USENIX Security '19
124 videos • 4,417 views • by USENIX
1
USENIX Security '19 - Tackling the Trust and Safety Crisis
USENIX
Download
2
USENIX Security '19 - A Study of the Feasibility of Co-located App Attacks against BLE
USENIX
Download
3
USENIX Security '19 - The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links
USENIX
Download
4
USENIX Security '19 - A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking
USENIX
Download
5
USENIX Security '19 - Hiding in Plain Signal: Physical Signal Overshadowing Attack on LTE
USENIX
Download
6
USENIX Security '19 - UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband
USENIX
Download
7
USENIX Security '19 - Computer Security and Privacy in the Interactions Between Victim
USENIX
Download
8
USENIX Security '19 - Clinical Computer Security for Victims of Intimate Partner Violence
USENIX
Download
9
USENIX Security '19 - Evaluating the Contextual Integrity of Privacy Regulation: Parents' IoT
USENIX
Download
10
USENIX Security '19 - Secure Multi-User Content Sharing for Augmented Reality Applications
USENIX
Download
11
USENIX Security '19 - Understanding and Improving Security and Privacy in Multi-User
USENIX
Download
12
USENIX Security '19 - Embracing the "Hack." A Better Strategy for Team-Defense
USENIX
Download
13
USENIX Security '19 - Evaluating Mobile Messengers for Implementation Vulnerabilities
USENIX
Download
14
USENIX Security '19 - PAC it up: Towards Pointer Integrity using ARM Pointer Authentication
USENIX
Download
15
USENIX Security '19 - Origin-sensitive Control Flow Integrity
USENIX
Download
16
USENIX Security '19 - HardFails: Insights into Software-Exploitable Hardware Bugs
USENIX
Download
17
USENIX Security '19 - A Systematic Evaluation of Transient Execution Attacks and Defenses
USENIX
Download
18
USENIX Security '19 - uXOM: Efficient eXecute-Only Memory on ARM Cortex-M
USENIX
Download
19
USENIX Security '19 - The Secret Sharer: Evaluating and Testing Unintended Memorization in
USENIX
Download
20
USENIX Security '19 - Improving Robustness of ML Classifiers against Realizable Evasio
USENIX
Download
21
USENIX Security '19 - ALOHA: Auxiliary Loss Optimization for Hypothesis Augmentation
USENIX
Download
22
USENIX Security '19 - Why Do Adversarial Attacks Transfer? Explaining Transferability of
USENIX
Download
23
USENIX Security '19 - Stack Overflow Considered Helpful! Deep Learning Security Nudges Towards
USENIX
Download
24
USENIX Security '19 - Security Research and Public Policy
USENIX
Download
25
USENIX Security '19 - From Privacy by Design to Data Protection by Design: The Challenges of
USENIX
Download
26
USENIX Security '19 - Wireless Attacks on Aircraft Instrument Landing Systems
USENIX
Download
27
USENIX Security '19 - Please Pay Inside: Evaluating Bluetooth-based Detection of Gas Pump Skimmers
USENIX
Download
28
USENIX Security '19 - CANvas: Fast and Inexpensive Automotive Network Mapping
USENIX
Download
29
USENIX Security '19 - Losing the Car Keys: Wireless PHY-Layer Insecurity in EV Charging
USENIX
Download
30
USENIX Security '19 - RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through
USENIX
Download
31
USENIX Security '19 - Seeing is Not Believing: Camouflage Attacks on Image Scaling Algorithms
USENIX
Download
32
USENIX Security '19 - CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning
USENIX
Download
33
USENIX Security '19 - Misleading Authorship Attribution of Source Code using Adversarial Learning
USENIX
Download
34
USENIX Security '19 - Terminal Brain Damage: Exposing the Graceless Degradation in Deep
USENIX
Download
35
USENIX Security '19 - CSI NN: Reverse Engineering of Neural Network Architectures
USENIX
Download
36
USENIX Security '19 - The Spies Hacking our Phones are Going Dark, and We're All in Trouble
USENIX
Download
37
USENIX Security '19 - simTPM: User-centric TPM for Mobile Devices
USENIX
Download
38
USENIX Security '19 - The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile
USENIX
Download
39
USENIX Security '19 - EnTrust: Regulating Sensor Access by Cooperating Programs
USENIX
Download
40
USENIX Security '19 - PolicyLint: Investigating Internal Privacy Policy Contradictions on Google
USENIX
Download
41
USENIX Security '19 - 50 Ways to Leak Your Data: An Exploration of Apps'
USENIX
Download
42
USENIX Security '19 - SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks
USENIX
Download
43
USENIX Security '19 - Robust Website Fingerprinting Through the Cache Occupancy Channel
USENIX
Download
44
USENIX Security '19 - Identifying Cache-Based Side Channels through Secret-Augmented
USENIX
Download
45
USENIX Security '19 - ScatterCache: Thwarting Cache Attacks via Cache Set Randomization
USENIX
Download
46
USENIX Security '19 - Pythia: Remote Oracles for the Masses
USENIX
Download
47
USENIX Security '19 - Lessons Learned from Evaluating the Robustness of Defenses to
USENIX
Download
48
USENIX Security '19 - HideMyApp: Hiding the Presence of Sensitive Apps on Android
USENIX
Download
49
USENIX Security '19 - TESSERACT: Eliminating Experimental Bias in Malware Classification
USENIX
Download
50
USENIX Security '19 - Devils in the Guidance: Predicting Logic Vulnerabilities in Payment
USENIX
Download
51
USENIX Security '19 - Understanding iOS-based Crowdturfing Through Hidden UI Analysis
USENIX
Download
52
USENIX Security '19 - BITE: Bitcoin Lightweight Client Privacy using Trusted Execution
USENIX
Download
53
USENIX Security '19 - FastKitten: Practical Smart Contracts on Bitcoin
USENIX
Download
54
USENIX Security '19 - StrongChain: Transparent and Collaborative Proof-of-Work Consensus
USENIX
Download
55
USENIX Security '19 - Tracing Transactions Across Cryptocurrency Ledgers
USENIX
Download
56
USENIX Security '19 - Reading the Tea leaves: A Comparative Analysis of Threat Intelligence
USENIX
Download
57
USENIX Security '19 - Towards the Detection of Inconsistencies in Public Security
USENIX
Download
58
USENIX Security '19 - Understanding and Securing Device Vulnerabilities through
USENIX
Download
59
USENIX Security '19 - ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the
USENIX
Download
60
USENIX Security '19 - All Your Clicks Belong to Me: Investigating Click Interception on the Web
USENIX
Download
61
USENIX Security '19 - What Are You Searching For? A Remote Keylogging Attack
USENIX
Download
62
USENIX Security '19 - Iframes/Popups Are Dangerous in Mobile WebView: Studying and
USENIX
Download
63
USENIX Security '19 - Small World with High Risks: A Study of Security Threats in the npm Ecosystem
USENIX
Download
64
USENIX Security '19 - Leaky Images: Targeted Privacy Attacks in the Web
USENIX
Download
65
USENIX Security '19 - “Johnny, you are fired!” – Spoofing OpenPGP and S/MIME Signatures in Emails
USENIX
Download
66
USENIX Security '19 - Scalable Scanning and Automatic Classification of TLS Padding Oracle
USENIX
Download
67
USENIX Security '19 - The KNOB is Broken: Exploiting Low Entropy in the Encryption Key
USENIX
Download
68
USENIX Security '19 - From IP ID to Device ID and KASLR Bypass
USENIX
Download
69
USENIX Security '19 - When the Signal is in the Noise: Exploiting Diffix's Sticky Noise
USENIX
Download
70
USENIX Security '19 - FIRM-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via
USENIX
Download
71
USENIX Security '19 - Not Everything is Dark and Gloomy: Power Grid Protections Against IoT
USENIX
Download
72
USENIX Security '19 - Discovering and Understanding the Security Hazards in the
USENIX
Download
73
USENIX Security '19 - Looking from the Mirror: Evaluating IoT Device Security through
USENIX
Download
74
USENIX Security '19 - All Things Considered: An Analysis of IoT Devices on Home Networks
USENIX
Download
75
USENIX Security '19 - KEPLER: Facilitating Control-flow Hijacking Primitive Evaluation for Linux
USENIX
Download
76
USENIX Security '19 - PeX: A Permission Check Analysis Framework for Linux Kernel
USENIX
Download
77
USENIX Security '19 - ERIM: Secure, Efficient In-process Isolation with Protection Keys (MPK)
USENIX
Download
78
USENIX Security '19 - SafeHidden: An Efficient and Secure Information Hiding Technique Using
USENIX
Download
79
USENIX Security '19 - Exploiting Unprotected I/O Operations in AMD’s Secure Encrypted Virtualization
USENIX
Download
80
USENIX Security '19 - Detecting and Characterizing Lateral Phishing at Scale
USENIX
Download
81
USENIX Security '19 - High Precision Detection of Business Email Compromise
USENIX
Download
82
USENIX Security '19 - Cognitive Triaging of Phishing Attacks
USENIX
Download
83
USENIX Security '19 - Users Really Do Answer Telephone Scams
