USENIX Security Symposium A*

160 papers

YearTitle / Authors
2020"I am uncomfortable sharing what I can't see": Privacy Concerns of the Visually Impaired with Camera Based Assistive Applications.
Taslima Akter, Bryan Dosono, Tousif Ahmed, Apu Kapadia, Bryan C. Semaan
2020'I have too much respect for my elders': Understanding South African Mobile Users' Perceptions of Privacy and Current Behaviors on Facebook and WhatsApp.
Jake Reichel, Fleming C. Peck, Mikako Inaba, Bisrat Moges, Brahmnoor Singh Chawla, Marshini Chetty
2020(Mostly) Exitless VM Protection from Untrusted Hypervisor through Disaggregated Nested Virtualization.
Zeyu Mi, Dingji Li, Haibo Chen, Binyu Zang, Haibing Guan
202029th USENIX Security Symposium, USENIX Security 2020, August 12-14, 2020
Srdjan Capkun, Franziska Roesner
2020A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web.
Elissa M. Redmiles, Noel Warford, Amritha Jayanti, Aravind Koneru, Sean Kross, Miraida Morales, Rock Stevens, Michelle L. Mazurek
2020A Formal Analysis of IEEE 802.11's WPA2: Countering the Kracks Caused by Cracking the Counters.
Cas Cremers, Benjamin Kiesl, Niklas Medinger
2020A Longitudinal and Comprehensive Study of the DANE Ecosystem in Email.
Hyeonmin Lee, Aniketh Gireesh, Roland van Rijswijk-Deij, Taekyoung Kwon, Taejoong Chung
2020A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols.
Guillaume Girol, Lucca Hirschi, Ralf Sasse, Dennis Jackson, Cas Cremers, David A. Basin
2020A Tale of Two Headers: A Formal Analysis of Inconsistent Click-Jacking Protection on the Web.
Stefano Calzavara, Sebastian Roth, Alvise Rabitti, Michael Backes, Ben Stock
2020A different cup of TI? The added value of commercial threat intelligence.
Xander Bouwman, Harm Griffioen, Jelle Egbers, Christian Doerr, Bram Klievink, Michel van Eeten
2020APEX: A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise.
Ivan De Oliveira Nunes, Karim Eldefrawy, Norrathep Rattanavipanon, Gene Tsudik
2020AURORA: Statistical Crash Analysis for Automated Root Cause Explanation.
Tim Blazytko, Moritz Schlögel, Cornelius Aschermann, Ali Abbasi, Joel Frank, Simon Wörner, Thorsten Holz
2020Achieving Keyless CDNs with Conclaves.
Stephen Herwig, Christina Garman, Dave Levin
2020Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheck.
Benjamin Andow, Samin Yaseer Mahmud, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, Serge Egelman
2020Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks in Machine Learning.
Erwin Quiring, David Klein, Daniel Arp, Martin Johns, Konrad Rieck
2020Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints.
Dokyung Song, Felicitas Hetzelt, Jonghwan Kim, Brent ByungHoon Kang, Jean-Pierre Seifert, Michael Franz
2020An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem.
Shunfan Zhou, Zhemin Yang, Jie Xiang, Yinzhi Cao, Min Yang, Yuan Zhang
2020An Observational Investigation of Reverse Engineers' Processes.
Daniel Votipka, Seth M. Rabin, Kristopher K. Micinski, Jeffrey S. Foster, Michelle L. Mazurek
2020An Off-Chip Attack on Hardware Enclaves via the Memory Bus.
Dayeol Lee, Dongha Jung, Ian T. Fang, Chia-Che Tsai, Raluca Ada Popa
2020Analysis of DTLS Implementations Using Protocol State Fuzzing.
Paul Fiterau-Brostean, Bengt Jonsson, Robert Merget, Joeri de Ruiter, Konstantinos Sagonas, Juraj Somorovsky
2020Automatic Hot Patch Generation for Android Kernels.
Zhengzi Xu, Yulong Zhang, Longri Zheng, Liangzhao Xia, Chenfu Bao, Zhi Wang, Yang Liu
2020Automatic Techniques to Systematically Discover New Heap Exploitation Primitives.
Insu Yun, Dhaval Kapil, Taesoo Kim
2020Automating the Development of Chosen Ciphertext Attacks.
Gabrielle Beck, Maximilian Zinkus, Matthew Green
2020BScout: Direct Whole Patch Presence Test for Java Executables.
Jiarun Dai, Yuan Zhang, Zheyue Jiang, Yingtian Zhou, Junyan Chen, Xinyu Xing, Xiaohan Zhang, Xin Tan, Min Yang, Zhemin Yang
2020BesFS: A POSIX Filesystem for Enclaves with a Mechanized Safety Proof.
Shweta Shinde, Shengyi Wang, Pinghai Yuan, Aquinas Hobor, Abhik Roychoudhury, Prateek Saxena
2020Big Numbers - Big Troubles: Systematically Analyzing Nonce Leakage in (EC)DSA Implementations.
Samuel Weiser, David Schrammel, Lukas Bodner, Raphael Spreitzer
2020BigMAC: Fine-Grained Policy Analysis of Android Firmware.
Grant Hernandez, Dave (Jing) Tian, Anurag Swarnim Yadav, Byron J. Williams, Kevin R. B. Butler
2020BlockSci: Design and applications of a blockchain analysis platform.
Harry A. Kalodner, Malte Möser, Kevin Lee, Steven Goldfeder, Martin Plattner, Alishah Chator, Arvind Narayanan
2020Boxer: Preventing fraud by scanning credit cards.
Zain ul Abi Din, Hari Venugopalan, Jaime Park, Andy Li, Weisu Yin, Haohui Mai, Yong Jae Lee, Steven Liu, Samuel T. King
2020Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks.
Yue Zhang, Jian Weng, Rajib Dey, Yier Jin, Zhiqiang Lin, Xinwen Fu
2020COUNTERFOIL: Verifying Provenance of Integrated Circuits using Intrinsic Package Fingerprints and Inexpensive Cameras.
Siva Nishok Dhanuskodi, Xiang Li, Daniel E. Holcomb
2020Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures.
Mengjia Yan, Christopher W. Fletcher, Josep Torrellas
2020Cached and Confused: Web Cache Deception in the Wild.
Seyed Ali Mirheidari, Sajjad Arshad, Kaan Onarlioglu, Bruno Crispo, Engin Kirda, William Robertson
2020Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE.
David Rupprecht, Katharina Kohls, Thorsten Holz, Christina Pöpper
2020Cardpliance: PCI DSS Compliance of Android Applications.
Samin Yaseer Mahmud, Akhil Acharya, Benjamin Andow, William Enck, Bradley Reaves
2020Certified Side Channels.
Cesar Pereida García, Sohaib ul Hassan, Nicola Tuveri, Iaroslav Gridin, Alejandro Cabrera Aldaya, Billy Bob Brumley
2020Chaperone: Real-time Locking and Loss Prevention for Smartphones.
Jiayi Chen, Urs Hengartner, Hassan Khan, Mohammad Mannan
2020Civet: An Efficient Java Partitioning Framework for Hardware Enclaves.
Chia-Che Tsai, Jeongseok Son, Bhushan Jain, John McAvey, Raluca Ada Popa, Donald E. Porter
2020Composition Kills: A Case Study of Email Sender Authentication.
Jianjun Chen, Vern Paxson, Jian Jiang
2020CopyCat: Controlled Instruction-Level Attacks on Enclaves.
Daniel Moghimi, Jo Van Bulck, Nadia Heninger, Frank Piessens, Berk Sunar
2020DECAF: Automatic, Adaptive De-bloating and Hardening of COTS Firmware.
Jake Christensen, Ionut Mugurel Anghel, Rob Taglang, Mihai Chiroiu, Radu Sion
2020DELF: Safeguarding deletion correctness in Online Social Networks.
Katriel Cohn-Gordon, Georgios Damaskinos, Divino Neto, Joshi Cordova, Benoît Reitz, Benjamin Strahs, Daniel Obenshain, Paul Pearce, Ioannis Papagiannis, Available Media
2020Data Recovery from "Scrubbed" NAND Flash Storage: Need for Analog Sanitization.
