USENIX Security '15 - Recognizing Functions in Binaries with Neural Networks
USENIX Security '15 - Reassembleable Disassembling
USENIX Security '15 - Securing Self-Virtualizing Ethernet Devices
USENIX Security '15 - Inherent Cyber Insecurity and Our National Security...
USENIX Security '15 - Perspectives on Securing Cyberspace
USENIX Security '15 - Faster Secure Computation through Automatic Parallelization
USENIX Security '15 - Type Casting Verification: Stopping an Emerging Attack Vector
USENIX Security '15 - UIPicker: User-Input Privacy Identification in Mobile Applications
USENIX Security '15 - RAPTOR: Routing Attacks on Privacy in Tor
USENIX Security '15 - Automatic Generation of Data-Oriented Exploits
USENIX Security '15 - Investigating the Computer Security Practices and Needs of Journalists
USENIX Security '15 - Protocol State Fuzzing of TLS Implementations
USENIX Security '15 - Needles in a Haystack: Mining Information from Public Dynamic Analysis...
USENIX Security '15 - WebWitness: Investigating, Categorizing, and Mitigating Malware Download Paths
USENIX Security '15 - Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services
USENIX Security '15 - A Placement Vulnerability Study in Multi-Tenant Public Clouds
USENIX Security '15 - A Measurement Study on Co-residence Threat inside the Cloud
USENIX Security '15 - SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps
USENIX Security '15 - Cookies Lack Integrity: Real-World Implications
USENIX Security '15 - Anatomization and Protection of Mobile Apps’ Location Privacy Threats