default search action
24th USENIX Security Symposium 2015: Washington, D.C., USA
- Jaeyeon Jung, Thorsten Holz:
24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015. USENIX Association 2015
Measurement: We Didn't Start the Fire
- Hadi Asghari, Michael Ciere, Michel J. G. van Eeten:
Post-Mortem of a Zombie: Conficker Cleanup After Six Years. 1-16 - Bradley Reaves, Nolen Scaife, Adam Bates, Patrick Traynor, Kevin R. B. Butler:
Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World. 17-32 - Kyle Soska, Nicolas Christin:
Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem. 33-48
Tic-Attack-Toe
- Mathy Vanhoef, Frank Piessens:
All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS. 97-112 - Christina Garman, Kenneth G. Paterson, Thyla van der Merwe:
Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS. 113-128 - Ethan Heilman, Alison Kendler, Aviv Zohar, Sharon Goldberg:
Eclipse Attacks on Bitcoin's Peer-to-Peer Network. 129-144
Sock It To Me: TLS No Less
- Joeri de Ruiter, Erik Poll:
Protocol State Fuzzing of TLS Implementations. 193-206 - Lennart Beringer, Adam Petcher, Katherine Q. Ye, Andrew W. Appel:
Verified Correctness and Security of OpenSSL HMAC. 207-221 - David Kaloper-Mersinjak, Hannes Mehnert, Anil Madhavapeddy, Peter Sewell:
Not-Quite-So-Broken TLS: Lessons in Re-Engineering a Security Protocol Specification and Implementation. 223-238 - Marten Oltrogge, Yasemin Acar, Sergej Dechand, Matthew Smith, Sascha Fahl:
To Pin or Not to Pin-Helping App Developers Bullet Proof Their TLS Connections. 239-254
Word Crimes
- Frederico Araujo, Kevin W. Hamlen:
Compiler-instrumented, Dynamic Secret-Redaction of Legacy Processes for Attacker Deception. 145-159 - Nicholas Carlini, Antonio Barresi, Mathias Payer, David A. Wagner, Thomas R. Gross:
Control-Flow Bending: On the Effectiveness of Control-Flow Integrity. 161-176 - Hong Hu, Zheng Leong Chua, Sendroiu Adrian, Prateek Saxena, Zhenkai Liang:
Automatic Generation of Data-Oriented Exploits. 177-192
Forget Me Not
- Aylin Caliskan Islam, Richard E. Harang, Andrew Liu, Arvind Narayanan, Clare R. Voss, Fabian Yamaguchi, Rachel Greenstadt:
De-anonymizing Programmers via Code Stylometry. 255-270 - Yixin Sun, Anne Edmundson, Laurent Vanbever, Oscar Li, Jennifer Rexford, Mung Chiang, Prateek Mittal:
RAPTOR: Routing Attacks on Privacy in Tor. 271-286 - Albert Kwon, Mashael AlSabah, David Lazar, Marc Dacier, Srinivas Devadas:
Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services. 287-302 - Shouling Ji, Weiqing Li, Prateek Mittal, Xin Hu, Raheem A. Beyah:
SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization. 303-318
Now You're Just Something That I Used to Code
- David A. Ramos, Dawson R. Engler:
Under-Constrained Symbolic Execution: Correctness Checking for Real Code. 49-64 - Jiang Ming, Dinghao Wu, Gaoyao Xiao, Jun Wang, Peng Liu:
TaintPipe: Pipelined Symbolic Taint Analysis. 65-80 - Byoungyoung Lee, Chengyu Song, Taesoo Kim, Wenke Lee:
Type Casting Verification: Stopping an Emerging Attack Vector. 81-96
Operating System Security: It's All About the Base
- Adam Bates, Dave Tian, Kevin R. B. Butler, Thomas Moyer:
Trustworthy Whole-System Provenance for the Linux Kernel. 319-334 - Igor Smolyar, Muli Ben-Yehuda, Dan Tsafrir:
Securing Self-Virtualizing Ethernet Devices. 335-350 - Ruowen Wang, William Enck, Douglas S. Reeves, Xinwen Zhang, Peng Ning, Dingbang Xu, Wu Zhou, Ahmed M. Azab:
EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning. 351-366
Ace Ventura: PETS Detective
- Kevin P. Dyer, Scott E. Coull, Thomas Shrimpton:
Marionette: A Programmable Network Traffic Obfuscation System. 367-382 - Marcela S. Melara, Aaron Blankstein, Joseph Bonneau, Edward W. Felten, Michael J. Freedman:
CONIKS: Bringing Key Transparency to End Users. 383-398 - Susan E. McGregor, Polina Charters, Tobin Holliday, Franziska Roesner:
Investigating the Computer Security Practices and Needs of Journalists. 399-414
ORAMorama!
