USENIX Security Symposium, USENIX Security 2017


Title/Authors Title Research Artifacts
[?] A research artifact is any by-product of a research project that is not directly included in the published research paper. In Computer Science research this is often source code and data sets, but it could also be media, documentation, inputs to proof assistants, shell-scripts to run experiments, etc.
Details

Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks

Tao Wang, Ian Goldberg

Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

The Loopix Anonymity System

Ania M. Piotrowska, Jamie Hayes, Tariq Elahi, Sebastian Meiser, George Danezis

The Loopix Anonymity System

Details
Discussion Comments: 0
Verification: Authors have not verified information

Towards Efficient Heap Overflow Discovery

Xiangkun Jia, Chao Zhang, Purui Su, Yi Yang, Huafeng Huang, Dengguo Feng

Towards Efficient Heap Overflow Discovery

Details
Discussion Comments: 0
Verification: Authors have not verified information

"I Have No Idea What I'm Doing" - On the Usability of Deploying HTTPS

Katharina Krombholz, Wilfried Mayer, Martin Schmiedecker, Edgar R. Weippl

"I Have No Idea What I'm Doing" - On the Usability of Deploying HTTPS

Details
Discussion Comments: 0
Verification: Authors have not verified information

Attacking the Brain: Races in the SDN Control Plane

Lei Xu, Jeff Huang, Sungmin Hong, Jialong Zhang, Guofei Gu

Attacking the Brain: Races in the SDN Control Plane

Details
Discussion Comments: 0
Verification: Authors have not verified information

Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment

Xiaolong Bai, Zhe Zhou, XiaoFeng Wang, Zhou Li, Xianghang Mi, Nan Zhang, Tongxin Li, Shi-Min Hu, Kehuan Zhang

Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment

Details
Discussion Comments: 0
Verification: Authors have not verified information

Computer Security, Privacy, and DNA Sequencing: Compromising Computers with Synthesized DNA, Privacy Leaks, and More

Peter Ney, Karl Koscher, Lee Organick, Luis Ceze, Tadayoshi Kohno

Computer Security, Privacy, and DNA Sequencing: Compromising Computers with Synthesized DNA, Privacy Leaks, and More

Details
Discussion Comments: 0
Verification: Authors have not verified information

Predicting the Resilience of Obfuscated Code Against Symbolic Execution Attacks via Machine Learning

Sebastian Banescu, Christian S. Collberg, Alexander Pretschner

Predicting the Resilience of Obfuscated Code Against Symbolic Execution Attacks via Machine Learning

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Extension Breakdown: Security Analysis of Browsers Extension Resources Control Policies

Iskander Sánchez-Rola, Igor Santos, Davide Balzarotti

Extension Breakdown: Security Analysis of Browsers Extension Resources Control Policies

Details
Discussion Comments: 0
Verification: Authors have not verified information

AuthentiCall: Efficient Identity and Content Authentication for Phone Calls

Bradley Reaves, Logan Blue, Hadi Abdullah, Luis Vargas, Patrick Traynor, Thomas Shrimpton

AuthentiCall: Efficient Identity and Content Authentication for Phone Calls

Details
Discussion Comments: 0
Verification: Authors have not verified information

AWare: Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings

Giuseppe Petracca, Ahmad Atamli-Reineh, Yuqiong Sun, Jens Grossklags, Trent Jaeger

AWare: Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings

Details
Discussion Comments: 0
Verification: Authors have not verified information

Prime+Abort: A Timer-Free High-Precision L3 Cache Attack using Intel TSX

Craig Disselkoen, David Kohlbrenner, Leo Porter, Dean M. Tullsen

Prime+Abort: A Timer-Free High-Precision L3 Cache Attack using Intel TSX

Details
Discussion Comments: 0
Verification: Authors have not verified information

Ninja: Towards Transparent Tracing and Debugging on ARM

Zhenyu Ning, Fengwei Zhang

Ninja: Towards Transparent Tracing and Debugging on ARM

Details
Discussion Comments: 0
Verification: Authors have not verified information

