Paper Info Paper Name: SmashEx: Smashing SGX Enclaves Using Exceptions Conference: CCS ‘21 Author List: Jinhua Cui, Jason Zhijingcheng Yu, Shweta Shinde, Prateek Saxena, Zhiping Cai Link t...
Paper Info Paper Name: MirChecker: Detecting Bugs in Rust Programs via Static Analysis Conference: CCS ‘21 Author List: Zhuohua Li, Jincheng Wang, Mingshen Sun, John C.S. Lui Link to Paper...
Paper Info Paper Name: Automated Bug Hunting With Data-Driven Symbolic Root Cause Analysis Conference: CCS ‘21 Author List: Carter Yagemann, Simon P. Chung, Brendan Saltaformaggio, Wenke Lee...
Paper Info Paper Name: DeepSight: Mitigating Backdoor Attacks in Federated Learning Through Deep Model Inspection Conference: NDSS ‘22 Author List: Phillip Rieger, Thien Duc Nguyen, Markus M...
Paper Info Paper Name: Learning to Explore Paths for Symbolic Execution Conference: CCS ‘21 Author List: Jingxuan He, Gishor Sivanrupan, Petar Tsankov, Martin Vechev Link to Paper: here ...
Paper Info Paper Name: Catching Transparent Phish: Analyzing and Detecting MITM Phishing Toolkits Conference: CCS ‘21 Author List: Brian Kondracki, Babak Amin Azad, Oleksii Starov, Nick Niki...
Paper Info Paper Name: Igor: Crash Deduplication Through Root-Cause Clustering Conference: CCS ‘21 Author List: Zhiyuan Jiang, Xiyue Jiang, Ahmad Hazimeh, Chaojing Tang, Chao Zhang, Mathias ...
Paper Info Paper Name: ‘‘I need a better description’’: An Investigation Into User Expectations For Differential Privacy Conference: CCS ‘21 Author List: Rachel Cummings, Gabriel Kaptchuk, E...
Paper Info Paper Name: CROSSLINE: Breaking ‘‘Security-by-Crash’’ based Memory Isolation in AMD SEV Conference: CCS ‘21 Author List: Mengyuan Li, Yinqian Zhang, Zhiqiang Lin Link to Paper: ...
Paper Info Paper Name: The Effect of Google Search on Software Security: Unobtrusive Security Interventions via Content Re-ranking Conference: CCS ‘21 Author List: Felix Fischer, Yannick Sta...
Paper Info Paper Name: HardsHeap: A Universal and Extensible Framework for Evaluating Secure Allocators Conference: CCS ‘21 Author List: Insu Yun, Woosun Song, Seunggi Min, Taesoo Kim Link...
Paper Info Paper Name: Finding Bugs Using Your Own Code: Detecting Functionally-similar yet Inconsistent Code Conference: USENIX Security ‘21 Author List: Mansour Ahmadi, Reza Mirzazade Fark...
Paper Info Paper Name: Detecting Kernel Refcount Bugs with Two-Dimensional Consistency Checking Conference: USENIX Security ‘21 Author List: Xin Tan, Yuan Zhang and Xiyu Yang Link to Pape...
Paper Info Paper Name: Charger-Surfing: Exploiting a Power Line Side-Channel for Smartphone Information Leakage Conference: USENIX Security ‘21 Author List: Patrick Cronin, Xing Gao, and Che...
Paper Info Paper Name: You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion Conference: USENIX Security ‘21 Author List: Roei Schuster, Congzheng Song, Eran Tromer, Vital...
Paper Info Paper Name: Hopper - Modeling and Detecting Lateral Movement Conference: USENIX Security ‘21 Author List: Grant Ho, Mayank Dhiman, Devdatta Akhawe, Vern Paxson,Stefan Savage, Geof...
Paper Info Paper Name: Preventing Use-After-Free Attacks with Fast Forward Allocation Conference: USENIX Security ‘21 Author List: Brian Wickman, Hong Hu, Insu Yun, Daehee Jang, JungWon Lim,...
Paper Info Paper Name: Constraint-guided Directed Greybox Fuzzing Conference: USENIX Security ‘21 Author List: Gwangmu Lee, Woochul Shim, Byoungyoung Lee Link to Paper: here Food: No foo...
Paper Info Paper Name: Breaking Through Binaries: Compiler-quality Instrumentation for Better Binary-only Fuzzing Conference: USENIX Security ‘21 Author List: Stefan Nagy, Anh Nguyen-Tuong, ...
Paper Info Paper Name: Why Older Adults (Don’t) Use Password Managers Conference: USENIX Security ‘21 Author List: Hirak Ray, Flynn Wolf, Ravi Kuber, and Adam J. Aviv Link to Paper: here ...
Paper Info Paper Name: Token-Level Fuzzing Conference: USENIX Security ‘21 Author List: Christopher Salls, UC Santa Barbara; Chani Jindal, Jake Corina, Christopher Kruegel and Giovanni Vigna...
Paper Info Paper Name: WINNIE: Fuzzing Windows Applications withHarness Synthesis and Fast Cloning Conference: NDSS ‘21 Author List: Jinho Jung, Stephen Tong, Hong Hu, Jungwon Lim, Yonghwi J...
Paper Info Paper Name: Refining Indirect Call Targets at the Binary Level Conference: NDSS ‘21 Author List: Sun Hyoung Kim, Cong Sun, Dongrui Zeng, Gang Tan Link to Paper: here Food: Bis...
Paper Info Paper Name: Censored Planet: An Internet-wide, Longitudinal Censorship Observatory Conference: CCS ‘20 Author List: Ram Sundara Raman, Prerana Shenoy, Katharina Kohls, Roya Ensafi...
Paper Info Paper Name: FREEDOM: Engineering a State-of-the-Art DOM Fuzzer Conference: CCS ‘20 Author List: Wen Xu, Soyeon Park, Taesoo Kim Link to Paper: here Food: Cookies Problem We...
Paper Info Paper Name: Speculative Probing - Hacking Blind in the Spectre Era Conference: CCS ‘20 Author List: Enes Göktaş, Kaveh Razavi, Georgios Portokalidis, Herbert Bos, Cristiano Giuffr...
Paper Info Paper Name: A Generic technique fro Automatically Finding Defense-Aware Code Reuse Attacks Conference: CCS ‘20 Author List: Edward J. Schwartz, Cory F. Cohen, Jeffrey S. Gennari,...
Paper Info Paper Name: A Qualitative Study of Dependency Management and Its Security ImplicationsAttacks on Neural Networks Conference: CCS ‘20 Author List: Ivan Paschenko, Duc-Ly Vu, Fabio ...
Paper Info Paper Name: Gotta Catch ’Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks Conference: CCS ‘20 Author List: Shawn Shan, Emily Wenger, Bolun Wang, Bo Li, Hait...
Paper Info Paper Name: The Cookie Hunter: Automated Black-box Auditing for Web Authentication and Authorization Flaws Conference: CCS ‘20 Author List: Kostas Drakonakis, Sotiris Ioannidis, J...
Paper Info Paper Name: Finding Cracks in Shields On the Security of CFI Mechanisms Conference: CCS ‘20 Author List: Yuan Li, Mingzhe Wang, Chao Zhang, Xingman Chen, Songtao Yang, and YingLiu...
Paper Info Paper Name: Devil is Virtual: Reversing Virtual Inheritance in C++ Binaries Conference: CCS ‘20 Author List: Rukayat Ayomide Erinfolami, Aravind Prakash Link to Paper: here Fo...
Paper Info Paper Name: BlackMirror: Preventing Wallhacks in 3D Online FPS Games Conference CCS ‘20 Author List: Seonghyun Park, Adil Ahmad, Byoungyoung Lee Link to Paper: here Food: Pome...
Paper Info Paper Name: Talking with Familiar Strangers: An Empirical Study on HTTPS Context Confusion Attacks Conference CCS ‘20 Author List: Mingming Zhang, Xiaofeng Zheng, Kaiwen Shen, Ziq...
Paper Info Paper Name: Symbolic execution with SymCC: Don’t interpret, compile! Conference: USENIX Security ‘20 Author List: Sebastian Poeplau and Aurélien Francillon Link to Paper: here ...
Paper Info Paper Name: Remote Side-Channel Attacks on Anonymous Transactions Conference: USENIX Security ‘20 Author List: Florian Tramer, Dan Boneh, and Kenny Paterson Link to Paper: here ...
Paper Info Paper Name: FuzzGen: Automatic Fuzzer Generation Conference: USENIX Security ‘20 Author List: Kyriakos Ispoglou, Daniel Austin, Vishwath Mohan, Mathias Payer Link to Paper: here...
Paper Info Paper Name: An Observational Investigation of Reverse Engineers’ Processes Conference: USENIX Security ‘20 Author List: Daniel Votipka, Seth Rabin, Kristopher Micinski, Michelle L...
Paper Info Paper Name: Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections Conference: USENIX Security ‘20 Author List: Tom Van Goethem and Christina Popp...
Paper Info Paper Name: Cardpliance: PCI DSS Compliance of Android Applications Conference: USENIX Security ‘20 Author List: Samin Yaseer Mahmud, Akhil Acharya, Benjamin Andow, William Enck, ...
Paper Info Paper Name: The Industrial Age of Hacking Conference: USENIX Security ‘20 Author List: Tim Nosco, Jared Ziegler, Zechariah Clark, Davy Marrero, Todd Finkler, Andrew Barbarello, W....
Paper Info Paper Name: Datalog Disassembly Conference: USENIX Security ‘20 Author List: Antonio Flores-Montoya and Eric Schulte, GrammaTech Inc. Link to Paper: here Team: Team Stapler ...
Paper Info Paper Name: Everything Old is New Again: Binary Security of WebAssembly Conference: USENIX Security ‘20 Author List: Daniel Lehmann, Johannes Kinder, Michael Pradel Link to Pape...
Paper Info Paper Name: Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It Conference: USENIX Security ‘20 Author List: Daniel Votipka, Kels...
Paper Info Paper Name: Agamotto: Accelerating Kernel Driver Fuzzing withLightweight Virtual Machine Checkpoints Conference: USENIX Security ‘20 Author List: Dokyung Song, Felicitas Hetzelt, ...