Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/uss/uss2016.bht:"
@inproceedings{DBLP:conf/uss/0001BDMOW16, author = {Michael Backes and Sven Bugiel and Erik Derr and Patrick D. McDaniel and Damien Octeau and Sebastian Weisgerber}, editor = {Thorsten Holz and Stefan Savage}, title = {On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {1101--1118}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/backes\_android}, timestamp = {Mon, 01 Feb 2021 08:43:18 +0100}, biburl = {https://dblp.org/rec/conf/uss/0001BDMOW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/0001BHHKM16, author = {Michael Backes and Pascal Berrang and Anna Hecksteden and Mathias Humbert and Andreas Keller and Tim Meyer}, editor = {Thorsten Holz and Stefan Savage}, title = {Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {1223--1240}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/backes\_epigenetics}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/0001BHHKM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AaferZD16, author = {Yousra Aafer and Xiao Zhang and Wenliang Du}, editor = {Thorsten Holz and Stefan Savage}, title = {Harvesting Inconsistent Security Configurations in Custom Android ROMs via Differential Analysis}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {1153--1168}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/aafer}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/AaferZD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AlkimDPS16, author = {Erdem Alkim and L{\'{e}}o Ducas and Thomas P{\"{o}}ppelmann and Peter Schwabe}, editor = {Thorsten Holz and Stefan Savage}, title = {Post-quantum Key Exchange - {A} New Hope}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {327--343}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/alkim}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/AlkimDPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AlmeidaBBDE16, author = {Jos{\'{e}} Bacelar Almeida and Manuel Barbosa and Gilles Barthe and Fran{\c{c}}ois Dupressoir and Michael Emmi}, editor = {Thorsten Holz and Stefan Savage}, title = {Verifying Constant-Time Implementations}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {53--70}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/almeida}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/AlmeidaBBDE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AndriesseCVSB16, author = {Dennis Andriesse and Xi Chen and Victor van der Veen and Asia Slowinska and Herbert Bos}, editor = {Thorsten Holz and Stefan Savage}, title = {An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {583--600}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/andriesse}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/AndriesseCVSB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AngelWHLSSBW16, author = {Sebastian Angel and Riad S. Wahby and Max Howald and Joshua B. Leners and Michael Spilo and Zhen Sun and Andrew J. Blumberg and Michael Walfish}, editor = {Thorsten Holz and Stefan Savage}, title = {Defending against Malicious Peripherals with Cinch}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {397--414}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/angel}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/AngelWHLSSBW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ArmknechtBBK16, author = {Frederik Armknecht and Ludovic Barman and Jens{-}Matthias Bohli and Ghassan O. Karame}, editor = {Thorsten Holz and Stefan Savage}, title = {Mirror: Enabling Proofs of Data Replication and Retrievability in the Cloud}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {1051--1068}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/armknecht}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/ArmknechtBBK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AviramSSHDSVAHD16, author = {Nimrod Aviram and Sebastian Schinzel and Juraj Somorovsky and Nadia Heninger and Maik Dankel and Jens Steube and Luke Valenta and David Adrian and J. Alex Halderman and Viktor Dukhovni and Emilia K{\"{a}}sper and Shaanan Cohney and Susanne Engels and Christof Paar and Yuval Shavitt}, editor = {Thorsten Holz and Stefan Savage}, title = {{DROWN:} Breaking {TLS} Using SSLv2}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {689--706}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/aviram}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/AviramSSHDSVAHD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BartosSF16, author = {Karel Bartos and Michal Sofka and Vojtech Franc}, editor = {Thorsten Holz and Stefan Savage}, title = {Optimized Invariant Representation of Network Traffic for Detecting Unseen Malware Variants}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {807--822}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/bartos}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/BartosSF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BashirARW16, author = {Muhammad Ahmad Bashir and Sajjad Arshad and William K. Robertson and Christo Wilson}, editor = {Thorsten Holz and Stefan Savage}, title = {Tracing Information Flows Between Ad Exchanges Using Retargeted Ads}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {481--496}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/bashir}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/BashirARW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BiryukovK16, author = {Alex Biryukov and Dmitry Khovratovich}, editor = {Thorsten Holz and Stefan Savage}, title = {Egalitarian Computing}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {315--326}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/biryukov}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/BiryukovK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/CaoQWDKM16, author = {Yue Cao and Zhiyun Qian and Zhongjie Wang and Tuan Dao and Srikanth V. Krishnamurthy and Lisa M. Marvel}, editor = {Thorsten Holz and Stefan Savage}, title = {Off-Path {TCP} Exploits: Global Rate Limit Considered Dangerous}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {209--225}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/cao}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/CaoQWDKM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/CarliniMVZSSWZ16, author = {Nicholas Carlini and Pratyush Mishra and Tavish Vaidya and Yuankai Zhang and Micah Sherr and Clay Shields and David A. Wagner and Wenchao Zhou}, editor = {Thorsten Holz and Stefan Savage}, title = {Hidden Voice Commands}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {513--530}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/carlini}, timestamp = {Mon, 15 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/CarliniMVZSSWZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/CaselliZASK16, author = {Marco Caselli and Emmanuele Zambon and Johanna Amann and Robin Sommer and Frank Kargl}, editor = {Thorsten Holz and Stefan Savage}, title = {Specification Mining for Intrusion Detection in Networked Control Systems}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {791--806}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/caselli}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/CaselliZASK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ChoS16, author = {Kyong{-}Tak Cho and Kang G. Shin}, editor = {Thorsten Holz and Stefan Savage}, title = {Fingerprinting Electronic Control Units for Vehicle Intrusion Detection}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {911--927}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/cho}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/ChoS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/CostanLD16, author = {Victor Costan and Ilia A. Lebedev and Srinivas Devadas}, editor = {Thorsten Holz and Stefan Savage}, title = {Sanctum: Minimal Hardware Extensions for Strong Software Isolation}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {857--874}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/costan}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/CostanLD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/CristalliPGLB16, author = {Stefano Cristalli and Mattia Pagnozzi and Mariano Graziano and Andrea Lanzi and Davide Balzarotti}, editor = {Thorsten Holz and Stefan Savage}, title = {Micro-Virtualization Memory Tracing to Detect and Prevent Spraying Attacks}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {431--446}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/stefano}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/CristalliPGLB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/DechandSBAF016, author = {Sergej Dechand and Dominik Sch{\"{u}}rmann and Karoline Busse and Yasemin Acar and Sascha Fahl and Matthew Smith}, editor = {Thorsten Holz and Stefan Savage}, title = {An Empirical Study of Textual Key-Fingerprint Representations}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {193--208}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/dechand}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/DechandSBAF016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/DowlingSZ16, author = {Benjamin Dowling and Douglas Stebila and Greg Zaverucha}, editor = {Thorsten Holz and Stefan Savage}, title = {Authenticated Network Time Synchronization}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {823--840}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/dowling}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/DowlingSZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/DuYLDZ16, author = {Kun Du and Hao Yang and Zhou Li and Hai{-}Xin Duan and Kehuan Zhang}, editor = {Thorsten Holz and Stefan Savage}, title = {The Ever-Changing Labyrinth: {A} Large-Scale Analysis of Wildcard {DNS} Powered Blackhat {SEO}}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {245--262}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/du}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/DuYLDZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ElniketyMV0D16, author = {Eslam Elnikety and Aastha Mehta and Anjo Vahldiek{-}Oberwagner and Deepak Garg and Peter Druschel}, editor = {Thorsten Holz and Stefan Savage}, title = {Thoth: Comprehensive Policy Compliance in Data Retrieval Systems}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {637--654}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/elnikety}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/ElniketyMV0D16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/FawazKS16, author = {Kassem Fawaz and Kyu{-}Han Kim and Kang G. Shin}, editor = {Thorsten Holz and Stefan Savage}, title = {Protecting Privacy of {BLE} Device Users}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {1205--1221}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/fawaz}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/FawazKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/FernandesPRSCP16, author = {Earlence Fernandes and Justin Paupore and Amir Rahmati and Daniel Simionato and Mauro Conti and Atul Prakash}, editor = {Thorsten Holz and Stefan Savage}, title = {FlowFence: Practical Data Protection for Emerging IoT Application Frameworks}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {531--548}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/fernandes}, timestamp = {Wed, 12 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/FernandesPRSCP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GarciaOKP16, author = {Flavio D. Garcia and David F. Oswald and Timo Kasper and Pierre Pavlid{\`{e}}s}, editor = {Thorsten Holz and Stefan Savage}, title = {Lock It and Still Lose It - on the (In)Security of Automotive Remote Keyless Entry Systems}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/garcia}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/GarciaOKP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Garman0KMR16, author = {Christina Garman and Matthew Green and Gabriel Kaptchuk and Ian Miers and Michael Rushanan}, editor = {Thorsten Holz and Stefan Savage}, title = {Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {655--672}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/garman}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/Garman0KMR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GiacomelliMO16, author = {Irene Giacomelli and Jesper Madsen and Claudio Orlandi}, editor = {Thorsten Holz and Stefan Savage}, title = {ZKBoo: Faster Zero-Knowledge for Boolean Circuits}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {1069--1083}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/giacomelli}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/GiacomelliMO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GoethemVPJ16, author = {Tom van Goethem and Mathy Vanhoef and Frank Piessens and Wouter Joosen}, editor = {Thorsten Holz and Stefan Savage}, title = {Request and Conquer: Exposing Cross-Origin Resource Size}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {447--462}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/goethem}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/GoethemVPJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GoktasGKAPGB16, author = {Enes G{\"{o}}ktas and Robert Gawlik and Benjamin Kollenda and Elias Athanasopoulos and Georgios Portokalidis and Cristiano Giuffrida and Herbert Bos}, editor = {Thorsten Holz and Stefan Savage}, title = {Undermining Information Hiding (and What to Do about It)}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {105--119}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/goktas}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/GoktasGKAPGB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GongL16, author = {Neil Zhenqiang Gong and Bin Liu}, editor = {Thorsten Holz and Stefan Savage}, title = {You Are Who You Know and How You Behave: Attribute Inference Attacks via Users' Social Friends and Behaviors}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {979--995}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/gong}, timestamp = {Sat, 01 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/GongL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HayesD16, author = {Jamie Hayes and George Danezis}, editor = {Thorsten Holz and Stefan Savage}, title = {k-fingerprinting: {A} Robust Scalable Website Fingerprinting Technique}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {1187--1203}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/hayes}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/HayesD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/JanaKRR16, author = {Suman Jana and Yuan Jochen Kang and Samuel Roth and Baishakhi Ray}, editor = {Thorsten Holz and Stefan Savage}, title = {Automatically Detecting Error Handling Bugs Using Error Specifications}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {345--362}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/jana}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/JanaKRR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/JiaMTS16, author = {Yaoqi Jia and Tarik Moataz and Shruti Tople and Prateek Saxena}, editor = {Thorsten Holz and Stefan Savage}, title = {OblivP2P: An Oblivious Peer-to-Peer Content Sharing System}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {945--962}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/jia}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/JiaMTS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KharrazAMRK16, author = {Amin Kharraz and Sajjad Arshad and Collin Mulliner and William K. Robertson and Engin Kirda}, editor = {Thorsten Holz and Stefan Savage}, title = {{UNVEIL:} {A} Large-Scale, Automated Approach to Detecting Ransomware}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {757--772}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/kharaz}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/KharrazAMRK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KohlbrennerS16, author = {David Kohlbrenner and Hovav Shacham}, editor = {Thorsten Holz and Stefan Savage}, title = {Trusted Browsers for Uncertain Times}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {463--480}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/kohlbrenner}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/KohlbrennerS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Kokoris-KogiasJ16, author = {Eleftherios Kokoris{-}Kogias and Philipp Jovanovic and Nicolas Gailly and Ismail Khoffi and Linus Gasser and Bryan Ford}, editor = {Thorsten Holz and Stefan Savage}, title = {Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {279--296}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/kogias}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/Kokoris-KogiasJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KotziasBC16, author = {Platon Kotzias and Leyla Bilge and Juan Caballero}, editor = {Thorsten Holz and Stefan Savage}, title = {Measuring {PUP} Prevalence and {PUP} Distribution through Pay-Per-Install Services}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {739--756}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/kotzias}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/KotziasBC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LernerSKR16, author = {Ada Lerner and Anna Kornfeld Simpson and Tadayoshi Kohno and Franziska Roesner}, editor = {Thorsten Holz and Stefan Savage}, title = {Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/lerner}, timestamp = {Thu, 18 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/LernerSKR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LiDCKBMSP16, author = {Frank Li and Zakir Durumeric and Jakub Czyz and Mohammad Karami and Michael D. Bailey and Damon McCoy and Stefan Savage and Vern Paxson}, editor = {Thorsten Holz and Stefan Savage}, title = {You've Got Vulnerability: Exploring Effective Vulnerability Notifications}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {1033--1050}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/li}, timestamp = {Thu, 26 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/LiDCKBMSP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LippGSMM16, author = {Moritz Lipp and Daniel Gruss and Raphael Spreitzer and Cl{\'{e}}mentine Maurice and Stefan Mangard}, editor = {Thorsten Holz and Stefan Savage}, title = {ARMageddon: Cache Attacks on Mobile Devices}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {549--564}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/lipp}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/LippGSMM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Maisuradze0R16, author = {Giorgi Maisuradze and Michael Backes and Christian Rossow}, editor = {Thorsten Holz and Stefan Savage}, title = {What Cannot Be Read, Cannot Be Leveraged? Revisiting Assumptions of {JIT-ROP} Defenses}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {139--156}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/maisuradze}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/Maisuradze0R16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MelicherUSKBCC16, author = {William Melicher and Blase Ur and Sean M. Segreti and Saranga Komanduri and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor}, editor = {Thorsten Holz and Stefan Savage}, title = {Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {175--191}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/melicher}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/MelicherUSKBCC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/NadkarniAEJ16, author = {Adwait Nadkarni and Benjamin Andow and William Enck and Somesh Jha}, editor = {Thorsten Holz and Stefan Savage}, title = {Practical {DIFC} Enforcement on Android}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {1119--1136}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/nadkarni}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/NadkarniAEJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/NakiblySR16, author = {Gabi Nakibly and Jaime Schcolnik and Yossi Rubin}, editor = {Thorsten Holz and Stefan Savage}, title = {Website-Targeted False Content Injection by Network Operators}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {227--244}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/nakibly}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/NakiblySR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/NelmsPAA16, author = {Terry Nelms and Roberto Perdisci and Manos Antonakakis and Mustaque Ahamad}, editor = {Thorsten Holz and Stefan Savage}, title = {Towards Measuring and Mitigating Social Engineering Software Download Attacks}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {773--789}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/nelms}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/NelmsPAA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/OhrimenkoSFMNVC16, author = {Olga Ohrimenko and Felix Schuster and C{\'{e}}dric Fournet and Aastha Mehta and Sebastian Nowozin and Kapil Vaswani and Manuel Costa}, editor = {Thorsten Holz and Stefan Savage}, title = {Oblivious Multi-Party Machine Learning on Trusted Processors}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {619--636}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/ohrimenko}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/OhrimenkoSFMNVC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/OikonomopoulosA16, author = {Angelos Oikonomopoulos and Elias Athanasopoulos and Herbert Bos and Cristiano Giuffrida}, editor = {Thorsten Holz and Stefan Savage}, title = {Poking Holes in Information Hiding}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {121--138}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/oikonomopoulos}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/OikonomopoulosA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/PesslGMSM16, author = {Peter Pessl and Daniel Gruss and Cl{\'{e}}mentine Maurice and Michael Schwarz and Stefan Mangard}, editor = {Thorsten Holz and Stefan Savage}, title = {{DRAMA:} Exploiting {DRAM} Addressing for Cross-CPU Attacks}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {565--581}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/pessl}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/PesslGMSM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/PlohmannYKBG16, author = {Daniel Plohmann and Khaled Yakdan and Michael Klatt and Johannes Bader and Elmar Gerhards{-}Padilla}, editor = {Thorsten Holz and Stefan Savage}, title = {A Comprehensive Measurement Study of Domain Generating