USENIX
Download
84
USENIX Security '19 - Platforms in Everything: Analyzing Ground-Truth Data on the Anatomy and
USENIX
Download
85
USENIX Security '19 - Baby Steps towards the Precipice: How the Web Became a Scary
USENIX
Download
86
USENIX Security '19 - Shining Light on Internet-based Crimes Against Children
USENIX
Download
87
USENIX Security '19 - Protecting Cloud Virtual Machines from Hypervisor and Host Operating
USENIX
Download
88
USENIX Security '19 - WAVE: A Decentralized Authorization Framework with Transitive Delegation
USENIX
Download
89
USENIX Security '19 - in-toto: Providing farm-to-table guarantees for bits and bytes
USENIX
Download
90
USENIX Security '19 - IODINE: Verifying Constant-Time Execution of Hardware
USENIX
Download
91
USENIX Security '19 - VRASED: A Verified Hardware/Software Co-Design for Remote Attestation
USENIX
Download
92
USENIX Security '19 - EverParse: Verified Secure Zero-Copy Parsers for Authenticated Message Formats
USENIX
Download
93
USENIX Security '19 - Mobile Private Contact Discovery at Scale
USENIX
Download
94
USENIX Security 19 - Blind Bernoulli Trials: A Noninteractive Protocol For Hidden-Weight Coin Flips
USENIX
Download
95
USENIX Security '19 - XONN: XNOR-based Oblivious Deep Neural Network Inference
USENIX
Download
96
USENIX Security '19 - JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT
USENIX
Download
97
USENIX Security '19 - Security Educational Panel
USENIX
Download
98
USENIX Security '19 - Birthday, Name and Bifacial-security: Understanding Passwords
USENIX
Download
99
USENIX Security '19 - Protecting accounts from credential stuffing with password breach alerting
USENIX
Download
100
USENIX Security '19 - Probability Model Transforming Encoders Against Encoding Attacks
USENIX
Download
101
USENIX Security '19 - The Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts
USENIX
Download
102
USENIX Security '19 - The Anatomy of a Cryptocurrency Pump-and-Dump Scheme
USENIX
Download
103
USENIX Security '19 - Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of
USENIX
Download
104
USENIX Security '19 - Lessons Learned About Building Secure Software: It's About the Developers!
USENIX
Download
105
USENIX Security '19 - Rendered Private: Making GLSL Execution Uniform to Prevent WebGL-based
USENIX
Download
106
USENIX Security '19 - Site Isolation: Process Separation for Web Sites within the Browser
USENIX
Download
107
USENIX Security '19 - Everyone is Different: Client-side Diversification for Defending
USENIX
Download
108
USENIX Security '19 - Less is More: Quantifying the Security Benefits of Debloating Web Applications
USENIX
Download
109
USENIX Security '19 - The Web's Identity Crisis: Understanding the Effectiveness of Website Identity
USENIX
Download
110
USENIX Security '19 - RAZOR: A Framework for Post-deployment Software Debloating
USENIX
Download
111
USENIX Security '19 - Back to the Whiteboard: a Principled Approach for the Assessment and
USENIX
Download
112
USENIX Security '19 - Detecting Missing-Check Bugs via Semantic- and Context-Aware
USENIX
Download
113
USENIX Security '19 - DEEPVSA: Facilitating Value-set Analysis with Deep Learning for
USENIX
Download
114
USENIX Security '19 - CONFIRM: Evaluating Compatibility and Relevance of Control-flow
USENIX
Download
115
USENIX Security '19 - Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor
USENIX
Download
116
USENIX Security '19 - No Right to Remain Silent: Isolating Malicious Mixes
USENIX
Download
117
USENIX Security '19 - On (The Lack Of) Location Privacy in Crowdsourcing Applications
USENIX
Download
118
USENIX Security '19 - Utility-Optimized Local Differential Privacy Mechanisms for
USENIX
Download
119
USENIX Security '19 - Evaluating Differentially Private Machine Learning in Practice
USENIX
Download
120
USENIX Security '19 - Fuzzification: Anti-Fuzzing Techniques
USENIX
Download
121
USENIX Security '19 - AntiFuzz: Impeding Fuzzing Audits of Binary Executables
USENIX
Download
122
USENIX Security '19 - MOPT: Optimized Mutation Scheduling for Fuzzers
USENIX
Download
123
USENIX Security '19 - EnFuzz: Ensemble Fuzzing with Seed Synchronization among Diverse Fuzzers
USENIX
Download
124
USENIX Security '19 - GRIMOIRE: Synthesizing Structure while Fuzzing
USENIX
Download