:facetid:toc:\"db/conf/uss/uss2015.bht\"OK:facetid:toc:db/conf/uss/uss2015.bhtMichael Backes 0001Sven BugielChristian Hammer 0001Oliver SchranzPhilipp von Styp-RekowskyBoxify: Full-fledged App Sandboxing for Stock Android.USENIX Security Symposium691-7062015Conference and Workshop Papersopenconf/uss/0001B0SS15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/backeshttps://dblp.org/rec/conf/uss/0001B0SS15URL#3657615Kai Chen 0012Peng Wang 0088Yeonjoon LeeXiaoFeng Wang 0001Nan Zhang 0018Heqing HuangWei ZouPeng Liu 0005Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale.USENIX Security Symposium659-6742015Conference and Workshop Papersopenconf/uss/0012WLWZHZ015https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/chen-kaihttps://dblp.org/rec/conf/uss/0012WLWZHZ015URL#3657616Frederico AraujoKevin W. HamlenCompiler-instrumented, Dynamic Secret-Redaction of Legacy Processes for Attacker Deception.USENIX Security Symposium145-1592015Conference and Workshop Papersopenconf/uss/AraujoH15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/araujohttps://dblp.org/rec/conf/uss/AraujoH15URL#3657617Hadi AsghariMichael CiereMichel J. G. van EetenPost-Mortem of a Zombie: Conficker Cleanup After Six Years.USENIX Security Symposium1-162015Conference and Workshop Papersopenconf/uss/AsghariCE15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/asgharihttps://dblp.org/rec/conf/uss/AsghariCE15URL#3657618Adam Bates 0001Dave TianKevin R. B. ButlerThomas MoyerTrustworthy Whole-System Provenance for the Linux Kernel.USENIX Security Symposium319-3342015Conference and Workshop Papersopenconf/uss/BatesTBM15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/bateshttps://dblp.org/rec/conf/uss/BatesTBM15URL#3657619Lennart BeringerAdam PetcherKatherine Q. YeAndrew W. AppelVerified Correctness and Security of OpenSSL HMAC.USENIX Security Symposium207-2212015Conference and Workshop Papersopenconf/uss/BeringerPYA15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/beringerhttps://dblp.org/rec/conf/uss/BeringerPYA15URL#3657620Kevin BorgolteChristopher KruegelGiovanni VignaMeerkat: Detecting Website Defacements through Image-based Object Recognition.USENIX Security Symposium595-6102015Conference and Workshop Papersopenconf/uss/BorgolteKV15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/borgoltehttps://dblp.org/rec/conf/uss/BorgolteKV15URL#3657621Niklas BüscherStefan Katzenbeisser 0001Faster Secure Computation through Automatic Parallelization.USENIX Security Symposium531-5462015Conference and Workshop Papersopenconf/uss/Buscher015https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/buescherhttps://dblp.org/rec/conf/uss/Buscher015URL#3657622Nicholas CarliniAntonio BarresiMathias PayerDavid A. Wagner 0001Thomas R. GrossControl-Flow Bending: On the Effectiveness of Control-Flow Integrity.USENIX Security Symposium161-1762015Conference and Workshop Papersopenconf/uss/CarliniBPWG15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/carlinihttps://dblp.org/rec/conf/uss/CarliniBPWG15URL#3657623Jin ChenHaibo Chen 0001Erick BaumanZhiqiang LinBinyu ZangHaibing GuanYou Shouldn't Collect My Secrets: Thwarting Sensitive Keystroke Leakage in Mobile IME Apps.USENIX Security Symposium657-6902015Conference and Workshop Papersopenconf/uss/ChenCBLZG15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/chen-jinhttps://dblp.org/rec/conf/uss/ChenCBLZG15URL#3657624Tien Tuan Anh DinhPrateek SaxenaEe-Chien ChangBeng Chin OoiChunwang ZhangM2R: Enabling Stronger Privacy in MapReduce Computation.USENIX Security Symposium447-4622015Conference and Workshop Papersopenconf/uss/DinhSCOZ15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/dinhhttps://dblp.org/rec/conf/uss/DinhSCOZ15URL#3657625Kevin P. DyerScott