1:18:41 USENIX Security '16 - Crashing Drones and Hijacked Cameras: CyberTrust Meets CyberPhysical USENIX
29:23 USENIX Security '16 - Secure, Precise, and Fast Floating-Point Operations on x86 Processors USENIX
29:27 USENIX Security '16 - überSpark: Enforcing Verifiable Object Abstractions for Automated... USENIX
26:37 USENIX Security '16 - What Cannot Be Read, Cannot Be Leveraged? Revisiting Assumptions of JIT-ROP... USENIX
26:35 USENIX Security '16 - Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks USENIX
29:18 USENIX Security '16 - The Ever-Changing Labyrinth: A Large-Scale Analysis of Wildcard DNS Powered... USENIX
25:00 USENIX Security '16 - Enhancing Bitcoin Security and Performance with Strong Consistency via... USENIX
24:46 USENIX Security '16 - Faster Malicious 2-Party Secure Computation with Online/Offline Dual Execution USENIX
2:46:21 USENIX Security '16 - When Governments Attack: Malware Targeting Activists, Lawyers, and Journalists USENIX
22:59 USENIX Security '16 - Automatically Detecting Error Handling Bugs Using Error Specifications USENIX
28:19 USENIX Security '16 - On Omitting Commits and Committing Omissions: Preventing Git Metadata... USENIX
29:46 USENIX Security '16 - Micro-Virtualization Memory Tracing to Detect and Prevent Spraying Attacks USENIX
26:45 USENIX Security '16 - Tracing Information Flows Between Ad Exchanges Using Retargeted Ads USENIX
26:02 USENIX Security '16 - Virtual U: Defeating Face Liveness Detection by Building Virtual Models... USENIX
26:49 USENIX Security '16 - FlowFence: Practical Data Protection for Emerging IoT Application Frameworks USENIX
1:18:13 USENIX Security '16 - Privacy and Threat in Practice: Mobile Messaging by Low-Income New Yorkers USENIX
22:37 USENIX Security '16 - An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries USENIX
28:41 USENIX Security '16 - Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage USENIX
26:12 USENIX Security '16 - All Your Queries Are Belong to Us: The Power of File-Injection Attacks... USENIX
28:25 USENIX Security '16 - Investigating Commercial Pay-Per-Install and the Distribution of Unwanted... USENIX
25:54 USENIX Security '16 - Measuring PUP Prevalence and PUP Distribution through Pay-Per-Install Services USENIX
27:42 USENIX Security '16 - Towards Measuring and Mitigating Social Engineering Software Download Attacks USENIX
27:08 USENIX Security '16 - Specification Mining for Intrusion Detection in Networked Control Systems USENIX
26:28 USENIX Security '16 - Optimized Invariant Representation of Network Traffic for Detecting Unseen... USENIX
28:02 USENIX Security '16 - Sanctum: Minimal Hardware Extensions for Strong Software Isolation USENIX
27:39 USENIX Security '16 - The Million-Key Question—Investigating the Origins of RSA Public Keys USENIX
29:33 USENIX Security '16 - Fingerprinting Electronic Control Units for Vehicle Intrusion Detection USENIX
26:54 USENIX Security '16 - Lock It and Still Lose It —on the (In)Security of Automotive Remote Keyless USENIX
27:29 USENIX Security '16 - AuthLoop: End-to-End Cryptographic Authentication for Telephony... USENIX
24:11 USENIX Security '16 - You Are Who You Know and How You Behave: Attribute Inference Attacks... USENIX
1:01:06 USENIX Security '16 - Report from the Field: A CDN's Role in Repelling Attacks against Banking... USENIX
30:44 USENIX Security '16 - Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability USENIX
29:13 USENIX Security '16 - You've Got Vulnerability: Exploring Effective Vulnerability Notifications USENIX
31:21 USENIX Security '16 - Mirror: Enabling Proofs of Data Replication and Retrievability in the Cloud USENIX
21:55 USENIX Security '16 - The Cut-and-Choose Game and Its Application to Cryptographic Protocols USENIX
27:09 USENIX Security '16 - On Demystifying the Android Application Framework: Re-Visiting Android... USENIX
26:56 USENIX Security '16 - Screen after Previous Screens: Spatial-Temporal Recreation of Android App... USENIX
25:23 USENIX Security '16 - Harvesting Inconsistent Security Configurations in Custom Android ROMs... USENIX
26:28 USENIX Security '16 - k-fingerprinting: A Robust Scalable Website Fingerprinting Technique USENIX
28:55 USENIX Security '16 - Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles USENIX