Md. Mehedi Hasan, Biswajit Ray
2020Datalog Disassembly.
Antonio Flores-Montoya, Eric M. Schulte
2020DatashareNetwork: A Decentralized Privacy-Preserving Search Engine for Investigative Journalists.
Kasra Edalatnejad, Wouter Lueks, Julien Pierre Martin, Soline Ledésert, Anne L'Hôte, Bruno Thomas, Laurent Girod, Carmela Troncoso
2020DeepHammer: Depleting the Intelligence of Deep Neural Networks through Targeted Chain of Bit Flips.
Fan Yao, Adnan Siraj Rakin, Deliang Fan
2020Delphi: A Cryptographic Inference Service for Neural Networks.
Pratyush Mishra, Ryan Lehmkuhl, Akshayaram Srinivasan, Wenting Zheng, Raluca Ada Popa
2020Detecting Stuffing of a User's Credentials at Her Own Accounts.
Ke Coby Wang, Michael K. Reiter
2020Devil's Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices.
Yuxuan Chen, Xuejing Yuan, Jiangshan Zhang, Yue Zhao, Shengzhi Zhang, Kai Chen, Xiaofeng Wang
2020Differentially-Private Control-Flow Node Coverage for Software Usage Analysis.
Hailong Zhang, Sufian Latif, Raef Bassily, Atanas Rountev
2020Digital Contact Tracing.
Srdjan Capkun
2020Donky: Domain Keys - Efficient In-Process Isolation for RISC-V and x86.
David Schrammel, Samuel Weiser, Stefan Steinegger, Martin Schwarzl, Michael Schwarz, Stefan Mangard, Daniel Gruss
2020Drift with Devil: Security of Multi-Sensor Fusion based Localization in High-Level Autonomous Driving under GPS Spoofing.
Junjie Shen, Jun Yeon Won, Zeyuan Chen, Qi Alfred Chen
2020Droplet: Decentralized Authorization and Access Control for Encrypted Data Streams.
Hossein Shafagh, Lukas Burkhalter, Sylvia Ratnasamy, Anwar Hithnawi
2020EPIC: Every Packet Is Checked in the Data Plane of a Path-Aware Internet.
Markus Legner, Tobias Klenze, Marc Wyss, Christoph Sprenger, Adrian Perrig
2020ETHBMC: A Bounded Model Checker for Smart Contracts.
Joel Frank, Cornelius Aschermann, Thorsten Holz
2020EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed Bandit.
Tai Yue, Pengfei Wang, Yong Tang, Enze Wang, Bo Yu, Kai Lu, Xu Zhou
2020Empirical Measurement of Systemic 2FA Usability.
Joshua Reynolds, Nikita Samarin, Joseph D. Barnes, Taylor Judd, Joshua Mason, Michael D. Bailey, Serge Egelman
2020Estonian Electronic Identity Card: Security Flaws in Key Management.
Arnis Parsovs
2020Everything Old is New Again: Binary Security of WebAssembly.
Daniel Lehmann, Johannes Kinder, Michael Pradel
2020Exploring Connections Between Active Learning and Model Extraction.
Varun Chandrasekaran, Kamalika Chaudhuri, Irene Giacomelli, Somesh Jha, Songbai Yan
2020FANS: Fuzzing Android Native System Services via Automated Interface Analysis.
Baozheng Liu, Chao Zhang, Guang Gong, Yishun Zeng, Haifeng Ruan, Jianwei Zhuge
2020FIRMSCOPE: Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware.
Mohamed Elsabagh, Ryan Johnson, Angelos Stavrou, Chaoshun Zuo, Qingchuan Zhao, Zhiqiang Lin
2020Fawkes: Protecting Privacy against Unauthorized Deep Learning Models.
Shawn Shan, Emily Wenger, Jiayun Zhang, Huiying Li, Haitao Zheng, Ben Y. Zhao
2020Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets.
Jan Ruge, Jiska Classen, Francesco Gringoli, Matthias Hollick
2020From Control Model to Program: Investigating Robotic Aerial Vehicle Accidents with MAYDAY.
