


default search action
27th USENIX Security Symposium 2018: Baltimore, MD, USA
- William Enck, Adrienne Porter Felt:

27th USENIX Security Symposium, USENIX Security 2018, Baltimore, MD, USA, August 15-17, 2018. USENIX Association 2018
Security Impacting the Physical World
- Nolen Scaife, Christian Peeters, Patrick Traynor:

Fear the Reaper: Characterization and Fast Detection of Card Skimmers. 1-14 - Saleh Soltan, Prateek Mittal, H. Vincent Poor:

BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power Grid. 15-32 - Deepak Kumar, Riccardo Paccagnella, Paul Murley, Eric Hennenfent, Joshua Mason, Adam Bates, Michael D. Bailey:

Skill Squatting Attacks on Amazon Alexa. 33-47 - Xuejing Yuan, Yuxuan Chen, Yue Zhao, Yunhui Long, Xiaokang Liu, Kai Chen, Shengzhi Zhang, Heqing Huang, Xiaofeng Wang, Carl A. Gunter:

CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. 49-64
Memory Defenses
- Abraham A. Clements, Naif Saleh Almakhdhub, Saurabh Bagchi, Mathias Payer:

ACES: Automatic Compartments for Embedded Systems. 65-82 - Tommaso Frassetto, Patrick Jauernig, Christopher Liebchen, Ahmad-Reza Sadeghi:

IMIX: In-Process Memory Isolation EXtension. 83-97 - Moritz Eckert, Antonio Bianchi, Ruoyu Wang, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna:

HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security. 99-116 - Sam Silvestro, Hongyu Liu, Tianyi Liu, Zhiqiang Lin, Tongping Liu:

Guarder: A Tunable Secure Allocator. 117-133
Censorship and Web Privacy
- Antoine Vastel, Pierre Laperdrix, Walter Rudametkin, Romain Rouvoy:

Fp-Scanner: The Privacy Implications of Browser Fingerprint Inconsistencies. 135-150 - Gertjan Franken, Tom van Goethem, Wouter Joosen:

Who Left Open the Cookie Jar? A Comprehensive Evaluation of Third-Party Cookie Policies. 151-168 - Diogo Barradas, Nuno Santos, Luís E. T. Rodrigues:

Effective Detection of Multimedia Protocol Tunneling using Machine Learning. 169-185 - Benjamin VanderSloot, Allison McDonald, Will Scott, J. Alex Halderman, Roya Ensafi:

Quack: Scalable Remote Measurement of Application-Layer Censorship. 187-202
Understanding How Humans Authenticate
- Sanam Ghorbani Lyastani, Michael Schilling, Sascha Fahl, Michael Backes, Sven Bugiel:

Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse. 203-220 - Xianyi Gao, Yulong Yang, Can Liu, Christos Mitropoulos, Janne Lindqvist, Antti Oulasvirta:

Forgetting of Passwords: Ecological Theory and Data. 221-238 - Ingolf Becker, Simon Parkin, M. Angela Sasse:

The Rewards and Costs of Stronger Passwords in a University: Linking Password Lifetime to Strength. 239-253 - Weijia He, Maximilian Golla, Roshni Padhi, Jordan Ofek, Markus Dürmuth, Earlence Fernandes, Blase Ur:

Rethinking Access Control and Authentication for the Home Internet of Things (IoT). 255-272
Vulnerability Discovery
- Dave (Jing) Tian, Grant Hernandez, Joseph I. Choi, Vanessa Frost, Christie Ruales, Patrick Traynor, Hayawardh Vijayakumar, Lee Harrison, Amir Rahmati, Michael Grace, Kevin R. B. Butler:

ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem. 273-290 - Seyed Mohammadjavad Seyed Talebi, Hamid Tavakoli, Hang Zhang, Zheng Zhang, Ardalan Amiri Sani, Zhiyun Qian:

Charm: Facilitating Dynamic Analysis of Device Drivers of Mobile Systems. 291-307 - Nassim Corteggiani, Giovanni Camurati, Aurélien Francillon