E. CoullThomas ShrimptonMarionette: A Programmable Network Traffic Obfuscation System.USENIX Security Symposium367-3822015Conference and Workshop Papersopenconf/uss/DyerCS15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/dyerhttps://dblp.org/rec/conf/uss/DyerCS15URL#3657626Adam EverspaughRahul Chatterjee 0001Samuel ScottAri JuelsThomas RistenpartThe Pythia PRF Service.USENIX Security Symposium547-5622015Conference and Workshop Papersopenconf/uss/EverspaughCSJR15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/everspaughhttps://dblp.org/rec/conf/uss/EverspaughCSJR15URL#3657627Kassem FawazHuan FengKang G. ShinAnatomization and Protection of Mobile Apps' Location Privacy Threats.USENIX Security Symposium753-7682015Conference and Workshop Papersopenconf/uss/FawazFS15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/fawazhttps://dblp.org/rec/conf/uss/FawazFS15URL#3657628Seyed Kaveh FayazYoshiaki TobiokaVyas SekarMichael D. BaileyBohatei: Flexible and Elastic DDoS Defense.USENIX Security Symposium817-8322015Conference and Workshop Papersopenconf/uss/FayazTSB15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/fayazhttps://dblp.org/rec/conf/uss/FayazTSB15URL#3657629Alessandro Di FedericoAmat CamaYan ShoshitaishviliChristopher KruegelGiovanni VignaHow the ELF Ruined Christmas.USENIX Security Symposium643-6582015Conference and Workshop Papersopenconf/uss/FedericoCSKV15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/di-fredericohttps://dblp.org/rec/conf/uss/FedericoCSKV15URL#3657630Huan FengKassem FawazKang G. ShinLinkDroid: Reducing Unregulated Aggregation of App Usage Behaviors.USENIX Security Symposium769-7832015Conference and Workshop Papersopenconf/uss/FengFS15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/fenghttps://dblp.org/rec/conf/uss/FengFS15URL#3657631Christina GarmanKenneth G. PatersonThyla van der MerweAttacks Only Get Better: Password Recovery Attacks Against RC4 in TLS.USENIX Security Symposium113-1282015Conference and Workshop Papersopenconf/uss/GarmanPM15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/garmanhttps://dblp.org/rec/conf/uss/GarmanPM15URL#3657632Mariano GrazianoDavide CanaliLeyla BilgeAndrea LanziDavide BalzarottiNeedles in a Haystack: Mining Information from Public Dynamic Analysis Sandboxes for Malware Intelligence.USENIX Security Symposium1057-10722015Conference and Workshop Papersopenconf/uss/GrazianoCBLB15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/grazianohttps://dblp.org/rec/conf/uss/GrazianoCBLB15URL#3657633Daniel GrussRaphael SpreitzerStefan MangardCache Template Attacks: Automating Attacks on Inclusive Last-Level Caches.USENIX Security Symposium897-9122015Conference and Workshop Papersopenconf/uss/GrussSM15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/grusshttps://dblp.org/rec/conf/uss/GrussSM15URL#3657634Mordechai GuriAssaf KachlonOfer HassonGabi KedmaYisroel MirskyYuval EloviciGSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies.USENIX Security Symposium849-8642015Conference and Workshop Papersopenconf/uss/GuriKHKME15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/gurihttps://dblp.org/rec/conf/uss/GuriKHKME15URL#3657635Ethan HeilmanAlison KendlerAviv ZoharSharon GoldbergEclipse Attacks on Bitcoin's Peer-to-Peer Network.USENIX Security Symposium129-1442015Conference and Workshop Papersopenconf/uss/HeilmanKZG15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/heilmanhttps://dblp.org/rec/conf/uss/HeilmanKZG15URL#3657636Hong Hu 0004Zheng Leong ChuaSendroiu AdrianPrateek SaxenaZhenkai LiangAutomatic Generation of Data-Oriented Exploits.USENIX Security Symposium177-1922015Conference and Workshop Papersopenconf/uss/HuCASL15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/huhttps://dblp.org/rec/conf/uss/HuCASL15URL#3657637Jianjun Huang 0001Zhichun LiXusheng XiaoZhenyu WuKangjie LuXiangyu Zhang 0001Guofei JiangSUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps.USENIX Security Symposium977-9922015Conference and Workshop Papersopenconf/uss/HuangLXWLZJ15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/huanghttps://dblp.org/rec/conf/uss/HuangLXWLZJ15URL#3657638Aylin Caliskan IslamRichard E. HarangAndrew LiuArvind NarayananClare R. VossFabian YamaguchiRachel GreenstadtDe-anonymizing Programmers via Code Stylometry.USENIX Security Symposium255-2702015Conference and Workshop Papersopenconf/uss/IslamHLNVYG15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/caliskan-islamhttps://dblp.org/rec/conf/uss/IslamHLNVYG15URL#3657639Nav JagpalEric DingleJean-Philippe GravelPanayiotis MavrommatisNiels ProvosMoheeb Abu RajabKurt ThomasTrends and Lessons from Three Years Fighting Malicious Extensions.USENIX Security Symposium579-5932015Conference and Workshop Papersopenconf/uss/JagpalDGMPRT15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/jagpalhttps://dblp.org/rec/conf/uss/JagpalDGMPRT15URL#3657640Shouling JiWeiqing LiPrateek MittalXin Hu 0001Raheem A. BeyahSecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization.USENIX Security Symposium303-3182015Conference and Workshop Papersopenconf/uss/JiLMHB15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/jihttps://dblp.org/rec/conf/uss/JiLMHB15URL#3657641David Kaloper-MersinjakHannes MehnertAnil MadhavapeddyPeter SewellNot-Quite-So-Broken TLS: Lessons in Re-Engineering a Security Protocol Specification and Implementation.USENIX Security Symposium223-2382015Conference and Workshop Papersopenconf/uss/Kaloper-Mersinjak15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/kaloper-mersinjakhttps://dblp.org/rec/conf/uss/Kaloper-Mersinjak15URL#3657642Nikolaos KarapanosClaudio MarforioClaudio SorienteSrdjan CapkunSound-Proof: Usable Two-Factor Authentication Based on Ambient Sound.USENIX Security Symposium483-4982015Conference and Workshop Papersopenconf/uss/KarapanosMSC15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/karapanoshttps://dblp.org/rec/conf/uss/KarapanosMSC15URL#3657643Albert KwonMashael AlSabahDavid LazarMarc DacierSrinivas DevadasCircuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services.USENIX Security Symposium287-3022015Conference and Workshop Papersopenconf/uss/KwonALDD15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/kwonhttps://dblp.org/rec/conf/uss/KwonALDD15URL#3657644Byoungyoung LeeChengyu SongTaesoo KimWenke LeeType Casting Verification: Stopping an Emerging Attack Vector.USENIX Security Symposium81-962015Conference and Workshop Papersopenconf/uss/LeeSKL15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/leehttps://dblp.org/rec/conf/uss/LeeSKL15URL#3657645Sebastian LekiesBen StockMartin WentzelMartin JohnsThe Unexpected Dangers of Dynamic JavaScript.USENIX Security Symposium723-7352015Conference and Workshop Papersopenconf/uss/LekiesSWJ15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/lekieshttps://dblp.org/rec/conf/uss/LekiesSWJ15URL#3657646Yang Liu 0018Armin SarabiJing Zhang 0027Parinaz NaghizadehManish KarirMichael D. BaileyMingyan LiuCloudy with a Chance of Breach: Forecasting Cyber Security Incidents.USENIX Security Symposium1009-10242015Conference and Workshop Papersopenconf/uss/LiuSZNKBL15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/liuhttps://dblp.org/rec/conf/uss/LiuSZNKBL15URL#3657647Ramya Jayaram MastiDevendra RaiAanjhan RanganathanChristian MüllerLothar ThieleSrdjan CapkunThermal Covert Channels on Multi-core Platforms.USENIX Security Symposium865-8802015Conference and Workshop