USENIX Sec 2020

159 papers accepted.

Updated on 2023-09-08.

You can find the lastest information here.


A Formal Analysis of IEEE 802.11's WPA2: Countering the Kracks Caused by Cracking the Counters.

Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets.

Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks.

You Are What You Broadcast: Identification of Mobile and IoT Devices from (Public) WiFi.

Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE.

A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web.

Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It.

Empirical Measurement of Systemic 2FA Usability.

What Twitter Knows: Characterizing Ad Targeting Practices, User Perceptions, and Ad Explanations Through Users' Own Twitter Data.

The Impact of Ad-Blockers on Product Search and Purchase Behavior: A Lab Experiment.

Symbolic execution with SymCC: Don't interpret, compile!

Sys: A Static/Symbolic Tool for Finding Good Bugs in Good (Browser) Code.

Everything Old is New Again: Binary Security of WebAssembly.

AURORA: Statistical Crash Analysis for Automated Root Cause Explanation.

SmartVerif: Push the Limit of Automation Capability of Verifying Security Protocols by Dynamic Strategies.

BigMAC: Fine-Grained Policy Analysis of Android Firmware.

From Needs to Actions to Secure Apps? The Effect of Requirements and Developer Practices on App Security.

FANS: Fuzzing Android Native System Services via Automated Interface Analysis.

Chaperone: Real-time Locking and Loss Prevention for Smartphones.

Towards HTTPS Everywhere on Android: We Are Not There Yet.

Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale.

PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists.

Who's Calling? Characterizing Robocalls through Audio and Metadata Analysis.

See No Evil: Phishing for Permissions with False Transparency.

A different cup of TI? The added value of commercial threat intelligence.

HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments.

CopyCat: Controlled Instruction-Level Attacks on Enclaves.

An Off-Chip Attack on Hardware Enclaves via the Memory Bus.

Civet: An Efficient Java Partitioning Framework for Hardware Enclaves.

BesFS: A POSIX Filesystem for Enclaves with a Mechanized Safety Proof.

EPIC: Every Packet Is Checked in the Data Plane of a Path-Aware Internet.

ShadowMove: A Stealthy Lateral Movement Strategy.

Poison Over Troubled Forwarders: A Cache Poisoning Attack Targeting DNS Forwarding Devices.

Programmable In-Network Security for Context-aware BYOD Policies.

A Longitudinal and Comprehensive Study of the DANE Ecosystem in Email.

NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities.

Cached and Confused: Web Cache Deception in the Wild.

A Tale of Two Headers: A Formal Analysis of Inconsistent Click-Jacking Protection on the Web.

Retrofitting Fine Grain Isolation in the Firefox Renderer.

Zero-delay Lightweight Defenses against Website Fingerprinting.

Achieving Keyless CDNs with Conclaves.

SENG, the SGX-Enforcing Network Gateway: Authorizing Communication from Shielded Clients.

APEX: A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise.

PARTEMU: Enabling Dynamic Analysis of Real-World TrustZone Software Using Emulation.

PHMon: A Programmable Hardware Monitor and Its Security Use Cases.

Horizontal Privilege Escalation in Trusted Applications.

TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves.

The 2020 Election: Remote Voting, Disinformation, and Audit.

Stealthy Tracking of Autonomous Vehicles with Cache Side Channels.

Towards Robust LiDAR-based Perception in Autonomous Driving: General Black-box Adversarial Sensor Attack and Countermeasures.

SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants.

From Control Model to Program: Investigating Robotic Aerial Vehicle Accidents with MAYDAY.

Drift with Devil: Security of Multi-Sensor Fusion based Localization in High-Level Autonomous Driving under GPS Spoofing.

Plug-N-Pwned: Comprehensive Vulnerability Analysis of OBD-II Dongles as A New Over-the-Air Attack Surface in Automotive IoT.

PCKV: Locally Differentially Private Correlated Key-Value Data Collection with Optimized Utility.

Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheck.

Walking Onions: Scaling Anonymity Networks while Protecting Users.

Differentially-Private Control-Flow Node Coverage for Software Usage Analysis.

Visor: Privacy-Preserving Video Analytics as a Cloud Service.

DELF: Safeguarding deletion correctness in Online Social Networks.

Datalog Disassembly.

KOOBE: Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities.

Automatic Techniques to Systematically Discover New Heap Exploitation Primitives.

The Industrial Age of Hacking.

BScout: Direct Whole Patch Presence Test for Java Executables.

MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures.

Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation.

HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation.

Silhouette: Efficient Protected Shadow Stacks for Embedded Systems.

P2IM: Scalable and Hardware-independent Firmware Testing via Automatic Peripheral Interface Modeling.

COUNTERFOIL: Verifying Provenance of Integrated Circuits using Intrinsic Package Fingerprints and Inexpensive Cameras.

Hall Spoofing: A Non-Invasive DoS Attack on Grid-Tied Solar Inverter.

Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning.

Exploring Connections Between Active Learning and Model Extraction.

Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries.

High Accuracy and High Fidelity Extraction of Neural Networks.

Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks in Machine Learning.

TextShield: Robust Text Classification Based on Multimodal Embedding and Neural Machine Translation.

Data Recovery from "Scrubbed" NAND Flash Storage: Need for Analog Sanitization.

PKU Pitfalls: Attacks on PKU-based Memory Isolation Systems.

Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis.

V0LTpwn: Attacking x86 Processor Integrity from Software.

DeepHammer: Depleting the Intelligence of Deep Neural Networks through Targeted Chain of Bit Flips.

SpecFuzz: Bringing Spectre-type vulnerabilities to the surface.

Digital Contact Tracing.

Security Analysis of Unified Payments Interface and Payment Apps in India.

Cardpliance: PCI DSS Compliance of Android Applications.

The Ballot is Busted Before the Blockchain: A Security Analysis of Voatz, the First Internet Voting Application Used in U.S. Federal Elections.

VoteAgain: A scalable coercion-resistant voting system.

Boxer: Preventing fraud by scanning credit cards.

Fawkes: Protecting Privacy against Unauthorized Deep Learning Models.

Stolen Memories: Leveraging Model Memorization for Calibrated White-Box Membership Inference.

Local Model Poisoning Attacks to Byzantine-Robust Federated Learning.

Justinian's GAAvernor: Robust Distributed Learning with Gradient Aggregation Agent.

Interpretable Deep Learning under Fire.

Donky: Domain Keys - Efficient In-Process Isolation for RISC-V and x86.

(Mostly) Exitless VM Protection from Untrusted Hypervisor through Disaggregated Nested Virtualization.

DECAF: Automatic, Adaptive De-bloating and Hardening of COTS Firmware.

McTiny: Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers.

Temporal System Call Specialization for Attack Surface Reduction.

Big Numbers - Big Troubles: Systematically Analyzing Nonce Leakage in (EC)DSA Implementations.

Estonian Electronic Identity Card: Security Flaws in Key Management.

The Unpatchable Silicon: A Full Break of the Bitstream Encryption of Xilinx 7-Series FPGAs.

Automating the Development of Chosen Ciphertext Attacks.

SHA-1 is a Shambles: First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust.

A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols.

An Observational Investigation of Reverse Engineers' Processes.

The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums.

DatashareNetwork: A Decentralized Privacy-Preserving Search Engine for Investigative Journalists.

"I am uncomfortable sharing what I can't see": Privacy Concerns of the Visually Impaired with Camera Based Assistive Applications.

'I have too much respect for my elders': Understanding South African Mobile Users' Perceptions of Privacy and Current Behaviors on Facebook and WhatsApp.

RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks.

Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections.

Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures.

Certified Side Channels.

NetWarden: Mitigating Network Covert Channels while Preserving Performance.

TPM-FAIL: TPM meets Timing and Lattice Attacks.

Scaling Verifiable Computation Using Efficient Set Accumulators.

Pixel: Multi-signatures for Consensus.

MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs.

Secure Multi-party Computation of Differentially Private Median.

That Was Then, This Is Now: A Security Evaluation of Password Generation, Storage, and Autofill in Browser-Based Password Managers.

Composition Kills: A Case Study of Email Sender Authentication.

Detecting Stuffing of a User's Credentials at Her Own Accounts.

Liveness is Not Enough: Enhancing Fingerprint Authentication with Behavioral Biometrics to Defeat Puppet Attacks.

Human Distinguishable Visual Key Fingerprints.

FuzzGuard: Filtering out Unreachable Inputs in Directed Grey-box Fuzzing through Deep Learning.

FuzzGen: Automatic Fuzzer Generation.

ParmeSan: Sanitizer-guided Greybox Fuzzing.

EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed Bandit.

MUZZ: Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded Programs.

On Training Robust PDF Malware Classifiers.

Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines.

FIRMSCOPE: Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware.

Automatic Hot Patch Generation for Android Kernels.

iOS, Your OS, Everybody's OS: Vetting and Analyzing Network Services of iOS Applications.

SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage.

Pancake: Frequency Smoothing for Encrypted Data Stores.

Droplet: Decentralized Authorization and Access Control for Encrypted Data Streams.

Secure parallel computation on national scale volumes of data.

Delphi: A Cryptographic Inference Service for Neural Networks.

Analysis of DTLS Implementations Using Protocol State Fuzzing.

Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints.

USBFuzz: A Framework for Fuzzing USB Drivers by Device Emulation.

GREYONE: Data Flow Sensitive Fuzzing.

Fuzzing Error Handling Code using Context-Sensitive Software Fault Injection.

Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer.

Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems.

SkillExplorer: Understanding the Behavior of Skills in Large Scale.

Devil's Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices.

Void: A fast and light voice liveness detection system.

Preech: A System for Privacy-Preserving Speech Transcription.

BlockSci: Design and applications of a blockchain analysis platform.

Remote Side-Channel Attacks on Anonymous Transactions.

ETHBMC: A Bounded Model Checker for Smart Contracts.

TXSPECTOR: Uncovering Attacks in Ethereum from Transactions.

An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem.