Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/uss/uss2021.bht:"
@inproceedings{DBLP:conf/uss/00010LH0H0021, author = {Zhikun Zhang and Tianhao Wang and Ninghui Li and Jean Honorio and Michael Backes and Shibo He and Jiming Chen and Yang Zhang}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {PrivSyn: Differentially Private Data Synthesis}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {929--946}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/zhang-zhikun}, timestamp = {Mon, 20 Nov 2023 08:57:49 +0100}, biburl = {https://dblp.org/rec/conf/uss/00010LH0H0021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/000121, author = {Susan Landau}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Susan Landau, Tufts University}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/keynote-landau}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/000121.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/0001AFHWL21, author = {Kevin Bock and Abdulrahman Alaraj and Yair Fax and Kyle Hurley and Eric Wustrow and Dave Levin}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Weaponizing Middleboxes for {TCP} Reflected Amplification}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3345--3361}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/bock}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/0001AFHWL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/0001BSM21, author = {Chong Xiang and Arjun Nitin Bhagoji and Vikash Sehwag and Prateek Mittal}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {PatchGuard: {A} Provably Robust Defense against Adversarial Patches via Small Receptive Fields and Masking}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2237--2254}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/xiang}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/0001BSM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/0001KR0S21, author = {Lorenzo Grassi and Dmitry Khovratovich and Christian Rechberger and Arnab Roy and Markus Schofnegger}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Poseidon: {A} New Hash Function for Zero-Knowledge Proof Systems}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {519--535}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/grassi}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/0001KR0S21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/0001L21, author = {Daniel Perez and Benjamin Livshits}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Smart Contract Vulnerabilities: Vulnerable Does Not Imply Exploited}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1325--1341}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/perez}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/0001L21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/0001TO21, author = {Wanrong Zhang and Shruti Tople and Olga Ohrimenko}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Leakage of Dataset Properties in Multi-Party Machine Learning}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2687--2704}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/zhang-wanrong}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/0001TO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/00020D21, author = {Chenglong Fu and Qiang Zeng and Xiaojiang Du}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {HAWatcher: Semantics-Aware Anomaly Detection for Appified Smart Homes}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {4223--4240}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/fu-chenglong}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/00020D21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/0002JW021, author = {Hang Hu and Steve T. K. Jan and Yang Wang and Gang Wang}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Assessing Browser-level Defense against IDN-based Phishing}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3739--3756}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/hu-hang}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/0002JW021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/0002WXWS0J21, author = {Bingyu Shen and Lili Wei and Chengcheng Xiang and Yudong Wu and Mingyao Shen and Yuanyuan Zhou and Xinxin Jin}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Can Systems Explain Permissions Better? Understanding Users' Misperceptions under Smartphone Runtime Permission Model}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {751--768}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/shen-bingyu}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/0002WXWS0J21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/00100B21, author = {Jie Huang and Michael Backes and Sven Bugiel}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {A11y and Privacy don't have to be mutually exclusive: Constraining Accessibility Service Misuse on Android}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3631--3648}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/huang}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/00100B21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/0026G0Z21, author = {Wei Zhou and Le Guan and Peng Liu and Yuqing Zhang}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Automatic Firmware Emulation through Invalidity-guided Knowledge Inference}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2007--2024}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/zhou}, timestamp = {Thu, 18 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/0026G0Z21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/0057CS21, author = {Chen Chen and Anrin Chakraborti and Radu Sion}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {{PEARL:} Plausibly Deniable Flash Translation Layer using {WOM} coding}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1109--1126}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/chen-chen}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/0057CS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AaferYSS0Y21, author = {Yousra Aafer and Wei You and Yi Sun and Yu Shi and Xiangyu Zhang and Heng Yin}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2759--2776}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/aafer}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/AaferYSS0Y21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AbubakarAFX21, author = {Muhammad Abubakar and Adil Ahmad and Pedro Fonseca and Dongyan Xu}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {{SHARD:} Fine-Grained Kernel Specialization with Context-Aware Hardening}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2435--2452}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/abubakar}, timestamp = {Tue, 02 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/AbubakarAFX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AcharyaV21, author = {Bhupendra Acharya and Phani Vadrevu}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {PhishPrint: Evading Phishing Detection Crawlers by Prior Profiling}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3775--3792}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/acharya}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/AcharyaV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AhmadiFWL21, author = {Mansour Ahmadi and Reza Mirzazade Farkhani and Ryan Williams and Long Lu}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Finding Bugs Using Your Own Code: Detecting Functionally-similar yet Inconsistent Code}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2025--2040}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/ahmadi}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/AhmadiFWL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AhmadpanahHBOS21, author = {Mohammad M. Ahmadpanah and Daniel Hedin and Musard Balliu and Lars Eric Olsson and Andrei Sabelfeld}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {SandTrap: Securing JavaScript-driven Trigger-Action Platforms}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2899--2916}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/ahmadpanah}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/AhmadpanahHBOS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Akgul0DM21, author = {Omer Akgul and Wei Bai and Shruti Das and Michelle L. Mazurek}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Evaluating In-Workflow Messages for Improving Mental Models of End-to-End Encryption}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {447--464}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/akgul}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Akgul0DM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AlbartusNSFPT21, author = {Nils Albartus and Clemens Nasenberg and Florian Stolz and Marc Fyrbiak and Christof Paar and Russell Tessier}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {On the Design and Misuse of Microcoded (Embedded) Processors - {A} Cautionary Note}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {267--284}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/albartus}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/AlbartusNSFPT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AlbrechtBJM21, author = {Martin R. Albrecht and Jorge Blasco and Rikke Bjerg Jensen and Lenka Marekov{\'{a}}}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Collective Information Security in Large-Scale Urban Protests: the Case of Hong Kong}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3363--3380}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/albrecht}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/AlbrechtBJM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AlharbiARRA21, author = {Fatemah Alharbi and Arwa Alrawais and Abdulrahman Bin Rabiah and Silas Richelson and Nael B. Abu{-}Ghazaleh}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {CSProp: Ciphertext and Signature Propagation Low-Overhead Public-Key Cryptosystem for IoT Environments}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {609--626}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/alharbi}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/AlharbiARRA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AliLP0SSY21, author = {Asra Ali and Tancr{\`{e}}de Lepoint and Sarvar Patel and Mariana Raykova and Phillipp Schoppmann and Karn Seth and Kevin Yeo}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Communication-Computation Trade-offs in {PIR}}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1811--1828}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/ali}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/AliLP0SSY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AliapouliosBBLM21, author = {Maxwell Aliapoulios and Cameron Ballard and Rasika Bhalerao and Tobias Lauinger and Damon McCoy}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Swiped: Analyzing Ground-truth Data of a Marketplace for Stolen Debit and Credit Cards}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {4151--4168}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/aliapoulios}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/AliapouliosBBLM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AlrawiIPKBHHS21, author = {Omar Alrawi and Moses Ike and Matthew Pruett and Ranjita Pai Kasturi and Srimanta Barua and Taleb Hirani and Brennan Hill and Brendan Saltaformaggio}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Forecasting Malware Capabilities From Cyber Attack Memory Images}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3523--3540}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/alrawi-forecasting}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/AlrawiIPKBHHS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AlrawiLVCSMA21, author = {Omar Alrawi and Charles Lever and Kevin Valakuzhy and Ryan Court and Kevin Z. Snow and Fabian Monrose and Manos Antonakakis}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {The Circle Of Life: {A} Large-Scale Study of The IoT Malware Lifecycle}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3505--3522}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/alrawi-circle}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/AlrawiLVCSMA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AlsaheelNMYWC0X21, author = {Abdulellah Alsaheel and Yuhong Nan and Shiqing Ma and Le Yu and Gregory Walkup and Z. Berkay Celik and Xiangyu Zhang and Dongyan Xu}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {{ATLAS:} {A} Sequence-based Learning Approach for Attack Investigation}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3005--3022}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/alsaheel}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/AlsaheelNMYWC0X21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AnthoineDJMPHR21, author = {Gaspard Anthoine and Jean{-}Guillaume Dumas and M{\'{e}}lanie de Jonghe and Aude Maignan and Cl{\'{e}}ment Pernet and Michael Hanling and Daniel S. Roche}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Dynamic proofs of retrievability with low server storage}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {537--554}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/anthoine}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/AnthoineDJMPHR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AumayrMKM21, author = {Lukas Aumayr and Pedro Moreno{-}Sanchez and Aniket Kate and Matteo Maffei}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Blitz: Secure Multi-Hop Payments Without Two-Phase Commits}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {4043--4060}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/aumayr}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/AumayrMKM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AvllazagajZBBD21, author = {Erin Avllazagaj and Ziyun Zhu and Leyla Bilge and Davide Balzarotti and Tudor Dumitras}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {When Malware Changed Its Mind: An Empirical Study of Variable Program Behaviors in the Real World}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3487--3504}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/avllazagaj}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/AvllazagajZBBD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AziziTWMPJRV21, author = {Ahmadreza Azizi and Ibrahim Asadullah Tahmid and Asim Waheed and Neal Mangaokar and Jiameng Pu and Mobin Javed and Chandan K. Reddy and Bimal Viswanath}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {T-Miner: {A} Generative Approach to Defend Against Trojan Attacks on DNN-based Text Classification}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2255--2272}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/azizi}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/AziziTWMPJRV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BagdasaryanS21, author = {Eugene Bagdasaryan and Vitaly Shmatikov}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Blind Backdoors in Deep Learning Models}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1505--1521}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/bagdasaryan}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/BagdasaryanS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BahmaniBDJKSS21, author = {Raad Bahmani and Ferdinand Brasser and Ghada Dessouky and Patrick Jauernig and Matthias Klimmek and Ahmad{-}Reza Sadeghi and Emmanuel Stapf}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {{CURE:} {A} Security Architecture with CUstomizable and Resilient Enclaves}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1073--1090}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/bahmani}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/BahmaniBDJKSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BaiLL021, author = {Jia{-}Ju Bai and Tuo Li and Kangjie Lu and Shi{-}Min Hu}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Static Detection of Unsafe {DMA} Accesses in Device Drivers}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1629--1645}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/bai}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/BaiLL021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BasinST21, author = {David A. Basin and Ralf Sasse and Jorge Toro{-}Pozo}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Card Brand Mixup Attack: Bypassing the {PIN} in non-Visa Cards by Using Them for Visa Transactions}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {179--194}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/basin}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/BasinST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BijmansBSNW21, author = {Hugo L. J. Bijmans and Tim M. Booij and Anneke Schwedersky and Aria Nedgabat and Rolf van Wegberg}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Catching Phishers By Their Bait: Investigating the Dutch Phishing Landscape through Phishing Kit Detection}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3757--3774}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/bijmans}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/BijmansBSNW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BilogrevicEPTHP21, author = {Igor Bilogrevic and Balazs Engedy and Judson L. Porter III and Nina Taft and Kamila Hasanbega and Andrew Paseltiner and Hwi Kyoung Lee and Edward Jung and Meggyn Watkins and P. J. McLachlan and Jason James}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {"Shhh...be quiet!" Reducing the Unwanted Interruptions of Notification Permission Prompts on Chrome}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {769--784}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/bilogrevic}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/BilogrevicEPTHP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Birge-LeeWMSRM21, author = {Henry Birge{-}Lee and Liang Wang and Daniel McCarney and Roland Shoemaker and Jennifer Rexford and Prateek Mittal}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Experiences Deploying Multi-Vantage-Point Domain Validation at Let's Encrypt}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {4311--4327}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/birge-lee}, timestamp = {Thu, 04 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/Birge-LeeWMSRM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BrengelR21, author = {Michael Brengel and Christian Rossow}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {{YARIX:} Scalable YARA-based Malware Intelligence}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3541--3558}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/brengel}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/BrengelR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BrinkmannDMP0SS21, author = {Marcus Brinkmann and Christian Dresen and Robert Merget and Damian Poddebniak and Jens M{\"{u}}ller and Juraj Somorovsky and J{\"{o}}rg Schwenk and Sebastian Schinzel}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {{ALPACA:} Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in {TLS} Authentication}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {4293--4310}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/brinkmann}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/BrinkmannDMP0SS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BulekovJE21, author = {Alexander Bulekov and Rasoul Jahanshahi and Manuel Egele}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Saphire: Sandboxing {PHP} Applications with Tailored System Call Allowlists}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2881--2898}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/bulekov}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/BulekovJE21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/CabarcosHB0S21, author = {Patricia Arias Cabarcos and Thilo Habrich and Karen Becker and Christian Becker and Thorsten Strufe}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Inexpensive Brainwave Authentication: New Techniques and Insights on User Acceptance}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {55--72}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/arias-cabarcos}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/CabarcosHB0S21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/CaoJG21, author = {Xiaoyu Cao and Jinyuan Jia and Neil Zhenqiang Gong}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Data Poisoning Attacks to Local Differential Privacy Protocols}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {947--964}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/cao-xiaoyu}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/CaoJG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/CaoXPLTA21, author = {Weicheng Cao and Chunqiu Xia and Sai Teja Peddinti and David Lie and Nina Taft and Lisa M. Austin}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {A Large Scale Study of User Behavior, Expectations and Engagement with Android Permissions}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {803--820}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/cao-weicheng}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/CaoXPLTA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Carlini21, author = {Nicholas Carlini}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Poisoning the Unlabeled Dataset of Semi-Supervised Learning}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1577--1592}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/carlini-poisoning}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Carlini21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/CarliniTWJHLRBS21, author = {Nicholas Carlini and Florian Tram{\`{e}}r and Eric Wallace and Matthew Jagielski and Ariel Herbert{-}Voss and Katherine Lee and Adam Roberts and Tom B. Brown and Dawn Song and {\'{U}}lfar Erlingsson and Alina Oprea and Colin Raffel}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Extracting Training Data from Large Language Models}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2633--2650}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/carlini-extracting}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/CarliniTWJHLRBS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ChatelPTH21, author = {Sylvain Chatel and Apostolos Pyrgelis and Juan Ram{\'{o}}n Troncoso{-}Pastoriza and Jean{-}Pierre Hubaux}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Privacy and Integrity Preserving Computations with {CRISP}}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2111--2128}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/chatel}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ChatelPTH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Chen0JCJ21, author = {Yizheng Chen and Shiqi Wang and Weifan Jiang and Asaf Cidon and Suman Jana}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Cost-Aware Robust Tree Ensembles for Security Applications}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2291--2308}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/chen-yizheng}, timestamp = {Thu, 27 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Chen0JCJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Chen0YCZ21, author = {Kaixiang Chen and Chao Zhang and Tingting Yin and Xingman Chen and Lei Zhao}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {VScape: Assessing and Escaping Virtual Call Protections}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1719--1736}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/chen-kaixiang}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Chen0YCZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ChenI0GY21, author = {Xutong Chen and Hassaan Irshad and Yan Chen and Ashish Gehani and Vinod Yegneswaran}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {{CLARION:} Sound and Clear Provenance Tracking for Microservice Deployments}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3989--4006}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/chen-xutong}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ChenI0GY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ChenLY21, author = {Paizhuo Chen and Lei Li and Zhice Yang}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Cross-VM and Cross-Processor Covert Channels Exploiting Processor Idle Power Management}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {733--750}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/chen-paizhuo}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ChenLY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ChenLZ21, author = {Sanchuan Chen and Zhiqiang Lin and Yinqian Zhang}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {SelectiveTaint: Efficient Data Flow Tracking With Static Binary Rewriting}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1665--1682}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/chen-sanchuan}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ChenLZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ChenVMDOG21, author = {Zitai Chen and Georgios Vasilakis and Kit Murdock and Edward Dean and David F. Oswald and Flavio D. Garcia}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {VoltPillager: Hardware-based fault injection attacks against Intel {SGX} Enclaves using the {SVID} voltage scaling interface}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {699--716}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/chen-zitai}, timestamp = {Tue, 13 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ChenVMDOG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ChenWCZ0LH0DX21, author = {Libo Chen and Yanhao Wang and Quanpu Cai and Yunfan Zhan and Hong Hu and Jiaqi Linghu and Qinsheng Hou and Chao Zhang and Haixin Duan and Zhi Xue}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Sharing More and Checking Less: Leveraging Common Input Keywords to Detect Bugs in Embedded Systems}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {303--319}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/chen-libo}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ChenWCZ0LH0DX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Cheng0LZFPM21, author = {Binlin Cheng and Jiang Ming and Erika A. Leal and Haotian Zhang and Jianming Fu and Guojun Peng and Jean{-}Yves Marion}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Obfuscation-Resilient Executable Payload Extraction From Packed Malware}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3451--3468}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/cheng-binlin}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Cheng0LZFPM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ChengJWP0X21, author = {Yushi Cheng and Xiaoyu Ji and Lixu Wang and Qi Pang and Yi{-}Chao Chen and Wenyuan Xu}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {mID: Tracing Screen Photos via Moir{\'{e}} Patterns}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2969--2986}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/cheng-yushi}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ChengJWP0X21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ChengL0CL21, author = {Haibo Cheng and Wenting Li and Ping Wang and Chao{-}Hsien Chu and Kaitai Liang}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Incrementally Updateable Honey Password Vaults}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {857--874}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/cheng-haibo}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ChengL0CL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ConsolvoKMTDB21, author = {Sunny Consolvo and Patrick Gage Kelley and Tara Matthews and Kurt Thomas and Lee Dunn and Elie Bursztein}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {"Why wouldn't someone think of democracy as a target?": Security practices {\&} challenges of people involved with {U.S.} political campaigns}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1181--1198}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/consolvo}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ConsolvoKMTDB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/CremersHK21, author = {Cas Cremers and Britta Hale and Konrad Kohbrok}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {The Complexities of Healing in Secure Group Messaging: Why Cross-Group Effects Matter}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1847--1864}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/cremers}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/CremersHK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Cronin0YW21, author = {Patrick Cronin and Xing Gao and Chengmo Yang and Haining Wang}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Charger-Surfing: Exploiting a Power Line Side-Channel for Smartphone Information Leakage}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {681--698}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/cronin}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Cronin0YW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/CuiGX0C021, author = {Tianyu Cui and Gaopeng Gou and Gang Xiong and Zhen Li and Mingxin Cui and Chang Liu}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {SiamHAN: IPv6 Address Correlation Attacks on {TLS} Encrypted Traffic via Siamese Heterogeneous Graph Attention Network}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {4329--4346}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/cui}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/CuiGX0C021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/DaiJSW21, author = {Tianxiang Dai and Philipp Jeitner and Haya Schulmann and Michael Waidner}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {The Hijackers Guide To The Galaxy: Off-Path Taking Over Internet Resources}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3147--3164}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/dai}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/DaiJSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Dalskov0K21, author = {Anders P. K. Dalskov and Daniel Escudero and Marcel Keller}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Fantastic Four: Honest-Majority Four-Party Secure Computation With Malicious Security}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2183--2200}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/dalskov}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Dalskov0K21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Damie0P21, author = {Marc Damie and Florian Hahn and Andreas Peter}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {A Highly Accurate Query-Recovery Attack against Searchable Encryption using Non-Indexed Documents}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {143--160}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/damie}, timestamp = {Fri, 26 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Damie0P21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/DingYZM21, author = {Hailun Ding and Shenao Yan and Juan Zhai and Shiqing Ma}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {{ELISE:} {A} Storage Efficient Logging System Powered by Redundancy Reduction and Representation Learning}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3023--3040}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/ding}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/DingYZM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/DowningMPL21, author = {Evan Downing and Yisroel Mirsky and Kyuhong Park and Wenke Lee}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {DeepReflect: Discovering Malicious Functionality through Binary Reconstruction}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3469--3486}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/downing}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/DowningMPL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/EisenhoferSFSKH21, author = {Thorsten Eisenhofer and Lea Sch{\"{o}}nherr and Joel Frank and Lars Speckemeier and Dorothea Kolossa and Thorsten Holz}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Dompteur: Taming Audio Adversarial Examples}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2309--2326}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/eisenhofer}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/EisenhoferSFSKH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Elbitar0N0B21, author = {Yusra Elbitar and Michael Schilling and Trung Tin Nguyen and Michael Backes and Sven Bugiel}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Explanation Beats Context: The Effect of Timing {\&} Rationales on Users' Runtime Permission Decisions}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {785--802}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/elbitar}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Elbitar0N0B21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/EskandarianCZB21, author = {Saba Eskandarian and Henry Corrigan{-}Gibbs and Matei Zaharia and Dan Boneh}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic Privacy}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1775--1792}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/eskandarian}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/EskandarianCZB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/FarkeBGDA21, author = {Florian M. Farke and David G. Balash and Maximilian Golla and Markus D{\"{u}}rmuth and Adam J. Aviv}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Are Privacy Dashboards Good for End Users? Evaluating User Perceptions and Reactions to Google's My Activity}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {483--500}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/farke}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/FarkeBGDA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/FarkhaniAL21, author = {Reza Mirzazade Farkhani and Mansour Ahmadi and Long Lu}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {PTAuth: Temporal Memory Safety via Robust Points-to Authentication}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1037--1054}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/mirzazade}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/FarkhaniAL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/FeiL000J21, author = {Peng Fei and Zhou Li and Zhiying Wang and Xiao Yu and Ding Li and Kangkook Jee}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {{SEAL:} Storage-efficient Causality Analysis on Enterprise Logs with Query-friendly Compression}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2987--3004}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/fei}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/FeiL000J21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Ferguson-Walter21, author = {Kimberly Ferguson{-}Walter and Maxine Major and Chelsea K. Johnson and Daniel H. Muhleman}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Examining the Efficacy of Decoy-based and Psychological Cyber Deception}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1127--1144}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/ferguson-walter}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Ferguson-Walter21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/FioraldiDB21, author = {Andrea Fioraldi and Daniele Cono D'Elia and Davide Balzarotti}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {The Use of Likely Invariants as Feedback for Fuzzers}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2829--2846}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/fioraldi}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/FioraldiDB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/FuC21, author = {Xiaoqin Fu and Haipeng Cai}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {FlowDist: Multi-Staged Refinement-Based Dynamic Information Flow Analysis for Distributed Software Systems}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2093--2110}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/fu-xiaoqin}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/FuC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GaddamL0W21, author = {Sivanarayana Gaddam and Atul Luykx and Rohit Sinha and Gaven J. Watson}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Reducing {HSM} Reliance in Payments through Proxy Re-Encryption}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {4061--4078}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/gaddam}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/GaddamL0W21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GaoGLZZMWSY21, author = {Yipeng Gao and Haichang Gao and Sainan Luo and Yang Zi and Shudong Zhang and Wenjie Mao and Ping Wang and Yulong Shen and Jeff Yan}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Research on the Security of Visual Reasoning {CAPTCHA}}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3291--3308}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/gao}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/GaoGLZZMWSY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GigerlHPMB21, author = {Barbara Gigerl and Vedad Hadzic and Robert Primas and Stefan Mangard and Roderick Bloem}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Coco: Co-Design and Co-Verification of Masked Software Implementations on CPUs}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1469--1468}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/gigerl}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/GigerlHPMB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GollaHLPR21, author = {Maximilian Golla and Grant Ho and Marika Lohmus and Monica Pulluri and Elissa M. Redmiles}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Driving 2FA Adoption at Scale: Optimizing Two-Factor Authentication Notification Design Patterns}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {109--126}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/golla}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/GollaHLPR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Groza0MES21, author = {Bogdan Groza and Lucian Popa and Pal{-}Stefan Murvay and Yuval Elovici and Asaf Shabtai}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {{CANARY} - a reactive defense mechanism for Controller Area Networks based on Active RelaYs}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {4259--4276}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/groza}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Groza0MES21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GuoCKRC21, author = {Cheng Guo and Brianne Campbell and Apu Kapadia and Michael K. Reiter and Kelly Caine}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Effect of Mood, Location, Trust, and Presence of Others on Video-Based Social Authentication}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1--18}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/guo}, timestamp = {Mon, 14 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/GuoCKRC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Han0P0RMSC21, author = {Xueyuan Han and Xiao Yu and Thomas F. J.{-}M. Pasquier and Ding Li and Junghwan Rhee and James W. Mickens and Margo I. Seltzer and Haifeng Chen}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {{SIGL:} Securing Software Installations Through Deep Graph Learning}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2345--2362}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/han-xueyuan}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Han0P0RMSC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HanWP21, author = {HyungSeok Han and Andrew Wesie and Brian Pak}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Precise and Scalable Detection of Use-after-Compacting-Garbage-Collection Bugs}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2059--2074}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/han-hyungseok}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/HanWP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HanYR21, author = {Zhaokun Han and Muhammad Yasin and Jeyavijayan (JV) Rajendran}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Does logic locking work with {EDA} tools?}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1055--1072}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/han-zhaokun}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/HanYR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HaneyAF21, author = {Julie M. Haney and Yasemin Acar and Susanne Furman}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {"It's the Company, the Government, You and I": User Perceptions of Responsibility for Smart Home Privacy and Security}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {411--428}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/haney}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/HaneyAF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HeJ0G021, author = {Xinlei He and Jinyuan Jia and Michael Backes and Neil Zhenqiang Gong and Yang Zhang}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Stealing Links from Graph Neural Networks}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2669--2686}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/he-xinlei}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/HeJ0G021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HeM0HH21, author = {Yingzhe He and Guozhu Meng and Kai Chen and Xingbo Hu and Jinwen He}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {{DRMI:} {A} Dataset Reduction Technology based on Mutual Information for Black-box Attacks}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1901--1918}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/he-yingzhe}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/HeM0HH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HeZ00L0YJ21, author = {Ningyu He and Ruiyi Zhang and Haoyu Wang and Lei Wu and Xiapu Luo and Yao Guo and Ting Yu and Xuxian Jiang}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {{EOSAFE:} Security Analysis of {EOSIO} Smart Contracts}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1271--1288}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/he-ningyu}, timestamp = {Wed, 06 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/HeZ00L0YJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HeinrichH0SW21, author = {Alexander Heinrich and Matthias Hollick and Thomas Schneider and Milan Stute and Christian Weinert}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3577--3594}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/heinrich}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/HeinrichH0SW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HoDAPSV021, author = {Grant Ho and Mayank Dhiman and Devdatta Akhawe and Vern Paxson and Stefan Savage and Geoffrey M. Voelker and David A. Wagner}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Hopper: Modeling and Detecting Lateral Movement}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3093--3110}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/ho}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/HoDAPSV021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HoangNDKLMCGP21, author = {Nguyen Phong Hoang and Arian Akhavan Niaki and Jakub Dalek and Jeffrey Knockel and Pellaeon Lin and Bill Marczak and Masashi Crete{-}Nishihata and Phillipa Gill and Michalis Polychronakis}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {How Great is the Great Firewall? Measuring China's {DNS} Censorship}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3381--3398}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/hoang}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/HoangNDKLMCGP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Hu0LGWGLD21, author = {Changhui Hu and Jin Li and Zheli Liu and Xiaojie Guo and Yu Wei and Xuan Guang and Grigorios Loukides and Changyu Dong}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {How to Make