USENIX Security '13 - Security Team 2.0
USENIX Security '13 - Dr. Felten Goes To Washington: Lessons from 18 Months in Government
USENIX Security '13 - The White House's Priorities for Cybersecurity
USENIX Security '13 - Confessions of a Recovering Data Broker
USENIX Security '13 - Windows 8 Security: Supporting User Confidence
USENIX Security '13 - Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer
USENIX Security '13 - Building Securable Infrastructure: Open-Source Private Clouds
USENIX ATC '13 - Redundant State Detection for Dynamic Symbolic Execution
USENIX Security '17 - Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for ART
USENIX Security '14 - Brahmastra: Driving Apps to Test the Security of Third-Party Components
HotCloud '13 - How I Learned to Stop Worrying and Trust the Cloud
USENIX ATC '13 - Lightweight Memory Tracing
HotCloud '13 - Toward Secure and Convenient Browsing Data Management in the Cloud
USENIX Security '14 - Password Managers: Attacks and Defenses
USENIX ATC '13 - Characterization of Incremental Data Changes for Efficient Data Protection
USENIX Security '23 - Othered, Silenced and Scapegoated: Understanding the Situated Security of...
USENIX Security '24 - Argus: All your (PHP) Injection-sinks are belong to us.
USENIX Security '13 - Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media
USENIX Security '21 - Stars Can Tell: A Robust Method to Defend against GPS Spoofing Attacks
USENIX Security '23 - TRust: A Compilation Framework for In-process Isolation to Protect Safe...