Taegyu Kim, Chung Hwan Kim, Altay Ozen, Fan Fei, Zhan Tu, Xiangyu Zhang, Xinyan Deng, Dave (Jing) Tian, Dongyan Xu
2020From Needs to Actions to Secure Apps? The Effect of Requirements and Developer Practices on App Security.
Charles Weir, Ben Hermann, Sascha Fahl
2020FuzzGen: Automatic Fuzzer Generation.
Kyriakos K. Ispoglou, Daniel Austin, Vishwath Mohan, Mathias Payer
2020FuzzGuard: Filtering out Unreachable Inputs in Directed Grey-box Fuzzing through Deep Learning.
Peiyuan Zong, Tao Lv, Dawei Wang, Zizhuang Deng, Ruigang Liang, Kai Chen
2020Fuzzing Error Handling Code using Context-Sensitive Software Fault Injection.
Zu-Ming Jiang, Jia-Ju Bai, Kangjie Lu, Shi-Min Hu
2020GREYONE: Data Flow Sensitive Fuzzing.
Shuitao Gan, Chao Zhang, Peng Chen, Bodong Zhao, Xiaojun Qin, Dong Wu, Zuoning Chen
2020HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation.
Abraham A. Clements, Eric Gustafson, Tobias Scharnowski, Paul Grosen, David Fritz, Christopher Kruegel, Giovanni Vigna, Saurabh Bagchi, Mathias Payer
2020Hall Spoofing: A Non-Invasive DoS Attack on Grid-Tied Solar Inverter.
Anomadarshi Barua, Mohammad Abdullah Al Faruque
2020High Accuracy and High Fidelity Extraction of Neural Networks.
Matthew Jagielski, Nicholas Carlini, David Berthelot, Alex Kurakin, Nicolas Papernot
2020Horizontal Privilege Escalation in Trusted Applications.
Darius Suciu, Stephen E. McLaughlin, Laurent Simon, Radu Sion
2020Human Distinguishable Visual Key Fingerprints.
Mozhgan Azimpourkivi, Umut Topkara, Bogdan Carbunar
2020HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments.
Ghada Dessouky, Tommaso Frassetto, Ahmad-Reza Sadeghi
2020Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries.
Fnu Suya, Jianfeng Chi, David Evans, Yuan Tian
2020Interpretable Deep Learning under Fire.
Xinyang Zhang, Ningfei Wang, Hua Shen, Shouling Ji, Xiapu Luo, Ting Wang
2020Justinian's GAAvernor: Robust Distributed Learning with Gradient Aggregation Agent.
Xudong Pan, Mi Zhang, Duocai Wu, Qifan Xiao, Shouling Ji, Min Yang
2020KOOBE: Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities.
Weiteng Chen, Xiaochen Zou, Guoren Li, Zhiyun Qian
2020Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems.
Takeshi Sugawara, Benjamin Cyr, Sara Rampazzi, Daniel Genkin, Kevin Fu
2020Liveness is Not Enough: Enhancing Fingerprint Authentication with Behavioral Biometrics to Defeat Puppet Attacks.
Cong Wu, Kun He, Jing Chen, Ziming Zhao, Ruiying Du
2020Local Model Poisoning Attacks to Byzantine-Robust Federated Learning.
Minghong Fang, Xiaoyu Cao, Jinyuan Jia, Neil Zhenqiang Gong
2020MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs.
Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Dawn Song
2020MUZZ: Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded Programs.
Hongxu Chen, Shengjian Guo, Yinxing Xue, Yulei Sui, Cen Zhang, Yuekang Li, Haijun Wang, Yang Liu
2020MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures.
Yang Xiao, Bihuan Chen, Chendong Yu, Zhengzi Xu, Zimu Yuan, Feng Li, Binghong Liu, Yang Liu, Wei Huo, Wei Zou, Wenchang Shi
2020McTiny: Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers.
Daniel J. Bernstein, Tanja Lange
2020Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines.
Shuofei Zhu, Jianjun Shi, Limin Yang, Boqin Qin, Ziyi Zhang, Linhai Song, Gang Wang
2020Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis.
Daniel Moghimi, Moritz Lipp, Berk Sunar, Michael Schwarz
2020Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer.
Suyoung Lee, HyungSeok Han, Sang Kil Cha, Sooel Son
2020NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities.
Yehuda Afek, Anat Bremler-Barr, Lior Shafir
2020NetWarden: Mitigating Network Covert Channels while Preserving Performance.
Jiarong Xing, Qiao Kang, Ang Chen
2020On Training Robust PDF Malware Classifiers.
Yizheng Chen, Shiqi Wang, Dongdong She, Suman Jana
2020P2IM: Scalable and Hardware-independent Firmware Testing via Automatic Peripheral Interface Modeling.
Bo Feng, Alejandro Mera, Long Lu
2020PARTEMU: Enabling Dynamic Analysis of Real-World TrustZone Software Using Emulation.
Lee Harrison, Hayawardh Vijayakumar, Rohan Padhye, Koushik Sen, Michael Grace
2020PCKV: Locally Differentially Private Correlated Key-Value Data Collection with Optimized Utility.
Xiaolan Gu, Ming Li, Yueqiang Cheng, Li Xiong, Yang Cao
2020PHMon: A Programmable Hardware Monitor and Its Security Use Cases.
Leila Delshadtehrani, Sadullah Canakci, Boyou Zhou, Schuyler Eldridge, Ajay Joshi, Manuel Egele
2020PKU Pitfalls: Attacks on PKU-based Memory Isolation Systems.
R. Joseph Connor, Tyler McDaniel, Jared M. Smith, Max Schuchard
2020Pancake: Frequency Smoothing for Encrypted Data Stores.
Paul Grubbs, Anurag Khandelwal, Marie-Sarah Lacharité, Lloyd Brown, Lucy Li, Rachit Agarwal, Thomas Ristenpart
2020ParmeSan: Sanitizer-guided Greybox Fuzzing.
Sebastian Österlund, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida
2020PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists.
Adam Oest, Yeganeh Safaei, Penghui Zhang, Brad Wardman, Kevin Tyers, Yan Shoshitaishvili, Adam Doupé
2020Pixel: Multi-signatures for Consensus.
Manu Drijvers, Sergey Gorbunov, Gregory Neven, Hoeteck Wee
2020Plug-N-Pwned: Comprehensive Vulnerability Analysis of OBD-II Dongles as A New Over-the-Air Attack Surface in Automotive IoT.
Haohuang Wen, Qi Alfred Chen, Zhiqiang Lin
2020Poison Over Troubled Forwarders: A Cache Poisoning Attack Targeting DNS Forwarding Devices.
Xiaofeng Zheng, Chaoyi Lu, Jian Peng, Qiushi Yang, Dongjie Zhou, Baojun Liu, Keyu Man, Shuang Hao, Haixin Duan, Zhiyun Qian
2020Preech: A System for Privacy-Preserving Speech Transcription.
Shimaa Ahmed, Amrita Roy Chowdhury, Kassem Fawaz, Parmesh Ramanathan
2020Programmable In-Network Security for Context-aware BYOD Policies.
Qiao Kang, Lei Xue, Adam Morrison, Yuxin Tang, Ang Chen, Xiapu Luo
2020RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks.
Samira Briongos, Pedro Malagón, José Manuel Moya, Thomas Eisenbarth
2020Remote Side-Channel Attacks on Anonymous Transactions.
Florian Tramèr, Dan Boneh, Kenny Paterson
2020Retrofitting Fine Grain Isolation in the Firefox Renderer.
Shravan Narayan, Craig Disselkoen, Tal Garfinkel, Nathan Froyd, Eric Rahm, Sorin Lerner, Hovav Shacham, Deian Stefan
2020SANNS: Scaling Up Secure Approximate k-Nearest Neighbors Search.
Hao Chen, Ilaria Chillotti, Yihe Dong, Oxana Poburinnaya, Ilya P. Razenshteyn, M. Sadegh Riazi
2020SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants.
Raul Quinonez, Jairo Giraldo, Luis E. Salazar, Erick Bauman, Alvaro A. Cárdenas, Zhiqiang Lin
2020SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage.
Ioannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou, Saurabh Shintre
2020SENG, the SGX-Enforcing Network Gateway: Authorizing Communication from Shielded Clients.
Fabian Schwarz, Christian Rossow
2020SHA-1 is a Shambles: First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust.
Gaëtan Leurent, Thomas Peyrin
2020Scaling Verifiable Computation Using Efficient Set Accumulators.
Alex Ozdemir, Riad S. Wahby, Barry Whitehat, Dan Boneh
2020Secure Multi-party Computation of Differentially Private Median.
Jonas Böhler, Florian Kerschbaum
2020Secure parallel computation on national scale volumes of data.
Sahar Mazloom, Phi Hung Le, Samuel Ranellucci, S. Dov Gordon
2020Security Analysis of Unified Payments Interface and Payment Apps in India.
Renuka Kumar, Sreesh Kishore, Hao Lu, Atul Prakash
2020See No Evil: Phishing for Permissions with False Transparency.
Güliz Seray Tuncay, Jingyu Qian, Carl A. Gunter
2020ShadowMove: A Stealthy Lateral Movement Strategy.
Amirreza Niakanlahiji, Jinpeng Wei, Md Rabbi Alam, Qingyang Wang, Bei-Tseng Chu
2020Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation.
Bin Yuan, Yan Jia, Luyi Xing, Dongfang Zhao, Xiaofeng Wang, Deqing Zou, Hai Jin, Yuqing Zhang
2020Shim Shimmeny: Evaluating the Security and Privacy Contributions of Link Shimming in the Modern Web.
Frank Li
2020Silhouette: Efficient Protected Shadow Stacks for Embedded Systems.
Jie Zhou, Yufei Du, Zhuojia Shen, Lele Ma, John Criswell, Robert J. Walls
2020SkillExplorer: Understanding the Behavior of Skills in Large Scale.
Zhixiu Guo, Zijin Lin, Pan Li, Kai Chen
2020SmartVerif: Push the Limit of Automation Capability of Verifying Security Protocols by Dynamic Strategies.
Yan Xiong, Cheng Su, Wenchao Huang, Fuyou Miao, Wansen Wang, Hengyi Ouyang
2020SpecFuzz: Bringing Spectre-type vulnerabilities to the surface.
Oleksii Oleksenko, Bohdan Trach, Mark Silberstein, Christof Fetzer
2020Stealthy Tracking of Autonomous Vehicles with Cache Side Channels.
Mulong Luo, Andrew C. Myers, G. Edward Suh
2020Stolen Memories: Leveraging Model Memorization for Calibrated White-Box Membership Inference.
Klas Leino, Matt Fredrikson
2020Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale.
Adam Oest, Penghui Zhang, Brad Wardman, Eric Nunes, Jakub Burgis, Ali Zand, Kurt Thomas, Adam Doupé, Gail-Joon Ahn
2020Symbolic execution with SymCC: Don't interpret, compile!
Sebastian Poeplau, Aurélien Francillon
2020Sys: A Static/Symbolic Tool for Finding Good Bugs in Good (Browser) Code.
Fraser Brown, Deian Stefan, Dawson R. Engler
2020TPM-FAIL: TPM meets Timing and Lattice Attacks.
Daniel Moghimi, Berk Sunar, Thomas Eisenbarth, Nadia Heninger
2020TXSPECTOR: Uncovering Attacks in Ethereum from Transactions.
Mengya Zhang, Xiaokuan Zhang, Yinqian Zhang, Zhiqiang Lin
2020TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves.
Tobias Cloosters, Michael Rodler, Lucas Davi
2020Temporal System Call Specialization for Attack Surface Reduction.
Seyedhamed Ghavamnia, Tapti Palit, Shachee Mishra, Michalis Polychronakis
2020TextShield: Robust Text Classification Based on Multimodal Embedding and Neural Machine Translation.
Jinfeng Li, Tianyu Du, Shouling Ji, Rong Zhang, Quan Lu, Min Yang, Ting Wang
2020That Was Then, This Is Now: A Security Evaluation of Password Generation, Storage, and Autofill in Browser-Based Password Managers.
Sean Oesch, Scott Ruoti
2020The 2020 Election: Remote Voting, Disinformation, and Audit.
Avi Rubin
2020The Ballot is Busted Before the Blockchain: A Security Analysis of Voatz, the First Internet Voting Application Used in U.S. Federal Elections.
Michael A. Specter, James Koppel, Daniel J. Weitzner
2020The Impact of Ad-Blockers on Product Search and Purchase Behavior: A Lab Experiment.
Alisa Frik, Amelia Haviland, Alessandro Acquisti
2020The Industrial Age of Hacking.
Timothy Nosco, Jared Ziegler, Zechariah Clark, Davy Marrero, Todd Finkler, Andrew Barbarello, W. Michael Petullo
2020The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums.
Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart
2020The Unpatchable Silicon: A Full Break of the Bitstream Encryption of Xilinx 7-Series FPGAs.
Maik Ender, Amir Moradi, Christof Paar
2020Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections.
Tom van Goethem, Christina Pöpper, Wouter Joosen, Mathy Vanhoef
2020Towards HTTPS Everywhere on Android: We Are Not There Yet.
Andrea Possemato, Yanick Fratantonio
2020Towards Robust LiDAR-based Perception in Autonomous Driving: General Black-box Adversarial Sensor Attack and Countermeasures.
Jiachen Sun, Yulong Cao, Qi Alfred Chen, Z. Morley Mao
2020USBFuzz: A Framework for Fuzzing USB Drivers by Device Emulation.
Hui Peng, Mathias Payer
2020Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It.
Daniel Votipka, Kelsey R. Fulton, James Parker, Matthew Hou, Michelle L. Mazurek, Michael Hicks
2020Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning.
Ahmed Salem, Apratim Bhattacharya, Michael Backes, Mario Fritz, Yang Zhang
2020V0LTpwn: Attacking x86 Processor Integrity from Software.
Zijo Kenjar, Tommaso Frassetto, David Gens, Michael Franz, Ahmad-Reza Sadeghi
2020Visor: Privacy-Preserving Video Analytics as a Cloud Service.
Rishabh Poddar, Ganesh Ananthanarayanan, Srinath T. V. Setty, Stavros Volos, Raluca Ada Popa
2020Void: A fast and light voice liveness detection system.
Muhammad Ejaz Ahmed, Il-Youp Kwak, Jun Ho Huh, Iljoo Kim, Taekkyung Oh, Hyoungshick Kim
2020VoteAgain: A scalable coercion-resistant voting system.
Wouter Lueks, Iñigo Querejeta-Azurmendi, Carmela Troncoso
2020Walking Onions: Scaling Anonymity Networks while Protecting Users.
Chelsea Komlo, Nick Mathewson, Ian Goldberg
2020What Twitter Knows: Characterizing Ad Targeting Practices, User Perceptions, and Ad Explanations Through Users' Own Twitter Data.
Miranda Wei, Madison Stamos, Sophie Veys, Nathan Reitinger, Justin Goodman, Margot Herman, Dorota Filipczuk, Ben Weinshel, Michelle L. Mazurek, Blase Ur
2020Who's Calling? Characterizing Robocalls through Audio and Metadata Analysis.
Sathvik Prasad, Elijah Robert Bouma-Sims, Athishay Kiran Mylappan, Bradley Reaves
2020You Are What You Broadcast: Identification of Mobile and IoT Devices from (Public) WiFi.
Lingjing Yu, Bo Luo, Jun Ma, Zhaoyu Zhou, Qingyun Liu
2020Zero-delay Lightweight Defenses against Website Fingerprinting.
Jiajun Gong, Tao Wang
2020iOS, Your OS, Everybody's OS: Vetting and Analyzing Network Services of iOS Applications.
Zhushou Tang, Ke Tang, Minhui Xue, Yuan Tian, Sen Chen, Muhammad Ikram, Tielei Wang, Haojin Zhu