Symposium 2019: 425-442 - Amit Klein, Benny Pinkas:
From IP ID to Device ID and KASLR Bypass. USENIX Security Symposium 2019: 1063-1080 - Sekar Kulandaivel, Tushar Goyal, Arnav Kumar Agrawal, Vyas Sekar:
CANvas: Fast and Inexpensive Automotive Network Mapping. USENIX Security Symposium 2019: 389-405 - Sam Kumar, Yuncong Hu, Michael P. Andersen, Raluca Ada Popa, David E. Culler:
JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT. USENIX Security Symposium 2019: 1519-1536 - Deepak Kumar, Kelly Shen, Benton Case, Deepali Garg, Galina Alperovich, Dmitry Kuznetsov, Rajarshi Gupta, Zakir Durumeric:
All Things Considered: An Analysis of IoT Devices on Home Networks. USENIX Security Symposium 2019: 1169-1185 - Donghyun Kwon, Jangseop Shin, Giyeol Kim, Byoungyoung Lee, Yeongpil Cho, Yunheung Paek:
uXOM: Efficient eXecute-Only Memory on ARM Cortex-M. USENIX Security Symposium 2019: 231-247 - Yeonjoon Lee, Xueqiang Wang, Kwangwuk Lee, Xiaojing Liao, XiaoFeng Wang, Tongxin Li, Xianghang Mi:
Understanding iOS-based Crowdturfing Through Hidden UI Analysis. USENIX Security Symposium 2019: 765-781 - Hemi Leibowitz, Ania M. Piotrowska, George Danezis, Amir Herzberg:
No Right to Remain Silent: Isolating Malicious Mixes. USENIX Security Symposium 2019: 1841-1858 - Vector Guo Li, Matthew Dunn, Paul Pearce, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:
Reading the Tea leaves: A Comparative Analysis of Threat Intelligence. USENIX Security Symposium 2019: 851-867 - Shih-Wei Li, John S. Koh, Jason Nieh:
Protecting Cloud Virtual Machines from Hypervisor and Host Operating System Exploits. USENIX Security Symposium 2019: 1357-1374 - Mengyuan Li, Yinqian Zhang, Zhiqiang Lin, Yan Solihin:
Exploiting Unprotected I/O Operations in AMD's Secure Encrypted Virtualization. USENIX Security Symposium 2019: 1257-1272 - Hans Liljestrand, Thomas Nyman, Kui Wang, Carlos Chinea Perez, Jan-Erik Ekberg, N. Asokan:
PAC it up: Towards Pointer Integrity using ARM Pointer Authentication. USENIX Security Symposium 2019: 177-194 - Kangjie Lu, Aditya Pakki, Qiushi Wu:
Detecting Missing-Check Bugs via Semantic- and Context-Aware Criticalness and Constraints Inferences. USENIX Security Symposium 2019: 1769-1786