12:14 USENIX Security '21 - Capture: Centralized Library Management for Heterogeneous IoT Devices USENIX
11:39 USENIX Security '21 - Deep Entity Classification: Abusive Account Detection for Online Social USENIX
11:47 USENIX Security '21 - Ripple: A Programmable, Decentralized Link-Flooding Defense Against Adaptive USENIX
11:27 USENIX Security '21 - V0Finder: Discovering the Correct Origin of Publicly Reported Software USENIX
12:09 USENIX Security '21 - Domain Shadowing: Leveraging Content Delivery Networks for Robust Blocking USENIX
11:13 USENIX Security '21 - Scalable Detection of Promotional Website Defacements in Black Hat SEO USENIX
11:33 USENIX Security '21 - MPInspector: A Systematic and Automatic Approach for Evaluating the Security USENIX
15:32 USENIX Security '21 - Risky Business? Investigating the Security Practices of Vendors on an Online USENIX
11:46 USENIX Security '21 - Is Real-time Phishing Eliminated with FIDO? Social Engineering Downgrade USENIX
10:51 USENIX Security '21 - Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service USENIX
11:28 USENIX Security '21 - Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender USENIX
12:18 USENIX Security '21 - Dirty Road Can Attack: Security of Deep Learning based Automated Lane USENIX
9:42 USENIX Security '21- Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security... USENIX
12:18 USENIX Security '21 - Share First, Ask Later (or Never?) Studying Violations of GDPR's Explicit USENIX
13:17 USENIX Security '21 - Compromised or Attacker-Owned: A Large Scale Classification and Study USENIX
11:57 USENIX Security '21 - Accurately Measuring Global Risk of Amplification Attacks using AmpMap USENIX
12:18 USENIX Security '21 - Virtual Secure Platform: A Five-Stage Pipeline Processor over TFHE USENIX
11:58 USENIX Security '21 - Messy States of Wiring: Vulnerabilities in Emerging Personal Payment Systems USENIX
13:57 USENIX Security '21 - Jaqen: A High-Performance Switch-Native Approach for Detecting and Mitigating USENIX
12:18 USENIX Security '21 - Stars Can Tell: A Robust Method to Defend against GPS Spoofing Attacks USENIX
10:32 USENIX Security '21 - Phishpedia: A Hybrid Deep Learning Based Approach to Visually Identify USENIX
11:56 USENIX Security '21 - Automatic Policy Generation for Inter-Service Access Control of Microservices USENIX
11:06 USENIX Security '21 - ReDoSHunter: A Combined Static and Dynamic Approach for Regular Expression DoS USENIX
11:02 USENIX Security '21 - Formally Verified Memory Protection for a Commodity Multiprocessor Hypervisor USENIX
11:00 USENIX Security '21 - A Stealthy Location Identification Attack Exploiting Carrier Aggregation USENIX
11:48 USENIX Security '21 - Too Good to Be Safe: Tricking Lane Detection in Autonomous Driving with Craft USENIX
10:38 USENIX Security '21 - Injection Attacks Reloaded: Tunnelling Malicious Payloads over DNS USENIX
11:49 USENIX Security '21 - Once is Never Enough: Foundations for Sound Statistical Inference in Tor USENIX
11:56 USENIX Security '21 - Why TLS is better without STARTTLS: A Security Analysis of STARTTLS USENIX
12:04 USENIX Security '21 - Rollercoaster: An Efficient Group-Multicast Scheme for Mix Networks USENIX
12:19 USENIX Security '21 - A11y and Privacy don't have to be mutually exclusive: Constraining USENIX
11:53 USENIX Security '21 - Automated Discovery of Denial-of-Service Vulnerabilities in Connected Vehicle USENIX
12:06 USENIX Security '21 - PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop USENIX
11:49 USENIX Security '21 - Disrupting Continuity of Apple's Wireless Ecosystem Security: New Tracking USENIX
11:34 USENIX Security '21 - CANARY - a reactive defense mechanism for Controller Area Networks based USENIX
10:47 USENIX Security '21 - HAWatcher: Semantics-Aware Anomaly Detection for Appified Smart Homes USENIX
12:12 USENIX Security '21 - DeepReflect: Discovering Malicious Functionality through Binary Reconstruction USENIX
12:06 USENIX Security '21 - ELISE: A Storage Efficient Logging System Powered by Redundancy Reduction USENIX
12:01 USENIX Security '21 - The Hijackers Guide To The Galaxy: Off-Path Taking Over Internet Resources USENIX
12:27 USENIX Security '21 - SiamHAN: IPv6 Address Correlation Attacks on TLS Encrypted Traffic USENIX
9:33 USENIX Security '21 - Obfuscation-Resilient Executable Payload Extraction From Packed Malware USENIX
11:47 USENIX Security '21 - CLARION: Sound and Clear Provenance Tracking for Microservice Deployments USENIX
12:13 USENIX Security '21 - ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks USENIX
11:27 USENIX Security '21 - Experiences Deploying Multi-Vantage-Point Domain Validation at Let's Encrypt USENIX
11:57 USENIX Security '21 - Catching Phishers By Their Bait: Investigating the Dutch Phishing Landscape USENIX
11:20 USENIX Security '21 - When Malware Changed Its Mind: An Empirical Study of Variable Program Behavior USENIX
11:59 USENIX Security '21 - ATLAS: A Sequence-based Learning Approach for Attack Investigation USENIX
12:25 USENIX Security '21 - The Circle Of Life: A Large-Scale Study of The IoT Malware Lifecycle USENIX
12:25 USENIX Security '21 - Swiped: Analyzing Ground-truth Data of a Marketplace for Stolen Debit USENIX
10:52 USENIX Security '21 - PhishPrint: Evading Phishing Detection Crawlers by Prior Profiling USENIX
12:01 USENIX Security '21 - Effect of Mood, Location, Trust, and Presence of Others on Video-Based... USENIX
12:27 USENIX Security '21 - 'Passwords Keep Me Safe' – Understanding What Children Think about Passwords USENIX
11:22 USENIX Security '21 - On the Usability of Authenticity Checks for Hardware Security Tokens USENIX
11:16 USENIX Security '21 - Inexpensive Brainwave Authentication: New Techniques and Insights... USENIX
11:49 USENIX Security '21 - "It's Stored, Hopefully, on an Encrypted Server'': Mitigating Users'... USENIX
12:39 USENIX Security '21 - Driving 2FA Adoption at Scale: Optimizing Two-Factor Authentication... USENIX
10:50 USENIX Security '21 - Hiding the Access Pattern is Not Enough: Exploiting Search Pattern Leakage... USENIX
11:56 USENIX Security '21 - A Highly Accurate Query-Recovery Attack against Searchable Encryption... USENIX
12:12 USENIX Security '21 - Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation USENIX
11:18 USENIX Security '21 - Card Brand Mixup Attack: Bypassing the PIN in non-Visa Cards by Using Them... USENIX
11:38 USENIX Security '21 - Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles... USENIX
10:31 USENIX Security '21 - Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications... USENIX
12:32 USENIX Security '21 - Are Privacy Dashboards Good for End Users? Evaluating User Perceptions... USENIX
12:15 USENIX Security '21 - PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-Metal... USENIX
11:05 USENIX Security '21 - On the Design and Misuse of Microcoded (Embedded) Processors—A Cautionary Note USENIX
12:16 USENIX Security '21 - M2MON: Building an MMIO-based Security Reference Monitor for Unmanned Vehicles USENIX