Posts
TopicSec
Cancel

Paper Info Paper Name: Midas: Systematic Kernel TOCTTOU Protection Conference: USENIX ‘22 Author List: Atri Bhattacharyya, EPFL; Uros Tesic, Nvidia; Mathias Payer, EPFL Link to Paper: here...

Paper Info Paper Name: Ground Truth for Binary Disassembly is Not Easy Conference: USENIX ‘22 Author List: Chengbin Pang, Tiantai Zhang, Ruotong Yu, Bing Mao, Jun Xu Link to Paper: here ...

Paper Info Paper Name: In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer Authentication Conference: USENIX ‘22 Author List: Sungbae Yoo, Jinbum Park, Seolheui Kim, Yeji Ki...

Paper Info Paper Name: Decomperson: How Humans Decompile and What We Can Learn From It Conference USENIX ‘22 Author List: Kevin Burk, Fabio Pagani, Christopher Kruegel, and Giovanni Vigna, ...

Paper Info Paper Name: Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand Conference USENIX ‘22 Author List: Matteo Cardaioli, Stefano Cecconello, Mauro Conti, and Sim...

Paper Info: Paper Name: Why Users (Don’t) Use Password Managers at a Large Educational Institution Conference USENIX ‘22 Author List: Peter Mayer, Karlsruhe Institute of Technology; Collins ...

Paper Info Paper Name: Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing Conference: USENIX ‘22 Author List: Tobias Scharnowski, Nils Bars, and Moritz Schloegel, Ruhr-Univ...

Paper Info Paper Name: How Machine Learning Is Solving the Binary Function Similarity Problem Conference: USENIX ‘22 Author List: Andrea Marcelli, Mariano Graziano, Xabier Ugarte-Pedrer...

Paper Info Paper Name: RE-Mind: a First Look Inside the Mind of a Reverse Engineer Conference: USENIX ‘22 Author List: Alessandro Mantovani, Simone Aonzo, Yanick Fratantonio, Davide Bal...

Paper Info Paper Name: Who’s In Control? On Security Risks of Disjointed IoT Device Management Channels Conference: CCS ‘21 Author List: Yan Jia, Bin Yuan, Luyi Xing, Dongfang Zhao, Yifan Zh...

Paper Info Paper Name: SmashEx: Smashing SGX Enclaves Using Exceptions Conference: CCS ‘21 Author List: Jinhua Cui, Jason Zhijingcheng Yu, Shweta Shinde, Prateek Saxena, Zhiping Cai Link t...

Paper Info Paper Name: MirChecker: Detecting Bugs in Rust Programs via Static Analysis Conference: CCS ‘21 Author List: Zhuohua Li, Jincheng Wang, Mingshen Sun, John C.S. Lui Link to Paper...

Paper Info Paper Name: Automated Bug Hunting With Data-Driven Symbolic Root Cause Analysis Conference: CCS ‘21 Author List: Carter Yagemann, Simon P. Chung, Brendan Saltaformaggio, Wenke Lee...

Paper Info Paper Name: DeepSight: Mitigating Backdoor Attacks in Federated Learning Through Deep Model Inspection Conference: NDSS ‘22 Author List: Phillip Rieger, Thien Duc Nguyen, Markus M...

Paper Info Paper Name: Learning to Explore Paths for Symbolic Execution Conference: CCS ‘21 Author List: Jingxuan He, Gishor Sivanrupan, Petar Tsankov, Martin Vechev Link to Paper: here ...

Paper Info Paper Name: Catching Transparent Phish: Analyzing and Detecting MITM Phishing Toolkits Conference: CCS ‘21 Author List: Brian Kondracki, Babak Amin Azad, Oleksii Starov, Nick Niki...

Paper Info Paper Name: Igor: Crash Deduplication Through Root-Cause Clustering Conference: CCS ‘21 Author List: Zhiyuan Jiang, Xiyue Jiang, Ahmad Hazimeh, Chaojing Tang, Chao Zhang, Mathias ...

Paper Info Paper Name: ‘‘I need a better description’’: An Investigation Into User Expectations For Differential Privacy Conference: CCS ‘21 Author List: Rachel Cummings, Gabriel Kaptchuk, E...