Papersopenconf/uss/MastiRRMTC15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/mastihttps://dblp.org/rec/conf/uss/MastiRRMTC15URL#3657648Susan E. McGregorPolina ChartersTobin HollidayFranziska RoesnerInvestigating the Computer Security Practices and Needs of Journalists.USENIX Security Symposium399-4142015Conference and Workshop Papersopenconf/uss/McGregorCHR15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/mcgregorhttps://dblp.org/rec/conf/uss/McGregorCHR15URL#3657649Marcela S. MelaraAaron BlanksteinJoseph BonneauEdward W. FeltenMichael J. FreedmanCONIKS: Bringing Key Transparency to End Users.USENIX Security Symposium383-3982015Conference and Workshop Papersopenconf/uss/MelaraBBFF15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/melarahttps://dblp.org/rec/conf/uss/MelaraBBFF15URL#3657650Yan MichalevskyAaron SchulmanGunaa Arumugam VeerapandianDan BonehGabi NakiblyPowerSpy: Location Tracking Using Mobile Device Power Analysis.USENIX Security Symposium785-8002015Conference and Workshop Papersopenconf/uss/MichalevskySVBN15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/michalevskyhttps://dblp.org/rec/conf/uss/MichalevskySVBN15URL#3657651Jiang Ming 0002Dinghao WuGaoyao XiaoJun Wang 0141Peng Liu 0005TaintPipe: Pipelined Symbolic Taint Analysis.USENIX Security Symposium65-802015Conference and Workshop Papersopenconf/uss/MingWXW015https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/minghttps://dblp.org/rec/conf/uss/MingWXW015URL#3657652Michael MitchellAn-I Andy WangPeter L. ReiherCashtags: Protecting the Input and Display of Sensitive Data.USENIX Security Symposium961-9762015Conference and Workshop Papersopenconf/uss/MitchellWR15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/mitchellhttps://dblp.org/rec/conf/uss/MitchellWR15URL#3657653Yuhong NanMin Yang 0002Zhemin YangShunfan ZhouGuofei GuXiaofeng Wang 0006UIPicker: User-Input Privacy Identification in Mobile Applications.USENIX Security Symposium993-10082015Conference and Workshop Papersopenconf/uss/NanYYZGW15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/nanhttps://dblp.org/rec/conf/uss/NanYYZGW15URL#3657654Terry NelmsRoberto PerdisciManos AntonakakisMustaque AhamadWebWitness: Investigating, Categorizing, and Mitigating Malware Download Paths.USENIX Security Symposium1025-10402015Conference and Workshop Papersopenconf/uss/NelmsPAA15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/nelmshttps://dblp.org/rec/conf/uss/NelmsPAA15URL#3657655Marten OltroggeYasemin AcarSergej DechandMatthew Smith 0001Sascha FahlTo Pin or Not to Pin-Helping App Developers Bullet Proof Their TLS Connections.USENIX Security Symposium239-2542015Conference and Workshop Papersopenconf/uss/OltroggeAD0F15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/oltroggehttps://dblp.org/rec/conf/uss/OltroggeAD0F15URL#3657656Giancarlo PellegrinoDavide BalzarottiStefan Winter 0001Neeraj SuriIn the Compression Hornet's Nest: A Security Study of Data Compression in Network Services.USENIX Security Symposium801-8162015Conference and Workshop Papersopenconf/uss/PellegrinoBWS15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/pellegrinohttps://dblp.org/rec/conf/uss/PellegrinoBWS15URL#3657657Benny PinkasThomas Schneider 0003Gil Segev 0001Michael ZohnerPhasing: Private Set Intersection Using Permutation-based Hashing.USENIX Security Symposium515-5302015Conference and Workshop Papersopenconf/uss/Pinkas0SZ15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/pinkashttps://dblp.org/rec/conf/uss/Pinkas0SZ15URL#3657658David A. RamosDawson R. EnglerUnder-Constrained Symbolic Execution: Correctness Checking for Real Code.USENIX Security Symposium49-642015Conference and Workshop Papersopenconf/uss/RamosE15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/ramoshttps://dblp.org/rec/conf/uss/RamosE15URL#3657659Ashay RaneCalvin LinMohit TiwariRaccoon: Closing Digital Side-Channels through Obfuscated Execution.USENIX Security Symposium431-4462015Conference and Workshop Papersopenconf/uss/RaneLT15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/ranehttps://dblp.org/rec/conf/uss/RaneLT15URL#3657660Bradley ReavesEthan ShernanAdam Bates 0001Henry CarterPatrick TraynorBoxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network Edge.USENIX Security Symposium833-8482015Conference and Workshop Papersopenconf/uss/ReavesSBCT15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/reaves-boxedhttps://dblp.org/rec/conf/uss/ReavesSBCT15URL#3657661Bradley ReavesNolen ScaifeAdam Bates 0001Patrick TraynorKevin R. B. ButlerMo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World.USENIX Security Symposium17-322015Conference and Workshop Papersopenconf/uss/ReavesSBTB15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/reaveshttps://dblp.org/rec/conf/uss/ReavesSBTB15URL#3657662Ling Ren 0001Christopher W. FletcherAlbert KwonEmil StefanovElaine ShiMarten van DijkSrinivas DevadasConstants Count: Practical Improvements to Oblivious RAM.USENIX Security Symposium415-4302015Conference and Workshop Papersopenconf/uss/RenFKSSDD15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/ren-linghttps://dblp.org/rec/conf/uss/RenFKSSDD15URL#3657663Chuangang RenYulong ZhangHui Xue 0003Tao WeiPeng Liu 0005Towards Discovering and Understanding Task Hijacking in Android.USENIX Security Symposium945-9592015Conference and Workshop Papersopenconf/uss/RenZXW015https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/ren-chuanganghttps://dblp.org/rec/conf/uss/RenZXW015URL#3657664Joeri de RuiterErik PollProtocol State Fuzzing of TLS Implementations.USENIX Security Symposium193-2062015Conference and Workshop Papersopenconf/uss/RuiterP15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/de-ruiterhttps://dblp.org/rec/conf/uss/RuiterP15URL#3657665Carl SabottkeOctavian SuciuTudor DumitrasVulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits.USENIX Security Symposium1041-10562015Conference and Workshop Papersopenconf/uss/SabottkeSD15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/sabottkehttps://dblp.org/rec/conf/uss/SabottkeSD15URL#3657666Eui Chul Richard ShinDawn SongReza MoazzeziRecognizing Functions in Binaries with Neural Networks.USENIX Security Symposium611-6262015Conference and Workshop Papersopenconf/uss/ShinSM15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/shinhttps://dblp.org/rec/conf/uss/ShinSM15URL#3657667Igor SmolyarMuli Ben-YehudaDan TsafrirSecuring Self-Virtualizing Ethernet Devices.USENIX Security Symposium335-3502015Conference and Workshop Papersopenconf/uss/SmolyarBT15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/smolyarhttps://dblp.org/rec/conf/uss/SmolyarBT15URL#3657668Yunmok SonHocheol ShinDongkwan Kim 0001Young-Seok ParkJuhwan NohKibum ChoiJungwoo ChoiYongdae KimRocking Drones with Intentional Sound Noise on Gyroscopic Sensors.USENIX Security Symposium881-8962015Conference and Workshop Papersopenconf/uss/SonSKPNCCK15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/sonhttps://dblp.org/rec/conf/uss/SonSKPNCCK15URL#3657669Kyle SoskaNicolas ChristinMeasuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem.USENIX Security Symposium33-482015Conference and Workshop Papersopenconf/uss/SoskaC15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/soskahttps://dblp.org/rec/conf/uss/SoskaC15URL#3657670Gianluca StringhiniPierre MourlanneGrégoire JacobManuel EgeleChristopher KruegelGiovanni VignaEVILCOHORT: Detecting Communities of Malicious Accounts on Online Services.USENIX Security Symposium563-5782015Conference and Workshop Papersopenconf/uss/StringhiniMJEKV15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/stringhinihttps://dblp.org/rec/conf/uss/StringhiniMJEKV15URL#3657671Yixin SunAnne EdmundsonLaurent VanbeverOscar LiJennifer RexfordMung ChiangPrateek MittalRAPTOR: Routing Attacks on Privacy in Tor.USENIX Security Symposium271-2862015Conference and Workshop Papersopenconf/uss/SunEVLRCM15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/sunhttps://dblp.org/rec/conf/uss/SunEVLRCM15URL#3657672Blase UrSean M. SegretiLujo BauerNicolas ChristinLorrie Faith CranorSaranga KomanduriDarya KurilovaMichelle L. MazurekWilliam MelicherRichard ShayMeasuring Real-World Accuracies and Biases in Modeling Password Guessability.USENIX Security Symposium463-4812015Conference and Workshop Papersopenconf/uss/UrSBCCKKMMS15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/urhttps://dblp.org/rec/conf/uss/UrSBCCKKMMS15URL#3657673Mathy VanhoefFrank PiessensAll Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS.USENIX Security Symposium97-1122015Conference and Workshop Papersopenconf/uss/VanhoefP15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/vanhoefhttps://dblp.org/rec/conf/uss/VanhoefP15URL#3657674Venkatanathan VaradarajanYinqian ZhangThomas RistenpartMichael M. SwiftA Placement Vulnerability Study in Multi-Tenant Public Clouds.USENIX Security Symposium913-9282015Conference and Workshop Papersopenconf/uss/VaradarajanZRS15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/varadarajanhttps://dblp.org/rec/conf/uss/VaradarajanZRS15URL#3657675Ruowen WangWilliam EnckDouglas S. ReevesXinwen ZhangPeng NingDingbang XuWu Zhou 0001Ahmed M. AzabEASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning.USENIX Security Symposium351-3662015Conference and Workshop Papersopenconf/uss/WangERZNXZA15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/wang-ruowenhttps://dblp.org/rec/conf/uss/WangERZNXZA15URL#3657676Shuai Wang 0011Pei Wang 0007Dinghao WuReassembleable Disassembling.USENIX Security Symposium627-6422015Conference and Workshop Papersopenconf/uss/WangWW15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/wang-shuaihttps://dblp.org/rec/conf/uss/WangWW15URL#3657677Michael WeissbacherWilliam K. RobertsonEngin KirdaChristopher KruegelGiovanni VignaZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities.USENIX Security Symposium737-7522015Conference and Workshop Papersopenconf/uss/WeissbacherRKKV15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/weissbacherhttps://dblp.org/rec/conf/uss/WeissbacherRKKV15URL#3657678Primal WijesekeraArjun BaokarAshkan HosseiniSerge EgelmanDavid A. Wagner 0001Konstantin BeznosovAndroid Permissions Remystified: A Field Study on Contextual Integrity.USENIX Security Symposium499-5142015Conference and Workshop Papersopenconf/uss/WijesekeraBHEWB15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/wijesekerahttps://dblp.org/rec/conf/uss/WijesekeraBHEWB15URL#3657679Zhang XuHaining WangZhenyu WuA Measurement Study on Co-residence Threat inside the Cloud.USENIX Security Symposium929-9442015Conference and Workshop Papersopenconf/uss/XuWW15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/xuhttps://dblp.org/rec/conf/uss/XuWW15URL#3657680Xiaofeng ZhengJian JiangJinjin LiangHai-Xin DuanShuo Chen 0001Tao Wan 0004Nicholas WeaverCookies Lack Integrity: Real-World Implications.USENIX Security Symposium707-7212015Conference and Workshop Papersopenconf/uss/ZhengJLDCWW15https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/zhenghttps://dblp.org/rec/conf/uss/ZhengJLDCWW15URL#3657681Jaeyeon JungThorsten Holz24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015.USENIX Security SymposiumUSENIX Association2015Editorshipopenconf/uss/2015https://www.usenix.org/conference/usenixsecurity15https://dblp.org/rec/conf/uss/2015URL#3671320