Search dblp for Publications

export results for "toc:db/conf/uss/uss2015.bht:"

 download as .bib file

@inproceedings{DBLP:conf/uss/0001B0SS15,
  author       = {Michael Backes and
                  Sven Bugiel and
                  Christian Hammer and
                  Oliver Schranz and
                  Philipp von Styp{-}Rekowsky},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Boxify: Full-fledged App Sandboxing for Stock Android},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {691--706},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/backes},
  timestamp    = {Mon, 01 Feb 2021 08:42:57 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/0001B0SS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/0012WLWZHZ015,
  author       = {Kai Chen and
                  Peng Wang and
                  Yeonjoon Lee and
                  XiaoFeng Wang and
                  Nan Zhang and
                  Heqing Huang and
                  Wei Zou and
                  Peng Liu},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats
                  at the Google-Play Scale},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {659--674},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/chen-kai},
  timestamp    = {Tue, 28 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/0012WLWZHZ015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AraujoH15,
  author       = {Frederico Araujo and
                  Kevin W. Hamlen},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Compiler-instrumented, Dynamic Secret-Redaction of Legacy Processes
                  for Attacker Deception},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {145--159},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/araujo},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/AraujoH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AsghariCE15,
  author       = {Hadi Asghari and
                  Michael Ciere and
                  Michel J. G. van Eeten},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Post-Mortem of a Zombie: Conficker Cleanup After Six Years},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {1--16},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/asghari},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/AsghariCE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BatesTBM15,
  author       = {Adam Bates and
                  Dave Tian and
                  Kevin R. B. Butler and
                  Thomas Moyer},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Trustworthy Whole-System Provenance for the Linux Kernel},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {319--334},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/bates},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BatesTBM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BeringerPYA15,
  author       = {Lennart Beringer and
                  Adam Petcher and
                  Katherine Q. Ye and
                  Andrew W. Appel},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Verified Correctness and Security of OpenSSL {HMAC}},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {207--221},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/beringer},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BeringerPYA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BorgolteKV15,
  author       = {Kevin Borgolte and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Meerkat: Detecting Website Defacements through Image-based Object
                  Recognition},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {595--610},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/borgolte},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BorgolteKV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Buscher015,
  author       = {Niklas B{\"{u}}scher and
                  Stefan Katzenbeisser},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Faster Secure Computation through Automatic Parallelization},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {531--546},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/buescher},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Buscher015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/CarliniBPWG15,
  author       = {Nicholas Carlini and
                  Antonio Barresi and
                  Mathias Payer and
                  David A. Wagner and
                  Thomas R. Gross},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Control-Flow Bending: On the Effectiveness of Control-Flow Integrity},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {161--176},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/carlini},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/CarliniBPWG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ChenCBLZG15,
  author       = {Jin Chen and
                  Haibo Chen and
                  Erick Bauman and
                  Zhiqiang Lin and
                  Binyu Zang and
                  Haibing Guan},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {You Shouldn't Collect My Secrets: Thwarting Sensitive Keystroke Leakage
                  in Mobile {IME} Apps},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {657--690},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/chen-jin},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ChenCBLZG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/DinhSCOZ15,
  author       = {Tien Tuan Anh Dinh and
                  Prateek Saxena and
                  Ee{-}Chien Chang and
                  Beng Chin Ooi and
                  Chunwang Zhang},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {{M2R:} Enabling Stronger Privacy in MapReduce Computation},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {447--462},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/dinh},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/DinhSCOZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/DyerCS15,
  author       = {Kevin P. Dyer and
                  Scott E. Coull and
                  Thomas Shrimpton},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Marionette: {A} Programmable Network Traffic Obfuscation System},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {367--382},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/dyer},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/DyerCS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/EverspaughCSJR15,
  author       = {Adam Everspaugh and
                  Rahul Chatterjee and
                  Samuel Scott and
                  Ari Juels and
                  Thomas Ristenpart},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {The Pythia {PRF} Service},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {547--562},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/everspaugh},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/EverspaughCSJR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/FawazFS15,
  author       = {Kassem Fawaz and
                  Huan Feng and
                  Kang G. Shin},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Anatomization and Protection of Mobile Apps' Location Privacy Threats},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {753--768},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/fawaz},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/FawazFS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/FayazTSB15,
  author       = {Seyed Kaveh Fayaz and
                  Yoshiaki Tobioka and
                  Vyas Sekar and
                  Michael D. Bailey},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Bohatei: Flexible and Elastic DDoS Defense},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {817--832},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/fayaz},
  timestamp    = {Mon, 20 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/FayazTSB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/FedericoCSKV15,
  author       = {Alessandro Di Federico and
                  Amat Cama and
                  Yan Shoshitaishvili and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {How the {ELF} Ruined Christmas},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {643--658},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/di-frederico},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/FedericoCSKV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/FengFS15,
  author       = {Huan Feng and
                  Kassem Fawaz and
                  Kang G. Shin},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {LinkDroid: Reducing Unregulated Aggregation of App Usage Behaviors},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {769--783},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/feng},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/FengFS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GarmanPM15,
  author       = {Christina Garman and
                  Kenneth G. Paterson and
                  Thyla van der Merwe},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Attacks Only Get Better: Password Recovery Attacks Against {RC4} in
                  {TLS}},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {113--128},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/garman},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/GarmanPM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GrazianoCBLB15,
  author       = {Mariano Graziano and
                  Davide Canali and
                  Leyla Bilge and
                  Andrea Lanzi and
                  Davide Balzarotti},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Needles in a Haystack: Mining Information from Public Dynamic Analysis
                  Sandboxes for Malware Intelligence},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {1057--1072},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/graziano},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/GrazianoCBLB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GrussSM15,
  author       = {Daniel Gruss and
                  Raphael Spreitzer and
                  Stefan Mangard},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Cache Template Attacks: Automating Attacks on Inclusive Last-Level
                  Caches},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {897--912},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/gruss},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/GrussSM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GuriKHKME15,
  author       = {Mordechai Guri and
                  Assaf Kachlon and
                  Ofer Hasson and
                  Gabi Kedma and
                  Yisroel Mirsky and
                  Yuval Elovici},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {GSMem: Data Exfiltration from Air-Gapped Computers over {GSM} Frequencies},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {849--864},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/guri},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/GuriKHKME15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HeilmanKZG15,
  author       = {Ethan Heilman and
                  Alison Kendler and
                  Aviv Zohar and
                  Sharon Goldberg},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Eclipse Attacks on Bitcoin's Peer-to-Peer Network},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {129--144},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/heilman},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/HeilmanKZG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HuCASL15,
  author       = {Hong Hu and
                  Zheng Leong Chua and
                  Sendroiu Adrian and
                  Prateek Saxena and
                  Zhenkai Liang},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Automatic Generation of Data-Oriented Exploits},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {177--192},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/hu},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/HuCASL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HuangLXWLZJ15,
  author       = {Jianjun Huang and
                  Zhichun Li and
                  Xusheng Xiao and
                  Zhenyu Wu and
                  Kangjie Lu and
                  Xiangyu Zhang and
                  Guofei Jiang},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {{SUPOR:} Precise and Scalable Sensitive User Input Detection for Android
                  Apps},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {977--992},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/huang},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/HuangLXWLZJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/IslamHLNVYG15,
  author       = {Aylin Caliskan Islam and
                  Richard E. Harang and
                  Andrew Liu and
                  Arvind Narayanan and
                  Clare R. Voss and
                  Fabian Yamaguchi and
                  Rachel Greenstadt},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {De-anonymizing Programmers via Code Stylometry},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {255--270},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/caliskan-islam},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/IslamHLNVYG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JagpalDGMPRT15,
  author       = {Nav Jagpal and
                  Eric Dingle and
                  Jean{-}Philippe Gravel and
                  Panayiotis Mavrommatis and
                  Niels Provos and
                  Moheeb Abu Rajab and
                  Kurt Thomas},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Trends and Lessons from Three Years Fighting Malicious Extensions},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {579--593},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/jagpal},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/JagpalDGMPRT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JiLMHB15,
  author       = {Shouling Ji and
                  Weiqing Li and
                  Prateek Mittal and
                  Xin Hu and
                  Raheem A. Beyah},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {SecGraph: {A} Uniform and Open-source Evaluation System for Graph
                  Data Anonymization and De-anonymization},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {303--318},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/ji},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/JiLMHB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Kaloper-Mersinjak15,
  author       = {David Kaloper{-}Mersinjak and
                  Hannes Mehnert and
                  Anil Madhavapeddy and
                  Peter Sewell},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Not-Quite-So-Broken {TLS:} Lessons in Re-Engineering a Security Protocol
                  Specification and Implementation},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {223--238},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/kaloper-mersinjak},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Kaloper-Mersinjak15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KarapanosMSC15,
  author       = {Nikolaos Karapanos and
                  Claudio Marforio and
                  Claudio Soriente and
                  Srdjan Capkun},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {483--498},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/karapanos},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/KarapanosMSC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KwonALDD15,
  author       = {Albert Kwon and
                  Mashael AlSabah and
                  David Lazar and
                  Marc Dacier and
                  Srinivas Devadas},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden
                  Services},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {287--302},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/kwon},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/KwonALDD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LeeSKL15,
  author       = {Byoungyoung Lee and
                  Chengyu Song and
                  Taesoo Kim and
                  Wenke Lee},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Type Casting Verification: Stopping an Emerging Attack Vector},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {81--96},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/lee},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/LeeSKL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LekiesSWJ15,
  author       = {Sebastian Lekies and
                  Ben Stock and
                  Martin Wentzel and
                  Martin Johns},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {The Unexpected Dangers of Dynamic JavaScript},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {723--735},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/lekies},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/LekiesSWJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LiuSZNKBL15,
  author       = {Yang Liu and
                  Armin Sarabi and
                  Jing Zhang and
                  Parinaz Naghizadeh and
                  Manish Karir and
                  Michael D. Bailey and
                  Mingyan Liu},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {1009--1024},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/liu},
  timestamp    = {Mon, 20 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/LiuSZNKBL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MastiRRMTC15,
  author       = {Ramya Jayaram Masti and
                  Devendra Rai and
                  Aanjhan Ranganathan and
                  Christian M{\"{u}}ller and
                  Lothar Thiele and
                  Srdjan Capkun},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Thermal Covert Channels on Multi-core Platforms},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {865--880},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/masti},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/MastiRRMTC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/McGregorCHR15,
  author       = {Susan E. McGregor and
                  Polina Charters and
                  Tobin Holliday and
                  Franziska Roesner},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Investigating the Computer Security Practices and Needs of Journalists},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {399--414},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/mcgregor},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/McGregorCHR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MelaraBBFF15,
  author       = {Marcela S. Melara and
                  Aaron Blankstein and
                  Joseph Bonneau and
                  Edward W. Felten and
                  Michael J. Freedman},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {{CONIKS:} Bringing Key Transparency to End Users},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {383--398},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/melara},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/MelaraBBFF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MichalevskySVBN15,
  author       = {Yan Michalevsky and
                  Aaron Schulman and
                  Gunaa Arumugam Veerapandian and
                  Dan Boneh and
                  Gabi Nakibly},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {PowerSpy: Location Tracking Using Mobile Device Power Analysis},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {785--800},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/michalevsky},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/MichalevskySVBN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MingWXW015,
  author       = {Jiang Ming and
                  Dinghao Wu and
                  Gaoyao Xiao and
                  Jun Wang and
                  Peng Liu},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {TaintPipe: Pipelined Symbolic Taint Analysis},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {65--80},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/ming},
  timestamp    = {Thu, 18 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/MingWXW015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MitchellWR15,
  author       = {Michael Mitchell and
                  An{-}I Andy Wang and
                  Peter L. Reiher},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Cashtags: Protecting the Input and Display of Sensitive Data},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {961--976},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/mitchell},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/MitchellWR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/NanYYZGW15,
  author       = {Yuhong Nan and
                  Min Yang and
                  Zhemin Yang and
                  Shunfan Zhou and
                  Guofei Gu and
                  Xiaofeng Wang},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {UIPicker: User-Input Privacy Identification in Mobile Applications},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {993--1008},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/nan},
  timestamp    = {Thu, 14 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/NanYYZGW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/NelmsPAA15,
  author       = {Terry Nelms and
                  Roberto Perdisci and
                  Manos Antonakakis and
                  Mustaque Ahamad},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {WebWitness: Investigating, Categorizing, and Mitigating Malware Download
                  Paths},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {1025--1040},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/nelms},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/NelmsPAA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/OltroggeAD0F15,
  author       = {Marten Oltrogge and
                  Yasemin Acar and
                  Sergej Dechand and
                  Matthew Smith and
                  Sascha Fahl},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {To Pin or Not to Pin-Helping App Developers Bullet Proof Their {TLS}
                  Connections},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {239--254},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/oltrogge},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/OltroggeAD0F15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/PellegrinoBWS15,
  author       = {Giancarlo Pellegrino and
                  Davide Balzarotti and
                  Stefan Winter and
                  Neeraj Suri},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {In the Compression Hornet's Nest: {A} Security Study of Data Compression
                  in Network Services},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {801--816},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/pellegrino},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/PellegrinoBWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Pinkas0SZ15,
  author       = {Benny Pinkas and
                  Thomas Schneider and
                  Gil Segev and
                  Michael Zohner},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Phasing: Private Set Intersection Using Permutation-based Hashing},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {515--530},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/pinkas},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Pinkas0SZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RamosE15,
  author       = {David A. Ramos and
                  Dawson R. Engler},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Under-Constrained Symbolic Execution: Correctness Checking for Real
                  Code},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {49--64},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/ramos},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/RamosE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RaneLT15,
  author       = {Ashay Rane and
                  Calvin Lin and
                  Mohit Tiwari},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Raccoon: Closing Digital Side-Channels through Obfuscated Execution},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {431--446},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/rane},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/RaneLT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ReavesSBCT15,
  author       = {Bradley Reaves and
                  Ethan Shernan and
                  Adam Bates and
                  Henry Carter and
                  Patrick Traynor},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network
                  Edge},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {833--848},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/reaves-boxed},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ReavesSBCT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ReavesSBTB15,
  author       = {Bradley Reaves and
                  Nolen Scaife and
                  Adam Bates and
                  Patrick Traynor and
                  Kevin R. B. Butler},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking
                  Applications in the Developing World},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {17--32},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/reaves},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ReavesSBTB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RenFKSSDD15,
  author       = {Ling Ren and
                  Christopher W. Fletcher and
                  Albert Kwon and
                  Emil Stefanov and
                  Elaine Shi and
                  Marten van Dijk and
                  Srinivas Devadas},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Constants Count: Practical Improvements to Oblivious {RAM}},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {415--430},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/ren-ling},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/RenFKSSDD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RenZXW015,
  author       = {Chuangang Ren and
                  Yulong Zhang and
                  Hui Xue and
                  Tao Wei and
                  Peng Liu},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Towards Discovering and Understanding Task Hijacking in Android},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {945--959},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/ren-chuangang},
  timestamp    = {Thu, 26 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/RenZXW015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RuiterP15,
  author       = {Joeri de Ruiter and
                  Erik Poll},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Protocol State Fuzzing of {TLS} Implementations},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {193--206},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/de-ruiter},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/RuiterP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SabottkeSD15,
  author       = {Carl Sabottke and
                  Octavian Suciu and
                  Tudor Dumitras},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter
                  for Predicting Real-World Exploits},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {1041--1056},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/sabottke},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/SabottkeSD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ShinSM15,
  author       = {Eui Chul Richard Shin and
                  Dawn Song and
                  Reza Moazzezi},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Recognizing Functions in Binaries with Neural Networks},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {611--626},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/shin},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ShinSM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SmolyarBT15,
  author       = {Igor Smolyar and
                  Muli Ben{-}Yehuda and
                  Dan Tsafrir},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Securing Self-Virtualizing Ethernet Devices},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {335--350},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/smolyar},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/SmolyarBT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SonSKPNCCK15,
  author       = {Yunmok Son and
                  Hocheol Shin and
                  Dongkwan Kim and
                  Young{-}Seok Park and
                  Juhwan Noh and
                  Kibum Choi and
                  Jungwoo Choi and
                  Yongdae Kim},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {881--896},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/son},
  timestamp    = {Thu, 23 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/SonSKPNCCK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SoskaC15,
  author       = {Kyle Soska and
                  Nicolas Christin},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Measuring the Longitudinal Evolution of the Online Anonymous Marketplace
                  Ecosystem},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {33--48},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/soska},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/SoskaC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/StringhiniMJEKV15,
  author       = {Gianluca Stringhini and
                  Pierre Mourlanne and
                  Gr{\'{e}}goire Jacob and
                  Manuel Egele and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {{EVILCOHORT:} Detecting Communities of Malicious Accounts on Online
                  Services},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {563--578},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/stringhini},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/StringhiniMJEKV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SunEVLRCM15,
  author       = {Yixin Sun and
                  Anne Edmundson and
                  Laurent Vanbever and
                  Oscar Li and
                  Jennifer Rexford and
                  Mung Chiang and
                  Prateek Mittal},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {{RAPTOR:} Routing Attacks on Privacy in Tor},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {271--286},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/sun},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/SunEVLRCM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/UrSBCCKKMMS15,
  author       = {Blase Ur and
                  Sean M. Segreti and
                  Lujo Bauer and
                  Nicolas Christin and
                  Lorrie Faith Cranor and
                  Saranga Komanduri and
                  Darya Kurilova and
                  Michelle L. Mazurek and
                  William Melicher and
                  Richard Shay},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Measuring Real-World Accuracies and Biases in Modeling Password Guessability},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {463--481},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/ur},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/UrSBCCKKMMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/VanhoefP15,
  author       = {Mathy Vanhoef and
                  Frank Piessens},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {All Your Biases Belong to Us: Breaking {RC4} in {WPA-TKIP} and {TLS}},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {97--112},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/vanhoef},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/VanhoefP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/VaradarajanZRS15,
  author       = {Venkatanathan Varadarajan and
                  Yinqian Zhang and
                  Thomas Ristenpart and
                  Michael M. Swift},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {A Placement Vulnerability Study in Multi-Tenant Public Clouds},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {913--928},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/varadarajan},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/VaradarajanZRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WangERZNXZA15,
  author       = {Ruowen Wang and
                  William Enck and
                  Douglas S. Reeves and
                  Xinwen Zhang and
                  Peng Ning and
                  Dingbang Xu and
                  Wu Zhou and
                  Ahmed M. Azab},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {EASEAndroid: Automatic Policy Analysis and Refinement for Security
                  Enhanced Android via Large-Scale Semi-Supervised Learning},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {351--366},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/wang-ruowen},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/WangERZNXZA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WangWW15,
  author       = {Shuai Wang and
                  Pei Wang and
                  Dinghao Wu},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Reassembleable Disassembling},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {627--642},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/wang-shuai},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/WangWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WeissbacherRKKV15,
  author       = {Michael Weissbacher and
                  William K. Robertson and
                  Engin Kirda and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {ZigZag: Automatically Hardening Web Applications Against Client-side
                  Validation Vulnerabilities},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {737--752},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/weissbacher},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/WeissbacherRKKV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WijesekeraBHEWB15,
  author       = {Primal Wijesekera and
                  Arjun Baokar and
                  Ashkan Hosseini and
                  Serge Egelman and
                  David A. Wagner and
                  Konstantin Beznosov},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Android Permissions Remystified: {A} Field Study on Contextual Integrity},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {499--514},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/wijesekera},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/WijesekeraBHEWB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/XuWW15,
  author       = {Zhang Xu and
                  Haining Wang and
                  Zhenyu Wu},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {A Measurement Study on Co-residence Threat inside the Cloud},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {929--944},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/xu},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/XuWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ZhengJLDCWW15,
  author       = {Xiaofeng Zheng and
                  Jian Jiang and
                  Jinjin Liang and
                  Hai{-}Xin Duan and
                  Shuo Chen and
                  Tao Wan and
                  Nicholas Weaver},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Cookies Lack Integrity: Real-World Implications},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {707--721},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/zheng},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ZhengJLDCWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2015,
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics