Search dblp for Publications

export results for "toc:db/conf/uss/uss2016.bht:"

 download as .bib file

@inproceedings{DBLP:conf/uss/0001BDMOW16,
  author       = {Michael Backes and
                  Sven Bugiel and
                  Erik Derr and
                  Patrick D. McDaniel and
                  Damien Octeau and
                  Sebastian Weisgerber},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {On Demystifying the Android Application Framework: Re-Visiting Android
                  Permission Specification Analysis},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {1101--1118},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/backes\_android},
  timestamp    = {Mon, 01 Feb 2021 08:43:18 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/0001BDMOW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/0001BHHKM16,
  author       = {Michael Backes and
                  Pascal Berrang and
                  Anna Hecksteden and
                  Mathias Humbert and
                  Andreas Keller and
                  Tim Meyer},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression
                  Profiles},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {1223--1240},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/backes\_epigenetics},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/0001BHHKM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AaferZD16,
  author       = {Yousra Aafer and
                  Xiao Zhang and
                  Wenliang Du},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Harvesting Inconsistent Security Configurations in Custom Android
                  ROMs via Differential Analysis},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {1153--1168},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/aafer},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/AaferZD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AlkimDPS16,
  author       = {Erdem Alkim and
                  L{\'{e}}o Ducas and
                  Thomas P{\"{o}}ppelmann and
                  Peter Schwabe},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Post-quantum Key Exchange - {A} New Hope},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {327--343},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/alkim},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/AlkimDPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AlmeidaBBDE16,
  author       = {Jos{\'{e}} Bacelar Almeida and
                  Manuel Barbosa and
                  Gilles Barthe and
                  Fran{\c{c}}ois Dupressoir and
                  Michael Emmi},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Verifying Constant-Time Implementations},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {53--70},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/almeida},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/AlmeidaBBDE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AndriesseCVSB16,
  author       = {Dennis Andriesse and
                  Xi Chen and
                  Victor van der Veen and
                  Asia Slowinska and
                  Herbert Bos},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {583--600},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/andriesse},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/AndriesseCVSB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AngelWHLSSBW16,
  author       = {Sebastian Angel and
                  Riad S. Wahby and
                  Max Howald and
                  Joshua B. Leners and
                  Michael Spilo and
                  Zhen Sun and
                  Andrew J. Blumberg and
                  Michael Walfish},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Defending against Malicious Peripherals with Cinch},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {397--414},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/angel},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/AngelWHLSSBW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ArmknechtBBK16,
  author       = {Frederik Armknecht and
                  Ludovic Barman and
                  Jens{-}Matthias Bohli and
                  Ghassan O. Karame},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Mirror: Enabling Proofs of Data Replication and Retrievability in
                  the Cloud},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {1051--1068},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/armknecht},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ArmknechtBBK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AviramSSHDSVAHD16,
  author       = {Nimrod Aviram and
                  Sebastian Schinzel and
                  Juraj Somorovsky and
                  Nadia Heninger and
                  Maik Dankel and
                  Jens Steube and
                  Luke Valenta and
                  David Adrian and
                  J. Alex Halderman and
                  Viktor Dukhovni and
                  Emilia K{\"{a}}sper and
                  Shaanan Cohney and
                  Susanne Engels and
                  Christof Paar and
                  Yuval Shavitt},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {{DROWN:} Breaking {TLS} Using SSLv2},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {689--706},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/aviram},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/AviramSSHDSVAHD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BartosSF16,
  author       = {Karel Bartos and
                  Michal Sofka and
                  Vojtech Franc},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Optimized Invariant Representation of Network Traffic for Detecting
                  Unseen Malware Variants},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {807--822},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/bartos},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BartosSF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BashirARW16,
  author       = {Muhammad Ahmad Bashir and
                  Sajjad Arshad and
                  William K. Robertson and
                  Christo Wilson},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Tracing Information Flows Between Ad Exchanges Using Retargeted Ads},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {481--496},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/bashir},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BashirARW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BiryukovK16,
  author       = {Alex Biryukov and
                  Dmitry Khovratovich},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Egalitarian Computing},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {315--326},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/biryukov},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BiryukovK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/CaoQWDKM16,
  author       = {Yue Cao and
                  Zhiyun Qian and
                  Zhongjie Wang and
                  Tuan Dao and
                  Srikanth V. Krishnamurthy and
                  Lisa M. Marvel},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Off-Path {TCP} Exploits: Global Rate Limit Considered Dangerous},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {209--225},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/cao},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/CaoQWDKM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/CarliniMVZSSWZ16,
  author       = {Nicholas Carlini and
                  Pratyush Mishra and
                  Tavish Vaidya and
                  Yuankai Zhang and
                  Micah Sherr and
                  Clay Shields and
                  David A. Wagner and
                  Wenchao Zhou},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Hidden Voice Commands},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {513--530},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/carlini},
  timestamp    = {Mon, 15 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/CarliniMVZSSWZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/CaselliZASK16,
  author       = {Marco Caselli and
                  Emmanuele Zambon and
                  Johanna Amann and
                  Robin Sommer and
                  Frank Kargl},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Specification Mining for Intrusion Detection in Networked Control
                  Systems},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {791--806},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/caselli},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/CaselliZASK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ChoS16,
  author       = {Kyong{-}Tak Cho and
                  Kang G. Shin},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Fingerprinting Electronic Control Units for Vehicle Intrusion Detection},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {911--927},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/cho},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ChoS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/CostanLD16,
  author       = {Victor Costan and
                  Ilia A. Lebedev and
                  Srinivas Devadas},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Sanctum: Minimal Hardware Extensions for Strong Software Isolation},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {857--874},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/costan},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/CostanLD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/CristalliPGLB16,
  author       = {Stefano Cristalli and
                  Mattia Pagnozzi and
                  Mariano Graziano and
                  Andrea Lanzi and
                  Davide Balzarotti},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Micro-Virtualization Memory Tracing to Detect and Prevent Spraying
                  Attacks},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {431--446},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/stefano},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/CristalliPGLB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/DechandSBAF016,
  author       = {Sergej Dechand and
                  Dominik Sch{\"{u}}rmann and
                  Karoline Busse and
                  Yasemin Acar and
                  Sascha Fahl and
                  Matthew Smith},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {An Empirical Study of Textual Key-Fingerprint Representations},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {193--208},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/dechand},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/DechandSBAF016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/DowlingSZ16,
  author       = {Benjamin Dowling and
                  Douglas Stebila and
                  Greg Zaverucha},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Authenticated Network Time Synchronization},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {823--840},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/dowling},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/DowlingSZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/DuYLDZ16,
  author       = {Kun Du and
                  Hao Yang and
                  Zhou Li and
                  Hai{-}Xin Duan and
                  Kehuan Zhang},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {The Ever-Changing Labyrinth: {A} Large-Scale Analysis of Wildcard
                  {DNS} Powered Blackhat {SEO}},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {245--262},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/du},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/DuYLDZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ElniketyMV0D16,
  author       = {Eslam Elnikety and
                  Aastha Mehta and
                  Anjo Vahldiek{-}Oberwagner and
                  Deepak Garg and
                  Peter Druschel},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Thoth: Comprehensive Policy Compliance in Data Retrieval Systems},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {637--654},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/elnikety},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ElniketyMV0D16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/FawazKS16,
  author       = {Kassem Fawaz and
                  Kyu{-}Han Kim and
                  Kang G. Shin},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Protecting Privacy of {BLE} Device Users},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {1205--1221},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/fawaz},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/FawazKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/FernandesPRSCP16,
  author       = {Earlence Fernandes and
                  Justin Paupore and
                  Amir Rahmati and
                  Daniel Simionato and
                  Mauro Conti and
                  Atul Prakash},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {FlowFence: Practical Data Protection for Emerging IoT Application
                  Frameworks},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {531--548},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/fernandes},
  timestamp    = {Wed, 12 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/FernandesPRSCP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GarciaOKP16,
  author       = {Flavio D. Garcia and
                  David F. Oswald and
                  Timo Kasper and
                  Pierre Pavlid{\`{e}}s},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Lock It and Still Lose It - on the (In)Security of Automotive Remote
                  Keyless Entry Systems},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/garcia},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/GarciaOKP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Garman0KMR16,
  author       = {Christina Garman and
                  Matthew Green and
                  Gabriel Kaptchuk and
                  Ian Miers and
                  Michael Rushanan},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple
                  iMessage},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {655--672},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/garman},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Garman0KMR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GiacomelliMO16,
  author       = {Irene Giacomelli and
                  Jesper Madsen and
                  Claudio Orlandi},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {ZKBoo: Faster Zero-Knowledge for Boolean Circuits},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {1069--1083},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/giacomelli},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/GiacomelliMO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GoethemVPJ16,
  author       = {Tom van Goethem and
                  Mathy Vanhoef and
                  Frank Piessens and
                  Wouter Joosen},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Request and Conquer: Exposing Cross-Origin Resource Size},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {447--462},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/goethem},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/GoethemVPJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GoktasGKAPGB16,
  author       = {Enes G{\"{o}}ktas and
                  Robert Gawlik and
                  Benjamin Kollenda and
                  Elias Athanasopoulos and
                  Georgios Portokalidis and
                  Cristiano Giuffrida and
                  Herbert Bos},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Undermining Information Hiding (and What to Do about It)},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {105--119},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/goktas},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/GoktasGKAPGB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GongL16,
  author       = {Neil Zhenqiang Gong and
                  Bin Liu},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {You Are Who You Know and How You Behave: Attribute Inference Attacks
                  via Users' Social Friends and Behaviors},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {979--995},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/gong},
  timestamp    = {Sat, 01 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/GongL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HayesD16,
  author       = {Jamie Hayes and
                  George Danezis},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {k-fingerprinting: {A} Robust Scalable Website Fingerprinting Technique},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {1187--1203},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/hayes},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/HayesD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JanaKRR16,
  author       = {Suman Jana and
                  Yuan Jochen Kang and
                  Samuel Roth and
                  Baishakhi Ray},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Automatically Detecting Error Handling Bugs Using Error Specifications},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {345--362},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/jana},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/JanaKRR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JiaMTS16,
  author       = {Yaoqi Jia and
                  Tarik Moataz and
                  Shruti Tople and
                  Prateek Saxena},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {OblivP2P: An Oblivious Peer-to-Peer Content Sharing System},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {945--962},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/jia},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/JiaMTS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KharrazAMRK16,
  author       = {Amin Kharraz and
                  Sajjad Arshad and
                  Collin Mulliner and
                  William K. Robertson and
                  Engin Kirda},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {{UNVEIL:} {A} Large-Scale, Automated Approach to Detecting Ransomware},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {757--772},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/kharaz},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/KharrazAMRK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KohlbrennerS16,
  author       = {David Kohlbrenner and
                  Hovav Shacham},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Trusted Browsers for Uncertain Times},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {463--480},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/kohlbrenner},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/KohlbrennerS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Kokoris-KogiasJ16,
  author       = {Eleftherios Kokoris{-}Kogias and
                  Philipp Jovanovic and
                  Nicolas Gailly and
                  Ismail Khoffi and
                  Linus Gasser and
                  Bryan Ford},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Enhancing Bitcoin Security and Performance with Strong Consistency
                  via Collective Signing},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {279--296},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/kogias},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Kokoris-KogiasJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KotziasBC16,
  author       = {Platon Kotzias and
                  Leyla Bilge and
                  Juan Caballero},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Measuring {PUP} Prevalence and {PUP} Distribution through Pay-Per-Install
                  Services},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {739--756},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/kotzias},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/KotziasBC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LernerSKR16,
  author       = {Ada Lerner and
                  Anna Kornfeld Simpson and
                  Tadayoshi Kohno and
                  Franziska Roesner},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Internet Jones and the Raiders of the Lost Trackers: An Archaeological
                  Study of Web Tracking from 1996 to 2016},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/lerner},
  timestamp    = {Thu, 18 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/LernerSKR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LiDCKBMSP16,
  author       = {Frank Li and
                  Zakir Durumeric and
                  Jakub Czyz and
                  Mohammad Karami and
                  Michael D. Bailey and
                  Damon McCoy and
                  Stefan Savage and
                  Vern Paxson},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {You've Got Vulnerability: Exploring Effective Vulnerability Notifications},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {1033--1050},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/li},
  timestamp    = {Thu, 26 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/LiDCKBMSP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LippGSMM16,
  author       = {Moritz Lipp and
                  Daniel Gruss and
                  Raphael Spreitzer and
                  Cl{\'{e}}mentine Maurice and
                  Stefan Mangard},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {ARMageddon: Cache Attacks on Mobile Devices},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {549--564},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/lipp},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/LippGSMM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Maisuradze0R16,
  author       = {Giorgi Maisuradze and
                  Michael Backes and
                  Christian Rossow},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {What Cannot Be Read, Cannot Be Leveraged? Revisiting Assumptions of
                  {JIT-ROP} Defenses},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {139--156},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/maisuradze},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Maisuradze0R16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MelicherUSKBCC16,
  author       = {William Melicher and
                  Blase Ur and
                  Sean M. Segreti and
                  Saranga Komanduri and
                  Lujo Bauer and
                  Nicolas Christin and
                  Lorrie Faith Cranor},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Fast, Lean, and Accurate: Modeling Password Guessability Using Neural
                  Networks},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {175--191},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/melicher},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/MelicherUSKBCC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/NadkarniAEJ16,
  author       = {Adwait Nadkarni and
                  Benjamin Andow and
                  William Enck and
                  Somesh Jha},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Practical {DIFC} Enforcement on Android},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {1119--1136},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/nadkarni},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/NadkarniAEJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/NakiblySR16,
  author       = {Gabi Nakibly and
                  Jaime Schcolnik and
                  Yossi Rubin},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Website-Targeted False Content Injection by Network Operators},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {227--244},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/nakibly},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/NakiblySR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/NelmsPAA16,
  author       = {Terry Nelms and
                  Roberto Perdisci and
                  Manos Antonakakis and
                  Mustaque Ahamad},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Towards Measuring and Mitigating Social Engineering Software Download
                  Attacks},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {773--789},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/nelms},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/NelmsPAA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/OhrimenkoSFMNVC16,
  author       = {Olga Ohrimenko and
                  Felix Schuster and
                  C{\'{e}}dric Fournet and
                  Aastha Mehta and
                  Sebastian Nowozin and
                  Kapil Vaswani and
                  Manuel Costa},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Oblivious Multi-Party Machine Learning on Trusted Processors},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {619--636},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/ohrimenko},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/OhrimenkoSFMNVC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/OikonomopoulosA16,
  author       = {Angelos Oikonomopoulos and
                  Elias Athanasopoulos and
                  Herbert Bos and
                  Cristiano Giuffrida},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Poking Holes in Information Hiding},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {121--138},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/oikonomopoulos},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/OikonomopoulosA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/PesslGMSM16,
  author       = {Peter Pessl and
                  Daniel Gruss and
                  Cl{\'{e}}mentine Maurice and
                  Michael Schwarz and
                  Stefan Mangard},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {{DRAMA:} Exploiting {DRAM} Addressing for Cross-CPU Attacks},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {565--581},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/pessl},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/PesslGMSM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/PlohmannYKBG16,
  author       = {Daniel Plohmann and
                  Khaled Yakdan and
                  Michael Klatt and
                  Johannes Bader and
                  Elmar Gerhards{-}Padilla},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {A Comprehensive Measurement Study of Domain Generating Malware},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {263--278},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/plohmann},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/PlohmannYKBG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RajSWACEFKLMNRS16,
  author       = {Himanshu Raj and
                  Stefan Saroiu and
                  Alec Wolman and
                  Ronald Aigner and
                  Jeremiah Cox and
                  Paul England and
                  Chris Fenner and
                  Kinshuman Kinshumann and
                  Jork L{\"{o}}ser and
                  Dennis Mattoon and
                  Magnus Nystr{\"{o}}m and
                  David Robinson and
                  Rob Spiger and
                  Stefan Thom and
                  David Wooten},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {fTPM: {A} Software-Only Implementation of a {TPM} Chip},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {841--856},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/raj},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/RajSWACEFKLMNRS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RaneLT16,
  author       = {Ashay Rane and
                  Calvin Lin and
                  Mohit Tiwari},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Secure, Precise, and Fast Floating-Point Operations on x86 Processors},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {71--86},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/rane},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/RaneLT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RazaviGBPGB16,
  author       = {Kaveh Razavi and
                  Ben Gras and
                  Erik Bosman and
                  Bart Preneel and
                  Cristiano Giuffrida and
                  Herbert Bos},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Flip Feng Shui: Hammering a Needle in the Software Stack},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {1--18},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/razavi},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/RazaviGBPGB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ReavesBT16,
  author       = {Bradley Reaves and
                  Logan Blue and
                  Patrick Traynor},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {AuthLoop: End-to-End Cryptographic Authentication for Telephony over
                  Voice Channels},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {963--978},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/reaves},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ReavesBT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RindalR16,
  author       = {Peter Rindal and
                  Mike Rosulek},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Faster Malicious 2-Party Secure Computation with Online/Offline Dual
                  Execution},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {297--314},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/rindal},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/RindalR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SaltaformaggioB16,
  author       = {Brendan Saltaformaggio and
                  Rohit Bhatia and
                  Xiangyu Zhang and
                  Dongyan Xu and
                  Golden G. Richard III},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Screen after Previous Screens: Spatial-Temporal Recreation of Android
                  App Displays from Memory Images},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {1137--1151},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/saltaformaggio},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/SaltaformaggioB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SongCKKKK16,
  author       = {WonJun Song and
                  Hyunwoo Choi and
                  Junhong Kim and
                  Eunsoo Kim and
                  Yongdae Kim and
                  John Kim},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {PIkit: {A} New Kernel-Independent Processor-Interconnect Rootkit},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {37--51},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/song},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/SongCKKKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/StockPRJ016,
  author       = {Ben Stock and
                  Giancarlo Pellegrino and
                  Christian Rossow and
                  Martin Johns and
                  Michael Backes},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability
                  Notification},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {1015--1032},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/stock},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/StockPRJ016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/StrackxP16,
  author       = {Raoul Strackx and
                  Frank Piessens},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Ariadne: {A} Minimal Approach to State Continuity},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {875--892},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/strackx},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/StrackxP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SvendaNSKFKM16,
  author       = {Petr Svenda and
                  Mat{\'{u}}s Nemec and
                  Peter Sekan and
                  Rudolf Kvasnovsk{\'{y}} and
                  David Form{\'{a}}nek and
                  David Kom{\'{a}}rek and
                  Vashek Maty{\'{a}}s},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {The Million-Key Question - Investigating the Origins of {RSA} Public
                  Keys},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {893--910},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/svenda},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/SvendaNSKFKM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ThomasCRPPDSTTC16,
  author       = {Kurt Thomas and
                  Juan A. Elices Crespo and
                  Ryan Rasti and
                  Jean Michel Picod and
                  Cait Phillips and
                  Marc{-}Andr{\'{e}} Decoste and
                  Chris Sharp and
                  Fabio Tirelo and
                  Ali Tofigh and
                  Marc{-}Antoine Courteau and
                  Lucas Ballard and
                  Robert Shield and
                  Nav Jagpal and
                  Moheeb Abu Rajab and
                  Panayiotis Mavrommatis and
                  Niels Provos and
                  Elie Bursztein and