Malware}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {263--278}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/plohmann}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/PlohmannYKBG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RajSWACEFKLMNRS16, author = {Himanshu Raj and Stefan Saroiu and Alec Wolman and Ronald Aigner and Jeremiah Cox and Paul England and Chris Fenner and Kinshuman Kinshumann and Jork L{\"{o}}ser and Dennis Mattoon and Magnus Nystr{\"{o}}m and David Robinson and Rob Spiger and Stefan Thom and David Wooten}, editor = {Thorsten Holz and Stefan Savage}, title = {fTPM: {A} Software-Only Implementation of a {TPM} Chip}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {841--856}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/raj}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/RajSWACEFKLMNRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RaneLT16, author = {Ashay Rane and Calvin Lin and Mohit Tiwari}, editor = {Thorsten Holz and Stefan Savage}, title = {Secure, Precise, and Fast Floating-Point Operations on x86 Processors}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {71--86}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/rane}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/RaneLT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RazaviGBPGB16, author = {Kaveh Razavi and Ben Gras and Erik Bosman and Bart Preneel and Cristiano Giuffrida and Herbert Bos}, editor = {Thorsten Holz and Stefan Savage}, title = {Flip Feng Shui: Hammering a Needle in the Software Stack}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {1--18}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/razavi}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/RazaviGBPGB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ReavesBT16, author = {Bradley Reaves and Logan Blue and Patrick Traynor}, editor = {Thorsten Holz and Stefan Savage}, title = {AuthLoop: End-to-End Cryptographic Authentication for Telephony over Voice Channels}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {963--978}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/reaves}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/ReavesBT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RindalR16, author = {Peter Rindal and Mike Rosulek}, editor = {Thorsten Holz and Stefan Savage}, title = {Faster Malicious 2-Party Secure Computation with Online/Offline Dual Execution}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {297--314}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/rindal}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/RindalR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SaltaformaggioB16, author = {Brendan Saltaformaggio and Rohit Bhatia and Xiangyu Zhang and Dongyan Xu and Golden G. Richard III}, editor = {Thorsten Holz and Stefan Savage}, title = {Screen after Previous Screens: Spatial-Temporal Recreation of Android App Displays from Memory Images}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {1137--1151}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/saltaformaggio}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/SaltaformaggioB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SongCKKKK16, author = {WonJun Song and Hyunwoo Choi and Junhong Kim and Eunsoo Kim and Yongdae Kim and John Kim}, editor = {Thorsten Holz and Stefan Savage}, title = {PIkit: {A} New Kernel-Independent Processor-Interconnect Rootkit}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {37--51}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/song}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/SongCKKKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/StockPRJ016, author = {Ben Stock and Giancarlo Pellegrino and Christian Rossow and Martin Johns and Michael Backes}, editor = {Thorsten Holz and Stefan Savage}, title = {Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {1015--1032}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/stock}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/StockPRJ016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/StrackxP16, author = {Raoul Strackx and Frank Piessens}, editor = {Thorsten Holz and Stefan Savage}, title = {Ariadne: {A} Minimal Approach to State Continuity}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {875--892}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/strackx}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/StrackxP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SvendaNSKFKM16, author = {Petr Svenda and Mat{\'{u}}s Nemec and Peter Sekan and Rudolf Kvasnovsk{\'{y}} and David Form{\'{a}}nek and David Kom{\'{a}}rek and Vashek Maty{\'{a}}s}, editor = {Thorsten Holz and Stefan Savage}, title = {The Million-Key Question - Investigating the Origins of {RSA} Public Keys}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {893--910}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/svenda}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/SvendaNSKFKM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ThomasCRPPDSTTC16, author = {Kurt Thomas and Juan A. Elices Crespo and Ryan Rasti and Jean Michel Picod and Cait Phillips and Marc{-}Andr{\'{e}} Decoste and Chris Sharp and Fabio Tirelo and Ali Tofigh and Marc{-}Antoine Courteau and Lucas Ballard and Robert Shield and Nav Jagpal and Moheeb Abu Rajab and Panayiotis Mavrommatis and Niels Provos and Elie Bursztein and Damon McCoy}, editor = {Thorsten Holz and Stefan Savage}, title = {Investigating Commercial Pay-Per-Install and the Distribution of Unwanted Software}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {721--739}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/thomas}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/ThomasCRPPDSTTC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/TianSBBT16, author = {Dave (Jing) Tian and Nolen Scaife and Adam Bates and Kevin R. B. Butler and Patrick Traynor}, editor = {Thorsten Holz and Stefan Savage}, title = {Making {USB} Great Again with {USBFILTER}}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {415--430}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/tian}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/TianSBBT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Torres-AriasACC16, author = {Santiago Torres{-}Arias and Anil Kumar Ammula and Reza Curtmola and Justin Cappos}, editor = {Thorsten Holz and Stefan Savage}, title = {On Omitting Commits and Committing Omissions: Preventing Git Metadata Tampering That (Re)introduces Software Vulnerabilities}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {379--395}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/torres-arias}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/Torres-AriasACC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/TramerZJRR16, author = {Florian Tram{\`{e}}r and Fan Zhang and Ari Juels and Michael K. Reiter and Thomas Ristenpart}, editor = {Thorsten Holz and Stefan Savage}, title = {Stealing Machine Learning Models via Prediction APIs}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {601--618}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/tramer}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/TramerZJRR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/VanhoefP16, author = {Mathy Vanhoef and Frank Piessens}, editor = {Thorsten Holz and Stefan Savage}, title = {Predicting, Decrypting, and Abusing {WPA2/802.11} Group Keys}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {673--688}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/vanhoef}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/VanhoefP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/VasudevanCMJD16, author = {Amit Vasudevan and Sagar Chaki and Petros Maniatis and Limin Jia and Anupam Datta}, editor = {Thorsten Holz and Stefan Savage}, title = {{\"{u}}berSpark: Enforcing Verifiable Object Abstractions for Automated Compositional Security Analysis of a Hypervisor}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {87--104}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/vasudevan}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/VasudevanCMJD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Wheeler16, author = {Daniel Lowe Wheeler}, editor = {Thorsten Holz and Stefan Savage}, title = {zxcvbn: Low-Budget Password Strength Estimation}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {157--173}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/wheeler}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/Wheeler16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WinterELF16, author = {Philipp Winter and Roya Ensafi and Karsten Loesing and Nick Feamster}, editor = {Thorsten Holz and Stefan Savage}, title = {Identifying and Characterizing Sybils in the Tor Network}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {1169--1185}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/winter}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/WinterELF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/XiaoZZT16, author = {Yuan Xiao and Xiaokuan Zhang and Yinqian Zhang and Radu Teodorescu}, editor = {Thorsten Holz and Stefan Savage}, title = {One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {19--35}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/xiao}, timestamp = {Tue, 23 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/XiaoZZT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/XuPFM16, author = {Yi Xu and True Price and Jan{-}Michael Frahm and Fabian Monrose}, editor = {Thorsten Holz and Stefan Savage}, title = {Virtual {U:} Defeating Face Liveness Detection by Building Virtual Models from Your Public Photos}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {497--512}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/xu}, timestamp = {Fri, 03 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/XuPFM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/YunMSJKN16, author = {Insu Yun and Changwoo Min and Xujie Si and Yeongjin Jang and Taesoo Kim and Mayur Naik}, editor = {Thorsten Holz and Stefan Savage}, title = {APISan: Sanitizing {API} Usages through Semantic Cross-Checking}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {363--378}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/yun}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/YunMSJKN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ZhangKP16, author = {Yupeng Zhang and Jonathan Katz and Charalampos Papamanthou}, editor = {Thorsten Holz and Stefan Savage}, title = {All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {707--720}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/zhang}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/ZhangKP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ZhuHKS16, author = {Ruiyu Zhu and Yan Huang and Jonathan Katz and Abhi Shelat}, editor = {Thorsten Holz and Stefan Savage}, title = {The Cut-and-Choose Game and Its Application to Cryptographic Protocols}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {1085--1100}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/zhu}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/ZhuHKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/uss/2016, editor = {Thorsten Holz and Stefan Savage}, title = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.