CLKSCREW: Exposing the Perils of Security-Oblivious Energy Management

Adrian Tang, Simha Sethumadhavan, Salvatore J. Stolfo

CLKSCREW: Exposing the Perils of Security-Oblivious Energy Management

Details
Discussion Comments: 0
Verification: Authors have not verified information

Hacking in Darkness: Return-oriented Programming against Secure Enclaves

Jae-Hyuk Lee, Jin Soo Jang, Yeongjin Jang, Nohyun Kwak, Yeseul Choi, Changho Choi, Taesoo Kim, Marcus Peinado, Brent ByungHoon Kang

Hacking in Darkness: Return-oriented Programming against Secure Enclaves

Details
Discussion Comments: 0
Verification: Authors have not verified information

How Double-Fetch Situations turn into Double-Fetch Vulnerabilities: A Study of Double Fetches in the Linux Kernel

Pengfei Wang, Jens Krinke, Kai Lu, Gen Li, Steve Dodier-Lazaro

How Double-Fetch Situations turn into Double-Fetch Vulnerabilities: A Study of Double Fetches in the Linux Kernel

Details
Discussion Comments: 0
Verification: Authors have not verified information

Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing

Sangho Lee, Ming-Wei Shih, Prasun Gera, Taesoo Kim, Hyesoon Kim, Marcus Peinado

Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Efficient Protection of Path-Sensitive Control Security

Ren Ding, Chenxiong Qian, Chengyu Song, William Harris, Taesoo Kim, Wenke Lee

Efficient Protection of Path-Sensitive Control Security

Details
Discussion Comments: 0
Verification: Authors have not verified information

Neural Nets Can Learn Function Type Signatures From Binaries

Zheng Leong Chua, Shiqi Shen, Prateek Saxena, Zhenkai Liang

Neural Nets Can Learn Function Type Signatures From Binaries

Details
Discussion Comments: 0
Verification: Authors have not verified information

Seeing Through The Same Lens: Introspecting Guest Address Space At Native Speed

Siqi Zhao, Xuhua Ding, Wen Xu, Dawu Gu

Seeing Through The Same Lens: Introspecting Guest Address Space At Native Speed

Details
Discussion Comments: 0
Verification: Authors have not verified information

vTZ: Virtualizing ARM TrustZone

Zhichao Hua, Jinyu Gu, Yubin Xia, Haibo Chen, Binyu Zang, Haibing Guan

vTZ: Virtualizing ARM TrustZone

Details
Discussion Comments: 0
Verification: Authors have not verified information

Loophole: Timing Attacks on Shared Event Loops in Chrome

Pepe Vila, Boris Köpf

Loophole: Timing Attacks on Shared Event Loops in Chrome

Details
Discussion Comments: 0
Verification: Authors have not verified information

6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices

Amit Kumar Sikder, Hidayet Aksu, A. Selcuk Uluagac

6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices

Details
Discussion Comments: 0
Verification: Authors have not verified information

CAn't Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory

Ferdinand Brasser, Lucas Davi, David Gens, Christopher Liebchen, Ahmad-Reza Sadeghi

CAn't Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory

Details
Discussion Comments: 0
Verification: Authors have not verified information

BLENDER: Enabling Local Search with a Hybrid Differential Privacy Model

Brendan Avent, Aleksandra Korolova, David Zeber, Torgeir Hovden, Benjamin Livshits

BLENDER: Enabling Local Search with a Hybrid Differential Privacy Model

Details
Discussion Comments: 0
Verification: Authors have not verified information

Understanding the Mirai Botnet

Manos Antonakakis, Tim April, Michael Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J. Alex Halderman, Luca Invernizzi, Michalis Kallitsis, Deepak Kumar, Chaz Lever, Zane Ma, Joshua Mason, Damian Menscher, Chad Seaman, Nick Sullivan, Kurt Thomas, Yi Zhou

Understanding the Mirai Botnet

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

DeTor: Provably Avoiding Geographic Regions in Tor

Zhihao Li, Stephen Herwig, Dave Levin

DeTor: Provably Avoiding Geographic Regions in Tor

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Game of Registrars: An Empirical Analysis of Post-Expiration Domain Name Takeovers

Tobias Lauinger, Abdelberi Chaabane, Ahmet Salih Buyukkayhan, Kaan Onarlioglu, William Robertson

Game of Registrars: An Empirical Analysis of Post-Expiration Domain Name Takeovers

Details
Discussion Comments: 0
Verification: Authors have not verified information

Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory

Daniel Gruss, Julian Lettner, Felix Schuster, Olga Ohrimenko, István Haller, Manuel Costa

Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Detecting Credential Spearphishing in Enterprise Settings

Grant Ho, Aashish Sharma, Mobin Javed, Vern Paxson, David A. Wagner

Detecting Credential Spearphishing in Enterprise Settings

Details
Discussion Comments: 0
Verification: Authors have not verified information

SmartPool: Practical Decentralized Pooled Mining

Loi Luu, Yaron Velner, Jason Teutsch, Prateek Saxena

SmartPool: Practical Decentralized Pooled Mining

Details
Discussion Comments: 0
Verification: Authors have not verified information

When the Weakest Link is Strong: Secure Collaboration in the Case of the Panama Papers

Susan E. McGregor, Elizabeth Anne Watkins, Mahdi Nasrullah Al-Ameen, Kelly Caine, Franziska Roesner

When the Weakest Link is Strong: Secure Collaboration in the Case of the Panama Papers

Details
Discussion Comments: 0
Verification: Authors have not verified information

Locally Differentially Private Protocols for Frequency Estimation

Tianhao Wang, Jeremiah Blocki, Ninghui Li, Somesh Jha

Locally Differentially Private Protocols for Frequency Estimation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Towards Practical Tools for Side Channel Aware Software Engineering: 'Grey Box' Modelling for Instruction Leakages

David McCann, Elisabeth Oswald, Carolyn Whitnall

Towards Practical Tools for Side Channel Aware Software Engineering: 'Grey Box' Modelling for Instruction Leakages

Details
Discussion Comments: 0
Verification: Authors have not verified information

Adaptive Android Kernel Live Patching

Yue Chen, Yulong Zhang, Zhi Wang, Liangzhao Xia, Chenfu Bao, Tao Wei

Adaptive Android Kernel Live Patching

Details
Discussion Comments: 0
Verification: Authors have not verified information

ORide: A Privacy-Preserving yet Accountable Ride-Hailing Service

Anh Pham, Italo Dacosta, Guillaume Endignoux, Juan Ramón Troncoso-Pastoriza, Kévin Huguenin, Jean-Pierre Hubaux

ORide: A Privacy-Preserving yet Accountable Ride-Hailing Service

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the effectiveness of mitigations against floating-point timing channels

David Kohlbrenner, Hovav Shacham

On the effectiveness of mitigations against floating-point timing channels

Details
Discussion Comments: 0
Verification: Authors have not verified information

Exploring User Perceptions of Discrimination in Online Targeted Advertising

Angelisa C. Plane, Elissa M. Redmiles, Michelle L. Mazurek, Michael Carl Tschantz

Exploring User Perceptions of Discrimination in Online Targeted Advertising

Details
Discussion Comments: 0
Verification: Authors have not verified information

Dead Store Elimination (Still) Considered Harmful

Zhaomo Yang, Brian Johannesmeyer, Anders Trier Olesen, Sorin Lerner, Kirill Levchenko

Dead Store Elimination (Still) Considered Harmful

Details
Discussion Comments: 0
Verification: Authors have not verified information

Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for ART

Lei Xue, Yajin Zhou, Ting Chen, Xiapu Luo, Guofei Gu

Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for ART

Details
Discussion Comments: 0
Verification: Authors have not verified information

ROTE: Rollback Protection for Trusted Execution

Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David M. Sommer, Arthur Gervais, Ari Juels, Srdjan Capkun

ROTE: Rollback Protection for Trusted Execution

Details
Discussion Comments: 0
Verification: Authors have not verified information

Venerable Variadic Vulnerabilities Vanquished

Priyam Biswas, Alessandro Di Federico, Scott A. Carr, Prabhu Rajasekaran, Stijn Volckaert, Yeoul Na, Michael Franz, Mathias Payer

Venerable Variadic Vulnerabilities Vanquished

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Global Measurement of DNS Manipulation

Paul Pearce, Ben Jones, Frank Li, Roya Ensafi, Nick Feamster, Nicholas Weaver, Vern Paxson

Global Measurement of DNS Manipulation

Details
Discussion Comments: 0
Verification: Authors have not verified information

CacheD: Identifying Cache-Based Timing Channels in Production Software

Shuai Wang, Pei Wang, Xiao Liu, Danfeng Zhang, Dinghao Wu

CacheD: Identifying Cache-Based Timing Channels in Production Software

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Privacy Analysis of Cross-device Tracking

Sebastian Zimmeck, Jie S. Li, Hyungtae Kim, Steven M. Bellovin, Tony Jebara

A Privacy Analysis of Cross-device Tracking

Details
Discussion Comments: 0
Verification: Authors have not verified information

TrustBase: An Architecture to Repair and Strengthen Certificate-based Authentication

Mark O'Neill, Scott Heidbrink, Scott Ruoti, Jordan Whitehead, Dan Bunker, Luke Dickinson, Travis Hendershot, Joshua Reynolds, Kent E. Seamons, Daniel Zappala

TrustBase: An Architecture to Repair and Strengthen Certificate-based Authentication

Details
Discussion Comments: 0
Verification: Authors have not verified information

Identifier Binding Attacks and Defenses in Software-Defined Networks

Samuel Jero, William Koch, Richard Skowyra, Hamed Okhravi, Cristina Nita-Rotaru, David Bigelow

Identifier Binding Attacks and Defenses in Software-Defined Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Measuring the Insecurity of Mobile Deep Links of Android

Fang Liu, Chun Wang, Andres Pico, Danfeng Yao, Gang Wang

Measuring the Insecurity of Mobile Deep Links of Android

Details
Discussion Comments: 0
Verification: Authors have not verified information

Characterizing the Nature and Dynamics of Tor Exit Blocking

Rachee Singh, Rishab Nithyanand, Sadia Afroz, Paul Pearce, Michael Carl Tschantz, Phillipa Gill, Vern Paxson

Characterizing the Nature and Dynamics of Tor Exit Blocking

Details
Discussion Comments: 0
Verification: Authors have not verified information

SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data

Md Nahid Hossain, Sadegh M. Milajerdi, Junao Wang, Birhanu Eshete, Rigel Gjomemo, R. Sekar, Scott D. Stoller, V. N. Venkatakrishnan

SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data

Details
Discussion Comments: 0
Verification: Authors have not verified information

Detecting Android Root Exploits by Learning from Root Providers

Ioannis Gasparis, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy

Detecting Android Root Exploits by Learning from Root Providers

Details
Discussion Comments: 0
Verification: Authors have not verified information

Qapla: Policy compliance for database-backed systems

Aastha Mehta, Eslam Elnikety, Katura Harvey, Deepak Garg, Peter Druschel

Qapla: Policy compliance for database-backed systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

REM: Resource-Efficient Mining for Blockchains

Fan Zhang, Ittay Eyal, Robert Escriva, Ari Juels, Robbert van Renesse

REM: Resource-Efficient Mining for Blockchains

Details
Discussion Comments: 0
Verification: Authors have not verified information

AutoLock: Why Cache Attacks on ARM Are Harder Than You Think

Marc Green, Leandro Rodrigues Lima, Andreas Zankl, Gorka Irazoqui, Johann Heyszl, Thomas Eisenbarth

AutoLock: Why Cache Attacks on ARM Are Harder Than You Think

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Transcend: Detecting Concept Drift in Malware Classification Models

Roberto Jordaney, Kumar Sharad, Santanu Kumar Dash, Zhi Wang, Davide Papini, Ilia Nouretdinov, Lorenzo Cavallaro

Transcend: Detecting Concept Drift in Malware Classification Models

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs

Yang Su, Daniel Genkin, Damith Chinthana Ranasinghe, Yuval Yarom

USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Same-Origin Policy: Evaluation in Modern Browsers

Jörg Schwenk, Marcus Niemietz, Christian Mainka

Same-Origin Policy: Evaluation in Modern Browsers

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

MCMix: Anonymous Messaging via Secure Multiparty Computation

Nikolaos Alexopoulos, Aggelos Kiayias, Riivo Talviste, Thomas Zacharias

MCMix: Anonymous Messaging via Secure Multiparty Computation

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds

Kirill Nikitin, Eleftherios Kokoris-Kogias, Philipp Jovanovic, Nicolas Gailly, Linus Gasser, Ismail Khoffi, Justin Cappos, Bryan Ford

CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds

Details
Discussion Comments: 0
Verification: Authors have not verified information

Phoenix: Rebirth of a Cryptographic Password-Hardening Service

Russell W. F. Lai, Christoph Egger, Dominique Schröder, Sherman S. M. Chow

Phoenix: Rebirth of a Cryptographic Password-Hardening Service

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels

Sergej Schumilo, Cornelius Aschermann, Robert Gawlik, Sebastian Schinzel, Thorsten Holz

kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Vale: Verifying High-Performance Cryptographic Assembly Code

Barry Bond, Chris Hawblitzel, Manos Kapritsos, K. Rustan M. Leino, Jacob R. Lorch, Bryan Parno, Ashay Rane, Srinath T. V. Setty, Laure Thompson

Vale: Verifying High-Performance Cryptographic Assembly Code

Details
Discussion Comments: 0
Verification: Authors have not verified information

DR. CHECKER: A Soundy Analysis for Linux Kernel Drivers

Aravind Machiry, Chad Spensky, Jake Corina, Nick Stephens, Christopher Kruegel, Giovanni Vigna

DR. CHECKER: A Soundy Analysis for Linux Kernel Drivers

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

CCSP: Controlled Relaxation of Content Security Policies by Runtime Policy Composition

Stefano Calzavara, Alvise Rabitti, Michele Bugliesi

CCSP: Controlled Relaxation of Content Security Policies by Runtime Policy Composition

Details
Discussion Comments: 0
Verification: Authors have not verified information

Constant-Time Callees with Variable-Time Callers

Cesar Pereida García, Billy Bob Brumley

Constant-Time Callees with Variable-Time Callers

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Longitudinal, End-to-End View of the DNSSEC Ecosystem

Taejoong Chung, Roland van Rijswijk-Deij, Balakrishnan Chandrasekaran, David R. Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo Wilson

A Longitudinal, End-to-End View of the DNSSEC Ecosystem

Details
Discussion Comments: 0
Verification: Authors have not verified information

HELP: Helper-Enabled In-Band Device Pairing Resistant Against Signal Cancellation

Nirnimesh Ghose, Loukas Lazos, Ming Li

HELP: Helper-Enabled In-Band Device Pairing Resistant Against Signal Cancellation

Details
Discussion Comments: 0
Verification: Authors have not verified information

MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning

Shiqing Ma, Juan Zhai, Fei Wang, Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu

MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning

Details
Discussion Comments: 0
Verification: Authors have not verified information

How the Web Tangled Itself: Uncovering the History of Client-Side Web (In)Security

Ben Stock, Martin Johns, Marius Steffens, Michael Backes

How the Web Tangled Itself: Uncovering the History of Client-Side Web (In)Security

Details
Discussion Comments: 0
Verification: Authors have not verified information

PDF Mirage: Content Masking Attack Against Information-Based Online Services

Ian D. Markwood, Dakun Shen, Yao Liu, Zhuo Lu

PDF Mirage: Content Masking Attack Against Information-Based Online Services

Details
Discussion Comments: 0
Verification: Authors have not verified information

Oscar: A Practical Page-Permissions-Based Scheme for Thwarting Dangling Pointers

Thurston H. Y. Dang, Petros Maniatis, David A. Wagner

Oscar: A Practical Page-Permissions-Based Scheme for Thwarting Dangling Pointers

Details
Discussion Comments: 0
Verification: Authors have not verified information

PlatPal: Detecting Malicious Documents with Platform Diversity

Meng Xu, Taesoo Kim

PlatPal: Detecting Malicious Documents with Platform Diversity

Details
Discussion Comments: 0
Verification: Authors have not verified information

Reverse Engineering x86 Processor Microcode

Philipp Koppe, Benjamin Kollenda, Marc Fyrbiak, Christian Kison, Robert Gawlik, Christof Paar, Thorsten Holz

Reverse Engineering x86 Processor Microcode

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Syntia: Synthesizing the Semantics of Obfuscated Code

Tim Blazytko, Moritz Contag, Cornelius Aschermann, Thorsten Holz

Syntia: Synthesizing the Semantics of Obfuscated Code

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Ensuring Authorized Updates in Multi-user Database-Backed Applications

Kevin Eykholt, Atul Prakash, Barzan Mozafari

Ensuring Authorized Updates in Multi-user Database-Backed Applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

BootStomp: On the Security of Bootloaders in Mobile Devices

Nilo Redini, Aravind Machiry, Dipanjan Das, Yanick Fratantonio, Antonio Bianchi, Eric Gustafson, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna

BootStomp: On the Security of Bootloaders in Mobile Devices

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

SmartAuth: User-Centered Authorization for the Internet of Things

Yuan Tian, Nan Zhang, Yue-Hsun Lin, XiaoFeng Wang, Blase Ur, Xianzheng Guo, Patrick Tague

SmartAuth: User-Centered Authorization for the Internet of Things

Details
Discussion Comments: 0
Verification: Authors have not verified information

BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking

Jiang Ming, Dongpeng Xu, Yufei Jiang, Dinghao Wu

BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking

Details
Discussion Comments: 0
Verification: Authors have not verified information

Measuring HTTPS Adoption on the Web

Adrienne Porter Felt, Richard Barnes, April King, Chris Palmer, Chris Bentzel, Parisa Tabriz

Measuring HTTPS Adoption on the Web

Details
Discussion Comments: 0
Verification: Authors have not verified information

Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions

Marc Stevens, Daniel Shumow

Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions

Details
Discussion Comments: 0
Verification: Authors have not verified information

Telling Your Secrets without Page Faults: Stealthy Page Table-Based Attacks on Enclaved Execution

Jo Van Bulck, Nico Weichbrodt, Rüdiger Kapitza, Frank Piessens, Raoul Strackx

Telling Your Secrets without Page Faults: Stealthy Page Table-Based Attacks on Enclaved Execution

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Digtool: A Virtualization-Based Framework for Detecting Kernel Vulnerabilities

Jianfeng Pan, Guanglu Yan, Xiaocao Fan

Digtool: A Virtualization-Based Framework for Detecting Kernel Vulnerabilities

Details
Discussion Comments: 0
Verification: Authors have not verified information

See No Evil, Hear No Evil, Feel No Evil, Print No Evil? Malicious Fill Patterns Detection in Additive Manufacturing

Christian Bayens, Tuan Le, Luis Garcia, Raheem A. Beyah, Mehdi Javanmard, Saman A. Zonouz

See No Evil, Hear No Evil, Feel No Evil, Print No Evil? Malicious Fill Patterns Detection in Additive Manufacturing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts

Jun Xu, Dongliang Mu, Xinyu Xing, Peng Liu, Ping Chen, Bing Mao

Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Beauty and the Burst: Remote Identification of Encrypted Video Streams

Roei Schuster, Vitaly Shmatikov, Eran Tromer

Beauty and the Burst: Remote Identification of Encrypted Video Streams

Details
Discussion Comments: 0
Verification: Authors have not verified information