51:22 USENIX Security '18-Q: Why Do Keynote Speakers Keep Suggesting That Improving Security Is Possible? USENIX
21:34 USENIX Security '18 - Fear the Reaper: Characterization and Fast Detection of Card Skimmers USENIX
25:56 USENIX Security '18 - BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power Grid USENIX
24:16 USENIX Security '18-CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition USENIX
22:01 USENIX Security '18 - HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security USENIX
21:11 USENIX Security '18 - Fp-Scanner: The Privacy Implications of Browser Fingerprint Inconsistencies USENIX
22:15 USENIX Security '18 - Effective Detection of Multimedia Protocol Tunneling using Machine Learning USENIX
27:18 USENIX Security '18 - Quack: Scalable Remote Measurement of Application-Layer Censorship USENIX
24:34 USENIX Security '18 - Rethinking Access Control and Authentication for the Home Internet of Things USENIX
23:11 USENIX Security '18 - ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands... USENIX
22:18 USENIX Security '18 - Charm: Facilitating Dynamic Analysis of Device Drivers of Mobile Systems USENIX
23:56 USENIX Security '18-Inception: System-Wide Security Testing of Real-World Embedded Systems Software USENIX
23:10 USENIX Security '18 - Acquisitional Rule-based Engine for Discovering Internet-of-Things Devices USENIX
26:54 USENIX Security '18 - NAVEX: Precise and Scalable Exploit Generation for Dynamic Web Applications USENIX
23:51 USENIX Security '18 - Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service... USENIX
25:02 USENIX Security '18 - Unveiling and Quantifying Facebook Exploitation of Sensitive Personal Data... USENIX
22:59 USENIX Security '18 - Analysis of Privacy Protections in Fitness Tracking Social Networks... USENIX
25:35 USENIX Security '18 - AttriGuard: A Practical Defense Against Attribute Inference Attacks... USENIX
25:01 USENIX Security '18 - Polisis: Automated Analysis and Presentation of Privacy Policies... USENIX
21:53 USENIX Security '18-Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels USENIX
48:40 USENIX Security '18 - Chipmunk or Pepe? Using Acoustical Analysis to Detect Voice-Channel Fraud USENIX
19:09 USENIX Security '18 - The Battle for New York: A Case Study of Applied Digital Threat Modeling... USENIX
25:44 USENIX Security '18 - SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior... USENIX
23:33 USENIX Security '18 - MoonShine: Optimizing OS Fuzzer Seed Selection with Trace Distillation USENIX
23:42 USENIX Security '18 - QSYM : A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing USENIX
20:55 USENIX Security '18 - FUZE: Towards Facilitating Exploit Generation for Kernel UAF Vulnerabilities USENIX
28:20 USENIX Security '18 - Understanding the Reproducibility of Crowd-reported Security Vulnerabilities USENIX
22:37 USENIX Security '18 - Malicious Management Unit: Why Stopping Cache Attacks in Software... USENIX
27:06 USENIX Security '18 - Translation Leak-aside Buffer: Defeating Cache Side-channel Protections USENIX
23:42 USENIX Security '18-Reading Thieves' Cant: Automatically Identifying & Understanding Dark Jargons... USENIX
18:19 USENIX Security '18-Schrödinger’s RAT: Profiling Stakeholders in the Remote Access Trojan Ecosystem USENIX
19:25 USENIX Security '18 - The aftermath of a crypto-ransomware attack at a large academic institution USENIX
45:06 USENIX Security '18 - Panel: From Spam to Speech: Policing the Next Generation of "Unwanted Traffic" USENIX
24:39 USENIX Security '18 - We Still Don’t Have Secure Cross-Domain Requests: an Empirical Study of CORS USENIX
20:18 USENIX Security '18 - Who Is Answering My Queries: Understanding and Characterizing Interception... USENIX
19:54 USENIX Security '18 - End-Users Get Maneuvered: Empirical Analysis of Redirection Hijacking... USENIX
20:16 USENIX Security '18 - FANCI : Feature-based Automated NXDomain Classification and Intelligence USENIX
22:26 USENIX Security '18 - An Empirical Study of Web Resource Manipulation in Real-world Mobile Apps... USENIX
26:21 USENIX Security '18 - Fast and Service-preserving Recovery from Malware Infections Using CRIU USENIX
23:02 USENIX Security '18 - The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX USENIX
25:58 USENIX Security '18 - A Bad Dream: Subverting Trusted Platform Module While You Are Sleeping USENIX
24:12 USENIX Security '18 - teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts USENIX
24:35 USENIX Security '18 - Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant... USENIX
27:28 USENIX Security '18 - DelegaTEE: Brokered Delegation Using Trusted Execution Environments USENIX
32:17 USENIX Security '18 - Security Namespace: Making Linux Security Frameworks Available to Containers USENIX
22:01 USENIX Security '18 - O Single Sign-Off, Where Art Thou? An Empirical Analysis of Single Sign-On USENIX
17:10 USENIX Security '18 - WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring USENIX
21:46 USENIX Security '18 - Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer USENIX