The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "USENIX Security Symposium"( http://dblp.L3S.de/Venues/USENIX_Security_Symposium )

URL (DBLP): http://dblp.uni-trier.de/db/conf/uss

Publication years (Num. hits)
1993 (15) 1995 (23) 1996-1998 (33) 1999 (19) 2000 (21) 2001 (26) 2002 (23) 2003 (22) 2004 (33) 2005 (23) 2006 (23) 2007 (24) 2008 (28) 2009 (27) 2010 (31) 2011 (36) 2012 (44) 2013 (46) 2014 (68) 2015 (68) 2016 (73) 2017 (86) 2018 (102)
Publication types (Num. hits)
inproceedings(870) proceedings(24)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 894 publication records. Showing 894 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Ashton Webster, Ryan Eckenrod, James Purtilo Fast and Service-preserving Recovery from Malware Infections Using CRIU. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Yi Zhou, Deepak Kumar, Surya Bakshi, Joshua Mason, Andrew Miller, Michael Bailey Erays: Reverse Engineering Ethereum's Opaque Smart Contracts. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Wei Meng 0001, Chenxiong Qian, Shuang Hao, Kevin Borgolte, Giovanni Vigna, Christopher Kruegel, Wenke Lee Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Moritz Eckert, Antonio Bianchi, Ruoyu Wang 0001, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Ingolf Becker, Simon Parkin, M. Angela Sasse The Rewards and Costs of Stronger Passwords in a University: Linking Password Lifetime to Strength. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Antoine Vastel, Pierre Laperdrix, Walter Rudametkin, Romain Rouvoy Fp-Scanner: The Privacy Implications of Browser Fingerprint Inconsistencies. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Chiraag Juvekar, Vinod Vaikuntanathan, Anantha Chandrakasan GAZELLE: A Low Latency Framework for Secure Neural Network Inference. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Samuel Schüppen, Dominik Teubert, Patrick Herrmann, Ulrike Meyer FANCI : Feature-based Automated NXDomain Classification and Intelligence. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Seunghun Han, Wook Shin, Jun-Hyeok Park, Hyoung-Chun Kim A Bad Dream: Subverting Trusted Platform Module While You Are Sleeping. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Anh Quach, Aravind Prakash, Lok-Kwong Yan Debloating Software through Piece-Wise Compilation and Loading. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Ronghai Yang, Wing Cheong Lau, Jiongyi Chen, Kehuan Zhang Vetting Single Sign-On SDK Implementations via Symbolic Reasoning. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Hamza Harkous, Kassem Fawaz, Rémi Lebret, Florian Schaub, Kang G. Shin, Karl Aberer Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Andrea Biondo, Mauro Conti, Lucas Davi, Tommaso Frassetto, Ahmad-Reza Sadeghi The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Z. Berkay Celik, Leonardo Babun, Amit Kumar Sikder, Hidayet Aksu, Gang Tan, Patrick D. McDaniel, A. Selcuk Uluagac Sensitive Information Tracking in Commodity IoT. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Chaowei Xiao, Armin Sarabi, Yang Liu, Bo Li, Mingyan Liu, Tudor Dumitras From Patching Delays to Infection Symptoms: Using Risk Profiles for an Early Discovery of Vulnerabilities Exploited in the Wild. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Doowon Kim, Bum Jun Kwon, Kristián Kozák, Christopher Gates 0002, Tudor Dumitras The Broken Shield: Measuring Revocation Effectiveness in the Windows Code-Signing PKI. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Diogo Barradas, Nuno Santos 0001, Luís Rodrigues Effective Detection of Multimedia Protocol Tunneling using Machine Learning. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Moritz Lipp, Michael Schwarz 0001, Daniel Gruss, Thomas Prescher 0002, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg Meltdown: Reading Kernel Memory from User Space. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Rolf van Wegberg, Samaneh Tajalizadehkhoob, Kyle Soska, Ugur Akyazi, Carlos Hernandez Gañán, Bram Klievink, Nicolas Christin, Michel van Eeten Plug and Prey? Measuring the Commoditization of Cybercrime via Online Anonymous Markets. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Nirvan Tyagi, Muhammad Haris Mughees, Thomas Ristenpart, Ian Miers BurnBox: Self-Revocable Encryption in a World Of Compelled Access. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Jianjun Chen, Jian Jiang, Hai-Xin Duan, Tao Wan, Shuo Chen, Vern Paxson, Min Yang 0002 We Still Don't Have Secure Cross-Domain Requests: an Empirical Study of CORS. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Ben Gras, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Insu Yun, Sangho Lee 0001, Meng Xu, Yeongjin Jang, Taesoo Kim QSYM : A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Tom Chothia, Joeri de Ruiter, Ben Smyth Modelling and Analysis of a Hierarchy of Distance Bounding Attacks. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Gertjan Franken, Tom van Goethem, Wouter Joosen Who Left Open the Cookie Jar? A Comprehensive Evaluation of Third-Party Cookie Policies. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Armon Barton, Matthew Wright 0001, Jiang Ming 0002, Mohsen Imani Towards Predicting Efficient and Anonymous Tor Circuits. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Kexiong (Curtis) Zeng, Shinan Liu, Yuanchao Shu, Dong Wang, Haoyu Li, Yanzhi Dou, Gang Wang 0011, Yaling Yang All Your GPS Are Belong To Us: Towards Stealthy Manipulation of Road Navigation Systems. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Kan Yuan, Haoran Lu, Xiaojing Liao, XiaoFeng Wang 0001 Reading Thieves' Cant: Automatically Identifying and Understanding Dark Jargons from Cybercrime Marketplaces. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Saleh Soltan, Prateek Mittal, H. Vincent Poor BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power Grid. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Russell W. F. Lai, Christoph Egger 0001, Manuel Reinert, Sherman S. M. Chow, Matteo Maffei, Dominique Schröder Simple Password-Hardened Encryption Services. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Susan Landau 0001 The Second Crypto War - What's Different Now. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Harry A. Kalodner, Steven Goldfeder, Xiaoqi Chen, S. Matthew Weinberg, Edward W. Felten Arbitrum: Scalable, private smart contracts. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Xiaohan Zhang, Yuan Zhang 0009, Qianqian Mo, Hao Xia, Zhemin Yang, Min Yang 0002, Xiaofeng Wang 0006, Long Lu, Hai-Xin Duan An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Wajih Ul Hassan, Saad Hussain, Adam Bates 0001 Analysis of Privacy Protections in Fitness Tracking Social Networks -or- You can run, but can you hide? Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Baojun Liu, Chaoyi Lu, Hai-Xin Duan, Ying Liu, Zhou Li, Shuang Hao, Min Yang 0002 Who Is Answering My Queries: Understanding and Characterizing Interception of the DNS Resolution Path. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Weijia He, Maximilian Golla, Roshni Padhi, Jordan Ofek, Markus Dürmuth, Earlence Fernandes, Blase Ur Rethinking Access Control and Authentication for the Home Internet of Things (IoT). Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Jonathan P. Chapman SAD THUG: Structural Anomaly Detection for Transmissions of High-value Information Using Graphics. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Howard Wu, Wenting Zheng, Alessandro Chiesa, Raluca Ada Popa, Ion Stoica DIZK: A Distributed Zero Knowledge Proof System. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Mark O'Neill, Scott Heidbrink, Jordan Whitehead, Tanner Perdue, Luke Dickinson, Torstein Collett, Nick Bonner, Kent E. Seamons, Daniel Zappala The Secure Socket API: TLS as an Operating System Service. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Stephan van Schaik, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi Malicious Management Unit: Why Stopping Cache Attacks in Software is Harder Than You Think. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Shuai Hao, Yubao Zhang, Haining Wang, Angelos Stavrou End-Users Get Maneuvered: Empirical Analysis of Redirection Hijacking in Content Delivery Networks. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Sam Silvestro, Hongyu Liu, Tianyi Liu, Zhiqiang Lin, Tongping Liu Guarder: A Tunable Secure Allocator. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Yazhou Tu, Zhiqiang Lin, Insup Lee, Xiali Hei Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial Sensors. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Monjur Alam, Haider A. Khan, Moumita Dey, Nishith Sinha, Robert Locke Callan, Alenka G. Zajic, Milos Prvulovic One&Done: A Single-Decryption EM-Based Attack on OpenSSL's Constant-Time Blinded RSA. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Dennis Felsch, Martin Grothe, Jörg Schwenk, Adam Czubak, Marcin Szymanek The Dangers of Key Reuse: Practical Attacks on IPsec IKE. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Shiqi Wang, Kexin Pei, Justin Whitehouse, Junfeng Yang, Suman Jana Formal Security Analysis of Neural Networks using Symbolic Intervals. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Yuqiong Sun, David Safford, Mimi Zohar, Dimitrios Pendarakis, Zhongshu Gu, Trent Jaeger Security Namespace: Making Linux Security Frameworks Available to Containers. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Hanno Böck, Juraj Somorovsky, Craig Young Return Of Bleichenbacher's Oracle Threat (ROBOT). Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Sanam Ghorbani Lyastani, Michael Schilling, Sascha Fahl, Michael Backes 0001, Sven Bugiel Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Stefano Calzavara, Riccardo Focardi, Matteo Maffei, Clara Schneidewind, Marco Squarcina, Mauro Tempesta WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Octavian Suciu, Radu Marginean, Yigitcan Kaya, Hal Daumé III, Tudor Dumitras When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Xuejing Yuan, Yuxuan Chen, Yue Zhao, Yunhui Long, Xiaokang Liu, Kai Chen 0012, Shengzhi Zhang, Heqing Huang, Xiaofeng Wang 0006, Carl A. Gunter CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Xiaowan Dong, Zhuojia Shen, John Criswell, Alan L. Cox, Sandhya Dwarkadas Shielding Software From Privileged Side-Channel Attacks. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1William Enck, Adrienne Porter Felt (eds.) 27th USENIX Security Symposium, USENIX Security 2018, Baltimore, MD, USA, August 15-17, 2018. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Michelle Y. Wong, David Lie Tackling runtime-based obfuscation in Android with TIRO. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Damian Poddebniak, Christian Dresen, Jens Müller 0007, Fabian Ising, Sebastian Schinzel, Simon Friedberger, Juraj Somorovsky, Jörg Schwenk Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Abeer Alhuzali, Rigel Gjomemo, Birhanu Eshete, V. N. Venkatakrishnan NAVEX: Precise and Scalable Exploit Generation for Dynamic Web Applications. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Benjamin VanderSloot, Allison McDonald, Will Scott, J. Alex Halderman, Roya Ensafi Quack: Scalable Remote Measurement of Application-Layer Censorship. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Wei Wu, Yueqi Chen, Jun Xu 0024, Xinyu Xing, Xiaorui Gong, Wei Zou FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1José González Cabañas, Ángel Cuevas, Rubén Cuevas Unveiling and Quantifying Facebook Exploitation of Sensitive Personal Data for Advertising Purposes. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Jonathan Frankle, Sunoo Park, Daniel Shaar, Shafi Goldwasser, Daniel J. Weitzner Practical Accountability of Secret Processes. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Sinisa Matetic, Moritz Schneider, Andrew Miller, Ari Juels, Srdjan Capkun DelegaTEE: Brokered Delegation Using Trusted Execution Environments. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Johannes Krupp, Christian Rossow teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Richard Bonett, Kaushal Kafle, Kevin Moran, Adwait Nadkarni, Denys Poshyvanyk Discovering Flaws in Security-Focused Static Analysis Tools for Android using Systematic Mutation. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Mohammad Rezaeirad, Brown Farinholt, Hitesh Dharmdasani, Paul Pearce, Kirill Levchenko, Damon McCoy Schrödinger's RAT: Profiling the Stakeholders in the Remote Access Trojan Ecosystem. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1George Kappos, Haaroon Yousaf, Mary Maller, Sarah Meiklejohn An Empirical Analysis of Anonymity in Zcash. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Mohammad Ghasemisharif, Amrutha Ramesh, Stephen Checkoway, Chris Kanich, Jason Polakis O Single Sign-Off, Where Art Thou? An Empirical Analysis of Single Sign-On Account Hijacking and Session Management on the Web. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Hang Zhang, Zhiyun Qian Precise and Accurate Patch Presence Test for Binaries. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Abraham A. Clements, Naif Saleh Almakhdhub, Saurabh Bagchi, Mathias Payer ACES: Automatic Compartments for Embedded Systems. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Thanh Bui, Siddharth Prakash Rao, Markku Antikainen, Viswanathan Manihatty Bojan, Tuomas Aura Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Nolen Scaife, Christian Peeters, Patrick Traynor Fear the Reaper: Characterization and Fast Detection of Card Skimmers. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Dave (Jing) Tian, Grant Hernandez, Joseph I. Choi, Vanessa Frost, Christie Raules, Patrick Traynor, Hayawardh Vijayakumar, Lee Harrison, Amir Rahmati, Michael Grace, Kevin R. B. Butler ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Sean Heelan, Tom Melham, Daniel Kroening Automatic Heap Layout Manipulation for Exploitation. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F. Wenisch, Yuval Yarom, Raoul Strackx Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Dongliang Mu, Alejandro Cuevas, Limin Yang, Hang Hu 0002, Xinyu Xing, Bing Mao, Gang Wang 0011 Understanding the Reproducibility of Crowd-reported Security Vulnerabilities. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Weiteng Chen, Zhiyun Qian Off-Path TCP Exploit: How Wireless Routers Can Jeopardize Your Secrets. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Md Nahid Hossain, Junao Wang, R. Sekar, Scott D. Stoller Dependence-Preserving Data Compaction for Scalable Forensic Analysis. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Henry Birge-Lee, Yixin Sun, Anne Edmundson, Jennifer Rexford, Prateek Mittal Bamboozling Certificate Authorities with BGP. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Tommaso Frassetto, Patrick Jauernig, Christopher Liebchen, Ahmad-Reza Sadeghi IMIX: In-Process Memory Isolation EXtension. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Roland Meier, Petar Tsankov, Vincent Lenders, Laurent Vanbever, Martin T. Vechev NetHide: Secure and Practical Network Topology Obfuscation. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Rakshith Shetty, Bernt Schiele, Mario Fritz A4NT: Author Attribute Anonymity by Adversarial Training of Neural Machine Translation. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Zhiheng Liu, Zhen Zhang, Yinzhi Cao, Zhaohan Xi, Shihao Jing, Humberto La Roche Towards a Secure Zero-rating Framework with Three Parties. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Yossi Adi, Carsten Baum, Moustapha Cissé, Benny Pinkas, Joseph Keshet Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Yang Ji, Sangho Lee 0001, Mattia Fazzini, Joey Allen, Evan Downing, Taesoo Kim, Alessandro Orso, Wenke Lee Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow Tagging and Tracking. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Hang Hu 0002, Gang Wang 0011 End-to-End Measurements of Email Spoofing Attacks. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Seyed Mohammadjavad Seyed Talebi, Hamid Tavakoli, Hang Zhang, Zheng Zhang, Ardalan Amiri Sani, Zhiyun Qian Charm: Facilitating Dynamic Analysis of Device Drivers of Mobile Systems. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Xiang Pan, Yinzhi Cao, Xuechao Du, Boyuan He, Gan Fang, Rui Shao, Yan Chen 0004 FlowCog: Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android Apps. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Philipp Winter, Anne Edmundson, Laura M. Roberts, Agnieszka Dutkowska-Zuk, Marshini Chetty, Nick Feamster How Do Tor Users Interact With Onion Services? Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Cristian-Alexandru Staicu, Michael Pradel Freezing the Web: A Study of ReDoS Vulnerabilities in JavaScript-based Web Servers. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Lorenz Breidenbach, Philip Daian, Florian Tramèr, Ari Juels Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Xianyi Gao, Yulong Yang, Can Liu, Christos Mitropoulos, Janne Lindqvist, Antti Oulasvirta Forgetting of Passwords: Ecological Theory and Data. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Deepak Kumar, Riccardo Paccagnella, Paul Murley, Eric Hennenfent, Joshua Mason, Adam Bates 0001, Michael Bailey Skill Squatting Attacks on Amazon Alexa. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Shankara Pailoor, Andrew Aday, Suman Jana MoonShine: Optimizing OS Fuzzer Seed Selection with Trace Distillation. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Peng Gao, Xusheng Xiao, Ding Li, Zhichun Li, Kangkook Jee, Zhenyu Wu, Chung Hwan Kim, Sanjeev R. Kulkarni, Prateek Mittal SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Jinyuan Jia, Neil Zhenqiang Gong AttriGuard: A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1James C. Davis, Eric R. Williamson, Dongyoon Lee A Sense of Time for JavaScript and Node.js: First-Class Timeouts as a Cure for Event Handler Poisoning. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Xuan Feng, Qiang Li 0007, Haining Wang, Limin Sun Acquisitional Rule-based Engine for Discovering Internet-of-Thing Devices. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Bolun Wang, Yuanshun Yao, Bimal Viswanath, Haitao Zheng, Ben Y. Zhao With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Rock Stevens, Daniel Votipka, Elissa M. Redmiles, Colin Ahern, Patrick Sweeney, Michelle L. Mazurek The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Leah Zhang-Kennedy, Hala Assal, Jessica N. Rocheleau, Reham Mohamed, Khadija Baig, Sonia Chiasson The aftermath of a crypto-ransomware attack at a large academic institution. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
Displaying result #1 - #100 of 894 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license