Posts
TopicSec
Cancel

Paper Info Paper Name: Midas: Systematic Kernel TOCTTOU Protection Conference: USENIX ‘22 Author List: Atri Bhattacharyya, EPFL; Uros Tesic, Nvidia; Mathias Payer, EPFL Link to Paper: here...

Paper Info Paper Name: Ground Truth for Binary Disassembly is Not Easy Conference: USENIX ‘22 Author List: Chengbin Pang, Tiantai Zhang, Ruotong Yu, Bing Mao, Jun Xu Link to Paper: here ...

Paper Info Paper Name: In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer Authentication Conference: USENIX ‘22 Author List: Sungbae Yoo, Jinbum Park, Seolheui Kim, Yeji Ki...

Paper Info Paper Name: Decomperson: How Humans Decompile and What We Can Learn From It Conference USENIX ‘22 Author List: Kevin Burk, Fabio Pagani, Christopher Kruegel, and Giovanni Vigna, ...

Paper Info Paper Name: Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand Conference USENIX ‘22 Author List: Matteo Cardaioli, Stefano Cecconello, Mauro Conti, and Sim...

Paper Info: Paper Name: Why Users (Don’t) Use Password Managers at a Large Educational Institution Conference USENIX ‘22 Author List: Peter Mayer, Karlsruhe Institute of Technology; Collins ...

Paper Info Paper Name: Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing Conference: USENIX ‘22 Author List: Tobias Scharnowski, Nils Bars, and Moritz Schloegel, Ruhr-Univ...

Paper Info Paper Name: How Machine Learning Is Solving the Binary Function Similarity Problem Conference: USENIX ‘22 Author List: Andrea Marcelli, Mariano Graziano, Xabier Ugarte-Pedrer...

Paper Info Paper Name: RE-Mind: a First Look Inside the Mind of a Reverse Engineer Conference: USENIX ‘22 Author List: Alessandro Mantovani, Simone Aonzo, Yanick Fratantonio, Davide Bal...

Paper Info Paper Name: Who’s In Control? On Security Risks of Disjointed IoT Device Management Channels Conference: CCS ‘21 Author List: Yan Jia, Bin Yuan, Luyi Xing, Dongfang Zhao, Yifan Zh...

Paper Info Paper Name: SmashEx: Smashing SGX Enclaves Using Exceptions Conference: CCS ‘21 Author List: Jinhua Cui, Jason Zhijingcheng Yu, Shweta Shinde, Prateek Saxena, Zhiping Cai Link t...

Paper Info Paper Name: MirChecker: Detecting Bugs in Rust Programs via Static Analysis Conference: CCS ‘21 Author List: Zhuohua Li, Jincheng Wang, Mingshen Sun, John C.S. Lui Link to Paper...

Paper Info Paper Name: Automated Bug Hunting With Data-Driven Symbolic Root Cause Analysis Conference: CCS ‘21 Author List: Carter Yagemann, Simon P. Chung, Brendan Saltaformaggio, Wenke Lee...

Paper Info Paper Name: DeepSight: Mitigating Backdoor Attacks in Federated Learning Through Deep Model Inspection Conference: NDSS ‘22 Author List: Phillip Rieger, Thien Duc Nguyen, Markus M...

Paper Info Paper Name: Learning to Explore Paths for Symbolic Execution Conference: CCS ‘21 Author List: Jingxuan He, Gishor Sivanrupan, Petar Tsankov, Martin Vechev Link to Paper: here ...

Paper Info Paper Name: Catching Transparent Phish: Analyzing and Detecting MITM Phishing Toolkits Conference: CCS ‘21 Author List: Brian Kondracki, Babak Amin Azad, Oleksii Starov, Nick Niki...

Paper Info Paper Name: Igor: Crash Deduplication Through Root-Cause Clustering Conference: CCS ‘21 Author List: Zhiyuan Jiang, Xiyue Jiang, Ahmad Hazimeh, Chaojing Tang, Chao Zhang, Mathias ...

Paper Info Paper Name: ‘‘I need a better description’’: An Investigation Into User Expectations For Differential Privacy Conference: CCS ‘21 Author List: Rachel Cummings, Gabriel Kaptchuk, E...

Paper Info Paper Name: CROSSLINE: Breaking ‘‘Security-by-Crash’’ based Memory Isolation in AMD SEV Conference: CCS ‘21 Author List: Mengyuan Li, Yinqian Zhang, Zhiqiang Lin Link to Paper: ...

Paper Info Paper Name: The Effect of Google Search on Software Security: Unobtrusive Security Interventions via Content Re-ranking Conference: CCS ‘21 Author List: Felix Fischer, Yannick Sta...

Paper Info Paper Name: HardsHeap: A Universal and Extensible Framework for Evaluating Secure Allocators Conference: CCS ‘21 Author List: Insu Yun, Woosun Song, Seunggi Min, Taesoo Kim Link...

Paper Info Paper Name: Finding Bugs Using Your Own Code: Detecting Functionally-similar yet Inconsistent Code Conference: USENIX Security ‘21 Author List: Mansour Ahmadi, Reza Mirzazade Fark...

Paper Info Paper Name: Detecting Kernel Refcount Bugs with Two-Dimensional Consistency Checking Conference: USENIX Security ‘21 Author List: Xin Tan, Yuan Zhang and Xiyu Yang Link to Pape...

Paper Info Paper Name: Charger-Surfing: Exploiting a Power Line Side-Channel for Smartphone Information Leakage Conference: USENIX Security ‘21 Author List: Patrick Cronin, Xing Gao, and Che...

Paper Info Paper Name: You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion Conference: USENIX Security ‘21 Author List: Roei Schuster, Congzheng Song, Eran Tromer, Vital...

Paper Info Paper Name: Hopper - Modeling and Detecting Lateral Movement Conference: USENIX Security ‘21 Author List: Grant Ho, Mayank Dhiman, Devdatta Akhawe, Vern Paxson,Stefan Savage, Geof...

Paper Info Paper Name: Preventing Use-After-Free Attacks with Fast Forward Allocation Conference: USENIX Security ‘21 Author List: Brian Wickman, Hong Hu, Insu Yun, Daehee Jang, JungWon Lim,...

Paper Info Paper Name: Constraint-guided Directed Greybox Fuzzing Conference: USENIX Security ‘21 Author List: Gwangmu Lee, Woochul Shim, Byoungyoung Lee Link to Paper: here Food: No foo...

Paper Info Paper Name: Breaking Through Binaries: Compiler-quality Instrumentation for Better Binary-only Fuzzing Conference: USENIX Security ‘21 Author List: Stefan Nagy, Anh Nguyen-Tuong, ...

Paper Info Paper Name: Why Older Adults (Don’t) Use Password Managers Conference: USENIX Security ‘21 Author List: Hirak Ray, Flynn Wolf, Ravi Kuber, and Adam J. Aviv Link to Paper: here ...

Paper Info Paper Name: Token-Level Fuzzing Conference: USENIX Security ‘21 Author List: Christopher Salls, UC Santa Barbara; Chani Jindal, Jake Corina, Christopher Kruegel and Giovanni Vigna...

Paper Info Paper Name: WINNIE: Fuzzing Windows Applications withHarness Synthesis and Fast Cloning Conference: NDSS ‘21 Author List: Jinho Jung, Stephen Tong, Hong Hu, Jungwon Lim, Yonghwi J...

Paper Info Paper Name: Refining Indirect Call Targets at the Binary Level Conference: NDSS ‘21 Author List: Sun Hyoung Kim, Cong Sun, Dongrui Zeng, Gang Tan Link to Paper: here Food: Bis...

Paper Info Paper Name: Censored Planet: An Internet-wide, Longitudinal Censorship Observatory Conference: CCS ‘20 Author List: Ram Sundara Raman, Prerana Shenoy, Katharina Kohls, Roya Ensafi...

Paper Info Paper Name: FREEDOM: Engineering a State-of-the-Art DOM Fuzzer Conference: CCS ‘20 Author List: Wen Xu, Soyeon Park, Taesoo Kim Link to Paper: here Food: Cookies Problem We...

Paper Info Paper Name: Speculative Probing - Hacking Blind in the Spectre Era Conference: CCS ‘20 Author List: Enes Göktaş, Kaveh Razavi, Georgios Portokalidis, Herbert Bos, Cristiano Giuffr...

Paper Info Paper Name: A Generic technique fro Automatically Finding Defense-Aware Code Reuse Attacks Conference: CCS ‘20 Author List: Edward J. Schwartz, Cory F. Cohen, Jeffrey S. Gennari,...

Paper Info Paper Name: A Qualitative Study of Dependency Management and Its Security ImplicationsAttacks on Neural Networks Conference: CCS ‘20 Author List: Ivan Paschenko, Duc-Ly Vu, Fabio ...

Paper Info Paper Name: Gotta Catch ’Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks Conference: CCS ‘20 Author List: Shawn Shan, Emily Wenger, Bolun Wang, Bo Li, Hait...

Paper Info Paper Name: The Cookie Hunter: Automated Black-box Auditing for Web Authentication and Authorization Flaws Conference: CCS ‘20 Author List: Kostas Drakonakis, Sotiris Ioannidis, J...

Paper Info Paper Name: Finding Cracks in Shields On the Security of CFI Mechanisms Conference: CCS ‘20 Author List: Yuan Li, Mingzhe Wang, Chao Zhang, Xingman Chen, Songtao Yang, and YingLiu...

Paper Info Paper Name: Devil is Virtual: Reversing Virtual Inheritance in C++ Binaries Conference: CCS ‘20 Author List: Rukayat Ayomide Erinfolami, Aravind Prakash Link to Paper: here Fo...

Paper Info Paper Name: BlackMirror: Preventing Wallhacks in 3D Online FPS Games Conference CCS ‘20 Author List: Seonghyun Park, Adil Ahmad, Byoungyoung Lee Link to Paper: here Food: Pome...

Paper Info Paper Name: Talking with Familiar Strangers: An Empirical Study on HTTPS Context Confusion Attacks Conference CCS ‘20 Author List: Mingming Zhang, Xiaofeng Zheng, Kaiwen Shen, Ziq...

Paper Info Paper Name: Symbolic execution with SymCC: Don’t interpret, compile! Conference: USENIX Security ‘20 Author List: Sebastian Poeplau and Aurélien Francillon Link to Paper: here ...

Paper Info Paper Name: Remote Side-Channel Attacks on Anonymous Transactions Conference: USENIX Security ‘20 Author List: Florian Tramer, Dan Boneh, and Kenny Paterson Link to Paper: here ...

Paper Info Paper Name: FuzzGen: Automatic Fuzzer Generation Conference: USENIX Security ‘20 Author List: Kyriakos Ispoglou, Daniel Austin, Vishwath Mohan, Mathias Payer Link to Paper: here...

Paper Info Paper Name: An Observational Investigation of Reverse Engineers’ Processes Conference: USENIX Security ‘20 Author List: Daniel Votipka, Seth Rabin, Kristopher Micinski, Michelle L...

Paper Info Paper Name: Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections Conference: USENIX Security ‘20 Author List: Tom Van Goethem and Christina Popp...

Paper Info Paper Name: Cardpliance: PCI DSS Compliance of Android Applications Conference: USENIX Security ‘20 Author List: Samin Yaseer Mahmud, Akhil Acharya, Benjamin Andow, William Enck, ...

Paper Info Paper Name: The Industrial Age of Hacking Conference: USENIX Security ‘20 Author List: Tim Nosco, Jared Ziegler, Zechariah Clark, Davy Marrero, Todd Finkler, Andrew Barbarello, W....

Paper Info Paper Name: Datalog Disassembly Conference: USENIX Security ‘20 Author List: Antonio Flores-Montoya and Eric Schulte, GrammaTech Inc. Link to Paper: here Team: Team Stapler ...

Paper Info Paper Name: Everything Old is New Again: Binary Security of WebAssembly Conference: USENIX Security ‘20 Author List: Daniel Lehmann, Johannes Kinder, Michael Pradel Link to Pape...

Paper Info Paper Name: Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It Conference: USENIX Security ‘20 Author List: Daniel Votipka, Kels...

Paper Info Paper Name: Agamotto: Accelerating Kernel Driver Fuzzing withLightweight Virtual Machine Checkpoints Conference: USENIX Security ‘20 Author List: Dokyung Song, Felicitas Hetzelt, ...

April 2025

Sun
30
Mon
31
Tue
01
Wed
02
Thu
03
Fri
04
Sat
05
Sun
06
Mon
07
Tue
08
Wed
09
Thu
10
Fri
11
Sat
12
Sun
13
Mon
14
Tue
15
Wed
16
Thu
17
Fri
18
Sat
19
Sun
20
Mon
21
Tue
22
Wed
23
Thu
24
Fri
25
Sat
26
Sun
27
Mon
28
Tue
29
Wed
30
Thu
01
Fri
02
Sat
03
Thanos was LeftPizza TimeHot Source Rides Again AgainNot YanWe Love Hawaii