- Ling Ren, Christopher W. Fletcher, Albert Kwon, Emil Stefanov, Elaine Shi, Marten van Dijk, Srinivas Devadas:
Constants Count: Practical Improvements to Oblivious RAM. 415-430 - Ashay Rane, Calvin Lin, Mohit Tiwari:
Raccoon: Closing Digital Side-Channels through Obfuscated Execution. 431-446 - Tien Tuan Anh Dinh, Prateek Saxena, Ee-Chien Chang, Beng Chin Ooi, Chunwang Zhang:
M2R: Enabling Stronger Privacy in MapReduce Computation. 447-462
But Maybe All You Need Is Something to Trust
- Blase Ur, Sean M. Segreti, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Saranga Komanduri, Darya Kurilova, Michelle L. Mazurek, William Melicher, Richard Shay:
Measuring Real-World Accuracies and Biases in Modeling Password Guessability. 463-481 - Nikolaos Karapanos, Claudio Marforio, Claudio Soriente, Srdjan Capkun:
Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound. 483-498 - Primal Wijesekera, Arjun Baokar, Ashkan Hosseini, Serge Egelman, David A. Wagner, Konstantin Beznosov:
Android Permissions Remystified: A Field Study on Contextual Integrity. 499-514
PELCGB
- Benny Pinkas, Thomas Schneider, Gil Segev, Michael Zohner:
Phasing: Private Set Intersection Using Permutation-based Hashing. 515-530 - Niklas Büscher, Stefan Katzenbeisser:
Faster Secure Computation through Automatic Parallelization. 531-546 - Adam Everspaugh, Rahul Chatterjee, Samuel Scott, Ari Juels, Thomas Ristenpart:
The Pythia PRF Service. 547-562
And the Hackers Gonna Hack, Hack, Hack, Hack, Hack
- Gianluca Stringhini, Pierre Mourlanne, Grégoire Jacob, Manuel Egele, Christopher Kruegel, Giovanni Vigna:
EVILCOHORT: Detecting Communities of Malicious Accounts on Online Services. 563-578 - Nav Jagpal, Eric Dingle, Jean-Philippe Gravel, Panayiotis Mavrommatis, Niels Provos, Moheeb Abu Rajab, Kurt Thomas:
Trends and Lessons from Three Years Fighting Malicious Extensions. 579-593 - Kevin Borgolte, Christopher Kruegel, Giovanni Vigna:
Meerkat: Detecting Website Defacements through Image-based Object Recognition. 595-610
It's a Binary Joke: Either You Get It, or You Don't
- Eui Chul Richard Shin, Dawn Song, Reza Moazzezi:
Recognizing Functions in Binaries with Neural Networks. 611-626 - Shuai Wang, Pei Wang, Dinghao Wu:
Reassembleable Disassembling. 627-642 - Alessandro Di Federico, Amat Cama, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna:
How the ELF Ruined Christmas. 643-658
Pain in the App
- Kai Chen, Peng Wang, Yeonjoon Lee, XiaoFeng Wang, Nan Zhang, Heqing Huang, Wei Zou, Peng Liu:
Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale. 659-674 - Jin Chen, Haibo Chen, Erick Bauman, Zhiqiang Lin, Binyu Zang, Haibing Guan:
You Shouldn't Collect My Secrets: Thwarting Sensitive Keystroke Leakage in Mobile IME Apps. 657-690 - Michael Backes, Sven Bugiel, Christian Hammer, Oliver Schranz, Philipp von Styp-Rekowsky:
Boxify: Full-fledged App Sandboxing for Stock Android. 691-706
Oh, What a Tangled Web We Weave
- Xiaofeng Zheng, Jian Jiang, Jinjin Liang, Hai-Xin Duan, Shuo Chen, Tao Wan, Nicholas Weaver:
Cookies Lack Integrity: Real-World Implications. 707-721 - Sebastian Lekies, Ben Stock, Martin Wentzel, Martin Johns:
The Unexpected Dangers of Dynamic JavaScript. 723-735 - Michael Weissbacher, William K. Robertson, Engin Kirda, Christopher Kruegel, Giovanni Vigna:
ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities. 737-752
The World's Address: An App That's Worn
- Kassem Fawaz, Huan Feng, Kang G. Shin:
Anatomization and Protection of Mobile Apps' Location Privacy Threats. 753-768 - Huan Feng, Kassem Fawaz, Kang G. Shin:
LinkDroid: Reducing Unregulated Aggregation of App Usage Behaviors. 769-783 - Yan Michalevsky, Aaron Schulman, Gunaa Arumugam Veerapandian, Dan Boneh, Gabi Nakibly:
PowerSpy: Location Tracking Using Mobile Device Power Analysis. 785-800
ADDioS!
- Giancarlo Pellegrino, Davide Balzarotti, Stefan Winter, Neeraj Suri:
In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services. 801-816 - Seyed Kaveh Fayaz, Yoshiaki Tobioka, Vyas Sekar, Michael D. Bailey:
Bohatei: Flexible and Elastic DDoS Defense. 817-832 - Bradley Reaves, Ethan Shernan, Adam Bates, Henry Carter, Patrick Traynor:
Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network Edge. 833-848
Attacks: I Won't Let You Down
- Mordechai Guri, Assaf Kachlon, Ofer Hasson, Gabi Kedma, Yisroel Mirsky, Yuval Elovici:
GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies. 849-864 - Ramya Jayaram Masti, Devendra Rai, Aanjhan Ranganathan, Christian Müller, Lothar Thiele, Srdjan Capkun:
Thermal Covert Channels on Multi-core Platforms. 865-880 - Yunmok Son, Hocheol Shin, Dongkwan Kim, Young-Seok Park, Juhwan Noh, Kibum Choi, Jungwoo Choi, Yongdae Kim:
Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors. 881-896
How Do You Secure a Cloud and Pin It Down?
- Daniel Gruss, Raphael Spreitzer, Stefan Mangard:
Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches. 897-912 - Venkatanathan Varadarajan, Yinqian Zhang, Thomas Ristenpart, Michael M. Swift:
A Placement Vulnerability Study in Multi-Tenant Public Clouds. 913-928 - Zhang Xu, Haining Wang, Zhenyu Wu:
A Measurement Study on Co-residence Threat inside the Cloud. 929-944
Knock Knock. Who's There? Icy. Icy Who? I See You Too
- Chuangang Ren, Yulong Zhang, Hui Xue, Tao Wei, Peng Liu:
Towards Discovering and Understanding Task Hijacking in Android. 945-959 - Michael Mitchell, An-I Andy Wang, Peter L. Reiher:
Cashtags: Protecting the Input and Display of Sensitive Data. 961-976 - Jianjun Huang, Zhichun Li, Xusheng Xiao, Zhenyu Wu, Kangjie Lu, Xiangyu Zhang, Guofei Jiang:
SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps. 977-992 - Yuhong Nan, Min Yang, Zhemin Yang, Shunfan Zhou, Guofei Gu, Xiaofeng Wang:
UIPicker: User-Input Privacy Identification in Mobile Applications. 993-1008
How Do You Solve a Problem Like M-al-ware?
- Yang Liu, Armin Sarabi, Jing Zhang, Parinaz Naghizadeh, Manish Karir, Michael D. Bailey, Mingyan Liu:
Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents. 1009-1024 - Terry Nelms, Roberto Perdisci, Manos Antonakakis, Mustaque Ahamad:
WebWitness: Investigating, Categorizing, and Mitigating Malware Download Paths. 1025-1040 - Carl Sabottke, Octavian Suciu, Tudor Dumitras:
Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits. 1041-1056 - Mariano Graziano, Davide Canali, Leyla Bilge, Andrea Lanzi, Davide Balzarotti:
Needles in a Haystack: Mining Information from Public Dynamic Analysis Sandboxes for Malware Intelligence. 1057-1072
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.