USENIX Security '16
84 videos • 457 views • by USENIX
View the full USENIX Security '16 program at https://www.usenix.org/conference/use...
1
USENIX Security '16 - Crashing Drones and Hijacked Cameras: CyberTrust Meets CyberPhysical
USENIX
Download
2
USENIX Security '16 - Flip Feng Shui: Hammering a Needle in the Software Stack
USENIX
Download
3
USENIX Security '16 - One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks...
USENIX
Download
4
USENIX Security '16 - PIkit: A New Kernel-Independent Processor-Interconnect Rootkit
USENIX
Download
5
USENIX Security '16 - Verifying Constant-Time Implementations
USENIX
Download
6
USENIX Security '16 - Secure, Precise, and Fast Floating-Point Operations on x86 Processors
USENIX
Download
7
USENIX Security '16 - überSpark: Enforcing Verifiable Object Abstractions for Automated...
USENIX
Download
8
USENIX Security '16 - 2016 Test of Time Award Panel
USENIX
Download
9
USENIX Security '16 - Undermining Information Hiding (and What to Do about It)
USENIX
Download
10
USENIX Security '16 - Poking Holes in Information Hiding
USENIX
Download
11
USENIX Security '16 - What Cannot Be Read, Cannot Be Leveraged? Revisiting Assumptions of JIT-ROP...
USENIX
Download
12
USENIX Security '16 - zxcvbn: Low-Budget Password Strength Estimation
USENIX
Download
13
USENIX Security '16 - Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks
USENIX
Download
14
USENIX Security '16 - An Empirical Study of Textual Key-Fingerprint Representations
USENIX
Download
15
USENIX Security '16 - Making HTTPS the Default in the World's Largest Bureaucracy
USENIX
Download
16
USENIX Security '16 - Off-Path TCP Exploits: Global Rate Limit Considered Dangerous
USENIX
Download
17
USENIX Security '16 - Website-Targeted False Content Injection by Network Operators
USENIX
Download
18
USENIX Security '16 - The Ever-Changing Labyrinth: A Large-Scale Analysis of Wildcard DNS Powered...
USENIX
Download
19
USENIX Security '16 - A Comprehensive Measurement Study of Domain Generating Malware
USENIX
Download
20
USENIX Security '16 - Enhancing Bitcoin Security and Performance with Strong Consistency via...
USENIX
Download
21
USENIX Security '16 - Faster Malicious 2-Party Secure Computation with Online/Offline Dual Execution
USENIX
Download
22
USENIX Security '16 - Egalitarian Computing
USENIX
Download
23
USENIX Security '16 - Post-quantum Key Exchange—A New Hope
USENIX
Download
24
USENIX Security '16 - When Governments Attack: Malware Targeting Activists, Lawyers, and Journalists
USENIX
Download
25
USENIX Security '16 - Automatically Detecting Error Handling Bugs Using Error Specifications
USENIX
Download
26
USENIX Security '16 - APISan: Sanitizing API Usages through Semantic Cross-Checking
USENIX
Download
27
USENIX Security '16 - Defending against Malicious Peripherals with Cinch
USENIX
Download
28
USENIX Security '16 - On Omitting Commits and Committing Omissions: Preventing Git Metadata...
USENIX
Download
29
USENIX Security '16 - Making USB Great Again with USBFILTER
USENIX
Download
30
USENIX Security '16 - Micro-Virtualization Memory Tracing to Detect and Prevent Spraying Attacks
USENIX
Download
31
USENIX Security '16 - The Moral Character of Cryptographic Work
USENIX
Download
32
USENIX Security '16 - Request and Conquer: Exposing Cross-Origin Resource Size
USENIX
Download
33
USENIX Security '16 - Trusted Browsers for Uncertain Times
USENIX
Download
34
USENIX Security '16 - Tracing Information Flows Between Ad Exchanges Using Retargeted Ads
USENIX
Download
35
USENIX Security '16 - Virtual U: Defeating Face Liveness Detection by Building Virtual Models...
USENIX
Download
36
USENIX Security '16 - Hidden Voice Commands
USENIX
Download
37
USENIX Security '16 - FlowFence: Practical Data Protection for Emerging IoT Application Frameworks
USENIX
Download
38
USENIX Security '16 - Privacy and Threat in Practice: Mobile Messaging by Low-Income New Yorkers
USENIX
Download
39
USENIX Security '16 - ARMageddon: Cache Attacks on Mobile Devices
USENIX
Download
40
USENIX Security '16 - DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks
USENIX
Download
41
USENIX Security '16 - An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries
USENIX
Download
42
USENIX Security '16 - Stealing Machine Learning Models via Prediction APIs
USENIX
Download
43
USENIX Security '16 - Oblivious Multi-Party Machine Learning on Trusted Processors
USENIX
Download
44
USENIX Security '16 - Thoth: Comprehensive Policy Compliance in Data Retrieval Systems
USENIX
Download
45
USENIX Security '16 - The Unfalsifiability of Security Claims
USENIX
Download
46
USENIX Security '16 - Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage
USENIX
Download
47
USENIX Security '16 - Predicting, Decrypting, and Abusing WPA2/802.11 Group Keys
USENIX
Download
48
USENIX Security '16 - DROWN: Breaking TLS Using SSLv2
USENIX
Download
49
USENIX Security '16 - All Your Queries Are Belong to Us: The Power of File-Injection Attacks...
USENIX
Download
50
USENIX Security '16 - Investigating Commercial Pay-Per-Install and the Distribution of Unwanted...
USENIX
Download
51
USENIX Security '16 - Measuring PUP Prevalence and PUP Distribution through Pay-Per-Install Services
USENIX
Download
52
USENIX Security '16 - UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware
USENIX
Download
53
USENIX Security '16 - Towards Measuring and Mitigating Social Engineering Software Download Attacks
USENIX
Download
54
USENIX Security '16 - Teaching Computer Security: Thoughts from the Field
USENIX
Download
55
USENIX Security '16 - Specification Mining for Intrusion Detection in Networked Control Systems
USENIX
Download
56
USENIX Security '16 - Optimized Invariant Representation of Network Traffic for Detecting Unseen...
USENIX
Download
57
USENIX Security '16 - Authenticated Network Time Synchronization
USENIX
Download
58
USENIX Security '16 - fTPM: A Software-Only Implementation of a TPM Chip
USENIX
Download
59
USENIX Security '16 - Sanctum: Minimal Hardware Extensions for Strong Software Isolation
USENIX
Download
60
USENIX Security '16 - Ariadne: A Minimal Approach to State Continuity
USENIX
Download
61
USENIX Security '16 - Finding and Fixing Security Bugs in Flash
USENIX
Download
62
USENIX Security '16 - The Million-Key Question—Investigating the Origins of RSA Public Keys
USENIX
Download
63
USENIX Security '16 - Fingerprinting Electronic Control Units for Vehicle Intrusion Detection
USENIX
Download
64
USENIX Security '16 - Lock It and Still Lose It —on the (In)Security of Automotive Remote Keyless
USENIX
Download
65
USENIX Security '16 - OblivP2P: An Oblivious Peer-to-Peer Content Sharing System
USENIX
Download
66
USENIX Security '16 - AuthLoop: End-to-End Cryptographic Authentication for Telephony...
USENIX
Download
67
USENIX Security '16 - You Are Who You Know and How You Behave: Attribute Inference Attacks...
USENIX
Download
68
USENIX Security '16 - Report from the Field: A CDN's Role in Repelling Attacks against Banking...
USENIX
Download
69
USENIX Security '16 - Internet Jones and the Raiders of the Lost Trackers...
USENIX
Download
70
USENIX Security '16 - Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability
USENIX
Download
71
USENIX Security '16 - You've Got Vulnerability: Exploring Effective Vulnerability Notifications
USENIX
Download
72
USENIX Security '16 - Mirror: Enabling Proofs of Data Replication and Retrievability in the Cloud
USENIX
Download
73
USENIX Security '16 - ZKBoo: Faster Zero-Knowledge for Boolean Circuits
USENIX
Download
74
USENIX Security '16 - The Cut-and-Choose Game and Its Application to Cryptographic Protocols
USENIX
Download
75
USENIX Security '16 - AMD x86 Memory Encryption Technologies
USENIX
Download
76
USENIX Security '16 - On Demystifying the Android Application Framework: Re-Visiting Android...
USENIX
Download
77
USENIX Security '16 - Practical DIFC Enforcement on Android
USENIX
Download
78
USENIX Security '16 - Screen after Previous Screens: Spatial-Temporal Recreation of Android App...
USENIX
Download
79
USENIX Security '16 - Harvesting Inconsistent Security Configurations in Custom Android ROMs...
USENIX
Download
80
USENIX Security '16 - Identifying and Characterizing Sybils in the Tor Network
USENIX
Download
81
USENIX Security '16 - k-fingerprinting: A Robust Scalable Website Fingerprinting Technique
USENIX
Download
82
USENIX Security '16 - Protecting Privacy of BLE Device Users
USENIX
Download
83
USENIX Security '16 - Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles
USENIX
Download
84
USENIX Security '16 - Security Competitions
USENIX
Download