Paper Info Paper Name: CROSSLINE: Breaking ‘‘Security-by-Crash’’ based Memory Isolation in AMD SEV Conference: CCS ‘21 Author List: Mengyuan Li, Yinqian Zhang, Zhiqiang Lin Link to Paper: ...

Paper Info Paper Name: The Effect of Google Search on Software Security: Unobtrusive Security Interventions via Content Re-ranking Conference: CCS ‘21 Author List: Felix Fischer, Yannick Sta...

Paper Info Paper Name: HardsHeap: A Universal and Extensible Framework for Evaluating Secure Allocators Conference: CCS ‘21 Author List: Insu Yun, Woosun Song, Seunggi Min, Taesoo Kim Link...

Paper Info Paper Name: Finding Bugs Using Your Own Code: Detecting Functionally-similar yet Inconsistent Code Conference: USENIX Security ‘21 Author List: Mansour Ahmadi, Reza Mirzazade Fark...

Paper Info Paper Name: Detecting Kernel Refcount Bugs with Two-Dimensional Consistency Checking Conference: USENIX Security ‘21 Author List: Xin Tan, Yuan Zhang and Xiyu Yang Link to Pape...

Paper Info Paper Name: Charger-Surfing: Exploiting a Power Line Side-Channel for Smartphone Information Leakage Conference: USENIX Security ‘21 Author List: Patrick Cronin, Xing Gao, and Che...

Paper Info Paper Name: You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion Conference: USENIX Security ‘21 Author List: Roei Schuster, Congzheng Song, Eran Tromer, Vital...

Paper Info Paper Name: Hopper - Modeling and Detecting Lateral Movement Conference: USENIX Security ‘21 Author List: Grant Ho, Mayank Dhiman, Devdatta Akhawe, Vern Paxson,Stefan Savage, Geof...

Paper Info Paper Name: Preventing Use-After-Free Attacks with Fast Forward Allocation Conference: USENIX Security ‘21 Author List: Brian Wickman, Hong Hu, Insu Yun, Daehee Jang, JungWon Lim,...

Paper Info Paper Name: Constraint-guided Directed Greybox Fuzzing Conference: USENIX Security ‘21 Author List: Gwangmu Lee, Woochul Shim, Byoungyoung Lee Link to Paper: here Food: No foo...

Paper Info Paper Name: Breaking Through Binaries: Compiler-quality Instrumentation for Better Binary-only Fuzzing Conference: USENIX Security ‘21 Author List: Stefan Nagy, Anh Nguyen-Tuong, ...

Paper Info Paper Name: Why Older Adults (Don’t) Use Password Managers Conference: USENIX Security ‘21 Author List: Hirak Ray, Flynn Wolf, Ravi Kuber, and Adam J. Aviv Link to Paper: here ...

Paper Info Paper Name: Token-Level Fuzzing Conference: USENIX Security ‘21 Author List: Christopher Salls, UC Santa Barbara; Chani Jindal, Jake Corina, Christopher Kruegel and Giovanni Vigna...

Paper Info Paper Name: WINNIE: Fuzzing Windows Applications withHarness Synthesis and Fast Cloning Conference: NDSS ‘21 Author List: Jinho Jung, Stephen Tong, Hong Hu, Jungwon Lim, Yonghwi J...

Paper Info Paper Name: Refining Indirect Call Targets at the Binary Level Conference: NDSS ‘21 Author List: Sun Hyoung Kim, Cong Sun, Dongrui Zeng, Gang Tan Link to Paper: here Food: Bis...

Paper Info Paper Name: Censored Planet: An Internet-wide, Longitudinal Censorship Observatory Conference: CCS ‘20 Author List: Ram Sundara Raman, Prerana Shenoy, Katharina Kohls, Roya Ensafi...

Paper Info Paper Name: FREEDOM: Engineering a State-of-the-Art DOM Fuzzer Conference: CCS ‘20 Author List: Wen Xu, Soyeon Park, Taesoo Kim Link to Paper: here Food: Cookies Problem We...

Paper Info Paper Name: Speculative Probing - Hacking Blind in the Spectre Era Conference: CCS ‘20 Author List: Enes Göktaş, Kaveh Razavi, Georgios Portokalidis, Herbert Bos, Cristiano Giuffr...

Paper Info Paper Name: A Generic technique fro Automatically Finding Defense-Aware Code Reuse Attacks Conference: CCS ‘20 Author List: Edward J. Schwartz, Cory F. Cohen, Jeffrey S. Gennari,...

Paper Info Paper Name: A Qualitative Study of Dependency Management and Its Security ImplicationsAttacks on Neural Networks Conference: CCS ‘20 Author List: Ivan Paschenko, Duc-Ly Vu, Fabio ...

Paper Info Paper Name: Gotta Catch ’Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks Conference: CCS ‘20 Author List: Shawn Shan, Emily Wenger, Bolun Wang, Bo Li, Hait...

Paper Info Paper Name: The Cookie Hunter: Automated Black-box Auditing for Web Authentication and Authorization Flaws Conference: CCS ‘20 Author List: Kostas Drakonakis, Sotiris Ioannidis, J...

Paper Info Paper Name: Finding Cracks in Shields On the Security of CFI Mechanisms Conference: CCS ‘20 Author List: Yuan Li, Mingzhe Wang, Chao Zhang, Xingman Chen, Songtao Yang, and YingLiu...

Paper Info Paper Name: Devil is Virtual: Reversing Virtual Inheritance in C++ Binaries Conference: CCS ‘20 Author List: Rukayat Ayomide Erinfolami, Aravind Prakash Link to Paper: here Fo...

Paper Info Paper Name: BlackMirror: Preventing Wallhacks in 3D Online FPS Games Conference CCS ‘20 Author List: Seonghyun Park, Adil Ahmad, Byoungyoung Lee Link to Paper: here Food: Pome...

Paper Info Paper Name: Talking with Familiar Strangers: An Empirical Study on HTTPS Context Confusion Attacks Conference CCS ‘20 Author List: Mingming Zhang, Xiaofeng Zheng, Kaiwen Shen, Ziq...

Paper Info Paper Name: Symbolic execution with SymCC: Don’t interpret, compile! Conference: USENIX Security ‘20 Author List: Sebastian Poeplau and Aurélien Francillon Link to Paper: here ...

Paper Info Paper Name: Remote Side-Channel Attacks on Anonymous Transactions Conference: USENIX Security ‘20 Author List: Florian Tramer, Dan Boneh, and Kenny Paterson Link to Paper: here ...

Paper Info Paper Name: FuzzGen: Automatic Fuzzer Generation Conference: USENIX Security ‘20 Author List: Kyriakos Ispoglou, Daniel Austin, Vishwath Mohan, Mathias Payer Link to Paper: here...

Paper Info Paper Name: An Observational Investigation of Reverse Engineers’ Processes Conference: USENIX Security ‘20 Author List: Daniel Votipka, Seth Rabin, Kristopher Micinski, Michelle L...

Paper Info Paper Name: Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections Conference: USENIX Security ‘20 Author List: Tom Van Goethem and Christina Popp...

Paper Info Paper Name: Cardpliance: PCI DSS Compliance of Android Applications Conference: USENIX Security ‘20 Author List: Samin Yaseer Mahmud, Akhil Acharya, Benjamin Andow, William Enck, ...

Paper Info Paper Name: The Industrial Age of Hacking Conference: USENIX Security ‘20 Author List: Tim Nosco, Jared Ziegler, Zechariah Clark, Davy Marrero, Todd Finkler, Andrew Barbarello, W....

Paper Info Paper Name: Datalog Disassembly Conference: USENIX Security ‘20 Author List: Antonio Flores-Montoya and Eric Schulte, GrammaTech Inc. Link to Paper: here Team: Team Stapler ...

Paper Info Paper Name: Everything Old is New Again: Binary Security of WebAssembly Conference: USENIX Security ‘20 Author List: Daniel Lehmann, Johannes Kinder, Michael Pradel Link to Pape...

Paper Info Paper Name: Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It Conference: USENIX Security ‘20 Author List: Daniel Votipka, Kels...

Paper Info Paper Name: Agamotto: Accelerating Kernel Driver Fuzzing withLightweight Virtual Machine Checkpoints Conference: USENIX Security ‘20 Author List: Dokyung Song, Felicitas Hetzelt, ...