Lightning Talk video USENIX Security'15 - #236 Pellegrino
USENIX Security '15 - Inherent Cyber Insecurity and Our National Security...
USENIX Security '15 - Protocol State Fuzzing of TLS Implementations
USENIX Security '15 - Trustworthy Whole-System Provenance for the Linux Kernel
USENIX Security '15 - Machine vs. Machine: Lessons from the First Year of Cyber Grand Challenge
USENIX Security '15 - Automatic Generation of Data-Oriented Exploits
USENIX Security '15 - In the Compression Hornet’s Nest: A Security Study of Data Compression...
USENIX Security '15 - Conducting Usable Security Studies: It's Complicated
USENIX Security '15 - Control-Flow Bending: On the Effectiveness of Control-Flow Integrity
USENIX Security '15 - Recognizing Functions in Binaries with Neural Networks
USENIX Security '15 - UIPicker: User-Input Privacy Identification in Mobile Applications
USENIX Security '15 - Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound
USENIX Security '15 - Post-Mortem of a Zombie: Conficker Cleanup After Six Years
USENIX Security'15 - Paper 309 - Graziano
USENIX Security '15 - Not-Quite-So-Broken TLS: Lessons in Re-Engineering a Security Protocol...
USENIX Security '15 - All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS
USENIX Security '15 - Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services
USENIX Security '15 - Trends and Lessons from Three Years Fighting Malicious Extensions
USENIX Security '15 - ZigZag: Automatically Hardening Web Applications Against Client-side...
USENIX Security '15 - Investigating the Computer Security Practices and Needs of Journalists