USENIX Security '14 - Peeking into Your App without Actually Seeing It: UI State Inference
USENIX Security '14 - A Large-Scale Analysis of the Security of Embedded Firmwares
USENIX Security '14 - Password Managers: Attacks and Defenses
USENIX Security '14 - A Look at Targeted Attacks Through the Lense of an NGO
USENIX Security '14 - Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens
USENIX Security '14 - ROP is Still Dangerous: Breaking Modern Defenses
USENIX Security '14 - Dynamic Hooks: Hiding Control Flow Changes within Non-Control Data
USENIX Security '14 - The Long “Taile” of Typosquatting Domain Names
USENIX Security '14 - ASM: A Programmable Interface for Extending Android Security
USENIX Security '14 - Towards Reliable Storage of 56-bit Secrets in Human Memory
USENIX Security '14 - Privee: An Architecture for Automatically Analyzing Web Privacy Policies
USENIX Security '14 - When Governments Hack Opponents: A Look at Actors and Technology
USENIX Security '14 - X-Force: Force-Executing Binary Programs for Security Applications
USENIX Security '14 - FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack
USENIX Security '14 - BareCloud: Bare-metal Analysis-based Evasive Malware Detection
USENIX Security '14 - Exit from Hell? Reducing the Impact of Amplification DDoS Attacks
USENIX Security '14 - JIGSAW: Protecting Resource Access by Inferring Programmer Expectations
USENIX Security '14 - The Emperor’s New Password Manager: Security Analysis of Web-based Password
USENIX Security '14 - The Future of Crypto: Getting from Here to Guarantees
USENIX Security '14 - SpanDex: Secure Password Tracking for Android