Search dblp for Publications

export results for "toc:db/conf/uss/uss2021.bht:"

 download as .bib file

@inproceedings{DBLP:conf/uss/00010LH0H0021,
  author       = {Zhikun Zhang and
                  Tianhao Wang and
                  Ninghui Li and
                  Jean Honorio and
                  Michael Backes and
                  Shibo He and
                  Jiming Chen and
                  Yang Zhang},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {PrivSyn: Differentially Private Data Synthesis},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {929--946},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/zhang-zhikun},
  timestamp    = {Mon, 20 Nov 2023 08:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/00010LH0H0021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/000121,
  author       = {Susan Landau},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Susan Landau, Tufts University},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/keynote-landau},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/000121.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/0001AFHWL21,
  author       = {Kevin Bock and
                  Abdulrahman Alaraj and
                  Yair Fax and
                  Kyle Hurley and
                  Eric Wustrow and
                  Dave Levin},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Weaponizing Middleboxes for {TCP} Reflected Amplification},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3345--3361},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/bock},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/0001AFHWL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/0001BSM21,
  author       = {Chong Xiang and
                  Arjun Nitin Bhagoji and
                  Vikash Sehwag and
                  Prateek Mittal},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {PatchGuard: {A} Provably Robust Defense against Adversarial Patches
                  via Small Receptive Fields and Masking},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2237--2254},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/xiang},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/0001BSM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/0001KR0S21,
  author       = {Lorenzo Grassi and
                  Dmitry Khovratovich and
                  Christian Rechberger and
                  Arnab Roy and
                  Markus Schofnegger},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Poseidon: {A} New Hash Function for Zero-Knowledge Proof Systems},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {519--535},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/grassi},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/0001KR0S21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/0001L21,
  author       = {Daniel Perez and
                  Benjamin Livshits},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Smart Contract Vulnerabilities: Vulnerable Does Not Imply Exploited},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1325--1341},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/perez},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/0001L21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/0001TO21,
  author       = {Wanrong Zhang and
                  Shruti Tople and
                  Olga Ohrimenko},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Leakage of Dataset Properties in Multi-Party Machine Learning},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2687--2704},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/zhang-wanrong},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/0001TO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/00020D21,
  author       = {Chenglong Fu and
                  Qiang Zeng and
                  Xiaojiang Du},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {HAWatcher: Semantics-Aware Anomaly Detection for Appified Smart Homes},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {4223--4240},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/fu-chenglong},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/00020D21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/0002JW021,
  author       = {Hang Hu and
                  Steve T. K. Jan and
                  Yang Wang and
                  Gang Wang},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Assessing Browser-level Defense against IDN-based Phishing},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3739--3756},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/hu-hang},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/0002JW021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/0002WXWS0J21,
  author       = {Bingyu Shen and
                  Lili Wei and
                  Chengcheng Xiang and
                  Yudong Wu and
                  Mingyao Shen and
                  Yuanyuan Zhou and
                  Xinxin Jin},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Can Systems Explain Permissions Better? Understanding Users' Misperceptions
                  under Smartphone Runtime Permission Model},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {751--768},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/shen-bingyu},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/0002WXWS0J21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/00100B21,
  author       = {Jie Huang and
                  Michael Backes and
                  Sven Bugiel},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {A11y and Privacy don't have to be mutually exclusive: Constraining
                  Accessibility Service Misuse on Android},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3631--3648},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/huang},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/00100B21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/0026G0Z21,
  author       = {Wei Zhou and
                  Le Guan and
                  Peng Liu and
                  Yuqing Zhang},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Automatic Firmware Emulation through Invalidity-guided Knowledge Inference},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2007--2024},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/zhou},
  timestamp    = {Thu, 18 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/0026G0Z21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/0057CS21,
  author       = {Chen Chen and
                  Anrin Chakraborti and
                  Radu Sion},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {{PEARL:} Plausibly Deniable Flash Translation Layer using {WOM} coding},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1109--1126},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/chen-chen},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/0057CS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AaferYSS0Y21,
  author       = {Yousra Aafer and
                  Wei You and
                  Yi Sun and
                  Yu Shi and
                  Xiangyu Zhang and
                  Heng Yin},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2759--2776},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/aafer},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/AaferYSS0Y21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AbubakarAFX21,
  author       = {Muhammad Abubakar and
                  Adil Ahmad and
                  Pedro Fonseca and
                  Dongyan Xu},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {{SHARD:} Fine-Grained Kernel Specialization with Context-Aware Hardening},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2435--2452},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/abubakar},
  timestamp    = {Tue, 02 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/AbubakarAFX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AcharyaV21,
  author       = {Bhupendra Acharya and
                  Phani Vadrevu},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {PhishPrint: Evading Phishing Detection Crawlers by Prior Profiling},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3775--3792},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/acharya},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/AcharyaV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AhmadiFWL21,
  author       = {Mansour Ahmadi and
                  Reza Mirzazade Farkhani and
                  Ryan Williams and
                  Long Lu},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Finding Bugs Using Your Own Code: Detecting Functionally-similar yet
                  Inconsistent Code},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2025--2040},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/ahmadi},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/AhmadiFWL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AhmadpanahHBOS21,
  author       = {Mohammad M. Ahmadpanah and
                  Daniel Hedin and
                  Musard Balliu and
                  Lars Eric Olsson and
                  Andrei Sabelfeld},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {SandTrap: Securing JavaScript-driven Trigger-Action Platforms},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2899--2916},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/ahmadpanah},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/AhmadpanahHBOS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Akgul0DM21,
  author       = {Omer Akgul and
                  Wei Bai and
                  Shruti Das and
                  Michelle L. Mazurek},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Evaluating In-Workflow Messages for Improving Mental Models of End-to-End
                  Encryption},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {447--464},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/akgul},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Akgul0DM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AlbartusNSFPT21,
  author       = {Nils Albartus and
                  Clemens Nasenberg and
                  Florian Stolz and
                  Marc Fyrbiak and
                  Christof Paar and
                  Russell Tessier},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {On the Design and Misuse of Microcoded (Embedded) Processors - {A}
                  Cautionary Note},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {267--284},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/albartus},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/AlbartusNSFPT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AlbrechtBJM21,
  author       = {Martin R. Albrecht and
                  Jorge Blasco and
                  Rikke Bjerg Jensen and
                  Lenka Marekov{\'{a}}},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Collective Information Security in Large-Scale Urban Protests: the
                  Case of Hong Kong},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3363--3380},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/albrecht},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/AlbrechtBJM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AlharbiARRA21,
  author       = {Fatemah Alharbi and
                  Arwa Alrawais and
                  Abdulrahman Bin Rabiah and
                  Silas Richelson and
                  Nael B. Abu{-}Ghazaleh},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {CSProp: Ciphertext and Signature Propagation Low-Overhead Public-Key
                  Cryptosystem for IoT Environments},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {609--626},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/alharbi},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/AlharbiARRA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AliLP0SSY21,
  author       = {Asra Ali and
                  Tancr{\`{e}}de Lepoint and
                  Sarvar Patel and
                  Mariana Raykova and
                  Phillipp Schoppmann and
                  Karn Seth and
                  Kevin Yeo},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Communication-Computation Trade-offs in {PIR}},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1811--1828},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/ali},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/AliLP0SSY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AliapouliosBBLM21,
  author       = {Maxwell Aliapoulios and
                  Cameron Ballard and
                  Rasika Bhalerao and
                  Tobias Lauinger and
                  Damon McCoy},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Swiped: Analyzing Ground-truth Data of a Marketplace for Stolen Debit
                  and Credit Cards},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {4151--4168},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/aliapoulios},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/AliapouliosBBLM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AlrawiIPKBHHS21,
  author       = {Omar Alrawi and
                  Moses Ike and
                  Matthew Pruett and
                  Ranjita Pai Kasturi and
                  Srimanta Barua and
                  Taleb Hirani and
                  Brennan Hill and
                  Brendan Saltaformaggio},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Forecasting Malware Capabilities From Cyber Attack Memory Images},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3523--3540},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/alrawi-forecasting},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/AlrawiIPKBHHS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AlrawiLVCSMA21,
  author       = {Omar Alrawi and
                  Charles Lever and
                  Kevin Valakuzhy and
                  Ryan Court and
                  Kevin Z. Snow and
                  Fabian Monrose and
                  Manos Antonakakis},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {The Circle Of Life: {A} Large-Scale Study of The IoT Malware Lifecycle},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3505--3522},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/alrawi-circle},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/AlrawiLVCSMA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AlsaheelNMYWC0X21,
  author       = {Abdulellah Alsaheel and
                  Yuhong Nan and
                  Shiqing Ma and
                  Le Yu and
                  Gregory Walkup and
                  Z. Berkay Celik and
                  Xiangyu Zhang and
                  Dongyan Xu},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {{ATLAS:} {A} Sequence-based Learning Approach for Attack Investigation},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3005--3022},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/alsaheel},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/AlsaheelNMYWC0X21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AnthoineDJMPHR21,
  author       = {Gaspard Anthoine and
                  Jean{-}Guillaume Dumas and
                  M{\'{e}}lanie de Jonghe and
                  Aude Maignan and
                  Cl{\'{e}}ment Pernet and
                  Michael Hanling and
                  Daniel S. Roche},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Dynamic proofs of retrievability with low server storage},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {537--554},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/anthoine},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/AnthoineDJMPHR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AumayrMKM21,
  author       = {Lukas Aumayr and
                  Pedro Moreno{-}Sanchez and
                  Aniket Kate and
                  Matteo Maffei},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Blitz: Secure Multi-Hop Payments Without Two-Phase Commits},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {4043--4060},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/aumayr},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/AumayrMKM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AvllazagajZBBD21,
  author       = {Erin Avllazagaj and
                  Ziyun Zhu and
                  Leyla Bilge and
                  Davide Balzarotti and
                  Tudor Dumitras},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {When Malware Changed Its Mind: An Empirical Study of Variable Program
                  Behaviors in the Real World},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3487--3504},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/avllazagaj},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/AvllazagajZBBD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AziziTWMPJRV21,
  author       = {Ahmadreza Azizi and
                  Ibrahim Asadullah Tahmid and
                  Asim Waheed and
                  Neal Mangaokar and
                  Jiameng Pu and
                  Mobin Javed and
                  Chandan K. Reddy and
                  Bimal Viswanath},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {T-Miner: {A} Generative Approach to Defend Against Trojan Attacks
                  on DNN-based Text Classification},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2255--2272},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/azizi},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/AziziTWMPJRV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BagdasaryanS21,
  author       = {Eugene Bagdasaryan and
                  Vitaly Shmatikov},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Blind Backdoors in Deep Learning Models},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1505--1521},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/bagdasaryan},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/BagdasaryanS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BahmaniBDJKSS21,
  author       = {Raad Bahmani and
                  Ferdinand Brasser and
                  Ghada Dessouky and
                  Patrick Jauernig and
                  Matthias Klimmek and
                  Ahmad{-}Reza Sadeghi and
                  Emmanuel Stapf},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {{CURE:} {A} Security Architecture with CUstomizable and Resilient
                  Enclaves},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1073--1090},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/bahmani},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/BahmaniBDJKSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BaiLL021,
  author       = {Jia{-}Ju Bai and
                  Tuo Li and
                  Kangjie Lu and
                  Shi{-}Min Hu},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Static Detection of Unsafe {DMA} Accesses in Device Drivers},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1629--1645},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/bai},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/BaiLL021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BasinST21,
  author       = {David A. Basin and
                  Ralf Sasse and
                  Jorge Toro{-}Pozo},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Card Brand Mixup Attack: Bypassing the {PIN} in non-Visa Cards by
                  Using Them for Visa Transactions},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {179--194},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/basin},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BasinST21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BijmansBSNW21,
  author       = {Hugo L. J. Bijmans and
                  Tim M. Booij and
                  Anneke Schwedersky and
                  Aria Nedgabat and
                  Rolf van Wegberg},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Catching Phishers By Their Bait: Investigating the Dutch Phishing
                  Landscape through Phishing Kit Detection},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3757--3774},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/bijmans},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/BijmansBSNW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BilogrevicEPTHP21,
  author       = {Igor Bilogrevic and
                  Balazs Engedy and
                  Judson L. Porter III and
                  Nina Taft and
                  Kamila Hasanbega and
                  Andrew Paseltiner and
                  Hwi Kyoung Lee and
                  Edward Jung and
                  Meggyn Watkins and
                  P. J. McLachlan and
                  Jason James},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {"Shhh...be quiet!" Reducing the Unwanted Interruptions of Notification
                  Permission Prompts on Chrome},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {769--784},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/bilogrevic},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/BilogrevicEPTHP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Birge-LeeWMSRM21,
  author       = {Henry Birge{-}Lee and
                  Liang Wang and
                  Daniel McCarney and
                  Roland Shoemaker and
                  Jennifer Rexford and
                  Prateek Mittal},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Experiences Deploying Multi-Vantage-Point Domain Validation at Let's
                  Encrypt},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {4311--4327},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/birge-lee},
  timestamp    = {Thu, 04 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Birge-LeeWMSRM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BrengelR21,
  author       = {Michael Brengel and
                  Christian Rossow},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {{YARIX:} Scalable YARA-based Malware Intelligence},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3541--3558},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/brengel},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/BrengelR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BrinkmannDMP0SS21,
  author       = {Marcus Brinkmann and
                  Christian Dresen and
                  Robert Merget and
                  Damian Poddebniak and
                  Jens M{\"{u}}ller and
                  Juraj Somorovsky and
                  J{\"{o}}rg Schwenk and
                  Sebastian Schinzel},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {{ALPACA:} Application Layer Protocol Confusion - Analyzing and Mitigating
                  Cracks in {TLS} Authentication},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {4293--4310},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/brinkmann},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/BrinkmannDMP0SS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BulekovJE21,
  author       = {Alexander Bulekov and
                  Rasoul Jahanshahi and
                  Manuel Egele},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Saphire: Sandboxing {PHP} Applications with Tailored System Call Allowlists},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2881--2898},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/bulekov},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/BulekovJE21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/CabarcosHB0S21,
  author       = {Patricia Arias Cabarcos and
                  Thilo Habrich and
                  Karen Becker and
                  Christian Becker and
                  Thorsten Strufe},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Inexpensive Brainwave Authentication: New Techniques and Insights
                  on User Acceptance},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {55--72},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/arias-cabarcos},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/CabarcosHB0S21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/CaoJG21,
  author       = {Xiaoyu Cao and
                  Jinyuan Jia and
                  Neil Zhenqiang Gong},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Data Poisoning Attacks to Local Differential Privacy Protocols},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {947--964},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/cao-xiaoyu},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/CaoJG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/CaoXPLTA21,
  author       = {Weicheng Cao and
                  Chunqiu Xia and
                  Sai Teja Peddinti and
                  David Lie and
                  Nina Taft and
                  Lisa M. Austin},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {A Large Scale Study of User Behavior, Expectations and Engagement
                  with Android Permissions},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {803--820},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/cao-weicheng},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/CaoXPLTA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Carlini21,
  author       = {Nicholas Carlini},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Poisoning the Unlabeled Dataset of Semi-Supervised Learning},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1577--1592},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/carlini-poisoning},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Carlini21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/CarliniTWJHLRBS21,
  author       = {Nicholas Carlini and
                  Florian Tram{\`{e}}r and
                  Eric Wallace and
                  Matthew Jagielski and
                  Ariel Herbert{-}Voss and
                  Katherine Lee and
                  Adam Roberts and
                  Tom B. Brown and
                  Dawn Song and
                  {\'{U}}lfar Erlingsson and
                  Alina Oprea and
                  Colin Raffel},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Extracting Training Data from Large Language Models},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2633--2650},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/carlini-extracting},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/CarliniTWJHLRBS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ChatelPTH21,
  author       = {Sylvain Chatel and
                  Apostolos Pyrgelis and
                  Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
                  Jean{-}Pierre Hubaux},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Privacy and Integrity Preserving Computations with {CRISP}},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2111--2128},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/chatel},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ChatelPTH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Chen0JCJ21,
  author       = {Yizheng Chen and
                  Shiqi Wang and
                  Weifan Jiang and
                  Asaf Cidon and
                  Suman Jana},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Cost-Aware Robust Tree Ensembles for Security Applications},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2291--2308},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/chen-yizheng},
  timestamp    = {Thu, 27 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Chen0JCJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Chen0YCZ21,
  author       = {Kaixiang Chen and
                  Chao Zhang and
                  Tingting Yin and
                  Xingman Chen and
                  Lei Zhao},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {VScape: Assessing and Escaping Virtual Call Protections},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1719--1736},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/chen-kaixiang},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Chen0YCZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ChenI0GY21,
  author       = {Xutong Chen and
                  Hassaan Irshad and
                  Yan Chen and
                  Ashish Gehani and
                  Vinod Yegneswaran},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {{CLARION:} Sound and Clear Provenance Tracking for Microservice Deployments},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3989--4006},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/chen-xutong},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ChenI0GY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ChenLY21,
  author       = {Paizhuo Chen and
                  Lei Li and
                  Zhice Yang},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Cross-VM and Cross-Processor Covert Channels Exploiting Processor
                  Idle Power Management},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {733--750},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/chen-paizhuo},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ChenLY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ChenLZ21,
  author       = {Sanchuan Chen and
                  Zhiqiang Lin and
                  Yinqian Zhang},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {SelectiveTaint: Efficient Data Flow Tracking With Static Binary Rewriting},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1665--1682},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/chen-sanchuan},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ChenLZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ChenVMDOG21,
  author       = {Zitai Chen and
                  Georgios Vasilakis and
                  Kit Murdock and
                  Edward Dean and
                  David F. Oswald and
                  Flavio D. Garcia},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {VoltPillager: Hardware-based fault injection attacks against Intel
                  {SGX} Enclaves using the {SVID} voltage scaling interface},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {699--716},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/chen-zitai},
  timestamp    = {Tue, 13 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ChenVMDOG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ChenWCZ0LH0DX21,
  author       = {Libo Chen and
                  Yanhao Wang and
                  Quanpu Cai and
                  Yunfan Zhan and
                  Hong Hu and
                  Jiaqi Linghu and
                  Qinsheng Hou and
                  Chao Zhang and
                  Haixin Duan and
                  Zhi Xue},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Sharing More and Checking Less: Leveraging Common Input Keywords to
                  Detect Bugs in Embedded Systems},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {303--319},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/chen-libo},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ChenWCZ0LH0DX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Cheng0LZFPM21,
  author       = {Binlin Cheng and
                  Jiang Ming and
                  Erika A. Leal and
                  Haotian Zhang and
                  Jianming Fu and
                  Guojun Peng and
                  Jean{-}Yves Marion},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Obfuscation-Resilient Executable Payload Extraction From Packed Malware},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3451--3468},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/cheng-binlin},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Cheng0LZFPM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ChengJWP0X21,
  author       = {Yushi Cheng and
                  Xiaoyu Ji and
                  Lixu Wang and
                  Qi Pang and
                  Yi{-}Chao Chen and
                  Wenyuan Xu},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {mID: Tracing Screen Photos via Moir{\'{e}} Patterns},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2969--2986},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/cheng-yushi},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ChengJWP0X21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ChengL0CL21,
  author       = {Haibo Cheng and
                  Wenting Li and
                  Ping Wang and
                  Chao{-}Hsien Chu and
                  Kaitai Liang},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Incrementally Updateable Honey Password Vaults},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {857--874},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/cheng-haibo},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ChengL0CL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ConsolvoKMTDB21,
  author       = {Sunny Consolvo and
                  Patrick Gage Kelley and
                  Tara Matthews and
                  Kurt Thomas and
                  Lee Dunn and
                  Elie Bursztein},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {"Why wouldn't someone think of democracy as a target?": Security practices
                  {\&} challenges of people involved with {U.S.} political campaigns},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1181--1198},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/consolvo},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ConsolvoKMTDB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/CremersHK21,
  author       = {Cas Cremers and
                  Britta Hale and
                  Konrad Kohbrok},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {The Complexities of Healing in Secure Group Messaging: Why Cross-Group
                  Effects Matter},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1847--1864},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/cremers},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/CremersHK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Cronin0YW21,
  author       = {Patrick Cronin and
                  Xing Gao and
                  Chengmo Yang and
                  Haining Wang},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Charger-Surfing: Exploiting a Power Line Side-Channel for Smartphone
                  Information Leakage},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {681--698},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/cronin},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Cronin0YW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/CuiGX0C021,
  author       = {Tianyu Cui and
                  Gaopeng Gou and
                  Gang Xiong and
                  Zhen Li and
                  Mingxin Cui and
                  Chang Liu},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {SiamHAN: IPv6 Address Correlation Attacks on {TLS} Encrypted Traffic
                  via Siamese Heterogeneous Graph Attention Network},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {4329--4346},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/cui},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/CuiGX0C021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/DaiJSW21,
