USENIX Security '14 - Information Security War Room
USENIX Security '14 - Mimesis Aegis: A Mimicry Privacy Shield–A System’s Approach to Data Privacy
USENIX Security '14 - JIGSAW: Protecting Resource Access by Inferring Programmer Expectations
USENIX Security '14 - A Large-Scale Analysis of the Security of Embedded Firmwares
USENIX Security '14 - Preventing Cryptographic Key Leakage in Cloud Virtual Machines
USENIX Security '14 - How To Live In Paradise: Pearls of Wisdom for New and Prospective Faculty
USENIX Security '14 - Battling Human Trafficking with Big Data
USENIX Security '14 - Blanket Execution: Dynamic Similarity Testing for Program Binaries
USENIX Security '14 - The Future of Crypto: Getting from Here to Guarantees
USENIX Security '14 - Opening Remarks and Awards
USENIX Security '14 - TRUESET: Faster Verifiable Set Computations
USENIX Security '14 - Peeking into Your App without Actually Seeing It: UI State Inference
USENIX Security '14 - Effective Attacks and Provable Defenses for Website Fingerprinting
USENIX Security '14 - SSOScan: Automated Testing of Web Applications for Single Sign-On
USENIX Security '14 - ZØ: An Optimizing Distributing Zero-Knowledge Compiler
USENIX Security '14 - Burst ORAM: Minimizing ORAM Response Times for Bursty Access Patterns
USENIX Security '14 - A Look at Targeted Attacks Through the Lense of an NGO
USENIX Security '14 - Lightning Talks for the One-Track Mind
USENIX Security '14 - ASM: A Programmable Interface for Extending Android Security