11:41 USENIX Security '20 - A Formal Analysis of IEEE 802.11's WPA2: Countering the Kracks Caused by... USENIX
12:25 USENIX Security '20 - Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation... USENIX
12:12 USENIX Security '20 - Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks USENIX
11:12 USENIX Security '20 - You Are What You Broadcast: Identification of Mobile and IoT Devices... USENIX
13:06 USENIX Security '20 - A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web USENIX
12:07 USENIX Security '20 - Understanding security mistakes developers make: Qualitative analysis... USENIX
12:16 USENIX Security '20 - What Twitter Knows: Characterizing Ad Targeting Practices, User Perceptions... USENIX
11:57 USENIX Security '20 - Sys: A Static/Symbolic Tool for Finding Good Bugs in Good (Browser) Code USENIX
11:56 USENIX Security '20 - AURORA: Statistical Crash Analysis for Automated Root Cause Explanation USENIX
11:18 USENIX Security '20 - SmartVerif: Push the Limit of Automation Capability of Verifying Security... USENIX
11:11 USENIX Security '20 - From Needs to Actions to Secure Apps? The Effect of Requirements... USENIX
12:17 USENIX Security '20 - FANS: Fuzzing Android Native System Services via Automated Interface Analysis USENIX
12:34 USENIX Security '20 - Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness... USENIX
12:41 USENIX Security '20 - PhishTime: Continuous Longitudinal Measurement of the Effectiveness... USENIX
11:08 USENIX Security '20 - Who's Calling? Characterizing Robocalls through Audio and Metadata Analysis USENIX
12:41 USENIX Security '20 - A different cup of TI? The added value of commercial threat intelligence USENIX
13:40 USENIX Security '20 - HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution... USENIX
10:57 USENIX Security '20 - Civet: An Efficient Java Partitioning Framework for Hardware Enclaves USENIX
11:34 USENIX Security '20 - BesFS: A POSIX Filesystem for Enclaves with a Mechanized Safety Proof USENIX
10:38 USENIX Security '20 - EPIC: Every Packet Is Checked in the Data Plane of a Path-Aware Internet USENIX
10:05 USENIX Security '20 - Poison Over Troubled Forwarders: A Cache Poisoning Attack Targeting DNS... USENIX
12:37 USENIX Security '20 - A Longitudinal and Comprehensive Study of the DANE Ecosystem in Email USENIX
12:24 USENIX Security '20- Shim Shimmeny: Evaluating the Security & Privacy Contributions of Link Shimming USENIX
12:00 USENIX Security '20 - A Tale of Two Headers: A Formal Analysis of Inconsistent Click-Jacking... USENIX
12:00 USENIX Security '20 - SENG, the SGX-Enforcing Network Gateway: Authorizing Communication... USENIX
13:48 USENIX Security '20 - APEX: A Verified Architecture for Proofs of Execution on Remote Devices... USENIX
11:17 USENIX Security '20 - PARTEMU: Enabling Dynamic Analysis of Real-World TrustZone Software... USENIX
10:41 USENIX Security '20 - TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities... USENIX
1:00:22 USENIX Security '20 - Panel: The 2020 Election: Remote Voting, Disinformation, and Audit USENIX
12:17 USENIX Security '20 - Towards Robust LiDAR-based Perception in Autonomous Driving: General Black-box USENIX
11:52 USENIX Security '20 - SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants USENIX
12:13 USENIX Security '20 - From Control Model to Program: Investigating Robotic Aerial Vehicle Accidents USENIX
11:41 USENIX Security '20 - Drift with Devil: Security of Multi-Sensor Fusion based Localization... USENIX
11:53 USENIX Security '20 - Plug-N-Pwned: Comprehensive Vulnerability Analysis of OBD-II Dongles... USENIX
12:32 USENIX Security '20 - PCKV: Locally Differentially Private Correlated Key-Value Data Collection USENIX
12:08 USENIX Security '20 - Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow USENIX
12:10 USENIX Security '20 - Differentially-Private Control-Flow Node Coverage for Software Usage Analysis USENIX
11:42 USENIX Security '20 - KOOBE: Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write USENIX
13:03 USENIX Security '20 - Automatic Techniques to Systematically Discover New Heap Exploitation USENIX
11:36 USENIX Security '20 - MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures USENIX
12:09 USENIX Security '20 - Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT USENIX
12:12 USENIX Security '20 - HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation USENIX
11:25 USENIX Security '20 - Silhouette: Efficient Protected Shadow Stacks for Embedded Systems USENIX
10:43 USENIX Security '20 - P2IM: Scalable and Hardware-independent Firmware Testing via Automatic USENIX
11:16 USENIX Security '20 - COUNTERFOIL: Verifying Provenance of Integrated Circuits using Intrinsic USENIX
12:07 USENIX Security '20 - Hall Spoofing: A Non-Invasive DoS Attack on Grid-Tied Solar Inverter USENIX
13:06 USENIX Security '20 - Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning USENIX
10:28 USENIX Security '20 - Exploring Connections Between Active Learning and Model Extraction USENIX
11:38 USENIX Security '20 - Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited USENIX
11:15 USENIX Security '20 - Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks USENIX
11:32 USENIX Security '20 - TextShield: Robust Text Classification Based on Multimodal Embedding USENIX
13:29 USENIX Security '20 - Data Recovery from “Scrubbed” NAND Flash Storage: Need for Analog Sanitization USENIX
12:17 USENIX Security '20 - Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis USENIX
12:50 USENIX Security '20 - DeepHammer: Depleting the Intelligence of Deep Neural Networks through Target USENIX
13:48 USENIX Security '20 - Security Analysis of Unified Payments Interface and Payment Apps in India USENIX
12:46 USENIX Security '20 - The Ballot is Busted Before the Blockchain: A Security Analysis of Voatz USENIX
12:04 USENIX Security '20 - Fawkes: Protecting Privacy against Unauthorized Deep Learning Models USENIX
12:07 USENIX Security '20 - Stolen Memories: Leveraging Model Memorization for Calibrated White-Box USENIX
12:08 USENIX Security '20 - Local Model Poisoning Attacks to Byzantine-Robust Federated Learning USENIX
11:09 USENIX Security '20 - Justinian's GAAvernor: Robust Distributed Learning with Gradient Aggregation USENIX
11:53 USENIX Security '20 - Donky: Domain Keys – Efficient In-Process Isolation for RISC-V and x86 USENIX
12:07 USENIX Security '20 - (Mostly) Exitless VM Protection from Untrusted Hypervisor through Disaggregate USENIX
12:33 USENIX Security '20 - DECAF: Automatic, Adaptive De-bloating and Hardening of COTS Firmware USENIX
12:11 USENIX Security '20 - McTiny: Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers USENIX