Home
Papertalks
About
Help
Improve
Upload
Login
Register
Login Required
×
You have to login to use this feature.
USENIX_Security
Member since:
2021-01-03
Last seen:
2021-01-07
User details
Name:
USENIX Security Symposium
Affiliation:
USENIX: The Advanced Computing Systems Association
Website:
https://www.usenix.org/
About me:
USENIX Security brings together researchers, practitioners, system administrators, system programmers, and others to share and explore the latest advances in the security and privacy of computer systems and networks.
Papertalks of USENIX_Security
12/08/2020
A Formal Analysis of IEEE 802.11's WPA2: Countering the Kracks Caused by Cracking the Counters
Cas Cremers
,
Benjamin Kiesl
,
Niklas Medinger
Keywords
Abstract
Paper
11:41
12/08/2020
Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets
Jan Ruge
,
Jiska Classen
,
Francesco Gringoli
,
Matthias Hollick
Keywords
Abstract
Paper
12:24
12/08/2020
Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks
Yue Zhang
,
Jian Weng
,
Rajib Dey
and
Yier Jin
,
Zhiqiang Lin
,
Xinwen Fu
Keywords
Abstract
Paper
12:12
12/08/2020
You Are What You Broadcast: Identification of Mobile and IoT Devices from (Public) WiFi
Lingjing Yu
,
Bo Luo
,
Jun Ma
and
Zhaoyu Zhou
,
Qingyun Liu
Keywords
Abstract
Paper
11:12
12/08/2020
Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE
David Rupprecht
,
Katharina Kohls
,
Thorsten Holz
,
Christina Pöpper
Keywords
Abstract
Paper
12:27
12/08/2020
A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web
Elissa M. Redmiles
,
Noel Warford
,
Amritha Jayanti
and
Aravind Koneru
,
Sean Kross
,
Miraida Morales
,
Rock Stevens
,
Michelle L. Mazurek
Keywords
Abstract
Paper
13:05
12/08/2020
Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It
Daniel Votipka
,
Kelsey R. Fulton
,
James Parker
and
Matthew Hou
,
Michelle L. Mazurek
,
Michael Hicks
Keywords
Abstract
Paper
12:07
12/08/2020
Empirical Measurement of Systemic 2FA Usability
Joshua Reynolds
,
Nikita Samarin
,
Joseph Barnes
and
Taylor Judd
,
Joshua Mason
,
Michael Bailey
,
Serge Egelman
Keywords
Abstract
Paper
10:48
12/08/2020
What Twitter Knows: Characterizing Ad Targeting Practices, User Perceptions, and Ad Explanations Through Users' Own Twitter Data
Miranda Wei
,
Madison Stamos
,
Sophie Veys
and
Nathan Reitinger
,
Justin Goodman
,
Margot Herman
,
Dorota Filipczuk
,
Ben Weinshel
,
Michelle L. Mazurek
,
Blase Ur
Keywords
Abstract
Paper
12:16
12/08/2020
The Impact of Ad-Blockers on Product Search and Purchase Behavior: A Lab Experiment
Alisa Frik
,
Amelia Haviland
,
Alessandro Acquisti
Keywords
Abstract
Paper
12:21
12/08/2020
Symbolic execution with SymCC: Don't interpret, compile!
Sebastian Poeplau
,
Aurélien Francillon
Keywords
Abstract
Paper
11:08
12/08/2020
Sys: A Static/Symbolic Tool for Finding Good Bugs in Good (Browser) Code
Fraser Brown
,
Deian Stefan
,
Dawson Engler
Keywords
Abstract
Paper
11:57
12/08/2020
Everything Old is New Again: Binary Security of WebAssembly
Daniel Lehmann
,
Johannes Kinder
,
Michael Pradel
Keywords
Abstract
Paper
12:11
12/08/2020
AURORA: Statistical Crash Analysis for Automated Root Cause Explanation
Tim Blazytko
,
Moritz Schlögel
,
Cornelius Aschermann
and
Ali Abbasi
,
Joel Frank
,
Simon Wörner
,
Thorsten Holz
Keywords
Abstract
Paper
11:56
12/08/2020
SmartVerif: Push the Limit of Automation Capability of Verifying Security Protocols by Dynamic Strategies
Yan Xiong
,
Cheng Su
,
Wenchao Huang
and
Fuyou Miao
,
Wansen Wang
,
Hengyi Ouyang
Keywords
Abstract
Paper
11:18
12/08/2020
BigMAC: Fine-Grained Policy Analysis of Android Firmware
Grant Hernandez
,
Dave (Jing) Tian
,
Anurag Swarnim Yadav
and
Byron J. Williams
,
Kevin R.B. Butler
Keywords
Abstract
Paper
11:35
12/08/2020
From Needs to Actions to Secure Apps? The Effect of Requirements and Developer Practices on App Security
Charles Weir
,
Ben Hermann
,
Sascha Fahl
Keywords
Abstract
Paper
11:11
12/08/2020
FANS: Fuzzing Android Native System Services via Automated Interface Analysis
Baozheng Liu
,
Chao Zhang
,
Guang Gong
and
Yishun Zeng
,
Haifeng Ruan
,
Jianwei Zhuge
Keywords
Abstract
Paper
12:17
12/08/2020
Chaperone: Real-time Locking and Loss Prevention for Smartphones
Jiayi Chen
,
Urs Hengartner
,
Hassan Khan
,
Mohammad Mannan
Keywords
Abstract
Paper
11:28
12/08/2020
Towards HTTPS Everywhere on Android: We Are Not There Yet
Andrea Possemato
,
Yanick Fratantonio
Keywords
Abstract
Paper
13:02
12/08/2020
Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale
Adam Oest
,
Penghui Zhang
,
Brad Wardman
and
Eric Nunes
,
Jakub Burgis
,
Ali Zand
,
Kurt Thomas
,
Adam Doupé
,
Gail-Joon Ahn
Keywords
Abstract
Paper
12:34
12/08/2020
PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists
Adam Oest
,
Yeganeh Safaei
,
Penghui Zhang
and
Brad Wardman
,
Kevin Tyers
,
Yan Shoshitaishvili
,
Adam Doupé
,
Gail-Joon Ahn
Keywords
Abstract
Paper
12:40
12/08/2020
Who's Calling? Characterizing Robocalls through Audio and Metadata Analysis
Sathvik Prasad
,
Elijah Bouma-Sims
,
Athishay Kiran Mylappan
,
Bradley Reaves
Keywords
Abstract
Paper
11:08
12/08/2020
See No Evil: Phishing for Permissions with False Transparency
Güliz Seray Tuncay
,
Jingyu Qian
,
Carl A. Gunter
Keywords
Abstract
Paper
12:45
12/08/2020
A different cup of TI? The added value of commercial threat intelligence
Xander Bouwman
,
Harm Griffioen
,
Jelle Egbers
and
Christian Doerr
,
Bram Klievink
,
Michel van Eeten
Keywords
Abstract
Paper
12:40
12/08/2020
HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments
Ghada Dessouky
,
Tommaso Frassetto
,
Ahmad-Reza Sadeghi
Keywords
Abstract
Paper
13:40
12/08/2020
CopyCat: Controlled Instruction-Level Attacks on Enclaves
Daniel Moghimi
,
Jo Van Bulck
,
Nadia Heninger
and
Frank Piessens
,
Berk Sunar
Keywords
Abstract
Paper
12:15
12/08/2020
An Off-Chip Attack on Hardware Enclaves via the Memory Bus
Dayeol Lee
,
Dongha Jung
,
Ian T. Fang
and
Chia-Che Tsai
,
Raluca Ada Popa
Keywords
Abstract
Paper
12:13
12/08/2020
Civet: An Efficient Java Partitioning Framework for Hardware Enclaves
Chia-Che Tsai
,
Jeongseok Son
,
Bhushan Jain
and
John McAvey
,
Raluca Ada Popa
,
Donald E. Porter
Keywords
Abstract
Paper
10:57
12/08/2020
BesFS: A POSIX Filesystem for Enclaves with a Mechanized Safety Proof
Shweta Shinde
,
Shengyi Wang
,
Pinghai Yuan
and
Aquinas Hobor
,
Abhik Roychoudhury
,
Prateek Saxena
Keywords
Abstract
Paper
11:34
12/08/2020
EPIC: Every Packet Is Checked in the Data Plane of a Path-Aware Internet
Markus Legner
,
Tobias Klenze
,
Marc Wyss
and
Christoph Sprenger
,
Adrian Perrig
Keywords
Abstract
Paper
10:38
12/08/2020
ShadowMove: A Stealthy Lateral Movement Strategy
Amirreza Niakanlahiji
,
Jinpeng Wei
,
Md Rabbi Alam
and
Qingyang Wang
,
Bei-Tseng Chu
Keywords
Abstract
Paper
11:31
12/08/2020
Poison Over Troubled Forwarders: A Cache Poisoning Attack Targeting DNS Forwarding Devices
Xiaofeng Zheng
,
Chaoyi Lu
,
Jian Peng
and
Qiushi Yang
,
Dongjie Zhou
,
Baojun Liu
,
Keyu Man
,
Shuang Hao
,
Haixin Duan
,
Zhiyun Qian
Keywords
Abstract
Paper
10:05
12/08/2020
Programmable In-Network Security for Context-aware BYOD Policies
Qiao Kang
,
Lei Xue
,
Adam Morrison
and
Yuxin Tang
,
Ang Chen
,
Xiapu Luo
Keywords
Abstract
Paper
12:31
12/08/2020
A Longitudinal and Comprehensive Study of the DANE Ecosystem in Email
Hyeonmin Lee
,
Aniketh Gireesh
,
Rolvan Rijswijk-Deij
and
Taekyoung "Ted" Kwon
,
Taejoong Chung
Keywords
Abstract
Paper
12:37
12/08/2020
NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities
Yehuda Afek
,
Anat Bremler-Barr
,
Lior Shafir
Keywords
Abstract
Paper
12:00
12/08/2020
Shim Shimmeny: Evaluating the Security and Privacy Contributions of Link Shimming in the Modern Web
Frank Li
Keywords
Abstract
Paper
12:24
12/08/2020
Cached and Confused: Web Cache Deception in the Wild
Seyed Ali Mirheidari
,
Sajjad Arshad
,
Kaan Onarlioglu
and
Bruno Crispo
,
Engin Kirda
,
William Robertson
Keywords
Abstract
Paper
11:22
12/08/2020
A Tale of Two Headers: A Formal Analysis of Inconsistent Click-Jacking Protection on the Web
Stefano Calzavara
,
Sebastian Roth
,
Alvise Rabitti
and
Michael Backes
,
Ben Stock
Keywords
Abstract
Paper
12:00
12/08/2020
Retrofitting Fine Grain Isolation in the Firefox Renderer
Shravan Narayan
,
Craig Disselkoen
,
Tal Garfinkel
and
Nathan Froyd
,
Eric Rahm
,
Sorin Lerner
,
Hovav Shacham
,
Deian Stefan
Keywords
Abstract
Paper
11:12
«
1
2
3
4
»