                  Damon McCoy},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Investigating Commercial Pay-Per-Install and the Distribution of Unwanted
                  Software},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {721--739},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/thomas},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ThomasCRPPDSTTC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/TianSBBT16,
  author       = {Dave (Jing) Tian and
                  Nolen Scaife and
                  Adam Bates and
                  Kevin R. B. Butler and
                  Patrick Traynor},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Making {USB} Great Again with {USBFILTER}},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {415--430},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/tian},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/TianSBBT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Torres-AriasACC16,
  author       = {Santiago Torres{-}Arias and
                  Anil Kumar Ammula and
                  Reza Curtmola and
                  Justin Cappos},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {On Omitting Commits and Committing Omissions: Preventing Git Metadata
                  Tampering That (Re)introduces Software Vulnerabilities},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {379--395},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/torres-arias},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Torres-AriasACC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/TramerZJRR16,
  author       = {Florian Tram{\`{e}}r and
                  Fan Zhang and
                  Ari Juels and
                  Michael K. Reiter and
                  Thomas Ristenpart},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Stealing Machine Learning Models via Prediction APIs},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {601--618},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/tramer},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/TramerZJRR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/VanhoefP16,
  author       = {Mathy Vanhoef and
                  Frank Piessens},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Predicting, Decrypting, and Abusing {WPA2/802.11} Group Keys},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {673--688},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/vanhoef},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/VanhoefP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/VasudevanCMJD16,
  author       = {Amit Vasudevan and
                  Sagar Chaki and
                  Petros Maniatis and
                  Limin Jia and
                  Anupam Datta},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {{\"{u}}berSpark: Enforcing Verifiable Object Abstractions for
                  Automated Compositional Security Analysis of a Hypervisor},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {87--104},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/vasudevan},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/VasudevanCMJD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Wheeler16,
  author       = {Daniel Lowe Wheeler},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {zxcvbn: Low-Budget Password Strength Estimation},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {157--173},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/wheeler},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Wheeler16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WinterELF16,
  author       = {Philipp Winter and
                  Roya Ensafi and
                  Karsten Loesing and
                  Nick Feamster},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Identifying and Characterizing Sybils in the Tor Network},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {1169--1185},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/winter},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/WinterELF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/XiaoZZT16,
  author       = {Yuan Xiao and
                  Xiaokuan Zhang and
                  Yinqian Zhang and
                  Radu Teodorescu},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege
                  Escalation},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {19--35},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/xiao},
  timestamp    = {Tue, 23 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/XiaoZZT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/XuPFM16,
  author       = {Yi Xu and
                  True Price and
                  Jan{-}Michael Frahm and
                  Fabian Monrose},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Virtual {U:} Defeating Face Liveness Detection by Building Virtual
                  Models from Your Public Photos},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {497--512},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/xu},
  timestamp    = {Fri, 03 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/XuPFM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/YunMSJKN16,
  author       = {Insu Yun and
                  Changwoo Min and
                  Xujie Si and
                  Yeongjin Jang and
                  Taesoo Kim and
                  Mayur Naik},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {APISan: Sanitizing {API} Usages through Semantic Cross-Checking},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {363--378},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/yun},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/YunMSJKN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ZhangKP16,
  author       = {Yupeng Zhang and
                  Jonathan Katz and
                  Charalampos Papamanthou},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {All Your Queries Are Belong to Us: The Power of File-Injection Attacks
                  on Searchable Encryption},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {707--720},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/zhang},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ZhangKP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ZhuHKS16,
  author       = {Ruiyu Zhu and
                  Yan Huang and
                  Jonathan Katz and
                  Abhi Shelat},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {The Cut-and-Choose Game and Its Application to Cryptographic Protocols},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {1085--1100},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/zhu},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ZhuHKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2016,
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics