Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/uss/uss2015.bht:"
@inproceedings{DBLP:conf/uss/0001B0SS15, author = {Michael Backes and Sven Bugiel and Christian Hammer and Oliver Schranz and Philipp von Styp{-}Rekowsky}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Boxify: Full-fledged App Sandboxing for Stock Android}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {691--706}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/backes}, timestamp = {Mon, 01 Feb 2021 08:42:57 +0100}, biburl = {https://dblp.org/rec/conf/uss/0001B0SS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/0012WLWZHZ015, author = {Kai Chen and Peng Wang and Yeonjoon Lee and XiaoFeng Wang and Nan Zhang and Heqing Huang and Wei Zou and Peng Liu}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {659--674}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/chen-kai}, timestamp = {Tue, 28 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/0012WLWZHZ015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AraujoH15, author = {Frederico Araujo and Kevin W. Hamlen}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Compiler-instrumented, Dynamic Secret-Redaction of Legacy Processes for Attacker Deception}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {145--159}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/araujo}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/AraujoH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AsghariCE15, author = {Hadi Asghari and Michael Ciere and Michel J. G. van Eeten}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Post-Mortem of a Zombie: Conficker Cleanup After Six Years}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {1--16}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/asghari}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/AsghariCE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BatesTBM15, author = {Adam Bates and Dave Tian and Kevin R. B. Butler and Thomas Moyer}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Trustworthy Whole-System Provenance for the Linux Kernel}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {319--334}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/bates}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/BatesTBM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BeringerPYA15, author = {Lennart Beringer and Adam Petcher and Katherine Q. Ye and Andrew W. Appel}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Verified Correctness and Security of OpenSSL {HMAC}}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {207--221}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/beringer}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/BeringerPYA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BorgolteKV15, author = {Kevin Borgolte and Christopher Kruegel and Giovanni Vigna}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Meerkat: Detecting Website Defacements through Image-based Object Recognition}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {595--610}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/borgolte}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/BorgolteKV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Buscher015, author = {Niklas B{\"{u}}scher and Stefan Katzenbeisser}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Faster Secure Computation through Automatic Parallelization}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {531--546}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/buescher}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/Buscher015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/CarliniBPWG15, author = {Nicholas Carlini and Antonio Barresi and Mathias Payer and David A. Wagner and Thomas R. Gross}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Control-Flow Bending: On the Effectiveness of Control-Flow Integrity}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {161--176}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/carlini}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/CarliniBPWG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ChenCBLZG15, author = {Jin Chen and Haibo Chen and Erick Bauman and Zhiqiang Lin and Binyu Zang and Haibing Guan}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {You Shouldn't Collect My Secrets: Thwarting Sensitive Keystroke Leakage in Mobile {IME} Apps}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {657--690}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/chen-jin}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/ChenCBLZG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/DinhSCOZ15, author = {Tien Tuan Anh Dinh and Prateek Saxena and Ee{-}Chien Chang and Beng Chin Ooi and Chunwang Zhang}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {{M2R:} Enabling Stronger Privacy in MapReduce Computation}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {447--462}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/dinh}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/DinhSCOZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/DyerCS15, author = {Kevin P. Dyer and Scott E. Coull and Thomas Shrimpton}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Marionette: {A} Programmable Network Traffic Obfuscation System}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {367--382}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/dyer}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/DyerCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/EverspaughCSJR15, author = {Adam Everspaugh and Rahul Chatterjee and Samuel Scott and Ari Juels and Thomas Ristenpart}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {The Pythia {PRF} Service}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {547--562}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/everspaugh}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/EverspaughCSJR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/FawazFS15, author = {Kassem Fawaz and Huan Feng and Kang G. Shin}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Anatomization and Protection of Mobile Apps' Location Privacy Threats}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {753--768}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/fawaz}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/FawazFS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/FayazTSB15, author = {Seyed Kaveh Fayaz and Yoshiaki Tobioka and Vyas Sekar and Michael D. Bailey}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Bohatei: Flexible and Elastic DDoS Defense}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {817--832}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/fayaz}, timestamp = {Mon, 20 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/FayazTSB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/FedericoCSKV15, author = {Alessandro Di Federico and Amat Cama and Yan Shoshitaishvili and Christopher Kruegel and Giovanni Vigna}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {How the {ELF} Ruined Christmas}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {643--658}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/di-frederico}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/FedericoCSKV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/FengFS15, author = {Huan Feng and Kassem Fawaz and Kang G. Shin}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {LinkDroid: Reducing Unregulated Aggregation of App Usage Behaviors}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {769--783}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/feng}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/FengFS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GarmanPM15, author = {Christina Garman and Kenneth G. Paterson and Thyla van der Merwe}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Attacks Only Get Better: Password Recovery Attacks Against {RC4} in {TLS}}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {113--128}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/garman}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/GarmanPM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GrazianoCBLB15, author = {Mariano Graziano and Davide Canali and Leyla Bilge and Andrea Lanzi and Davide Balzarotti}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Needles in a Haystack: Mining Information from Public Dynamic Analysis Sandboxes for Malware Intelligence}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {1057--1072}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/graziano}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/GrazianoCBLB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GrussSM15, author = {Daniel Gruss and Raphael Spreitzer and Stefan Mangard}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {897--912}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/gruss}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/GrussSM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GuriKHKME15, author = {Mordechai Guri and Assaf Kachlon and Ofer Hasson and Gabi Kedma and Yisroel Mirsky and Yuval Elovici}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {GSMem: Data Exfiltration from Air-Gapped Computers over {GSM} Frequencies}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {849--864}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/guri}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/GuriKHKME15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HeilmanKZG15, author = {Ethan Heilman and Alison Kendler and Aviv Zohar and Sharon Goldberg}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Eclipse Attacks on Bitcoin's Peer-to-Peer Network}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {129--144}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/heilman}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/HeilmanKZG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HuCASL15, author = {Hong Hu and Zheng Leong Chua and Sendroiu Adrian and Prateek Saxena and Zhenkai Liang}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Automatic Generation of Data-Oriented Exploits}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {177--192}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/hu}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/HuCASL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HuangLXWLZJ15, author = {Jianjun Huang and Zhichun Li and Xusheng Xiao and Zhenyu Wu and Kangjie Lu and Xiangyu Zhang and Guofei Jiang}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {{SUPOR:} Precise and Scalable Sensitive User Input Detection for Android Apps}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {977--992}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/huang}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/HuangLXWLZJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/IslamHLNVYG15, author = {Aylin Caliskan Islam and Richard E. Harang and Andrew Liu and Arvind Narayanan and Clare R. Voss and Fabian Yamaguchi and Rachel Greenstadt}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {De-anonymizing Programmers via Code Stylometry}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {255--270}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/caliskan-islam}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/IslamHLNVYG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/JagpalDGMPRT15, author = {Nav Jagpal and Eric Dingle and Jean{-}Philippe Gravel and Panayiotis Mavrommatis and Niels Provos and Moheeb Abu Rajab and Kurt Thomas}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Trends and Lessons from Three Years Fighting Malicious Extensions}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {579--593}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/jagpal}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/JagpalDGMPRT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/JiLMHB15, author = {Shouling Ji and Weiqing Li and Prateek Mittal and Xin Hu and Raheem A. Beyah}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {SecGraph: {A} Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {303--318}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/ji}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/JiLMHB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Kaloper-Mersinjak15, author = {David Kaloper{-}Mersinjak and Hannes Mehnert and Anil Madhavapeddy and Peter Sewell}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Not-Quite-So-Broken {TLS:} Lessons in Re-Engineering a Security Protocol Specification and Implementation}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {223--238}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/kaloper-mersinjak}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/Kaloper-Mersinjak15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KarapanosMSC15, author = {Nikolaos Karapanos and Claudio Marforio and Claudio Soriente and Srdjan Capkun}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {483--498}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/karapanos}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/KarapanosMSC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KwonALDD15, author = {Albert Kwon and Mashael AlSabah and David Lazar and Marc Dacier and Srinivas Devadas}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {287--302}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/kwon}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/KwonALDD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LeeSKL15, author = {Byoungyoung Lee and Chengyu Song and Taesoo Kim and Wenke Lee}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Type Casting Verification: Stopping an Emerging Attack Vector}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {81--96}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/lee}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/LeeSKL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LekiesSWJ15, author = {Sebastian Lekies and Ben Stock and Martin Wentzel and Martin Johns}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {The Unexpected Dangers of Dynamic JavaScript}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {723--735}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/lekies}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/LekiesSWJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LiuSZNKBL15, author = {Yang Liu and Armin Sarabi and Jing Zhang and Parinaz Naghizadeh and Manish Karir and Michael D. Bailey and Mingyan Liu}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {1009--1024}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/liu}, timestamp = {Mon, 20 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/LiuSZNKBL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MastiRRMTC15, author = {Ramya Jayaram Masti and Devendra Rai and Aanjhan Ranganathan and Christian M{\"{u}}ller and Lothar Thiele and Srdjan Capkun}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Thermal Covert Channels on Multi-core Platforms}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {865--880}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/masti}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/MastiRRMTC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/McGregorCHR15, author = {Susan E. McGregor and Polina Charters and Tobin Holliday and Franziska Roesner}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Investigating the Computer Security Practices and Needs of Journalists}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {399--414}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/mcgregor}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/McGregorCHR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MelaraBBFF15, author = {Marcela S. Melara and Aaron Blankstein and Joseph Bonneau and Edward W. Felten and Michael J. Freedman}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {{CONIKS:} Bringing Key Transparency to End Users}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {383--398}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/melara}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/MelaraBBFF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MichalevskySVBN15, author = {Yan Michalevsky and Aaron Schulman and Gunaa Arumugam Veerapandian and Dan Boneh and Gabi Nakibly}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {PowerSpy: Location Tracking Using Mobile Device Power Analysis}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {785--800}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/michalevsky}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/MichalevskySVBN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MingWXW015, author = {Jiang Ming and Dinghao Wu and Gaoyao Xiao and Jun Wang and Peng Liu}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {TaintPipe: Pipelined Symbolic Taint Analysis}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {65--80}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/ming}, timestamp = {Thu, 18 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/MingWXW015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MitchellWR15, author = {Michael Mitchell and An{-}I Andy Wang and Peter L. Reiher}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Cashtags: Protecting the Input and Display of Sensitive Data}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {961--976}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/mitchell}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/MitchellWR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/NanYYZGW15, author = {Yuhong Nan and Min Yang and Zhemin Yang and Shunfan Zhou and Guofei Gu and Xiaofeng Wang}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {UIPicker: User-Input Privacy Identification in Mobile Applications}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {993--1008}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/nan}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/NanYYZGW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/NelmsPAA15, author = {Terry Nelms and Roberto Perdisci and Manos Antonakakis and Mustaque Ahamad}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {WebWitness: Investigating, Categorizing, and Mitigating Malware Download Paths}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {1025--1040}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/nelms}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/NelmsPAA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/OltroggeAD0F15, author = {Marten Oltrogge and Yasemin Acar and Sergej Dechand and Matthew Smith and Sascha Fahl}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {To Pin or Not to Pin-Helping App Developers Bullet Proof Their {TLS} Connections}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {239--254}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/oltrogge}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/OltroggeAD0F15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/PellegrinoBWS15, author = {Giancarlo Pellegrino and Davide Balzarotti and Stefan Winter and Neeraj Suri}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {In the Compression Hornet's Nest: {A} Security Study of Data Compression in Network Services}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {801--816}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/pellegrino}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/PellegrinoBWS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Pinkas0SZ15, author = {Benny Pinkas and Thomas Schneider and Gil Segev and Michael Zohner}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Phasing: Private Set Intersection Using Permutation-based Hashing}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {515--530}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/pinkas}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/Pinkas0SZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RamosE15, author = {David A. Ramos and Dawson R. Engler}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Under-Constrained Symbolic Execution: Correctness Checking for Real Code}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {49--64}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/ramos}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/RamosE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RaneLT15, author = {Ashay Rane and Calvin Lin and Mohit Tiwari}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Raccoon: Closing Digital Side-Channels through Obfuscated Execution}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {431--446}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/rane}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/RaneLT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ReavesSBCT15, author = {Bradley Reaves and Ethan Shernan and Adam Bates and Henry Carter and Patrick Traynor}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network Edge}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {833--848}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/reaves-boxed}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/ReavesSBCT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ReavesSBTB15, author = {Bradley Reaves and Nolen Scaife and Adam Bates and Patrick Traynor and Kevin R. B. Butler}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {17--32}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/reaves}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/ReavesSBTB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RenFKSSDD15, author = {Ling Ren and Christopher W. Fletcher and Albert Kwon and Emil Stefanov and Elaine Shi and Marten van Dijk and Srinivas Devadas}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Constants Count: Practical Improvements to Oblivious {RAM}}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {415--430}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/ren-ling}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/RenFKSSDD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RenZXW015, author = {Chuangang Ren and Yulong Zhang and Hui Xue and Tao Wei and Peng Liu}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Towards Discovering and Understanding Task Hijacking in Android}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {945--959}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/ren-chuangang}, timestamp = {Thu, 26 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/RenZXW015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RuiterP15, author = {Joeri de Ruiter and Erik Poll}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Protocol State Fuzzing of {TLS} Implementations}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {193--206}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/de-ruiter}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/RuiterP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SabottkeSD15, author = {Carl Sabottke and Octavian Suciu and Tudor Dumitras}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {1041--1056}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/sabottke}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/SabottkeSD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ShinSM15, author = {Eui Chul Richard Shin and Dawn Song and Reza Moazzezi}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Recognizing Functions in Binaries with Neural Networks}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {611--626}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/shin}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/ShinSM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SmolyarBT15, author = {Igor Smolyar and Muli Ben{-}Yehuda and Dan Tsafrir}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Securing Self-Virtualizing Ethernet Devices}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {335--350}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/smolyar}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/SmolyarBT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SonSKPNCCK15, author = {Yunmok Son and Hocheol Shin and Dongkwan Kim and Young{-}Seok Park and Juhwan Noh and Kibum Choi and Jungwoo Choi and Yongdae Kim}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {881--896}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/son}, timestamp = {Thu, 23 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/SonSKPNCCK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SoskaC15, author = {Kyle Soska and Nicolas Christin}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {33--48}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/soska}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/SoskaC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/StringhiniMJEKV15, author = {Gianluca Stringhini and Pierre Mourlanne and Gr{\'{e}}goire Jacob and Manuel Egele and Christopher Kruegel and Giovanni Vigna}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {{EVILCOHORT:} Detecting Communities of Malicious Accounts on Online Services}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {563--578}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/stringhini}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/StringhiniMJEKV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SunEVLRCM15, author = {Yixin Sun and Anne Edmundson and Laurent Vanbever and Oscar Li and Jennifer Rexford and Mung Chiang and Prateek Mittal}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {{RAPTOR:} Routing Attacks on Privacy in Tor}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {271--286}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/sun}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/SunEVLRCM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/UrSBCCKKMMS15, author = {Blase Ur and Sean M. Segreti and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor and Saranga Komanduri and Darya Kurilova and Michelle L. Mazurek and William Melicher and Richard Shay}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Measuring Real-World Accuracies and Biases in Modeling Password Guessability}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {463--481}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/ur}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/UrSBCCKKMMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/VanhoefP15, author = {Mathy Vanhoef and Frank Piessens}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {All Your Biases Belong to Us: Breaking {RC4} in {WPA-TKIP} and {TLS}}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {97--112}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/vanhoef}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/VanhoefP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/VaradarajanZRS15, author = {Venkatanathan Varadarajan and Yinqian Zhang and Thomas Ristenpart and Michael M. Swift}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {A Placement Vulnerability Study in Multi-Tenant Public Clouds}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {913--928}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/varadarajan}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/VaradarajanZRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WangERZNXZA15, author = {Ruowen Wang and William Enck and Douglas S. Reeves and Xinwen Zhang and Peng Ning and Dingbang Xu and Wu Zhou and Ahmed M. Azab}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {351--366}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/wang-ruowen}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/WangERZNXZA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WangWW15, author = {Shuai Wang and Pei Wang and Dinghao Wu}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Reassembleable Disassembling}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {627--642}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/wang-shuai}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/WangWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WeissbacherRKKV15, author = {Michael Weissbacher and William K. Robertson and Engin Kirda and Christopher Kruegel and Giovanni Vigna}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {737--752}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/weissbacher}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/WeissbacherRKKV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WijesekeraBHEWB15, author = {Primal Wijesekera and Arjun Baokar and Ashkan Hosseini and Serge Egelman and David A. Wagner and Konstantin Beznosov}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Android Permissions Remystified: {A} Field Study on Contextual Integrity}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {499--514}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/wijesekera}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/WijesekeraBHEWB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/XuWW15, author = {Zhang Xu and Haining Wang and Zhenyu Wu}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {A Measurement Study on Co-residence Threat inside the Cloud}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {929--944}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/xu}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/XuWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ZhengJLDCWW15, author = {Xiaofeng Zheng and Jian Jiang and Jinjin Liang and Hai{-}Xin Duan and Shuo Chen and Tao Wan and Nicholas Weaver}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Cookies Lack Integrity: Real-World Implications}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {707--721}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/zheng}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ZhengJLDCWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/uss/2015, editor = {Jaeyeon Jung and Thorsten Holz}, title = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.