:
Inception: System-Wide Security Testing of Real-World Embedded Systems Software. 309-326 - Xuan Feng, Qiang Li, Haining Wang, Limin Sun:

Acquisitional Rule-based Engine for Discovering Internet-of-Thing Devices. 327-341
Information Tracking
- Xiang Pan, Yinzhi Cao, Xuechao Du, Boyuan He, Gan Fang, Rui Shao, Yan Chen:

FlowCog: Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android Apps. 1669-1685 - Z. Berkay Celik, Leonardo Babun, Amit Kumar Sikder, Hidayet Aksu, Gang Tan, Patrick D. McDaniel, A. Selcuk Uluagac:

Sensitive Information Tracking in Commodity IoT. 1687-1704 - Yang Ji, Sangho Lee, Mattia Fazzini, Joey Allen, Evan Downing, Taesoo Kim, Alessandro Orso, Wenke Lee:

Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow Tagging and Tracking. 1705-1722 - Md Nahid Hossain, Junao Wang, R. Sekar, Scott D. Stoller:

Dependence-Preserving Data Compaction for Scalable Forensic Analysis. 1723-1740
Web Applications
- James C. Davis, Eric R. Williamson, Dongyoon Lee:

A Sense of Time for JavaScript and Node.js: First-Class Timeouts as a Cure for Event Handler Poisoning. 343-359 - Cristian-Alexandru Staicu, Michael Pradel:

Freezing the Web: A Study of ReDoS Vulnerabilities in JavaScript-based Web Servers. 361-376 - Abeer Alhuzali, Rigel Gjomemo, Birhanu Eshete, V. N. Venkatakrishnan:

NAVEX: Precise and Scalable Exploit Generation for Dynamic Web Applications. 377-392 - Wei Meng, Chenxiong Qian, Shuang Hao, Kevin Borgolte, Giovanni Vigna, Christopher Kruegel, Wenke Lee:

Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks. 393-410
Anonymity
- Philipp Winter, Anne Edmundson, Laura M. Roberts, Agnieszka Dutkowska-Zuk, Marshini Chetty, Nick Feamster:

How Do Tor Users Interact With Onion Services? 411-428 - Armon Barton, Matthew Wright, Jiang Ming, Mohsen Imani:

Towards Predicting Efficient and Anonymous Tor Circuits. 429-444 - Nirvan Tyagi

, Muhammad Haris Mughees, Thomas Ristenpart, Ian Miers:
BurnBox: Self-Revocable Encryption in a World Of Compelled Access. 445-461 - George Kappos, Haaroon Yousaf, Mary Maller, Sarah Meiklejohn:

An Empirical Analysis of Anonymity in Zcash. 463-477
Privacy in a Digital World
- José González Cabañas, Ángel Cuevas, Rubén Cuevas:

Unveiling and Quantifying Facebook Exploitation of Sensitive Personal Data for Advertising Purposes. 479-495 - Wajih Ul Hassan, Saad Hussain, Adam Bates:

Analysis of Privacy Protections in Fitness Tracking Social Networks -or- You can run, but can you hide? 497-512 - Jinyuan Jia, Neil Zhenqiang Gong:

AttriGuard: A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning. 513-529 - Hamza Harkous, Kassem Fawaz, Rémi Lebret, Florian Schaub, Kang G. Shin, Karl Aberer:

Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning. 531-548
Attacks on Crypto & Crypto Libraries
- Damian Poddebniak, Christian Dresen, Jens Müller, Fabian Ising, Sebastian Schinzel, Simon Friedberger, Juraj Somorovsky, Jörg Schwenk:

Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels. 549-566 - Dennis Felsch, Martin Grothe, Jörg Schwenk, Adam Czubak, Marcin Szymanek:

The Dangers of Key Reuse: Practical Attacks on IPsec IKE. 567-583 - Monjur Alam, Haider Adnan Khan, Moumita Dey, Nishith Sinha, Robert Locke Callan, Alenka G. Zajic, Milos Prvulovic:

One&Done: A Single-Decryption EM-Based Attack on OpenSSL's Constant-Time Blinded RSA. 585-602 - Samuel Weiser, Andreas Zankl

, Raphael Spreitzer, Katja Miller, Stefan Mangard, Georg Sigl:
DATA - Differential Address Trace Analysis: Finding Address-based Side-Channels in Binaries. 603-620
Enterprise Security
- Rock Stevens, Daniel Votipka, Elissa M. Redmiles, Colin Ahern, Patrick Sweeney, Michelle L. Mazurek:

The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level. 621-637 - Peng Gao, Xusheng Xiao, Ding Li, Zhichun Li, Kangkook Jee, Zhenyu Wu, Chung Hwan Kim, Sanjeev R. Kulkarni, Prateek Mittal:

SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection. 639-656
Zero-Knowledge
- Jonathan Frankle, Sunoo Park, Daniel Shaar, Shafi Goldwasser, Daniel J. Weitzner:

Practical Accountability of Secret Processes. 657-674 - Howard Wu, Wenting Zheng, Alessandro Chiesa, Raluca Ada Popa, Ion Stoica:

DIZK: A Distributed Zero Knowledge Proof System. 675-692
Network Defenses
- Roland Meier, Petar Tsankov, Vincent Lenders, Laurent Vanbever, Martin T. Vechev:

NetHide: Secure and Practical Network Topology Obfuscation. 693-709 - Zhiheng Liu, Zhen Zhang, Yinzhi Cao, Zhaohan Xi, Shihao Jing, Humberto J. La Roche:

Towards a Secure Zero-rating Framework with Three Parties. 711-728
Fuzzing and Exploit Generation
- Shankara Pailoor, Andrew Aday, Suman Jana:

MoonShine: Optimizing OS Fuzzer Seed Selection with Trace Distillation. 729-743 - Insu Yun, Sangho Lee, Meng Xu, Yeongjin Jang, Taesoo Kim:

QSYM : A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing. 745-761 - Sean Heelan, Tom Melham, Daniel Kroening:

Automatic Heap Layout Manipulation for Exploitation. 763-779 - Wei Wu, Yueqi Chen, Jun Xu, Xinyu Xing, Xiaorui Gong, Wei Zou:

FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities. 781-797
TLS and PKI
- Mark O'Neill, Scott Heidbrink, Jordan Whitehead, Tanner Perdue, Luke Dickinson, Torstein Collett, Nick Bonner, Kent E. Seamons, Daniel Zappala:

The Secure Socket API: TLS as an Operating System Service. 799-816 - Hanno Böck, Juraj Somorovsky, Craig Young:

Return Of Bleichenbacher's Oracle Threat (ROBOT). 817-849 - Henry Birge-Lee, Yixin Sun, Anne Edmundson, Jennifer Rexford, Prateek Mittal:

Bamboozling Certificate Authorities with BGP. 833-849 - Doowon Kim, Bum Jun Kwon, Kristián Kozák, Christopher Gates, Tudor Dumitras:

The Broken Shield: Measuring Revocation Effectiveness in the Windows Code-Signing PKI. 851-868
Vulnerability Mitigations
- Anh Quach, Aravind Prakash, Lok-Kwong Yan:

Debloating Software through Piece-Wise Compilation and Loading. 869-886 - Hang Zhang, Zhiyun Qian:

Precise and Accurate Patch Presence Test for Binaries. 887-902 - Chaowei Xiao, Armin Sarabi, Yang Liu, Bo Li, Mingyan Liu, Tudor Dumitras:

From Patching Delays to Infection Symptoms: Using Risk Profiles for an Early Discovery of Vulnerabilities Exploited in the Wild. 903-918 - Dongliang Mu, Alejandro Cuevas, Limin Yang, Hang Hu, Xinyu Xing, Bing Mao, Gang Wang:

Understanding the Reproducibility of Crowd-reported Security Vulnerabilities. 919-936
Side Channels
- Stephan van Schaik, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi:

Malicious Management Unit: Why Stopping Cache Attacks in Software is Harder Than You Think. 937-954 - Ben Gras, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida:

Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks. 955-972 - Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg:

Meltdown: Reading Kernel Memory from User Space. 973-990 - Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F. Wenisch, Yuval Yarom, Raoul Strackx:

Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution. 991-1008
Cybercrime
- Rolf van Wegberg, Samaneh Tajalizadehkhoob, Kyle Soska, Ugur Akyazi, Carlos Hernandez Gañán, Bram Klievink, Nicolas Christin, Michel van Eeten:

Plug and Prey? Measuring the Commoditization of Cybercrime via Online Anonymous Markets. 1009-1026 - Kan Yuan, Haoran Lu, Xiaojing Liao, XiaoFeng Wang:

Reading Thieves' Cant: Automatically Identifying and Understanding Dark Jargons from Cybercrime Marketplaces. 1027-1041 - Mohammad Rezaeirad, Brown Farinholt, Hitesh Dharmdasani, Paul Pearce, Kirill Levchenko, Damon McCoy:

Schrödinger's RAT: Profiling the Stakeholders in the Remote Access Trojan Ecosystem. 1043-1060 - Leah Zhang-Kennedy, Hala Assal, Jessica N. Rocheleau, Reham Mohamed, Khadija Baig, Sonia Chiasson:

The aftermath of a crypto-ransomware attack at a large academic institution. 1061-1078
Web and Network Measurement
- Jianjun Chen, Jian Jiang, Hai-Xin Duan, Tao Wan, Shuo Chen, Vern Paxson, Min Yang

:
We Still Don't Have Secure Cross-Domain Requests: an Empirical Study of CORS. 1079-1093 - Hang Hu, Gang Wang:

End-to-End Measurements of Email Spoofing Attacks. 1095-1112 - Baojun Liu, Chaoyi Lu, Hai-Xin Duan, Ying Liu, Zhou Li

, Shuang Hao, Min Yang
:
Who Is Answering My Queries: Understanding and Characterizing Interception of the DNS Resolution Path. 1113-1128 - Shuai Hao, Yubao Zhang, Haining Wang, Angelos Stavrou

:
End-Users Get Maneuvered: Empirical Analysis of Redirection Hijacking in Content Delivery Networks. 1129-1145
Malware
- Jonathan P. Chapman:

SAD THUG: Structural Anomaly Detection for Transmissions of High-value Information Using Graphics. 1147-1164 - Samuel Schüppen, Dominik Teubert, Patrick Herrmann, Ulrike Meyer:

FANCI : Feature-based Automated NXDomain Classification and Intelligence. 1165-1181 - Xiaohan Zhang, Yuan Zhang, Qianqian Mo, Hao Xia, Zhemin Yang, Min Yang, Xiaofeng Wang, Long Lu, Hai-Xin Duan:

An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications. 1183-1198 - Ashton Webster, Ryan Eckenrod, James Purtilo:

Fast and Service-preserving Recovery from Malware Infections Using CRIU. 1199-1211
Invited Talks
- Susan Landau:

The Second Crypto War - What's Different Now.
Subverting Hardware Protections
- Andrea Biondo, Mauro Conti, Lucas Davi, Tommaso Frassetto, Ahmad-Reza Sadeghi:

The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX. 1213-1227 - Seunghun Han, Wook Shin, Jun-Hyeok Park, Hyoung-Chun Kim:

A Bad Dream: Subverting Trusted Platform Module While You Are Sleeping. 1229-1246
More Malware
- Michelle Y. Wong, David Lie:

Tackling runtime-based obfuscation in Android with TIRO. 1247-1262 - Richard Bonett, Kaushal Kafle, Kevin Moran, Adwait Nadkarni, Denys Poshyvanyk:

Discovering Flaws in Security-Focused Static Analysis Tools for Android using Systematic Mutation. 1263-1280
Attacks on Systems That Learn
- Bolun Wang, Yuanshun Yao, Bimal Viswanath, Haitao Zheng, Ben Y. Zhao:

With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning. 1281-1297 - Octavian Suciu, Radu Marginean, Yigitcan Kaya, Hal Daumé III, Tudor Dumitras:

When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks. 1299-1316
Smart Contracts
- Johannes Krupp

, Christian Rossow:
teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts. 1317-1333 - Lorenz Breidenbach, Philip Daian, Florian Tramèr

, Ari Juels:
Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts. 1335-1352 - Harry A. Kalodner, Steven Goldfeder, Xiaoqi Chen, S. Matthew Weinberg

, Edward W. Felten:
Arbitrum: Scalable, private smart contracts. 1353-1370 - Yi Zhou, Deepak Kumar, Surya Bakshi, Joshua Mason, Andrew Miller, Michael D. Bailey:

Erays: Reverse Engineering Ethereum's Opaque Smart Contracts. 1371-1385
Executing in Untrusted Environments
- Sinisa Matetic, Moritz Schneider, Andrew Miller, Ari Juels, Srdjan Capkun:

DelegaTEE: Brokered Delegation Using Trusted Execution Environments. 1387-1403 - Russell W. F. Lai, Christoph Egger, Manuel Reinert, Sherman S. M. Chow, Matteo Maffei, Dominique Schröder:

Simple Password-Hardened Encryption Services. 1405-1421 - Yuqiong Sun, David Safford, Mimi Zohar, Dimitrios Pendarakis, Zhongshu Gu, Trent Jaeger:

Security Namespace: Making Linux Security Frameworks Available to Containers. 1423-1439 - Xiaowan Dong, Zhuojia Shen, John Criswell, Alan L. Cox, Sandhya Dwarkadas:

Shielding Software From Privileged Side-Channel Attacks. 1441-1458
Web Authentication
- Ronghai Yang, Wing Cheong Lau, Jiongyi Chen, Kehuan Zhang:

Vetting Single Sign-On SDK Implementations via Symbolic Reasoning. 1459-1474 - Mohammad Ghasemisharif, Amrutha Ramesh, Stephen Checkoway, Chris Kanich, Jason Polakis:

O Single Sign-Off, Where Art Thou? An Empirical Analysis of Single Sign-On Account Hijacking and Session Management on the Web. 1475-1492 - Stefano Calzavara, Riccardo Focardi, Matteo Maffei, Clara Schneidewind, Marco Squarcina, Mauro Tempesta:

WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring. 1493-1510 - Thanh Bui, Siddharth Prakash Rao, Markku Antikainen, Viswanathan Manihatty Bojan, Tuomas Aura:

Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer. 1511-1525
Wireless Attacks
- Kexiong Curtis Zeng, Shinan Liu, Yuanchao Shu, Dong Wang, Haoyu Li, Yanzhi Dou, Gang Wang, Yaling Yang:

All Your GPS Are Belong To Us: Towards Stealthy Manipulation of Road Navigation Systems. 1527-1544 - Yazhou Tu, Zhiqiang Lin, Insup Lee, Xiali Hei:

Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial Sensors. 1545-1562 - Tom Chothia, Joeri de Ruiter, Ben Smyth:

Modelling and Analysis of a Hierarchy of Distance Bounding Attacks. 1563-1580 - Weiteng Chen, Zhiyun Qian:

Off-Path TCP Exploit: How Wireless Routers Can Jeopardize Your Secrets. 1581-1598
Neural Networks
- Shiqi Wang, Kexin Pei, Justin Whitehouse, Junfeng Yang, Suman Jana:

Formal Security Analysis of Neural Networks using Symbolic Intervals. 1599-1614 - Yossi Adi, Carsten Baum, Moustapha Cissé, Benny Pinkas, Joseph Keshet:

Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring. 1615-1631 - Rakshith Shetty, Bernt Schiele

, Mario Fritz:
A4NT: Author Attribute Anonymity by Adversarial Training of Neural Machine Translation. 1633-1650 - Chiraag Juvekar, Vinod Vaikuntanathan, Anantha P. Chandrakasan:

GAZELLE: A Low Latency Framework for Secure Neural Network Inference. 1651-1669

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