  author       = {Tianxiang Dai and
                  Philipp Jeitner and
                  Haya Schulmann and
                  Michael Waidner},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {The Hijackers Guide To The Galaxy: Off-Path Taking Over Internet Resources},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3147--3164},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/dai},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/DaiJSW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Dalskov0K21,
  author       = {Anders P. K. Dalskov and
                  Daniel Escudero and
                  Marcel Keller},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Fantastic Four: Honest-Majority Four-Party Secure Computation With
                  Malicious Security},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2183--2200},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/dalskov},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Dalskov0K21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Damie0P21,
  author       = {Marc Damie and
                  Florian Hahn and
                  Andreas Peter},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {A Highly Accurate Query-Recovery Attack against Searchable Encryption
                  using Non-Indexed Documents},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {143--160},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/damie},
  timestamp    = {Fri, 26 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Damie0P21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/DingYZM21,
  author       = {Hailun Ding and
                  Shenao Yan and
                  Juan Zhai and
                  Shiqing Ma},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {{ELISE:} {A} Storage Efficient Logging System Powered by Redundancy
                  Reduction and Representation Learning},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3023--3040},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/ding},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/DingYZM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/DowningMPL21,
  author       = {Evan Downing and
                  Yisroel Mirsky and
                  Kyuhong Park and
                  Wenke Lee},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {DeepReflect: Discovering Malicious Functionality through Binary Reconstruction},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3469--3486},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/downing},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/DowningMPL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/EisenhoferSFSKH21,
  author       = {Thorsten Eisenhofer and
                  Lea Sch{\"{o}}nherr and
                  Joel Frank and
                  Lars Speckemeier and
                  Dorothea Kolossa and
                  Thorsten Holz},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Dompteur: Taming Audio Adversarial Examples},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2309--2326},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/eisenhofer},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/EisenhoferSFSKH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Elbitar0N0B21,
  author       = {Yusra Elbitar and
                  Michael Schilling and
                  Trung Tin Nguyen and
                  Michael Backes and
                  Sven Bugiel},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Explanation Beats Context: The Effect of Timing {\&} Rationales
                  on Users' Runtime Permission Decisions},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {785--802},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/elbitar},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Elbitar0N0B21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/EskandarianCZB21,
  author       = {Saba Eskandarian and
                  Henry Corrigan{-}Gibbs and
                  Matei Zaharia and
                  Dan Boneh},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic
                  Privacy},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1775--1792},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/eskandarian},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/EskandarianCZB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/FarkeBGDA21,
  author       = {Florian M. Farke and
                  David G. Balash and
                  Maximilian Golla and
                  Markus D{\"{u}}rmuth and
                  Adam J. Aviv},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Are Privacy Dashboards Good for End Users? Evaluating User Perceptions
                  and Reactions to Google's My Activity},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {483--500},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/farke},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/FarkeBGDA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/FarkhaniAL21,
  author       = {Reza Mirzazade Farkhani and
                  Mansour Ahmadi and
                  Long Lu},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {PTAuth: Temporal Memory Safety via Robust Points-to Authentication},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1037--1054},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/mirzazade},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/FarkhaniAL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/FeiL000J21,
  author       = {Peng Fei and
                  Zhou Li and
                  Zhiying Wang and
                  Xiao Yu and
                  Ding Li and
                  Kangkook Jee},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {{SEAL:} Storage-efficient Causality Analysis on Enterprise Logs with
                  Query-friendly Compression},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2987--3004},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/fei},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/FeiL000J21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Ferguson-Walter21,
  author       = {Kimberly Ferguson{-}Walter and
                  Maxine Major and
                  Chelsea K. Johnson and
                  Daniel H. Muhleman},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Examining the Efficacy of Decoy-based and Psychological Cyber Deception},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1127--1144},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/ferguson-walter},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Ferguson-Walter21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/FioraldiDB21,
  author       = {Andrea Fioraldi and
                  Daniele Cono D'Elia and
                  Davide Balzarotti},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {The Use of Likely Invariants as Feedback for Fuzzers},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2829--2846},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/fioraldi},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/FioraldiDB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/FuC21,
  author       = {Xiaoqin Fu and
                  Haipeng Cai},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {FlowDist: Multi-Staged Refinement-Based Dynamic Information Flow Analysis
                  for Distributed Software Systems},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2093--2110},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/fu-xiaoqin},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/FuC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GaddamL0W21,
  author       = {Sivanarayana Gaddam and
                  Atul Luykx and
                  Rohit Sinha and
                  Gaven J. Watson},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Reducing {HSM} Reliance in Payments through Proxy Re-Encryption},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {4061--4078},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/gaddam},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/GaddamL0W21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GaoGLZZMWSY21,
  author       = {Yipeng Gao and
                  Haichang Gao and
                  Sainan Luo and
                  Yang Zi and
                  Shudong Zhang and
                  Wenjie Mao and
                  Ping Wang and
                  Yulong Shen and
                  Jeff Yan},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Research on the Security of Visual Reasoning {CAPTCHA}},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3291--3308},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/gao},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/GaoGLZZMWSY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GigerlHPMB21,
  author       = {Barbara Gigerl and
                  Vedad Hadzic and
                  Robert Primas and
                  Stefan Mangard and
                  Roderick Bloem},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Coco: Co-Design and Co-Verification of Masked Software Implementations
                  on CPUs},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1469--1468},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/gigerl},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/GigerlHPMB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GollaHLPR21,
  author       = {Maximilian Golla and
                  Grant Ho and
                  Marika Lohmus and
                  Monica Pulluri and
                  Elissa M. Redmiles},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Driving 2FA Adoption at Scale: Optimizing Two-Factor Authentication
                  Notification Design Patterns},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {109--126},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/golla},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/GollaHLPR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Groza0MES21,
  author       = {Bogdan Groza and
                  Lucian Popa and
                  Pal{-}Stefan Murvay and
                  Yuval Elovici and
                  Asaf Shabtai},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {{CANARY} - a reactive defense mechanism for Controller Area Networks
                  based on Active RelaYs},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {4259--4276},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/groza},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Groza0MES21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GuoCKRC21,
  author       = {Cheng Guo and
                  Brianne Campbell and
                  Apu Kapadia and
                  Michael K. Reiter and
                  Kelly Caine},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Effect of Mood, Location, Trust, and Presence of Others on Video-Based
                  Social Authentication},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1--18},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/guo},
  timestamp    = {Mon, 14 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/GuoCKRC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Han0P0RMSC21,
  author       = {Xueyuan Han and
                  Xiao Yu and
                  Thomas F. J.{-}M. Pasquier and
                  Ding Li and
                  Junghwan Rhee and
                  James W. Mickens and
                  Margo I. Seltzer and
                  Haifeng Chen},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {{SIGL:} Securing Software Installations Through Deep Graph Learning},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2345--2362},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/han-xueyuan},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Han0P0RMSC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HanWP21,
  author       = {HyungSeok Han and
                  Andrew Wesie and
                  Brian Pak},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Precise and Scalable Detection of Use-after-Compacting-Garbage-Collection
                  Bugs},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2059--2074},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/han-hyungseok},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/HanWP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HanYR21,
  author       = {Zhaokun Han and
                  Muhammad Yasin and
                  Jeyavijayan (JV) Rajendran},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Does logic locking work with {EDA} tools?},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1055--1072},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/han-zhaokun},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/HanYR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HaneyAF21,
  author       = {Julie M. Haney and
                  Yasemin Acar and
                  Susanne Furman},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {"It's the Company, the Government, You and I": User Perceptions of
                  Responsibility for Smart Home Privacy and Security},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {411--428},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/haney},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/HaneyAF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HeJ0G021,
  author       = {Xinlei He and
                  Jinyuan Jia and
                  Michael Backes and
                  Neil Zhenqiang Gong and
                  Yang Zhang},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Stealing Links from Graph Neural Networks},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2669--2686},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/he-xinlei},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/HeJ0G021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HeM0HH21,
  author       = {Yingzhe He and
                  Guozhu Meng and
                  Kai Chen and
                  Xingbo Hu and
                  Jinwen He},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {{DRMI:} {A} Dataset Reduction Technology based on Mutual Information
                  for Black-box Attacks},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1901--1918},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/he-yingzhe},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/HeM0HH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HeZ00L0YJ21,
  author       = {Ningyu He and
                  Ruiyi Zhang and
                  Haoyu Wang and
                  Lei Wu and
                  Xiapu Luo and
                  Yao Guo and
                  Ting Yu and
                  Xuxian Jiang},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {{EOSAFE:} Security Analysis of {EOSIO} Smart Contracts},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1271--1288},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/he-ningyu},
  timestamp    = {Wed, 06 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/HeZ00L0YJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HeinrichH0SW21,
  author       = {Alexander Heinrich and
                  Matthias Hollick and
                  Thomas Schneider and
                  Milan Stute and
                  Christian Weinert},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {PrivateDrop: Practical Privacy-Preserving Authentication for Apple
                  AirDrop},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3577--3594},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/heinrich},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/HeinrichH0SW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HoDAPSV021,
  author       = {Grant Ho and
                  Mayank Dhiman and
                  Devdatta Akhawe and
                  Vern Paxson and
                  Stefan Savage and
                  Geoffrey M. Voelker and
                  David A. Wagner},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Hopper: Modeling and Detecting Lateral Movement},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3093--3110},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/ho},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/HoDAPSV021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HoangNDKLMCGP21,
  author       = {Nguyen Phong Hoang and
                  Arian Akhavan Niaki and
                  Jakub Dalek and
                  Jeffrey Knockel and
                  Pellaeon Lin and
                  Bill Marczak and
                  Masashi Crete{-}Nishihata and
                  Phillipa Gill and
                  Michalis Polychronakis},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {How Great is the Great Firewall? Measuring China's {DNS} Censorship},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3381--3398},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/hoang},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/HoangNDKLMCGP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Hu0LGWGLD21,
  author       = {Changhui Hu and
                  Jin Li and
                  Zheli Liu and
                  Xiaojie Guo and
                  Yu Wei and
                  Xuan Guang and
                  Grigorios Loukides and
                  Changyu Dong},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {How to Make Private Distributed Cardinality Estimation Practical,
                  and Get Differential Privacy for Free},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {965--982},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/hu-changhui},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Hu0LGWGLD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HuCSFML21,
  author       = {Shengtuo Hu and
                  Qi Alfred Chen and
                  Jiachen Sun and
                  Yiheng Feng and
                  Z. Morley Mao and
                  Henry X. Liu},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Automated Discovery of Denial-of-Service Vulnerabilities in Connected
                  Vehicle Protocols},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3219--3236},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/hu-shengtuo},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/HuCSFML21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HuamanSSWADF21,
  author       = {Nicolas Huaman and
                  Bennet von Skarczinski and
                  Christian Stransky and
                  Dominik Wermke and
                  Yasemin Acar and
                  Arne Drei{\ss}igacker and
                  Sascha Fahl},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {A Large-Scale Interview Study on Information Security in and Attacks
                  against Small and Medium-sized Enterprises},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1235--1252},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/huaman},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/HuamanSSWADF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HugenrothKB21,
  author       = {Daniel Hugenroth and
                  Martin Kleppmann and
                  Alastair R. Beresford},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Rollercoaster: An Efficient Group-Multicast Scheme for Mix Networks},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3433--3450},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/hugenroth},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/HugenrothKB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HussainNDMK21,
  author       = {Shehzeen Hussain and
                  Paarth Neekhara and
                  Shlomo Dubnov and
                  Julian J. McAuley and
                  Farinaz Koushanfar},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {WaveGuard: Understanding and Mitigating Audio Adversarial Examples},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2273--2290},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/hussain},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/HussainNDMK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ImolaMC21,
  author       = {Jacob Imola and
                  Takao Murakami and
                  Kamalika Chaudhuri},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Locally Differentially Private Analysis of Graph Statistics},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {983--1000},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/imola},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ImolaMC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/IzhikevichTD21,
  author       = {Liz Izhikevich and
                  Renata Teixeira and
                  Zakir Durumeric},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {{LZR:} Identifying Unexpected Internet Services},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3111--3128},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/izhikevich},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/IzhikevichTD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JangidCZL21,
  author       = {Mohit Kumar Jangid and
                  Guoxing Chen and
                  Yinqian Zhang and
                  Zhiqiang Lin},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Towards Formal Verification of State Continuity for Enclave Programs},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {573--590},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/jangid},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/JangidCZL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JansenTG21,
  author       = {Rob Jansen and
                  Justin Tracey and
                  Ian Goldberg},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Once is Never Enough: Foundations for Sound Statistical Inference
                  in Tor Network Experimentation},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3415--3432},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/jansen},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/JansenTG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JeitnerS21,
  author       = {Philipp Jeitner and
                  Haya Schulmann},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Injection Attacks Reloaded: Tunnelling Malicious Payloads over {DNS}},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3165--3182},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/jeitner},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/JeitnerS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JiE0S21,
  author       = {Yuede Ji and
                  Mohamed Elsabagh and
                  Ryan Johnson and
                  Angelos Stavrou},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {DEFInit: An Analysis of Exposed Android Init Routines},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3685--3702},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/ji},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/JiE0S21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JiaCCP21,
  author       = {Hengrui Jia and
                  Christopher A. Choquette{-}Choo and
                  Varun Chandrasekaran and
                  Nicolas Papernot},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Entangled Watermarks as a Defense against Model Extraction},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1937--1954},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/jia},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/JiaCCP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Jing0D0L0NW21,
  author       = {Pengfei Jing and
                  Qiyi Tang and
                  Yuefeng Du and
                  Lei Xue and
                  Xiapu Luo and
                  Ting Wang and
                  Sen Nie and
                  Shi Wu},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Too Good to Be Safe: Tricking Lane Detection in Autonomous Driving
                  with Crafted Perturbations},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3237--3254},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/jing},
  timestamp    = {Tue, 21 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Jing0D0L0NW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JohnsonBZMCSL21,
  author       = {Evan Johnson and
                  Maxwell Bland and
                  Yifei Zhu and
                  Joshua Mason and
                  Stephen Checkoway and
                  Stefan Savage and
                  Kirill Levchenko},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Jetset: Targeted Firmware Rehosting for Embedded Systems},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {321--338},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/johnson},
  timestamp    = {Thu, 16 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/JohnsonBZMCSL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KaiserWLLMM21,
  author       = {Ben Kaiser and
                  Jerry Wei and
                  Eli Lucherini and
                  Kevin Lee and
                  J. Nathan Matias and
                  Jonathan R. Mayer},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Adapting Security Warnings to Counter Online Disinformation},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1163--1180},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/kaiser},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/KaiserWLLMM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Khan0SVKUZ21,
  author       = {Mohammad Taha Khan and
                  Christopher Tran and
                  Shubham Singh and
                  Dimitri Vasilkov and
                  Chris Kanich and
                  Blase Ur and
                  Elena Zheleva},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Helping Users Automatically Find and Manage Sensitive, Expendable
                  Files in Cloud Storage},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1145--1162},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/khan-mohammad},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Khan0SVKUZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KhanKLXBT21,
  author       = {Arslan Khan and
                  Hyungsub Kim and
                  Byoungyoung Lee and
                  Dongyan Xu and
                  Antonio Bianchi and
                  Dave (Jing) Tian},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {{M2MON:} Building an MMIO-based Security Reference Monitor for Unmanned
                  Vehicles},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {285--302},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/khan-arslan},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/KhanKLXBT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KhandelwalLHF21,
  author       = {Rishabh Khandelwal and
                  Thomas Linden and
                  Hamza Harkous and
                  Kassem Fawaz},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {PriSEC: {A} Privacy Settings Enforcement Controller},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {465--482},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/khandelwal},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/KhandelwalLHF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KhodayariP21,
  author       = {Soheil Khodayari and
                  Giancarlo Pellegrino},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {{JAW:} Studying Client-side {CSRF} with Hybrid Property Graphs and
                  Declarative Traversals},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2525--2542},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/khodayari},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/KhodayariP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KimKRCKKXT21,
  author       = {Taegyu Kim and
                  Vireshwar Kumar and
                  Junghwan Rhee and
                  Jizhou Chen and
                  Kyungtae Kim and
                  Chung Hwan Kim and
                  Dongyan Xu and
                  Dave (Jing) Tian},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {{PASAN:} Detecting Peripheral Access Concurrency Bugs within Bare-Metal
                  Embedded Applications},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {249--266},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/kim},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/KimKRCKKXT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Kirzner021,
  author       = {Ofek Kirzner and
                  Adam Morrison},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {An Analysis of Speculative Type Confusion Vulnerabilities in the Wild},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2399--2416},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/kirzner},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Kirzner021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KoganC21,
  author       = {Dmitry Kogan and
                  Henry Corrigan{-}Gibbs},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Private Blocklist Lookups with Checklist},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {875--892},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/kogan},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/KoganC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KotiPPS21,
  author       = {Nishat Koti and
                  Mahak Pancholi and
                  Arpita Patra and
                  Ajith Suresh},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {{SWIFT:} Super-fast and Robust Privacy-Preserving Machine Learning},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2651--2668},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/koti},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/KotiPPS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KrachenfelsKTS21,
  author       = {Thilo Krachenfels and
                  Tuba Kiyan and
                  Shahin Tajik and
                  Jean{-}Pierre Seifert},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Automatic Extraction of Secrets from the Transistor Jungle using Laser-Assisted
                  Side-Channel Attacks},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {627--644},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/krachenfels},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/KrachenfelsKTS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KulshresthaM21,
  author       = {Anunay Kulshrestha and
                  Jonathan R. Mayer},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Identifying Harmful Media in End-to-End Encrypted Communication: Efficient
                  Private Membership Computation},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {893--910},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/kulshrestha},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/KulshresthaM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LaarschotW21,
  author       = {Jochem van de Laarschot and
                  Rolf van Wegberg},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Risky Business? Investigating the Security Practices of Vendors on
                  an Online Anonymous Market using Ground-Truth Data},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {4079--4095},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/van-de-laarschot},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/LaarschotW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LakshmananBKCH21,
  author       = {Nitya Lakshmanan and
                  Nishant Budhdev and
                  Min Suk Kang and
                  Mun Choon Chan and
                  Jun Han},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {A Stealthy Location Identification Attack Exploiting Carrier Aggregation
                  in Cellular Networks},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3899--3916},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/lakshmanan},
  timestamp    = {Fri, 13 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/LakshmananBKCH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LaperdrixSCKN21,
  author       = {Pierre Laperdrix and
                  Oleksii Starov and
                  Quan Chen and
                  Alexandros Kapravelos and
                  Nick Nikiforakis},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Fingerprinting in Style: Detecting Browser Extensions via Injected
                  Style Sheets},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2507--2524},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/laperdrix},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/LaperdrixSCKN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LassakHGU21,
  author       = {Leona Lassak and
                  Annika Hildebrandt and
                  Maximilian Golla and
                  Blase Ur},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {"It's Stored, Hopefully, on an Encrypted Server": Mitigating Users'
                  Misconceptions About {FIDO2} Biometric WebAuthn},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {91--108},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/lassak},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/LassakHGU21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LeeECVLQWPJ21,
  author       = {Yu Tsung Lee and
                  William Enck and
                  Haining Chen and
                  Hayawardh Vijayakumar and
                  Ninghui Li and
                  Zhiyun Qian and
                  Daimeng Wang and
                  Giuseppe Petracca and
                  Trent Jaeger},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {PolyScope: Multi-Policy Access Control Analysis to Compute Authorized
                  Attack Operations in Android Systems},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2579--2596},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/lee-yu-tsung},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/LeeECVLQWPJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LeeLKJSS21,
  author       = {Hyunjoo Lee and
                  Jiyeon Lee and
                  Daejun Kim and
                  Suman Jana and
                  Insik Shin and
                  Sooel Son},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {AdCube: WebVR Ad Fraud and Practical Confinement of Third-Party Ads},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2543--2560},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/lee-hyunjoo},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/LeeLKJSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LeeML21,
  author       = {Yoochan Lee and
                  Changwoo Min and
                  Byoungyoung Lee},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {ExpRace: Exploiting Kernel Races through Raising Interrupts},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2363--2380},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/lee-yoochan},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/LeeML21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LeeSL21,
  author       = {Gwangmu Lee and
                  Woochul Shim and
                  Byoungyoung Lee},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Constraint-guided Directed Greybox Fuzzing},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3559--3576},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/lee-gwangmu},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/LeeSL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LehmkuhlMSP21,
  author       = {Ryan Lehmkuhl and
                  Pratyush Mishra and
                  Akshayaram Srinivasan and
                  Raluca Ada Popa},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Muse: Secure Inference Resilient to Malicious Clients},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2201--2218},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/lehmkuhl},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/LehmkuhlMSP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LenGR21,
  author       = {Julia Len and
                  Paul Grubbs and
                  Thomas Ristenpart},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Partitioning Oracle Attacks},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {195--212},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/len},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/LenGR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Li0FK21,
  author       = {Jingjie Li and
                  Amrita Roy Chowdhury and
                  Kassem Fawaz and
                  Younghyun Kim},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Kal{\(\epsilon\)}ido: Real-Time Privacy Control for Eye-Tracking Systems},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1793--1810},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/li-jingjie},
  timestamp    = {Thu, 28 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Li0FK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LiCC0PCCC21,
  author       = {Yeting Li and
                  Zixuan Chen and
                  Jialun Cao and
                  Zhiwu Xu and
                  Qiancheng Peng and
                  Haiming Chen and
                  Liyuan Chen and
                  Shing{-}Chi Cheung},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {ReDoSHunter: {A} Combined Static and Dynamic Approach for Regular
                  Expression DoS Detection},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3847--3864},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/li-yeting},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/LiCC0PCCC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LiCLWC21,
  author       = {Xing Li and
                  Yan Chen and
                  Zhiqiang Lin and
                  Xiao Wang and
                  Jim Hao Chen},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Automatic Policy Generation for Inter-Service Access Control of Microservices},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3971--3988},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/li-xing},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/LiCLWC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LiJCLLCLWBCL021,
  author       = {Yuwei Li and
                  Shouling Ji and
                  Yuan Chen and
                  Sizhuang Liang and
                  Wei{-}Han Lee and
                  Yueyao Chen and
                  Chenyang Lyu and
                  Chunming Wu and
                  Raheem Beyah and
                  Peng Cheng and
                  Kangjie Lu and
                  Ting Wang},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {{UNIFUZZ:} {A} Holistic and Pragmatic Metrics-Driven Platform for
                  Evaluating Fuzzers},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2777--2794},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/li-yuwei},
  timestamp    = {Fri, 29 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/LiJCLLCLWBCL021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LiLGNH21,
  author       = {Shih{-}Wei Li and
                  Xupeng Li and
                  Ronghui Gu and
                  Jason Nieh and
                  John Zhuang Hui},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Formally Verified Memory Protection for a Commodity Multiprocessor
                  Hypervisor},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3953--3970},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/li-shih-wei},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/LiLGNH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LiZWLC21,
  author       = {Mengyuan Li and
                  Yinqian Zhang and
                  Huibo Wang and
                  Kang Li and
                  Yueqiang Cheng},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {{CIPHERLEAKS:} Breaking Constant-time Cryptography on {AMD} {SEV}
                  via the Ciphertext Side Channel},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {717--732},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/li-mengyuan},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/LiZWLC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LiljestrandNGEA21,
  author       = {Hans Liljestrand and
                  Thomas Nyman and
                  Lachlan J. Gunn and
                  Jan{-}Erik Ekberg and
                  N. Asokan},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {PACStack: an Authenticated Call Stack},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {357--374},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/liljestrand},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/LiljestrandNGEA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LinLDNCLSZD21,
  author       = {Yun Lin and
                  Ruofan Liu and
                  Dinil Mon Divakaran and
                  Jun Yang Ng and
                  Qing Zhou Chan and
                  Yiwen Lu and
                  Yuxuan Si and
                  Fan Zhang and
                  Jin Song Dong},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Phishpedia: {A} Hybrid Deep Learning Based Approach to Visually Identify
                  Phishing Webpages},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3793--3810},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/lin},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/LinLDNCLSZD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LiuCYSWGZ0Y21,
  author       = {Shinan Liu and
                  Xiang Cheng and
                  Hanchao Yang and
                  Yuanchao Shu and
                  Xiaoran Weng and
                  Ping Guo and
                  Kexiong Curtis Zeng and
                  Gang Wang and
                  Yaling Yang},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Stars Can Tell: {A} Robust Method to Defend against {GPS} Spoofing
                  Attacks using Off-the-shelf Chipset},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3935--3952},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/liu-shinan},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/LiuCYSWGZ0Y21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LiuNNLK0BYS21,
  author       = {Zaoxing Liu and
                  Hun Namkung and
                  Georgios Nikolaidis and
                  Jeongkeun Lee and
                  Changhoon Kim and
                  Xin Jin and
                  Vladimir Braverman and
                  Minlan Yu and
                  Vyas Sekar},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Jaqen: {A} High-Performance Switch-Native Approach for Detecting and
                  Mitigating Volumetric DDoS Attacks with Programmable Switches},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3829--3846},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/liu-zaoxing},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/LiuNNLK0BYS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LiuS0ZLX21,
  author       = {Binbin Liu and
                  Junfu Shen and
                  Jiang Ming and
                  Qilong Zheng and
                  Jing Li and
                  Dongpeng Xu},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {MBA-Blast: Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1701--1718},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/liu-binbin},
  timestamp    = {Wed, 22 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/LiuS0ZLX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LouYZ21,
  author       = {Jiadong Lou and
                  Xu Yuan and
                  Ning Zhang},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Messy States of Wiring: Vulnerabilities in Emerging Personal Payment
                  Systems},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3273--3289},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/lou},
  timestamp    = {Mon, 23 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/LouYZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LoughlinNMTWNK21,
  author       = {Kevin Loughlin and
                  Ian Neal and
                  Jiacheng Ma and
                  Elisa Tsai and
                  Ofir Weisse and
                  Satish Narayanasamy and
                  Baris Kasikci},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {{DOLMA:} Securing Speculation with the Principle of Transient Non-Observability},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1397--1414},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/loughlin},
  timestamp    = {Fri, 24 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/LoughlinNMTWNK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LovisottoTSSM21,
  author       = {Giulio Lovisotto and
                  Henry Turner and
                  Ivo Sluganovic and
                  Martin Strohmeier and
                  Ivan Martinovic},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {{SLAP:} Improving Physical Adversarial Examples with Short-Lived Adversarial
                  Perturbations},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1865--1882},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/lovisotto},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/LovisottoTSSM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MaMADB21,
  author       = {Zane Ma and
                  Joshua Mason and
                  Manos Antonakakis and
                  Zakir Durumeric and
                  Michael D. Bailey},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {What's in a Name? Exploring {CA} Certificate Control},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {4383--4400},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/ma},
  timestamp    = {Thu, 26 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/MaMADB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MaassSPBHHS21,
  author       = {Max Maass and
                  Alina St{\"{o}}ver and
                  Henning Prid{\"{o}}hl and
                  Sebastian Bretthauer and
                  Dominik Herrmann and
                  Matthias Hollick and
                  Indra Spiecker},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Effective Notification Campaigns on the Web: {A} Matter of Trust,
                  Framing, and Support},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2489--2506},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/maass},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/MaassSPBHHS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MatsuokaBMS021,
  author       = {Kotaro Matsuoka and
                  Ryotaro Banno and
                  Naoki Matsumoto and
                  Takashi Sato and
                  Song Bian},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Virtual Secure Platform: {A} Five-Stage Pipeline Processor over {TFHE}},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {4007--4024},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/matsuoka},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/MatsuokaBMS021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MayerZSA21,
  author       = {Peter Mayer and
                  Yixin Zou and
                  Florian Schaub and
                  Adam J. Aviv},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {"Now I'm a bit angry: " Individuals' Awareness, Perception, and Responses
                  to Data Breaches that Affected Them},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {393--410},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/mayer},
  timestamp    = {Tue, 17 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/MayerZSA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/McDonaldBMSR21,
  author       = {Allison McDonald and
                  Catherine Barwulor and
                  Michelle L. Mazurek and
                  Florian Schaub and
                  Elissa M. Redmiles},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {"It's stressful having all these phones": Investigating Sex Workers'
                  Safety Goals, Risks, and Practices Online},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {375--392},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/mcdonald},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/McDonaldBMSR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MeijerMW21,
  author       = {Carlo Meijer and
                  Veelasha Moonsamy and
                  Jos Wetzels},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Where's Crypto?: Automated Identification and Classification of Proprietary
                  Cryptographic Primitives in Binary Code},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {555--572},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/meijer},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/MeijerMW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MergetBASMS21,
  author       = {Robert Merget and
                  Marcus Brinkmann and
                  Nimrod Aviram and
                  Juraj Somorovsky and
                  Johannes Mittmann and
                  J{\"{o}}rg Schwenk},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles
                  in {TLS-DH(E)}},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {213--230},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/merget},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/MergetBASMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MoonYSYSS21,
  author       = {Soo{-}Jin Moon and
                  Yucheng Yin and
                  Rahul Anand Sharma and
                  Yifei Yuan and
                  Jonathan M. Spring and
                  Vyas Sekar},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Accurately Measuring Global Risk of Amplification Attacks using AmpMap},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3881--3898},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/moon},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/MoonYSYSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MuschJ21,
  author       = {Marius Musch and
                  Martin Johns},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {U Can't Debug This: Detecting JavaScript Anti-Debugging Techniques
                  in the Wild},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2935--2950},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/musch},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/MuschJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/NagyNHDH21,
  author       = {Stefan Nagy and
                  Anh Nguyen{-}Tuong and
                  Jason D. Hiser and
                  Jack W. Davidson and
                  Matthew Hicks},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Breaking Through Binaries: Compiler-quality Instrumentation for Better
                  Binary-only Fuzzing},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1683--1700},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/nagy},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/NagyNHDH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/NakatsukaOPT21,
  author       = {Yoshimichi Nakatsuka and
                  Ercan Ozturk and
                  Andrew Paverd and
                  Gene Tsudik},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {{CACTI:} Captcha Avoidance via Client-side {TEE} Integration},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2561--2578},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/nakatsuka},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/NakatsukaOPT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/NarayanDMCJGVSS21,
  author       = {Shravan Narayan and
                  Craig Disselkoen and
                  Daniel Moghimi and
                  Sunjay Cauligi and
                  Evan Johnson and
                  Zhao Gang and
                  Anjo Vahldiek{-}Oberwagner and
                  Ravi Sahita and
                  Hovav Shacham and
                  Dean M. Tullsen and
                  Deian Stefan},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Swivel: Hardening WebAssembly against Spectre},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1433--1450},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/narayan},
  timestamp    = {Thu, 16 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/NarayanDMCJGVSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/NasrBH21,
  author       = {Milad Nasr and
                  Alireza Bahramali and
                  Amir Houmansadr},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Defeating DNN-Based Traffic Analysis Systems in Real-Time With Blind
                  Adversarial Perturbations},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2705--2722},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/nasr},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/NasrBH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/NgC21,
  author       = {Lucien K. L. Ng and
                  Sherman S. M. Chow},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {GForce: GPU-Friendly Oblivious and Rapid Neural Network Inference},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2147--2164},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/ng},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/NgC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Nguyen0MS21,
  author       = {Trung Tin Nguyen and
                  Michael Backes and
                  Ninja Marnau and
                  Ben Stock},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Share First, Ask Later (or Never?) Studying Violations of GDPR's Explicit
                  Consent in Android Apps},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3667--3684},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/nguyen},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Nguyen0MS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/OltroggeHAA0F21,
  author       = {Marten Oltrogge and
                  Nicolas Huaman and
                  Sabrina Amft and
                  Yasemin Acar and
                  Michael Backes and
                  Sascha Fahl},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Why Eve and Mallory Still Love Android: Revisiting {TLS} (In)Security
                  in Android Applications},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {4347--4364},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/oltrogge},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/OltroggeHAA0F21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/OnaolapoLMS21,
  author       = {Jeremiah Onaolapo and
                  Nektarios Leontiadis and
                  Despoina Magka and
                  Gianluca Stringhini},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {SocialHEISTing: Understanding Stolen Facebook Accounts},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {4115--4132},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/onaolapo},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/OnaolapoLMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/OyaK21,
  author       = {Simon Oya and
                  Florian Kerschbaum},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Hiding the Access Pattern is Not Enough: Exploiting Search Pattern
                  Leakage in Searchable Encryption},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {127--142},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/oya},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/OyaK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/PaccagnellaLF21,
  author       = {Riccardo Paccagnella and
                  Licheng Luo and
                  Christopher W. Fletcher},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Lord of the Ring(s): Side Channel Attacks on the {CPU} On-Chip Ring
                  Interconnect Are Practical},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {645--662},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/paccagnella},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/PaccagnellaLF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/PasquiniCAB21,
  author       = {Dario Pasquini and
                  Marco Cianfriglia and
                  Giuseppe Ateniese and
                  Massimo Bernaschi},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Reducing Bias in Modeling Real-world Password Strength via Deep Learning
                  and Dynamic Dictionaries},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {821--838},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/pasquini},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/PasquiniCAB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Patra0SY21,
  author       = {Arpita Patra and
                  Thomas Schneider and
                  Ajith Suresh and
                  Hossein Yalame},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {{ABY2.0:} Improved Mixed-Protocol Secure Two-Party Computation},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2165--2182},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/patra},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Patra0SY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/PfefferMDGSWFK21,
  author       = {Katharina Pfeffer and
                  Alexandra Mai and
                  Adrian Dabrowski and
                  Matthias Gusenbauer and
                  Philipp Schindler and
                  Edgar R. Weippl and
                  Michael Franz and
                  Katharina Krombholz},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {On the Usability of Authenticity Checks for Hardware Security Tokens},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {37--54},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/pfeffer},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/PfefferMDGSWFK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/PoddarKYDPH21,
  author       = {Rishabh Poddar and
                  Sukrit Kalra and
                  Avishay Yanai and
                  Ryan Deng and
                  Raluca Ada Popa and
                  Joseph M. Hellerstein},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Senate: {A} Maliciously-Secure {MPC} Platform for Collaborative Analytics},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2129--2146},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/poddar},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/PoddarKYDPH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/PoddebniakIBS21,
  author       = {Damian Poddebniak and
                  Fabian Ising and
                  Hanno B{\"{o}}ck and
                  Sebastian Schinzel},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Why {TLS} is better without {STARTTLS:} {A} Security Analysis of {STARTTLS}
                  in the Email Context},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {4365--4382},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/poddebniak},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/PoddebniakIBS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/PudduSHC21,
  author       = {Ivan Puddu and
                  Moritz Schneider and
                  Miro Haller and
                  Srdjan Capkun},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Frontal Attack: Leaking Control-Flow in {SGX} via the {CPU} Frontend},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {663--680},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/puddu},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/PudduSHC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RagabBBG21,
  author       = {Hany Ragab and
                  Enrico Barberis and
                  Herbert Bos and
                  Cristiano Giuffrida},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Rage Against the Machine Clear: {A} Systematic Analysis of Machine
                  Clears and Their Implications for Transient Execution Attacks},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1451--1468},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/ragab},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/RagabBBG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RakinLXF21,
  author       = {Adnan Siraj Rakin and
                  Yukui Luo and
                  Xiaolin Xu and
                  Deliang Fan},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Deep-Dup: An Adversarial Weight Duplication Attack Framework to Crush
                  Deep Neural Network in Multi-Tenant {FPGA}},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1919--1936},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/rakin},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/RakinLXF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RameshXMLRKJH21,
  author       = {Soundarya Ramesh and
                  Rui Xiao and
                  Anindya Maiti and
                  Jong Taek Lee and
                  Harini Ramprasad and
                  Ananda Kumar and
                  Murtuza Jadliwala and
                  Jun Han},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Acoustics to the Rescue: Physical Key Inference Attack Revisited},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3255--3272},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/ramesh},
  timestamp    = {Tue, 14 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/RameshXMLRKJH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RayWKA21,
  author       = {Hirak Ray and
                  Flynn Wolf and
                  Ravi Kuber and
                  Adam J. Aviv},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Why Older Adults (Don't) Use Password Managers},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {73--90},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/ray},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/RayWKA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RidderFVBGR21,
  author       = {Finn de Ridder and
                  Pietro Frigo and
                  Emanuele Vannacci and
                  Herbert Bos and
                  Cristiano Giuffrida and
                  Kaveh Razavi},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {{SMASH:} Synchronized Many-sided Rowhammer Attacks from JavaScript},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1001--1018},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/ridder},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/RidderFVBGR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RocheLMI21,
  author       = {Thomas Roche and
                  Victor Lomn{\'{e}} and
                  Camille Mutschler and
                  Laurent Imbert},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {A Side Journey To Titan},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {231--248},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/roche},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/RocheLMI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RodlerLKD21,
  author       = {Michael Rodler and
                  Wenting Li and
                  Ghassan O. Karame and
                  Lucas Davi},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1289--1306},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/rodler},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/RodlerLKD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RosenPM21,
  author       = {Marc B. Rosen and
                  James Parker and
                  Alex J. Malozemoff},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Balboa: Bobbing and Weaving around Network Censorship},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3399--3413},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/rosen},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/RosenPM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RossiFBRP21,
  author       = {Matthew Rossi and
                  Dario Facchinetti and
                  Enrico Bacis and
                  Marco Rosa and
                  Stefano Paraboschi},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {SEApp: Bringing Mandatory Access Control to Android Apps},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3613--3630},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/rossi},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/RossiFBRP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RothenbergerTPH21,
  author       = {Benjamin Rothenberger and
                  Konstantin Taranov and
                  Adrian Perrig and
                  Torsten Hoefler},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {ReDMArk: Bypassing {RDMA} Security Mechanisms},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {4277--4292},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/rothenberger},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/RothenbergerTPH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RyanSSBJ21,
  author       = {Gabriel Ryan and
                  Abhishek Shah and
                  Dongdong She and
                  Koustubha Bhat and
                  Suman Jana},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Fine Grained Dataflow Tracking with Proximal Gradients},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1611--1628},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/ryan},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/RyanSSBJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SaileshwarQ21,
  author       = {Gururaj Saileshwar and
                  Moinuddin K. Qureshi},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {{MIRAGE:} Mitigating Conflict-Based Cache Attacks with a Practical
                  Fully-Associative Design},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1379--1396},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/saileshwar},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/SaileshwarQ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SallsJCKV21,
  author       = {Christopher Salls and
                  Chani Jindal and
                  Jake Corina and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Token-Level Fuzzing},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2795--2809},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/salls},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/SallsJCKV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Sato0WJLC21,
  author       = {Takami Sato and
                  Junjie Shen and
                  Ningfei Wang and
                  Yunhan Jia and
                  Xue Lin and
                  Qi Alfred Chen},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Dirty Road Can Attack: Security of Deep Learning based Automated Lane
                  Centering under Physical-World Attack},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3309--3326},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/sato},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Sato0WJLC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SchefflerV21,
  author       = {Sarah Scheffler and
                  Mayank Varia},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Protecting Cryptography Against Compelled Self-Incrimination},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {591--608},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/scheffler},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/SchefflerV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SchmittR21,
  author       = {Paul Schmitt and
                  Barath Raghavan},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Pretty Good Phone Privacy},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1737--1754},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/schmitt},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/SchmittR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SchumiloA0WH21,
  author       = {Sergej Schumilo and
                  Cornelius Aschermann and
                  Ali Abbasi and
                  Simon W{\"{o}}rner and
                  Thorsten Holz},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2597--2614},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/schumilo},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/SchumiloA0WH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SchusterSTS21,
  author       = {Roei Schuster and
                  Congzheng Song and
                  Eran Tromer and
                  Vitaly Shmatikov},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1559--1575},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/schuster},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/SchusterSTS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SeragBKCX21,
  author       = {Khaled Serag and
                  Rohit Bhatia and
                  Vireshwar Kumar and
                  Z. Berkay Celik and
                  Dongyan Xu},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Exposing New Vulnerabilities of Error Handling Mechanism in {CAN}},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {4241--4258},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/serag},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/SeragBKCX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SeveriMCO21,
  author       = {Giorgio Severi and
                  Jim Meyer and
                  Scott E. Coull and
                  Alina Oprea},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1487--1504},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/severi},
  timestamp    = {Mon, 18 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/SeveriMCO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ShahverdiSD21,
  author       = {Aria Shahverdi and
                  Mahammad Shirinov and
                  Dana Dachman{-}Soled},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Database Reconstruction from Noisy Volumes: {A} Cache Side-Channel
                  Attack on SQLite},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1019--1035},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/shahverdi},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ShahverdiSD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ShenWGZLLZHDP021,
  author       = {Kaiwen Shen and
                  Chuhan Wang and
                  Minglei Guo and
                  Xiaofeng Zheng and
                  Chaoyi Lu and
                  Baojun Liu and
                  Yuxuan Zhao and
                  Shuang Hao and
                  Haixin Duan and
                  Qingfeng Pan and
                  Min Yang},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Weak Links in Authentication Chains: {A} Large-scale Analysis of Email
                  Sender Spoofing Attacks},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3201--3217},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/shen-kaiwen},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ShenWGZLLZHDP021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ShustermanAOGOY21,
  author       = {Anatoly Shusterman and
                  Ayush Agarwal and
                  Sioli O'Connell and
                  Daniel Genkin and
                  Yossi Oren and
                  Yuval Yarom},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel
                  Defenses},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2863--2880},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/shusterman},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ShustermanAOGOY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SilvaNEKYK21,
  author       = {Ravindu De Silva and
                  Mohamed Nabeel and
                  Charith Elvitigala and
                  Issa Khalil and
                  Ting Yu and
                  Chamath Keppitiyagama},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Compromised or Attacker-Owned: {A} Large Scale Classification and
                  Study of Hosting Domains of Malicious URLs},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3721--3738},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/desilva},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/SilvaNEKYK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SinghGNS21,
  author       = {Akash Deep Singh and
                  Luis Garcia and
                  Joseph Noor and
                  Mani B. Srivastava},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {I Always Feel Like Somebody's Sensing Me! {A} Framework to Detect,
                  Identify, and Localize Clandestine Wireless Sensors},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1829--1846},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/singh},
  timestamp    = {Mon, 17 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/SinghGNS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SoHO21,
  author       = {Sunbeom So and
                  Seongjoon Hong and
                  Hakjoo Oh},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {SmarTest: Effectively Hunting Vulnerable Transaction Sequences in
                  Smart Contracts through Language Model-Guided Symbolic Execution},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1361--1378},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/so},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/SoHO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SonPPPS21,
  author       = {Jeongseok Son and
                  Griffin Prechter and
                  Rishabh Poddar and
                  Raluca Ada Popa and
                  Koushik Sen},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {ObliCheck: Efficient Verification of Oblivious Algorithms with Unobservable
                  State},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2219--2236},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/son},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/SonPPPS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SongM21,
  author       = {Liwei Song and
                  Prateek Mittal},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Systematic Evaluation of Privacy Risks of Machine Learning Models},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2615--2632},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/song},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/SongM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SpecterH21,
  author       = {Michael A. Specter and
                  J. Alex Halderman},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Security Analysis of the Democracy Live Online Voting System},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3077--3092},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/specter-security},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/SpecterH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SpecterP021,
  author       = {Michael A. Specter and
                  Sunoo Park and
                  Matthew Green},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {KeyForge: Non-Attributable Email from Forward-Forgeable Signatures},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1755--1773},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/specter-keyforge},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/SpecterP021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SquarcinaTVCM21,
  author       = {Marco Squarcina and
                  Mauro Tempesta and
                  Lorenzo Veronese and
                  Stefano Calzavara and
                  Matteo Maffei},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Can {I} Take Your Subdomain? Exploring Same-Site Attacks in the Modern
                  Web},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2917--2934},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/squarcina},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/SquarcinaTVCM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/StuteHLH21,
  author       = {Milan Stute and
                  Alexander Heinrich and
                  Jannik Lorenz and
                  Matthias Hollick},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Disrupting Continuity of Apple's Wireless Ecosystem Security: New
                  Tracking, DoS, and MitM Attacks on iOS and macOS Through Bluetooth
                  Low Energy, AWDL, and Wi-Fi},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3917--3934},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/stute},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/StuteHLH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SuSDL0XL21,
  author       = {Liya Su and
                  Xinyue Shen and
                  Xiangyu Du and
                  Xiaojing Liao and
                  XiaoFeng Wang and
                  Luyi Xing and
                  Baoxu Liu},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Evil Under the Sun: Understanding and Discovering Attacks on Ethereum
                  Decentralized Applications},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1307--1324},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/su},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/SuSDL0XL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SunOZRB00SDA21,
  author       = {Zhibo Sun and
                  Adam Oest and
                  Penghui Zhang and
                  Carlos E. Rubio{-}Medrano and
                  Tiffany Bao and
                  Ruoyu Wang and
                  Ziming Zhao and
                  Yan Shoshitaishvili and
                  Adam Doup{\'{e}} and
                  Gail{-}Joon Ahn},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {4169--4186},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/sun-zhibo},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/SunOZRB00SDA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SunSLM21,
  author       = {Zhichuang Sun and
                  Ruimin Sun and
                  Long Lu and
                  Alan Mislove},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Mind Your Weight(s): {A} Large-scale Study on Insufficient Machine
                  Learning Model Protection in Mobile Apps},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1955--1972},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/sun-zhichuang},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/SunSLM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/TalebiYSQA21,
  author       = {Seyed Mohammadjavad Seyed Talebi and
                  Zhihao Yao and
                  Ardalan Amiri Sani and
                  Zhiyun Qian and
                  Daniel Austin},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Undo Workarounds for Kernel Bugs},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2381--2398},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/talebi},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/TalebiYSQA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Tan0YL021,
  author       = {Xin Tan and
                  Yuan Zhang and
                  Xiyu Yang and
                  Kangjie Lu and
                  Min Yang},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Detecting Kernel Refcount Bugs with Two-Dimensional Consistency Checking},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2471--2488},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/tan},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Tan0YL021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Tang0TZ21,
  author       = {Di Tang and
                  XiaoFeng Wang and
                  Haixu Tang and
                  Kehuan Zhang},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor
                  Contamination Detection},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1541--1558},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/tang-di},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Tang0TZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/TaoRGVT21,
  author       = {Zhe Tao and
                  Aseem Rastogi and
                  Naman Gupta and
                  Kapil Vaswani and
                  Aditya V. Thakur},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {DICE*: {A} Formally Verified Implementation of {DICE} Measured Boot},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1091--1107},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/tao},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/TaoRGVT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/TheofanosCM21,
  author       = {Mary Theofanos and
                  Yee{-}Yin Choong and
                  Olivia Murphy},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {'Passwords Keep Me Safe' - Understanding What Children Think about
                  Passwords},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {19--35},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/theofanos},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/TheofanosCM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/TolleyKKVC21,
  author       = {William J. Tolley and
                  Beau Kujath and
                  Mohammad Taha Khan and
                  Narseo Vallina{-}Rodriguez and
                  Jedidiah R. Crandall},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Blind In/On-Path Attacks and Applications to VPNs},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3129--3146},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/tolley},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/TolleyKKVC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/TorresCS21,
  author       = {Christof Ferreira Torres and
                  Ramiro Camino and
                  Radu State},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Frontrunner Jones and the Raiders of the Dark Forest: An Empirical
                  Study of Frontrunning on the Ethereum Blockchain},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1343--1359},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/torres},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/TorresCS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/TranSK21,
  author       = {Muoi Tran and
                  Akshaye Shenoi and
                  Min Suk Kang},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {On the Routing-Aware Peering against Network-Eclipse Attacks in Bitcoin},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1253--1270},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/tran},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/TranSK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/TychalasBM21,
  author       = {Dimitrios Tychalas and
                  Hadjer Benkraouda and
                  Michail Maniatakos},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {ICSFuzz: Manipulating I/Os and Repurposing Binary Code to Enable Instrumented
                  Fuzzing in {ICS} Control Applications},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2847--2862},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/tychalas},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/TychalasBM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/UjcichJS0SO21,
  author       = {Benjamin E. Ujcich and
                  Samuel Jero and
                  Richard Skowyra and
                  Adam Bates and
                  William H. Sanders and
                  Hamed Okhravi},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Causal Analysis for Software-Defined Networking Attacks},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3183--3200},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/ujcich},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/UjcichJS0SO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/UlqinakuAACC21,
  author       = {Enis Ulqinaku and
                  Hala Assal and
                  AbdelRahman Abdou and
                  Sonia Chiasson and
                  Srdjan Capkun},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Is Real-time Phishing Eliminated with FIDO? Social Engineering Downgrade
                  Attacks against {FIDO} Protocols},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3811--3828},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/ulqinaku},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/UlqinakuAACC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/UzunCKBL21,
  author       = {Erkam Uzun and
                  Simon P. Chung and
                  Vladimir Kolesnikov and
                  Alexandra Boldyreva and
                  Wenke Lee},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Fuzzy Labeled Private Set Intersection with Applications to Private
                  Real-Time Biometric Search},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {911--928},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/uzun},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/UzunCKBL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Vanhoef21,
  author       = {Mathy Vanhoef},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {161--178},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/vanhoef},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Vanhoef21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Vicarte0F21,
  author       = {Jose Rodrigo Sanchez Vicarte and
                  Gang Wang and
                  Christopher W. Fletcher},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Double-Cross Attacks: Subverting Active Learning Systems},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1593--1610},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/vicarte},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Vicarte0F21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Wang0ZZGZ21,
  author       = {Yan Wang and
                  Chao Zhang and
                  Zixuan Zhao and
                  Bolun Zhang and
                  Xiaorui Gong and
                  Wei Zou},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {{MAZE:} Towards Automated Heap Feng Shui},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1647--1664},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/wang-yan},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Wang0ZZGZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WangJT0ZKLLDLB21,
  author       = {Qinying Wang and
                  Shouling Ji and
                  Yuan Tian and
                  Xuhong Zhang and
                  Binbin Zhao and
                  Yuhong Kan and
                  Zhaowei Lin and
                  Changting Lin and
                  Shuiguang Deng and
                  Alex X. Liu and
                  Raheem Beyah},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {MPInspector: {A} Systematic and Automatic Approach for Evaluating
                  the Security of IoT Messaging Protocols},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {4205--4222},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/wang-qinying},
  timestamp    = {Tue, 14 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/WangJT0ZKLLDLB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WangR21,
  author       = {Ke Coby Wang and
                  Michael K. Reiter},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Using Amnesia to Detect Credential Database Breaches},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {839--855},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/wang-ke-coby},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/WangR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WangXWNXLDSL0Z21,
  author       = {Jice Wang and
                  Yue Xiao and
                  Xueqiang Wang and
                  Yuhong Nan and
                  Luyi Xing and
                  Xiaojing Liao and
                  Jinwei Dong and
                  Nicol{\'{a}}s Serrano and
                  Haoran Lu and
                  XiaoFeng Wang and
                  Yuqing Zhang},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Understanding Malicious Cross-library Data Harvesting on Android},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {4133--4150},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/wang-jice},
  timestamp    = {Fri, 19 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/WangXWNXLDSL0Z21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WangZX21,
  author       = {Yuchen Wang and
                  Zhenfeng Zhang and
                  Yongquan Xie},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Privacy-Preserving and Standard-Compatible {AKA} Protocol for 5G},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3595--3612},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/wang-yuchen},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/WangZX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WangZZQKA21,
  author       = {Daimeng Wang and
                  Zheng Zhang and
                  Hang Zhang and
                  Zhiyun Qian and
                  Srikanth V. Krishnamurthy and
                  Nael B. Abu{-}Ghazaleh},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {SyzVegas: Beating Kernel Fuzzing Odds with Reinforcement Learning},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2741--2758},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/wang-daimeng},
  timestamp    = {Tue, 03 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/WangZZQKA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WarfordMMAM21,
  author       = {Noel Warford and
                  Collins W. Munyendo and
                  Ashna Mediratta and
                  Adam J. Aviv and
                  Michelle L. Mazurek},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Strategies and Perceived Risks of Sending Sensitive Documents},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1217--1234},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/warford},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/WarfordMMAM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Weber0NSR21,
  author       = {Daniel Weber and
                  Ahmad Ibrahim and
                  Hamed Nemati and
                  Michael Schwarz and
                  Christian Rossow},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Osiris: Automated Discovery of Microarchitectural Side Channels},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1415--1432},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/weber},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Weber0NSR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Wei21,
  author       = {Mingkui Wei},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Domain Shadowing: Leveraging Content Delivery Networks for Robust
                  Blocking-Resistant Communications},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3327--3343},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/wei},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Wei21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Weng0XK021,
  author       = {Chenkai Weng and
                  Kang Yang and
                  Xiang Xie and
                  Jonathan Katz and
                  Xiao Wang},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications
                  to Machine Learning},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {501--518},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/weng},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Weng0XK021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Wickman0YJLKK21,
  author       = {Brian Wickman and
                  Hong Hu and
                  Insu Yun and
                  Daehee Jang and
                  Jungwon Lim and
                  Sanidhya Kashyap and
                  Taesoo Kim},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Preventing Use-After-Free Attacks with Fast Forward Allocation},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2453--2470},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/wickman},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Wickman0YJLKK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WolfAK21,
  author       = {Flynn Wolf and
                  Adam J. Aviv and
                  Ravi Kuber},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Security Obstacles and Motivations for Small Businesses from a CISO's
                  Perspective},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1199--1216},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/wolf},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/WolfAK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WooLPLD21,
  author       = {Seunghoon Woo and
                  Dongwook Lee and
                  Sunghan Park and
                  Heejo Lee and
                  Sven Dietrich},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {V0Finder: Discovering the Correct Origin of Publicly Reported Software
                  Vulnerabilities},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3041--3058},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/woo},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/WooLPLD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Wu0WX21,
  author       = {Xian Wu and
                  Wenbo Guo and
                  Hua Wei and
                  Xinyu Xing},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Adversarial Policy Training against Deep Reinforcement Learning},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1883--1900},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/wu-xian},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Wu0WX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WuPEML21,
  author       = {Qiushi Wu and
                  Aditya Pakki and
                  Navid Emamdoost and
                  Stephen McCamant and
                  Kangjie Lu},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Understanding and Detecting Disordered Error Handling with Precise
                  Function Pairing},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2041--2058},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/wu-qiushi},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/WuPEML21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WuWAPTXTB21,
  author       = {Jianliang Wu and
                  Ruoyu Wu and
                  Daniele Antonioli and
                  Mathias Payer and
                  Nils Ole Tippenhauer and
                  Dongyan Xu and
                  Dave (Jing) Tian and
                  Antonio Bianchi},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {{LIGHTBLUE:} Automatic Profile-Aware Debloating of Bluetooth Stacks},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {339--356},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/wu-jianliang},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/WuWAPTXTB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/XiPJ021,
  author       = {Zhaohan Xi and
                  Ren Pang and
                  Shouling Ji and
                  Ting Wang},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Graph Backdoor},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1523--1540},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/xi},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/XiPJ021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/XiaoHXY0GL21,
  author       = {Feng Xiao and
                  Jianwei Huang and
                  Yichang Xiong and
                  Guangliang Yang and
                  Hong Hu and
                  Guofei Gu and
                  Wenke Lee},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Abusing Hidden Properties to Attack the Node.js Ecosystem},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2951--2968},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/xiao},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/XiaoHXY0GL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/XingWC21,
  author       = {Jiarong Xing and
                  Wenqing Wu and
                  Ang Chen},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Ripple: {A} Programmable, Decentralized Link-Flooding Defense Against
                  Adaptive Adversaries},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3865--3881},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/xing},
  timestamp    = {Thu, 22 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/XingWC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/XuGCKJ0SPFP21,
  author       = {Teng Xu and
                  Gerard Goossen and
                  Huseyin Kerem Cevahir and
                  Sara Khodeir and
                  Yingyezhe Jin and
                  Frank Li and
                  Shawn Shan and
                  Sagar Patel and
                  David Freeman and
                  Paul Pearce},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Deep Entity Classification: Abusive Account Detection for Online Social
                  Networks},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {4097--4114},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/xu-teng},
  timestamp    = {Tue, 07 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/XuGCKJ0SPFP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/XuNCR21,
  author       = {Min Xu and
                  Armin Namavari and
                  David Cash and
                  Thomas Ristenpart},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Searching Encrypted Data with Size-Locked Indexes},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {4025--4042},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/xu-min},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/XuNCR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/YagemannPCBSL21,
  author       = {Carter Yagemann and
                  Matthew Pruett and
                  Simon P. Chung and
                  Kennon Bittick and
                  Brendan Saltaformaggio and
                  Wenke Lee},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {{ARCUS:} Symbolic Root Cause Analysis of Exploits in Production Systems},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1989--2006},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/yagemann},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/YagemannPCBSL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Yang0HCAX021,
  author       = {Limin Yang and
                  Wenbo Guo and
                  Qingying Hao and
                  Arridhana Ciptadi and
                  Ali Ahmadzadeh and
                  Xinyu Xing and
                  Gang Wang},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {{CADE:} Detecting and Explaining Concept Drift Samples for Security
                  Applications},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2327--2344},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/yang-limin},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Yang0HCAX021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/YangWCWHPL21,
  author       = {Ronghai Yang and
                  Xianbo Wang and
                  Cheng Chi and
                  Dawei Wang and
                  Jiawei He and
                  Siming Pang and
                  Wing Cheong Lau},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Scalable Detection of Promotional Website Defacements in Black Hat
                  {SEO} Campaigns},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3703--3720},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/yang-ronghai},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/YangWCWHPL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Yoon00KS21,
  author       = {Man{-}Ki Yoon and
                  Mengqi Liu and
                  Hao Chen and
                  Jung{-}Eun Kim and
                  Zhong Shao},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Blinder: Partition-Oblivious Hierarchical Scheduling},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2417--2434},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/yoon},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Yoon00KS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ZagorskiMMMV21,
  author       = {Filip Zag{\'{o}}rski and
                  Grant McClearn and
                  Sarah Morin and
                  Neal McBurnett and
                  Poorvi L. Vora},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Minerva- An Efficient Risk-Limiting Ballot Polling Audit},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3059--3076},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/zagorski},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ZagorskiMMMV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ZhangAFA21,
  author       = {Han Zhang and
                  Abhijith Anilkumar and
                  Matt Fredrikson and
                  Yuvraj Agarwal},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Capture: Centralized Library Management for Heterogeneous IoT Devices},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {4187--4204},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/zhang-han},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ZhangAFA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ZhangCFLSZLT21,
  author       = {Xing Zhang and
                  Jiongyi Chen and
                  Chao Feng and
                  Ruilin Li and
                  Yunfei Su and
                  Bin Zhang and
                  Jing Lei and
                  Chaojing Tang},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Reducing Test Cases with Attention Mechanism of Neural Networks},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2075--2092},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/zhang-xing},
  timestamp    = {Tue, 17 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ZhangCFLSZLT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ZhangLLXXCYW021,
  author       = {Cen Zhang and
                  Xingwei Lin and
                  Yuekang Li and
                  Yinxing Xue and
                  Jundong Xie and
                  Hongxu Chen and
                  Xinlei Ying and
                  Jiashui Wang and
                  Yang Liu},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {APICraft: Fuzz Driver Generation for Closed-source {SDK} Libraries},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2811--2828},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/zhang-cen},
  timestamp    = {Fri, 24 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ZhangLLXXCYW021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ZhangZQL21,
  author       = {Zheng Zhang and
                  Hang Zhang and
                  Zhiyun Qian and
                  Billy Lau},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {An Investigation of the Android Kernel Patch Ecosystem},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3649--3666},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/zhang-zheng},
  timestamp    = {Tue, 03 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ZhangZQL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ZhengDCPPS21,
  author       = {Wenting Zheng and
                  Ryan Deng and
                  Weikeng Chen and
                  Raluca Ada Popa and
                  Aurojit Panda and
                  Ion Stoica},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Cerebro: {A} Platform for Multi-Party Cryptographic Collaborative
                  Learning},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2723--2740},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/zheng},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ZhengDCPPS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ZhuCZL21,
  author       = {Yuankun Zhu and
                  Yueqiang Cheng and
                  Husheng Zhou and
                  Yantao Lu},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Hermes Attack: Steal {DNN} Models with Lossless Inference Accuracy},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1973--1988},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/zhu},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ZhuCZL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ZouMNDRRST21,
  author       = {Yixin Zou and
                  Allison McDonald and
                  Julia Narakornpichit and
                  Nicola Dell and
                  Thomas Ristenpart and
                  Kevin A. Roundy and
                  Florian Schaub and
                  Acar Tamersoy},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {The Role of Computer Security Customer Support in Helping Survivors
                  of Intimate Partner Violence},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {429--446},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/zou},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ZouMNDRRST21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2021,
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21},
  isbn         = {978-1-939133-24-3},
  timestamp    = {Mon, 20 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics