USENIX Security '16 - Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability
USENIX Security '16 - Identifying and Characterizing Sybils in the Tor Network
USENIX Security '16 - Making HTTPS the Default in the World's Largest Bureaucracy
USENIX Security '16 - When Governments Attack: Malware Targeting Activists, Lawyers, and Journalists
USENIX Security '16 - Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks
USENIX Security '16 - Finding and Fixing Security Bugs in Flash
USENIX Security '16 - Automatically Detecting Error Handling Bugs Using Error Specifications
USENIX Security '16 - The Moral Character of Cryptographic Work
USENIX Security '16 - Privacy and Threat in Practice: Mobile Messaging by Low-Income New Yorkers
USENIX Security '16 - Fingerprinting Electronic Control Units for Vehicle Intrusion Detection
USENIX Security '16 - You've Got Vulnerability: Exploring Effective Vulnerability Notifications
USENIX Security '16 - Poking Holes in Information Hiding
USENIX Security '16 - Specification Mining for Intrusion Detection in Networked Control Systems
USENIX Security '16 - Verifying Constant-Time Implementations
USENIX Security '16 - UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware
USENIX Security '16 - überSpark: Enforcing Verifiable Object Abstractions for Automated...
USENIX Security '16 - Security Competitions
USENIX Security '16 - Post-quantum Key Exchange—A New Hope
USENIX Security '16 - Towards Measuring and Mitigating Social Engineering Software Download Attacks
USENIX Security '16 - k-fingerprinting: A Robust Scalable Website Fingerprinting Technique