Private Distributed Cardinality Estimation Practical, and Get Differential Privacy for Free}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {965--982}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/hu-changhui}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Hu0LGWGLD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HuCSFML21, author = {Shengtuo Hu and Qi Alfred Chen and Jiachen Sun and Yiheng Feng and Z. Morley Mao and Henry X. Liu}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Automated Discovery of Denial-of-Service Vulnerabilities in Connected Vehicle Protocols}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3219--3236}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/hu-shengtuo}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/HuCSFML21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HuamanSSWADF21, author = {Nicolas Huaman and Bennet von Skarczinski and Christian Stransky and Dominik Wermke and Yasemin Acar and Arne Drei{\ss}igacker and Sascha Fahl}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {A Large-Scale Interview Study on Information Security in and Attacks against Small and Medium-sized Enterprises}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1235--1252}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/huaman}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/HuamanSSWADF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HugenrothKB21, author = {Daniel Hugenroth and Martin Kleppmann and Alastair R. Beresford}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Rollercoaster: An Efficient Group-Multicast Scheme for Mix Networks}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3433--3450}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/hugenroth}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/HugenrothKB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HussainNDMK21, author = {Shehzeen Hussain and Paarth Neekhara and Shlomo Dubnov and Julian J. McAuley and Farinaz Koushanfar}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {WaveGuard: Understanding and Mitigating Audio Adversarial Examples}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2273--2290}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/hussain}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/HussainNDMK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ImolaMC21, author = {Jacob Imola and Takao Murakami and Kamalika Chaudhuri}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Locally Differentially Private Analysis of Graph Statistics}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {983--1000}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/imola}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ImolaMC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/IzhikevichTD21, author = {Liz Izhikevich and Renata Teixeira and Zakir Durumeric}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {{LZR:} Identifying Unexpected Internet Services}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3111--3128}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/izhikevich}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/IzhikevichTD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/JangidCZL21, author = {Mohit Kumar Jangid and Guoxing Chen and Yinqian Zhang and Zhiqiang Lin}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Towards Formal Verification of State Continuity for Enclave Programs}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {573--590}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/jangid}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/JangidCZL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/JansenTG21, author = {Rob Jansen and Justin Tracey and Ian Goldberg}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Once is Never Enough: Foundations for Sound Statistical Inference in Tor Network Experimentation}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3415--3432}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/jansen}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/JansenTG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/JeitnerS21, author = {Philipp Jeitner and Haya Schulmann}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Injection Attacks Reloaded: Tunnelling Malicious Payloads over {DNS}}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3165--3182}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/jeitner}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/JeitnerS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/JiE0S21, author = {Yuede Ji and Mohamed Elsabagh and Ryan Johnson and Angelos Stavrou}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {DEFInit: An Analysis of Exposed Android Init Routines}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3685--3702}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/ji}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/JiE0S21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/JiaCCP21, author = {Hengrui Jia and Christopher A. Choquette{-}Choo and Varun Chandrasekaran and Nicolas Papernot}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Entangled Watermarks as a Defense against Model Extraction}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1937--1954}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/jia}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/JiaCCP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Jing0D0L0NW21, author = {Pengfei Jing and Qiyi Tang and Yuefeng Du and Lei Xue and Xiapu Luo and Ting Wang and Sen Nie and Shi Wu}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Too Good to Be Safe: Tricking Lane Detection in Autonomous Driving with Crafted Perturbations}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3237--3254}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/jing}, timestamp = {Tue, 21 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Jing0D0L0NW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/JohnsonBZMCSL21, author = {Evan Johnson and Maxwell Bland and Yifei Zhu and Joshua Mason and Stephen Checkoway and Stefan Savage and Kirill Levchenko}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Jetset: Targeted Firmware Rehosting for Embedded Systems}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {321--338}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/johnson}, timestamp = {Thu, 16 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/JohnsonBZMCSL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KaiserWLLMM21, author = {Ben Kaiser and Jerry Wei and Eli Lucherini and Kevin Lee and J. Nathan Matias and Jonathan R. Mayer}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Adapting Security Warnings to Counter Online Disinformation}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1163--1180}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/kaiser}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/KaiserWLLMM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Khan0SVKUZ21, author = {Mohammad Taha Khan and Christopher Tran and Shubham Singh and Dimitri Vasilkov and Chris Kanich and Blase Ur and Elena Zheleva}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Helping Users Automatically Find and Manage Sensitive, Expendable Files in Cloud Storage}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1145--1162}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/khan-mohammad}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Khan0SVKUZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KhanKLXBT21, author = {Arslan Khan and Hyungsub Kim and Byoungyoung Lee and Dongyan Xu and Antonio Bianchi and Dave (Jing) Tian}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {{M2MON:} Building an MMIO-based Security Reference Monitor for Unmanned Vehicles}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {285--302}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/khan-arslan}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/KhanKLXBT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KhandelwalLHF21, author = {Rishabh Khandelwal and Thomas Linden and Hamza Harkous and Kassem Fawaz}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {PriSEC: {A} Privacy Settings Enforcement Controller}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {465--482}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/khandelwal}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/KhandelwalLHF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KhodayariP21, author = {Soheil Khodayari and Giancarlo Pellegrino}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {{JAW:} Studying Client-side {CSRF} with Hybrid Property Graphs and Declarative Traversals}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2525--2542}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/khodayari}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/KhodayariP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KimKRCKKXT21, author = {Taegyu Kim and Vireshwar Kumar and Junghwan Rhee and Jizhou Chen and Kyungtae Kim and Chung Hwan Kim and Dongyan Xu and Dave (Jing) Tian}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {{PASAN:} Detecting Peripheral Access Concurrency Bugs within Bare-Metal Embedded Applications}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {249--266}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/kim}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/KimKRCKKXT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Kirzner021, author = {Ofek Kirzner and Adam Morrison}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {An Analysis of Speculative Type Confusion Vulnerabilities in the Wild}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2399--2416}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/kirzner}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Kirzner021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KoganC21, author = {Dmitry Kogan and Henry Corrigan{-}Gibbs}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Private Blocklist Lookups with Checklist}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {875--892}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/kogan}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/KoganC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KotiPPS21, author = {Nishat Koti and Mahak Pancholi and Arpita Patra and Ajith Suresh}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {{SWIFT:} Super-fast and Robust Privacy-Preserving Machine Learning}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2651--2668}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/koti}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/KotiPPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KrachenfelsKTS21, author = {Thilo Krachenfels and Tuba Kiyan and Shahin Tajik and Jean{-}Pierre Seifert}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Automatic Extraction of Secrets from the Transistor Jungle using Laser-Assisted Side-Channel Attacks}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {627--644}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/krachenfels}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/KrachenfelsKTS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KulshresthaM21, author = {Anunay Kulshrestha and Jonathan R. Mayer}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Identifying Harmful Media in End-to-End Encrypted Communication: Efficient Private Membership Computation}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {893--910}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/kulshrestha}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/KulshresthaM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LaarschotW21, author = {Jochem van de Laarschot and Rolf van Wegberg}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Risky Business? Investigating the Security Practices of Vendors on an Online Anonymous Market using Ground-Truth Data}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {4079--4095}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/van-de-laarschot}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/LaarschotW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LakshmananBKCH21, author = {Nitya Lakshmanan and Nishant Budhdev and Min Suk Kang and Mun Choon Chan and Jun Han}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {A Stealthy Location Identification Attack Exploiting Carrier Aggregation in Cellular Networks}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3899--3916}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/lakshmanan}, timestamp = {Fri, 13 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/LakshmananBKCH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LaperdrixSCKN21, author = {Pierre Laperdrix and Oleksii Starov and Quan Chen and Alexandros Kapravelos and Nick Nikiforakis}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Fingerprinting in Style: Detecting Browser Extensions via Injected Style Sheets}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2507--2524}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/laperdrix}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/LaperdrixSCKN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LassakHGU21, author = {Leona Lassak and Annika Hildebrandt and Maximilian Golla and Blase Ur}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {"It's Stored, Hopefully, on an Encrypted Server": Mitigating Users' Misconceptions About {FIDO2} Biometric WebAuthn}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {91--108}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/lassak}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/LassakHGU21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LeeECVLQWPJ21, author = {Yu Tsung Lee and William Enck and Haining Chen and Hayawardh Vijayakumar and Ninghui Li and Zhiyun Qian and Daimeng Wang and Giuseppe Petracca and Trent Jaeger}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack Operations in Android Systems}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2579--2596}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/lee-yu-tsung}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/LeeECVLQWPJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LeeLKJSS21, author = {Hyunjoo Lee and Jiyeon Lee and Daejun Kim and Suman Jana and Insik Shin and Sooel Son}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {AdCube: WebVR Ad Fraud and Practical Confinement of Third-Party Ads}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2543--2560}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/lee-hyunjoo}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/LeeLKJSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LeeML21, author = {Yoochan Lee and Changwoo Min and Byoungyoung Lee}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {ExpRace: Exploiting Kernel Races through Raising Interrupts}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2363--2380}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/lee-yoochan}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/LeeML21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LeeSL21, author = {Gwangmu Lee and Woochul Shim and Byoungyoung Lee}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Constraint-guided Directed Greybox Fuzzing}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3559--3576}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/lee-gwangmu}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/LeeSL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LehmkuhlMSP21, author = {Ryan Lehmkuhl and Pratyush Mishra and Akshayaram Srinivasan and Raluca Ada Popa}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Muse: Secure Inference Resilient to Malicious Clients}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2201--2218}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/lehmkuhl}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/LehmkuhlMSP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LenGR21, author = {Julia Len and Paul Grubbs and Thomas Ristenpart}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Partitioning Oracle Attacks}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {195--212}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/len}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/LenGR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Li0FK21, author = {Jingjie Li and Amrita Roy Chowdhury and Kassem Fawaz and Younghyun Kim}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Kal{\(\epsilon\)}ido: Real-Time Privacy Control for Eye-Tracking Systems}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1793--1810}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/li-jingjie}, timestamp = {Thu, 28 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Li0FK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LiCC0PCCC21, author = {Yeting Li and Zixuan Chen and Jialun Cao and Zhiwu Xu and Qiancheng Peng and Haiming Chen and Liyuan Chen and Shing{-}Chi Cheung}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {ReDoSHunter: {A} Combined Static and Dynamic Approach for Regular Expression DoS Detection}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3847--3864}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/li-yeting}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/LiCC0PCCC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LiCLWC21, author = {Xing Li and Yan Chen and Zhiqiang Lin and Xiao Wang and Jim Hao Chen}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Automatic Policy Generation for Inter-Service Access Control of Microservices}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3971--3988}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/li-xing}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/LiCLWC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LiJCLLCLWBCL021, author = {Yuwei Li and Shouling Ji and Yuan Chen and Sizhuang Liang and Wei{-}Han Lee and Yueyao Chen and Chenyang Lyu and Chunming Wu and Raheem Beyah and Peng Cheng and Kangjie Lu and Ting Wang}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {{UNIFUZZ:} {A} Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2777--2794}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/li-yuwei}, timestamp = {Fri, 29 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/LiJCLLCLWBCL021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LiLGNH21, author = {Shih{-}Wei Li and Xupeng Li and Ronghui Gu and Jason Nieh and John Zhuang Hui}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Formally Verified Memory Protection for a Commodity Multiprocessor Hypervisor}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3953--3970}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/li-shih-wei}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/LiLGNH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LiZWLC21, author = {Mengyuan Li and Yinqian Zhang and Huibo Wang and Kang Li and Yueqiang Cheng}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {{CIPHERLEAKS:} Breaking Constant-time Cryptography on {AMD} {SEV} via the Ciphertext Side Channel}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {717--732}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/li-mengyuan}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/LiZWLC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LiljestrandNGEA21, author = {Hans Liljestrand and Thomas Nyman and Lachlan J. Gunn and Jan{-}Erik Ekberg and N. Asokan}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {PACStack: an Authenticated Call Stack}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {357--374}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/liljestrand}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/LiljestrandNGEA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LinLDNCLSZD21, author = {Yun Lin and Ruofan Liu and Dinil Mon Divakaran and Jun Yang Ng and Qing Zhou Chan and Yiwen Lu and Yuxuan Si and Fan Zhang and Jin Song Dong}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Phishpedia: {A} Hybrid Deep Learning Based Approach to Visually Identify Phishing Webpages}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3793--3810}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/lin}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/LinLDNCLSZD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LiuCYSWGZ0Y21, author = {Shinan Liu and Xiang Cheng and Hanchao Yang and Yuanchao Shu and Xiaoran Weng and Ping Guo and Kexiong Curtis Zeng and Gang Wang and Yaling Yang}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Stars Can Tell: {A} Robust Method to Defend against {GPS} Spoofing Attacks using Off-the-shelf Chipset}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3935--3952}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/liu-shinan}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/LiuCYSWGZ0Y21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LiuNNLK0BYS21, author = {Zaoxing Liu and Hun Namkung and Georgios Nikolaidis and Jeongkeun Lee and Changhoon Kim and Xin Jin and Vladimir Braverman and Minlan Yu and Vyas Sekar}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Jaqen: {A} High-Performance Switch-Native Approach for Detecting and Mitigating Volumetric DDoS Attacks with Programmable Switches}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3829--3846}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/liu-zaoxing}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/LiuNNLK0BYS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LiuS0ZLX21, author = {Binbin Liu and Junfu Shen and Jiang Ming and Qilong Zheng and Jing Li and Dongpeng Xu}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {MBA-Blast: Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1701--1718}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/liu-binbin}, timestamp = {Wed, 22 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/LiuS0ZLX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LouYZ21, author = {Jiadong Lou and Xu Yuan and Ning Zhang}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Messy States of Wiring: Vulnerabilities in Emerging Personal Payment Systems}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3273--3289}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/lou}, timestamp = {Mon, 23 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/LouYZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LoughlinNMTWNK21, author = {Kevin Loughlin and Ian Neal and Jiacheng Ma and Elisa Tsai and Ofir Weisse and Satish Narayanasamy and Baris Kasikci}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {{DOLMA:} Securing Speculation with the Principle of Transient Non-Observability}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1397--1414}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/loughlin}, timestamp = {Fri, 24 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/LoughlinNMTWNK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LovisottoTSSM21, author = {Giulio Lovisotto and Henry Turner and Ivo Sluganovic and Martin Strohmeier and Ivan Martinovic}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {{SLAP:} Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1865--1882}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/lovisotto}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/LovisottoTSSM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MaMADB21, author = {Zane Ma and Joshua Mason and Manos Antonakakis and Zakir Durumeric and Michael D. Bailey}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {What's in a Name? Exploring {CA} Certificate Control}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {4383--4400}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/ma}, timestamp = {Thu, 26 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/MaMADB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MaassSPBHHS21, author = {Max Maass and Alina St{\"{o}}ver and Henning Prid{\"{o}}hl and Sebastian Bretthauer and Dominik Herrmann and Matthias Hollick and Indra Spiecker}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Effective Notification Campaigns on the Web: {A} Matter of Trust, Framing, and Support}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2489--2506}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/maass}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/MaassSPBHHS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MatsuokaBMS021, author = {Kotaro Matsuoka and Ryotaro Banno and Naoki Matsumoto and Takashi Sato and Song Bian}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Virtual Secure Platform: {A} Five-Stage Pipeline Processor over {TFHE}}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {4007--4024}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/matsuoka}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/MatsuokaBMS021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MayerZSA21, author = {Peter Mayer and Yixin Zou and Florian Schaub and Adam J. Aviv}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {"Now I'm a bit angry: " Individuals' Awareness, Perception, and Responses to Data Breaches that Affected Them}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {393--410}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/mayer}, timestamp = {Tue, 17 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/MayerZSA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/McDonaldBMSR21, author = {Allison McDonald and Catherine Barwulor and Michelle L. Mazurek and Florian Schaub and Elissa M. Redmiles}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {"It's stressful having all these phones": Investigating Sex Workers' Safety Goals, Risks, and Practices Online}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {375--392}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/mcdonald}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/McDonaldBMSR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MeijerMW21, author = {Carlo Meijer and Veelasha Moonsamy and Jos Wetzels}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Where's Crypto?: Automated Identification and Classification of Proprietary Cryptographic Primitives in Binary Code}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {555--572}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/meijer}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/MeijerMW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MergetBASMS21, author = {Robert Merget and Marcus Brinkmann and Nimrod Aviram and Juraj Somorovsky and Johannes Mittmann and J{\"{o}}rg Schwenk}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in {TLS-DH(E)}}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {213--230}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/merget}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/MergetBASMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MoonYSYSS21, author = {Soo{-}Jin Moon and Yucheng Yin and Rahul Anand Sharma and Yifei Yuan and Jonathan M. Spring and Vyas Sekar}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Accurately Measuring Global Risk of Amplification Attacks using AmpMap}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3881--3898}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/moon}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/MoonYSYSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MuschJ21, author = {Marius Musch and Martin Johns}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {U Can't Debug This: Detecting JavaScript Anti-Debugging Techniques in the Wild}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2935--2950}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/musch}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/MuschJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/NagyNHDH21, author = {Stefan Nagy and Anh Nguyen{-}Tuong and Jason D. Hiser and Jack W. Davidson and Matthew Hicks}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Breaking Through Binaries: Compiler-quality Instrumentation for Better Binary-only Fuzzing}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1683--1700}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/nagy}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/NagyNHDH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/NakatsukaOPT21, author = {Yoshimichi Nakatsuka and Ercan Ozturk and Andrew Paverd and Gene Tsudik}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {{CACTI:} Captcha Avoidance via Client-side {TEE} Integration}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2561--2578}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/nakatsuka}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/NakatsukaOPT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/NarayanDMCJGVSS21, author = {Shravan Narayan and Craig Disselkoen and Daniel Moghimi and Sunjay Cauligi and Evan Johnson and Zhao Gang and Anjo Vahldiek{-}Oberwagner and Ravi Sahita and Hovav Shacham and Dean M. Tullsen and Deian Stefan}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Swivel: Hardening WebAssembly against Spectre}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1433--1450}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/narayan}, timestamp = {Thu, 16 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/NarayanDMCJGVSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/NasrBH21, author = {Milad Nasr and Alireza Bahramali and Amir Houmansadr}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Defeating DNN-Based Traffic Analysis Systems in Real-Time With Blind Adversarial Perturbations}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2705--2722}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/nasr}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/NasrBH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/NgC21, author = {Lucien K. L. Ng and Sherman S. M. Chow}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {GForce: GPU-Friendly Oblivious and Rapid Neural Network Inference}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2147--2164}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/ng}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/NgC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Nguyen0MS21, author = {Trung Tin Nguyen and Michael Backes and Ninja Marnau and Ben Stock}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Share First, Ask Later (or Never?) Studying Violations of GDPR's Explicit Consent in Android Apps}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3667--3684}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/nguyen}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Nguyen0MS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/OltroggeHAA0F21, author = {Marten Oltrogge and Nicolas Huaman and Sabrina Amft and Yasemin Acar and Michael Backes and Sascha Fahl}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Why Eve and Mallory Still Love Android: Revisiting {TLS} (In)Security in Android Applications}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {4347--4364}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/oltrogge}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/OltroggeHAA0F21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/OnaolapoLMS21, author = {Jeremiah Onaolapo and Nektarios Leontiadis and Despoina Magka and Gianluca Stringhini}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {SocialHEISTing: Understanding Stolen Facebook Accounts}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {4115--4132}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/onaolapo}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/OnaolapoLMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/OyaK21, author = {Simon Oya and Florian Kerschbaum}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Hiding the Access Pattern is Not Enough: Exploiting Search Pattern Leakage in Searchable Encryption}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {127--142}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/oya}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/OyaK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/PaccagnellaLF21, author = {Riccardo Paccagnella and Licheng Luo and Christopher W. Fletcher}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Lord of the Ring(s): Side Channel Attacks on the {CPU} On-Chip Ring Interconnect Are Practical}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {645--662}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/paccagnella}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/PaccagnellaLF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/PasquiniCAB21, author = {Dario Pasquini and Marco Cianfriglia and Giuseppe Ateniese and Massimo Bernaschi}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {821--838}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/pasquini}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/PasquiniCAB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Patra0SY21, author = {Arpita Patra and Thomas Schneider and Ajith Suresh and Hossein Yalame}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {{ABY2.0:} Improved Mixed-Protocol Secure Two-Party Computation}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2165--2182}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/patra}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Patra0SY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/PfefferMDGSWFK21, author = {Katharina Pfeffer and Alexandra Mai and Adrian Dabrowski and Matthias Gusenbauer and Philipp Schindler and Edgar R. Weippl and Michael Franz and Katharina Krombholz}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {On the Usability of Authenticity Checks for Hardware Security Tokens}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {37--54}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/pfeffer}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/PfefferMDGSWFK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/PoddarKYDPH21, author = {Rishabh Poddar and Sukrit Kalra and Avishay Yanai and Ryan Deng and Raluca Ada Popa and Joseph M. Hellerstein}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Senate: {A} Maliciously-Secure {MPC} Platform for Collaborative Analytics}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2129--2146}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/poddar}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/PoddarKYDPH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/PoddebniakIBS21, author = {Damian Poddebniak and Fabian Ising and Hanno B{\"{o}}ck and Sebastian Schinzel}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Why {TLS} is better without {STARTTLS:} {A} Security Analysis of {STARTTLS} in the Email Context}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {4365--4382}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/poddebniak}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/PoddebniakIBS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/PudduSHC21, author = {Ivan Puddu and Moritz Schneider and Miro Haller and Srdjan Capkun}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Frontal Attack: Leaking Control-Flow in {SGX} via the {CPU} Frontend}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {663--680}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/puddu}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/PudduSHC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RagabBBG21, author = {Hany Ragab and Enrico Barberis and Herbert Bos and Cristiano Giuffrida}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Rage Against the Machine Clear: {A} Systematic Analysis of Machine Clears and Their Implications for Transient Execution Attacks}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1451--1468}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/ragab}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/RagabBBG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RakinLXF21, author = {Adnan Siraj Rakin and Yukui Luo and Xiaolin Xu and Deliang Fan}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Deep-Dup: An Adversarial Weight Duplication Attack Framework to Crush Deep Neural Network in Multi-Tenant {FPGA}}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1919--1936}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/rakin}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/RakinLXF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RameshXMLRKJH21, author = {Soundarya Ramesh and Rui Xiao and Anindya Maiti and Jong Taek Lee and Harini Ramprasad and Ananda Kumar and Murtuza Jadliwala and Jun Han}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Acoustics to the Rescue: Physical Key Inference Attack Revisited}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3255--3272}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/ramesh}, timestamp = {Tue, 14 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/RameshXMLRKJH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RayWKA21, author = {Hirak Ray and Flynn Wolf and Ravi Kuber and Adam J. Aviv}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Why Older Adults (Don't) Use Password Managers}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {73--90}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/ray}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/RayWKA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RidderFVBGR21, author = {Finn de Ridder and Pietro Frigo and Emanuele Vannacci and Herbert Bos and Cristiano Giuffrida and Kaveh Razavi}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {{SMASH:} Synchronized Many-sided Rowhammer Attacks from JavaScript}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1001--1018}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/ridder}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/RidderFVBGR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RocheLMI21, author = {Thomas Roche and Victor Lomn{\'{e}} and Camille Mutschler and Laurent Imbert}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {A Side Journey To Titan}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {231--248}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/roche}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/RocheLMI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RodlerLKD21, author = {Michael Rodler and Wenting Li and Ghassan O. Karame and Lucas Davi}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1289--1306}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/rodler}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/RodlerLKD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RosenPM21, author = {Marc B. Rosen and James Parker and Alex J. Malozemoff}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Balboa: Bobbing and Weaving around Network Censorship}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3399--3413}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/rosen}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/RosenPM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RossiFBRP21, author = {Matthew Rossi and Dario Facchinetti and Enrico Bacis and Marco Rosa and Stefano Paraboschi}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {SEApp: Bringing Mandatory Access Control to Android Apps}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3613--3630}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/rossi}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/RossiFBRP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RothenbergerTPH21, author = {Benjamin Rothenberger and Konstantin Taranov and Adrian Perrig and Torsten Hoefler}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {ReDMArk: Bypassing {RDMA} Security Mechanisms}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {4277--4292}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/rothenberger}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/RothenbergerTPH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RyanSSBJ21, author = {Gabriel Ryan and Abhishek Shah and Dongdong She and Koustubha Bhat and Suman Jana}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Fine Grained Dataflow Tracking with Proximal Gradients}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1611--1628}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/ryan}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/RyanSSBJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SaileshwarQ21, author = {Gururaj Saileshwar and Moinuddin K. Qureshi}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {{MIRAGE:} Mitigating Conflict-Based Cache Attacks with a Practical Fully-Associative Design}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1379--1396}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/saileshwar}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/SaileshwarQ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SallsJCKV21, author = {Christopher Salls and Chani Jindal and Jake Corina and Christopher Kruegel and Giovanni Vigna}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Token-Level Fuzzing}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2795--2809}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/salls}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/SallsJCKV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Sato0WJLC21, author = {Takami Sato and Junjie Shen and Ningfei Wang and Yunhan Jia and Xue Lin and Qi Alfred Chen}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Dirty Road Can Attack: Security of Deep Learning based Automated Lane Centering under Physical-World Attack}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3309--3326}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/sato}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Sato0WJLC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SchefflerV21, author = {Sarah Scheffler and Mayank Varia}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Protecting Cryptography Against Compelled Self-Incrimination}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {591--608}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/scheffler}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/SchefflerV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SchmittR21, author = {Paul Schmitt and Barath Raghavan}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Pretty Good Phone Privacy}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1737--1754}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/schmitt}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/SchmittR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SchumiloA0WH21, author = {Sergej Schumilo and Cornelius Aschermann and Ali Abbasi and Simon W{\"{o}}rner and Thorsten Holz}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2597--2614}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/schumilo}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/SchumiloA0WH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SchusterSTS21, author = {Roei Schuster and Congzheng Song and Eran Tromer and Vitaly Shmatikov}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1559--1575}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/schuster}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/SchusterSTS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SeragBKCX21, author = {Khaled Serag and Rohit Bhatia and Vireshwar Kumar and Z. Berkay Celik and Dongyan Xu}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Exposing New Vulnerabilities of Error Handling Mechanism in {CAN}}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {4241--4258}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/serag}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/SeragBKCX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SeveriMCO21, author = {Giorgio Severi and Jim Meyer and Scott E. Coull and Alina Oprea}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1487--1504}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/severi}, timestamp = {Mon, 18 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/SeveriMCO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ShahverdiSD21, author = {Aria Shahverdi and Mahammad Shirinov and Dana Dachman{-}Soled}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Database Reconstruction from Noisy Volumes: {A} Cache Side-Channel Attack on SQLite}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1019--1035}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/shahverdi}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ShahverdiSD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ShenWGZLLZHDP021, author = {Kaiwen Shen and Chuhan Wang and Minglei Guo and Xiaofeng Zheng and Chaoyi Lu and Baojun Liu and Yuxuan Zhao and Shuang Hao and Haixin Duan and Qingfeng Pan and Min Yang}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Weak Links in Authentication Chains: {A} Large-scale Analysis of Email Sender Spoofing Attacks}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3201--3217}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/shen-kaiwen}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ShenWGZLLZHDP021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ShustermanAOGOY21, author = {Anatoly Shusterman and Ayush Agarwal and Sioli O'Connell and Daniel Genkin and Yossi Oren and Yuval Yarom}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2863--2880}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/shusterman}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ShustermanAOGOY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SilvaNEKYK21, author = {Ravindu De Silva and Mohamed Nabeel and Charith Elvitigala and Issa Khalil and Ting Yu and Chamath Keppitiyagama}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Compromised or Attacker-Owned: {A} Large Scale Classification and Study of Hosting Domains of Malicious URLs}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3721--3738}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/desilva}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/SilvaNEKYK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SinghGNS21, author = {Akash Deep Singh and Luis Garcia and Joseph Noor and Mani B. Srivastava}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {I Always Feel Like Somebody's Sensing Me! {A} Framework to Detect, Identify, and Localize Clandestine Wireless Sensors}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1829--1846}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/singh}, timestamp = {Mon, 17 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/SinghGNS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SoHO21, author = {Sunbeom So and Seongjoon Hong and Hakjoo Oh}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {SmarTest: Effectively Hunting Vulnerable Transaction Sequences in Smart Contracts through Language Model-Guided Symbolic Execution}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1361--1378}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/so}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/SoHO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SonPPPS21, author = {Jeongseok Son and Griffin Prechter and Rishabh Poddar and Raluca Ada Popa and Koushik Sen}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {ObliCheck: Efficient Verification of Oblivious Algorithms with Unobservable State}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2219--2236}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/son}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/SonPPPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SongM21, author = {Liwei Song and Prateek Mittal}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Systematic Evaluation of Privacy Risks of Machine Learning Models}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2615--2632}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/song}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/SongM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SpecterH21, author = {Michael A. Specter and J. Alex Halderman}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Security Analysis of the Democracy Live Online Voting System}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3077--3092}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/specter-security}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/SpecterH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SpecterP021, author = {Michael A. Specter and Sunoo Park and Matthew Green}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {KeyForge: Non-Attributable Email from Forward-Forgeable Signatures}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1755--1773}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/specter-keyforge}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/SpecterP021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SquarcinaTVCM21, author = {Marco Squarcina and Mauro Tempesta and Lorenzo Veronese and Stefano Calzavara and Matteo Maffei}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Can {I} Take Your Subdomain? Exploring Same-Site Attacks in the Modern Web}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2917--2934}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/squarcina}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/SquarcinaTVCM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/StuteHLH21, author = {Milan Stute and Alexander Heinrich and Jannik Lorenz and Matthias Hollick}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Disrupting Continuity of Apple's Wireless Ecosystem Security: New Tracking, DoS, and MitM Attacks on iOS and macOS Through Bluetooth Low Energy, AWDL, and Wi-Fi}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3917--3934}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/stute}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/StuteHLH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SuSDL0XL21, author = {Liya Su and Xinyue Shen and Xiangyu Du and Xiaojing Liao and XiaoFeng Wang and Luyi Xing and Baoxu Liu}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1307--1324}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/su}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/SuSDL0XL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SunOZRB00SDA21, author = {Zhibo Sun and Adam Oest and Penghui Zhang and Carlos E. Rubio{-}Medrano and Tiffany Bao and Ruoyu Wang and Ziming Zhao and Yan Shoshitaishvili and Adam Doup{\'{e}} and Gail{-}Joon Ahn}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {4169--4186}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/sun-zhibo}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/SunOZRB00SDA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SunSLM21, author = {Zhichuang Sun and Ruimin Sun and Long Lu and Alan Mislove}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Mind Your Weight(s): {A} Large-scale Study on Insufficient Machine Learning Model Protection in Mobile Apps}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1955--1972}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/sun-zhichuang}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/SunSLM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/TalebiYSQA21, author = {Seyed Mohammadjavad Seyed Talebi and Zhihao Yao and Ardalan Amiri Sani and Zhiyun Qian and Daniel Austin}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Undo Workarounds for Kernel Bugs}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2381--2398}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/talebi}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/TalebiYSQA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Tan0YL021, author = {Xin Tan and Yuan Zhang and Xiyu Yang and Kangjie Lu and Min Yang}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Detecting Kernel Refcount Bugs with Two-Dimensional Consistency Checking}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2471--2488}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/tan}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Tan0YL021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Tang0TZ21, author = {Di Tang and XiaoFeng Wang and Haixu Tang and Kehuan Zhang}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor Contamination Detection}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1541--1558}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/tang-di}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Tang0TZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/TaoRGVT21, author = {Zhe Tao and Aseem Rastogi and Naman Gupta and Kapil Vaswani and Aditya V. Thakur}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {DICE*: {A} Formally Verified Implementation of {DICE} Measured Boot}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1091--1107}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/tao}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/TaoRGVT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/TheofanosCM21, author = {Mary Theofanos and Yee{-}Yin Choong and Olivia Murphy}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {'Passwords Keep Me Safe' - Understanding What Children Think about Passwords}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {19--35}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/theofanos}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/TheofanosCM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/TolleyKKVC21, author = {William J. Tolley and Beau Kujath and Mohammad Taha Khan and Narseo Vallina{-}Rodriguez and Jedidiah R. Crandall}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Blind In/On-Path Attacks and Applications to VPNs}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3129--3146}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/tolley}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/TolleyKKVC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/TorresCS21, author = {Christof Ferreira Torres and Ramiro Camino and Radu State}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Frontrunner Jones and the Raiders of the Dark Forest: An Empirical Study of Frontrunning on the Ethereum Blockchain}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1343--1359}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/torres}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/TorresCS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/TranSK21, author = {Muoi Tran and Akshaye Shenoi and Min Suk Kang}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {On the Routing-Aware Peering against Network-Eclipse Attacks in Bitcoin}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1253--1270}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/tran}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/TranSK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/TychalasBM21, author = {Dimitrios Tychalas and Hadjer Benkraouda and Michail Maniatakos}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {ICSFuzz: Manipulating I/Os and Repurposing Binary Code to Enable Instrumented Fuzzing in {ICS} Control Applications}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2847--2862}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/tychalas}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/TychalasBM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/UjcichJS0SO21, author = {Benjamin E. Ujcich and Samuel Jero and Richard Skowyra and Adam Bates and William H. Sanders and Hamed Okhravi}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Causal Analysis for Software-Defined Networking Attacks}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3183--3200}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/ujcich}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/UjcichJS0SO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/UlqinakuAACC21, author = {Enis Ulqinaku and Hala Assal and AbdelRahman Abdou and Sonia Chiasson and Srdjan Capkun}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Is Real-time Phishing Eliminated with FIDO? Social Engineering Downgrade Attacks against {FIDO} Protocols}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3811--3828}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/ulqinaku}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/UlqinakuAACC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/UzunCKBL21, author = {Erkam Uzun and Simon P. Chung and Vladimir Kolesnikov and Alexandra Boldyreva and Wenke Lee}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Fuzzy Labeled Private Set Intersection with Applications to Private Real-Time Biometric Search}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {911--928}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/uzun}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/UzunCKBL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Vanhoef21, author = {Mathy Vanhoef}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {161--178}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/vanhoef}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Vanhoef21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Vicarte0F21, author = {Jose Rodrigo Sanchez Vicarte and Gang Wang and Christopher W. Fletcher}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Double-Cross Attacks: Subverting Active Learning Systems}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1593--1610}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/vicarte}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Vicarte0F21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Wang0ZZGZ21, author = {Yan Wang and Chao Zhang and Zixuan Zhao and Bolun Zhang and Xiaorui Gong and Wei Zou}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {{MAZE:} Towards Automated Heap Feng Shui}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1647--1664}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/wang-yan}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Wang0ZZGZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WangJT0ZKLLDLB21, author = {Qinying Wang and Shouling Ji and Yuan Tian and Xuhong Zhang and Binbin Zhao and Yuhong Kan and Zhaowei Lin and Changting Lin and Shuiguang Deng and Alex X. Liu and Raheem Beyah}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {MPInspector: {A} Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {4205--4222}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/wang-qinying}, timestamp = {Tue, 14 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/WangJT0ZKLLDLB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WangR21, author = {Ke Coby Wang and Michael K. Reiter}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Using Amnesia to Detect Credential Database Breaches}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {839--855}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/wang-ke-coby}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/WangR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WangXWNXLDSL0Z21, author = {Jice Wang and Yue Xiao and Xueqiang Wang and Yuhong Nan and Luyi Xing and Xiaojing Liao and Jinwei Dong and Nicol{\'{a}}s Serrano and Haoran Lu and XiaoFeng Wang and Yuqing Zhang}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Understanding Malicious Cross-library Data Harvesting on Android}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {4133--4150}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/wang-jice}, timestamp = {Fri, 19 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/WangXWNXLDSL0Z21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WangZX21, author = {Yuchen Wang and Zhenfeng Zhang and Yongquan Xie}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Privacy-Preserving and Standard-Compatible {AKA} Protocol for 5G}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3595--3612}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/wang-yuchen}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/WangZX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WangZZQKA21, author = {Daimeng Wang and Zheng Zhang and Hang Zhang and Zhiyun Qian and Srikanth V. Krishnamurthy and Nael B. Abu{-}Ghazaleh}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {SyzVegas: Beating Kernel Fuzzing Odds with Reinforcement Learning}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2741--2758}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/wang-daimeng}, timestamp = {Tue, 03 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/WangZZQKA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WarfordMMAM21, author = {Noel Warford and Collins W. Munyendo and Ashna Mediratta and Adam J. Aviv and Michelle L. Mazurek}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Strategies and Perceived Risks of Sending Sensitive Documents}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1217--1234}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/warford}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/WarfordMMAM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Weber0NSR21, author = {Daniel Weber and Ahmad Ibrahim and Hamed Nemati and Michael Schwarz and Christian Rossow}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Osiris: Automated Discovery of Microarchitectural Side Channels}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1415--1432}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/weber}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Weber0NSR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Wei21, author = {Mingkui Wei}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Domain Shadowing: Leveraging Content Delivery Networks for Robust Blocking-Resistant Communications}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3327--3343}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/wei}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Wei21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Weng0XK021, author = {Chenkai Weng and Kang Yang and Xiang Xie and Jonathan Katz and Xiao Wang}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications to Machine Learning}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {501--518}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/weng}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Weng0XK021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Wickman0YJLKK21, author = {Brian Wickman and Hong Hu and Insu Yun and Daehee Jang and Jungwon Lim and Sanidhya Kashyap and Taesoo Kim}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Preventing Use-After-Free Attacks with Fast Forward Allocation}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2453--2470}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/wickman}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Wickman0YJLKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WolfAK21, author = {Flynn Wolf and Adam J. Aviv and Ravi Kuber}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Security Obstacles and Motivations for Small Businesses from a CISO's Perspective}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1199--1216}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/wolf}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/WolfAK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WooLPLD21, author = {Seunghoon Woo and Dongwook Lee and Sunghan Park and Heejo Lee and Sven Dietrich}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {V0Finder: Discovering the Correct Origin of Publicly Reported Software Vulnerabilities}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3041--3058}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/woo}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/WooLPLD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Wu0WX21, author = {Xian Wu and Wenbo Guo and Hua Wei and Xinyu Xing}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Adversarial Policy Training against Deep Reinforcement Learning}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1883--1900}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/wu-xian}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Wu0WX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WuPEML21, author = {Qiushi Wu and Aditya Pakki and Navid Emamdoost and Stephen McCamant and Kangjie Lu}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Understanding and Detecting Disordered Error Handling with Precise Function Pairing}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2041--2058}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/wu-qiushi}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/WuPEML21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WuWAPTXTB21, author = {Jianliang Wu and Ruoyu Wu and Daniele Antonioli and Mathias Payer and Nils Ole Tippenhauer and Dongyan Xu and Dave (Jing) Tian and Antonio Bianchi}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {{LIGHTBLUE:} Automatic Profile-Aware Debloating of Bluetooth Stacks}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {339--356}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/wu-jianliang}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/WuWAPTXTB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/XiPJ021, author = {Zhaohan Xi and Ren Pang and Shouling Ji and Ting Wang}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Graph Backdoor}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1523--1540}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/xi}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/XiPJ021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/XiaoHXY0GL21, author = {Feng Xiao and Jianwei Huang and Yichang Xiong and Guangliang Yang and Hong Hu and Guofei Gu and Wenke Lee}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Abusing Hidden Properties to Attack the Node.js Ecosystem}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2951--2968}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/xiao}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/XiaoHXY0GL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/XingWC21, author = {Jiarong Xing and Wenqing Wu and Ang Chen}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Ripple: {A} Programmable, Decentralized Link-Flooding Defense Against Adaptive Adversaries}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3865--3881}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/xing}, timestamp = {Thu, 22 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/XingWC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/XuGCKJ0SPFP21, author = {Teng Xu and Gerard Goossen and Huseyin Kerem Cevahir and Sara Khodeir and Yingyezhe Jin and Frank Li and Shawn Shan and Sagar Patel and David Freeman and Paul Pearce}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Deep Entity Classification: Abusive Account Detection for Online Social Networks}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {4097--4114}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/xu-teng}, timestamp = {Tue, 07 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/XuGCKJ0SPFP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/XuNCR21, author = {Min Xu and Armin Namavari and David Cash and Thomas Ristenpart}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Searching Encrypted Data with Size-Locked Indexes}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {4025--4042}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/xu-min}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/XuNCR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/YagemannPCBSL21, author = {Carter Yagemann and Matthew Pruett and Simon P. Chung and Kennon Bittick and Brendan Saltaformaggio and Wenke Lee}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {{ARCUS:} Symbolic Root Cause Analysis of Exploits in Production Systems}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1989--2006}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/yagemann}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/YagemannPCBSL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Yang0HCAX021, author = {Limin Yang and Wenbo Guo and Qingying Hao and Arridhana Ciptadi and Ali Ahmadzadeh and Xinyu Xing and Gang Wang}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {{CADE:} Detecting and Explaining Concept Drift Samples for Security Applications}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2327--2344}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/yang-limin}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Yang0HCAX021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/YangWCWHPL21, author = {Ronghai Yang and Xianbo Wang and Cheng Chi and Dawei Wang and Jiawei He and Siming Pang and Wing Cheong Lau}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Scalable Detection of Promotional Website Defacements in Black Hat {SEO} Campaigns}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3703--3720}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/yang-ronghai}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/YangWCWHPL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Yoon00KS21, author = {Man{-}Ki Yoon and Mengqi Liu and Hao Chen and Jung{-}Eun Kim and Zhong Shao}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Blinder: Partition-Oblivious Hierarchical Scheduling}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2417--2434}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/yoon}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/Yoon00KS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ZagorskiMMMV21, author = {Filip Zag{\'{o}}rski and Grant McClearn and Sarah Morin and Neal McBurnett and Poorvi L. Vora}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Minerva- An Efficient Risk-Limiting Ballot Polling Audit}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3059--3076}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/zagorski}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ZagorskiMMMV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ZhangAFA21, author = {Han Zhang and Abhijith Anilkumar and Matt Fredrikson and Yuvraj Agarwal}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Capture: Centralized Library Management for Heterogeneous IoT Devices}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {4187--4204}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/zhang-han}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/ZhangAFA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ZhangCFLSZLT21, author = {Xing Zhang and Jiongyi Chen and Chao Feng and Ruilin Li and Yunfei Su and Bin Zhang and Jing Lei and Chaojing Tang}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Reducing Test Cases with Attention Mechanism of Neural Networks}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2075--2092}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/zhang-xing}, timestamp = {Tue, 17 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ZhangCFLSZLT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ZhangLLXXCYW021, author = {Cen Zhang and Xingwei Lin and Yuekang Li and Yinxing Xue and Jundong Xie and Hongxu Chen and Xinlei Ying and Jiashui Wang and Yang Liu}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {APICraft: Fuzz Driver Generation for Closed-source {SDK} Libraries}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2811--2828}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/zhang-cen}, timestamp = {Fri, 24 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/ZhangLLXXCYW021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ZhangZQL21, author = {Zheng Zhang and Hang Zhang and Zhiyun Qian and Billy Lau}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {An Investigation of the Android Kernel Patch Ecosystem}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3649--3666}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/zhang-zheng}, timestamp = {Tue, 03 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/ZhangZQL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ZhengDCPPS21, author = {Wenting Zheng and Ryan Deng and Weikeng Chen and Raluca Ada Popa and Aurojit Panda and Ion Stoica}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Cerebro: {A} Platform for Multi-Party Cryptographic Collaborative Learning}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2723--2740}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/zheng}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ZhengDCPPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ZhuCZL21, author = {Yuankun Zhu and Yueqiang Cheng and Husheng Zhou and Yantao Lu}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Hermes Attack: Steal {DNN} Models with Lossless Inference Accuracy}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1973--1988}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/zhu}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ZhuCZL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ZouMNDRRST21, author = {Yixin Zou and Allison McDonald and Julia Narakornpichit and Nicola Dell and Thomas Ristenpart and Kevin A. Roundy and Florian Schaub and Acar Tamersoy}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {The Role of Computer Security Customer Support in Helping Survivors of Intimate Partner Violence}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {429--446}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/zou}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ZouMNDRRST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/uss/2021, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21}, isbn = {978-1-939133-24-3}, timestamp = {Mon, 20 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.