default search action
25th USENIX Security Symposium 2016: Washington, D.C., USA
- Thorsten Holz, Stefan Savage:
25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016. USENIX Association 2016
Cyber-Physical Systems II
- Flavio D. Garcia, David F. Oswald, Timo Kasper, Pierre Pavlidès:
Lock It and Still Lose It - on the (In)Security of Automotive Remote Keyless Entry Systems.
Web Measurements
- Ada Lerner, Anna Kornfeld Simpson, Tadayoshi Kohno, Franziska Roesner:
Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016.
Low-Level Attacks
- Kaveh Razavi, Ben Gras, Erik Bosman, Bart Preneel, Cristiano Giuffrida, Herbert Bos:
Flip Feng Shui: Hammering a Needle in the Software Stack. 1-18 - Yuan Xiao, Xiaokuan Zhang, Yinqian Zhang, Radu Teodorescu:
One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation. 19-35 - WonJun Song, Hyunwoo Choi, Junhong Kim, Eunsoo Kim, Yongdae Kim, John Kim:
PIkit: A New Kernel-Independent Processor-Interconnect Rootkit. 37-51
Verification and Timing
- José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir, Michael Emmi:
Verifying Constant-Time Implementations. 53-70 - Ashay Rane, Calvin Lin, Mohit Tiwari:
Secure, Precise, and Fast Floating-Point Operations on x86 Processors. 71-86 - Amit Vasudevan, Sagar Chaki, Petros Maniatis, Limin Jia, Anupam Datta:
überSpark: Enforcing Verifiable Object Abstractions for Automated Compositional Security Analysis of a Hypervisor. 87-104
Software Attacks
- Enes Göktas, Robert Gawlik, Benjamin Kollenda, Elias Athanasopoulos, Georgios Portokalidis, Cristiano Giuffrida, Herbert Bos:
Undermining Information Hiding (and What to Do about It). 105-119 - Angelos Oikonomopoulos, Elias Athanasopoulos, Herbert Bos, Cristiano Giuffrida:
Poking Holes in Information Hiding. 121-138 - Giorgi Maisuradze, Michael Backes, Christian Rossow:
What Cannot Be Read, Cannot Be Leveraged? Revisiting Assumptions of JIT-ROP Defenses. 139-156
Password and Key-Fingerprints
- Daniel Lowe Wheeler:
zxcvbn: Low-Budget Password Strength Estimation. 157-173 - William Melicher, Blase Ur, Sean M. Segreti, Saranga Komanduri, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks. 175-191 - Sergej Dechand, Dominik Schürmann, Karoline Busse, Yasemin Acar, Sascha Fahl, Matthew Smith:
An Empirical Study of Textual Key-Fingerprint Representations. 193-208
Network Security
- Yue Cao, Zhiyun Qian, Zhongjie Wang, Tuan Dao, Srikanth V. Krishnamurthy, Lisa M. Marvel:
Off-Path TCP Exploits: Global Rate Limit Considered Dangerous. 209-225 - Gabi Nakibly, Jaime Schcolnik, Yossi Rubin:
Website-Targeted False Content Injection by Network Operators. 227-244 - Kun Du, Hao Yang, Zhou Li, Hai-Xin Duan, Kehuan Zhang:
The Ever-Changing Labyrinth: A Large-Scale Analysis of Wildcard DNS Powered Blackhat SEO. 245-262 - Daniel Plohmann, Khaled Yakdan, Michael Klatt, Johannes Bader, Elmar Gerhards-Padilla:
A Comprehensive Measurement Study of Domain Generating Malware. 263-278
Applied Cryptography
- Eleftherios Kokoris-Kogias, Philipp Jovanovic, Nicolas Gailly, Ismail Khoffi, Linus Gasser, Bryan Ford:
Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing. 279-296 - Peter Rindal, Mike Rosulek:
Faster Malicious 2-Party Secure Computation with Online/Offline Dual Execution. 297-314 - Alex Biryukov, Dmitry Khovratovich:
Egalitarian Computing. 315-326 - Erdem Alkim, Léo Ducas, Thomas Pöppelmann, Peter Schwabe:
Post-quantum Key Exchange - A New Hope. 327-343
Software Security
- Suman Jana, Yuan Jochen Kang, Samuel Roth, Baishakhi Ray:
Automatically Detecting Error Handling Bugs Using Error Specifications. 345-362 - Insu Yun, Changwoo Min, Xujie Si, Yeongjin Jang, Taesoo Kim, Mayur Naik:
APISan: Sanitizing API Usages through Semantic Cross-Checking. 363-378 - Santiago Torres-Arias, Anil Kumar Ammula, Reza Curtmola, Justin Cappos:
On Omitting Commits and Committing Omissions: Preventing Git Metadata Tampering That (Re)introduces Software Vulnerabilities. 379-395
Hardware I
- Sebastian Angel, Riad S. Wahby, Max Howald, Joshua B. Leners, Michael Spilo, Zhen Sun, Andrew J. Blumberg, Michael Walfish:
Defending against Malicious Peripherals with Cinch. 397-414 - Dave (Jing) Tian, Nolen Scaife, Adam Bates, Kevin R. B. Butler, Patrick Traynor:
Making USB Great Again with USBFILTER. 415-430 - Stefano Cristalli, Mattia Pagnozzi, Mariano Graziano, Andrea Lanzi, Davide Balzarotti:
Micro-Virtualization Memory Tracing to Detect and Prevent Spraying Attacks. 431-446
Web Security
- Tom van Goethem, Mathy Vanhoef, Frank Piessens, Wouter Joosen:
Request and Conquer: Exposing Cross-Origin Resource Size. 447-462 - David Kohlbrenner, Hovav Shacham:
Trusted Browsers for Uncertain Times. 463-480 - Muhammad Ahmad Bashir, Sajjad Arshad, William K. Robertson, Christo Wilson:
Tracing Information Flows Between Ad Exchanges Using Retargeted Ads. 481-496
Cyber-Physical Systems
- Yi Xu, True Price, Jan-Michael Frahm, Fabian Monrose:
Virtual U: Defeating Face Liveness Detection by Building Virtual Models from Your Public Photos. 497-512 - Nicholas Carlini, Pratyush Mishra, Tavish Vaidya, Yuankai Zhang, Micah Sherr, Clay Shields, David A. Wagner, Wenchao Zhou:
Hidden Voice Commands. 513-530 - Earlence Fernandes, Justin Paupore, Amir Rahmati, Daniel Simionato, Mauro Conti, Atul Prakash:
FlowFence: Practical Data Protection for Emerging IoT Application Frameworks. 531-548
Low-Level Attacks and Defenses
- Moritz Lipp, Daniel Gruss, Raphael Spreitzer, Clémentine Maurice, Stefan Mangard:
ARMageddon: Cache Attacks on Mobile Devices. 549-564 - Peter Pessl, Daniel Gruss, Clémentine Maurice, Michael Schwarz, Stefan Mangard:
DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks. 565-581 - Dennis Andriesse, Xi Chen, Victor van der Veen, Asia Slowinska, Herbert Bos:
An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries. 583-600
Machine Learning and Data Retrieval Systems
- Florian Tramèr, Fan Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart:
Stealing Machine Learning Models via Prediction APIs. 601-618 - Olga Ohrimenko, Felix Schuster, Cédric Fournet, Aastha Mehta, Sebastian Nowozin, Kapil Vaswani, Manuel Costa:
Oblivious Multi-Party Machine Learning on Trusted Processors. 619-636 - Eslam Elnikety, Aastha Mehta, Anjo Vahldiek-Oberwagner, Deepak Garg, Peter Druschel:
Thoth: Comprehensive Policy Compliance in Data Retrieval Systems. 637-654
Crypto Attacks
- Christina Garman, Matthew Green, Gabriel Kaptchuk, Ian Miers, Michael Rushanan:
Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage. 655-672 - Mathy Vanhoef, Frank Piessens:
Predicting, Decrypting, and Abusing WPA2/802.11 Group Keys. 673-688 - Nimrod Aviram, Sebastian Schinzel, Juraj Somorovsky, Nadia Heninger, Maik Dankel, Jens Steube, Luke Valenta, David Adrian, J. Alex Halderman, Viktor Dukhovni, Emilia Käsper, Shaanan Cohney, Susanne Engels, Christof Paar, Yuval Shavitt:
DROWN: Breaking TLS Using SSLv2. 689-706 - Yupeng Zhang, Jonathan Katz, Charalampos Papamanthou:
All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption. 707-720
Malware
- Kurt Thomas, Juan A. Elices Crespo, Ryan Rasti, Jean-Michel Picod, Cait Phillips, Marc-André Decoste, Chris Sharp, Fabio Tirelo, Ali Tofigh, Marc-Antoine Courteau, Lucas Ballard, Robert Shield, Nav Jagpal, Moheeb Abu Rajab, Panayiotis Mavrommatis, Niels Provos, Elie Bursztein, Damon McCoy:
Investigating Commercial Pay-Per-Install and the Distribution of Unwanted Software. 721-739 - Platon Kotzias, Leyla Bilge, Juan Caballero:
Measuring PUP Prevalence and PUP Distribution through Pay-Per-Install Services. 739-756 - Amin Kharraz, Sajjad Arshad, Collin Mulliner, William K. Robertson, Engin Kirda:
UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware. 757-772 - Terry Nelms, Roberto Perdisci, Manos Antonakakis, Mustaque Ahamad:
Towards Measuring and Mitigating Social Engineering Software Download Attacks. 773-789
Network Security II
- Marco Caselli, Emmanuele Zambon, Johanna Amann, Robin Sommer, Frank Kargl:
Specification Mining for Intrusion Detection in Networked Control Systems. 791-806 - Karel Bartos, Michal Sofka, Vojtech Franc:
Optimized Invariant Representation of Network Traffic for Detecting Unseen Malware Variants. 807-822 - Benjamin Dowling, Douglas Stebila, Greg Zaverucha:
Authenticated Network Time Synchronization. 823-840
Hardware II
- Himanshu Raj, Stefan Saroiu, Alec Wolman, Ronald Aigner, Jeremiah Cox, Paul England, Chris Fenner, Kinshuman Kinshumann, Jork Löser, Dennis Mattoon, Magnus Nyström, David Robinson, Rob Spiger, Stefan Thom, David Wooten:
fTPM: A Software-Only Implementation of a TPM Chip. 841-856 - Victor Costan, Ilia A. Lebedev, Srinivas Devadas:
Sanctum: Minimal Hardware Extensions for Strong Software Isolation. 857-874 - Raoul Strackx, Frank Piessens:
Ariadne: A Minimal Approach to State Continuity. 875-892
Cyber-Physical Systems II
- Petr Svenda, Matús Nemec, Peter Sekan, Rudolf Kvasnovský, David Formánek, David Komárek, Vashek Matyás:
The Million-Key Question - Investigating the Origins of RSA Public Keys. 893-910 - Kyong-Tak Cho, Kang G. Shin:
Fingerprinting Electronic Control Units for Vehicle Intrusion Detection. 911-927
Distributed Systems
- Yaoqi Jia, Tarik Moataz, Shruti Tople, Prateek Saxena:
OblivP2P: An Oblivious Peer-to-Peer Content Sharing System. 945-962 - Bradley Reaves, Logan Blue, Patrick Traynor:
AuthLoop: End-to-End Cryptographic Authentication for Telephony over Voice Channels. 963-978 - Neil Zhenqiang Gong, Bin Liu:
You Are Who You Know and How You Behave: Attribute Inference Attacks via Users' Social Friends and Behaviors. 979-995
Web Measurements
- Ben Stock, Giancarlo Pellegrino, Christian Rossow, Martin Johns, Michael Backes:
Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification. 1015-1032 - Frank Li, Zakir Durumeric, Jakub Czyz, Mohammad Karami, Michael D. Bailey, Damon McCoy, Stefan Savage, Vern Paxson:
You've Got Vulnerability: Exploring Effective Vulnerability Notifications. 1033-1050
Proofs
- Frederik Armknecht, Ludovic Barman, Jens-Matthias Bohli, Ghassan O. Karame:
Mirror: Enabling Proofs of Data Replication and Retrievability in the Cloud. 1051-1068 - Irene Giacomelli, Jesper Madsen, Claudio Orlandi:
ZKBoo: Faster Zero-Knowledge for Boolean Circuits. 1069-1083 - Ruiyu Zhu, Yan Huang, Jonathan Katz, Abhi Shelat:
The Cut-and-Choose Game and Its Application to Cryptographic Protocols. 1085-1100
Android
- Michael Backes, Sven Bugiel, Erik Derr, Patrick D. McDaniel, Damien Octeau, Sebastian Weisgerber:
On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis. 1101-1118 - Adwait Nadkarni, Benjamin Andow, William Enck, Somesh Jha:
Practical DIFC Enforcement on Android. 1119-1136 - Brendan Saltaformaggio, Rohit Bhatia, Xiangyu Zhang, Dongyan Xu, Golden G. Richard III:
Screen after Previous Screens: Spatial-Temporal Recreation of Android App Displays from Memory Images. 1137-1151 - Yousra Aafer, Xiao Zhang, Wenliang Du:
Harvesting Inconsistent Security Configurations in Custom Android ROMs via Differential Analysis. 1153-1168
Privacy
- Philipp Winter, Roya Ensafi, Karsten Loesing, Nick Feamster:
Identifying and Characterizing Sybils in the Tor Network. 1169-1185 - Jamie Hayes, George Danezis:
k-fingerprinting: A Robust Scalable Website Fingerprinting Technique. 1187-1203 - Kassem Fawaz, Kyu-Han Kim, Kang G. Shin:
Protecting Privacy of BLE Device Users. 1205-1221 - Michael Backes, Pascal Berrang, Anna Hecksteden, Mathias Humbert, Andreas Keller, Tim Meyer:
Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles. 1223-1240
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.