USENIX Security '16 - Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks
USENIX Security '16 - Ariadne: A Minimal Approach to State Continuity
USENIX Security '16 - An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries
USENIX Security '16 - Hidden Voice Commands
USENIX Security '16 - Making HTTPS the Default in the World's Largest Bureaucracy
USENIX Security '16 - Secure, Precise, and Fast Floating-Point Operations on x86 Processors
USENIX Security '16 - Security Competitions
USENIX Security '16 - Report from the Field: A CDN's Role in Repelling Attacks against Banking...
USENIX Security '16 - Off-Path TCP Exploits: Global Rate Limit Considered Dangerous
USENIX Security '16 - Making USB Great Again with USBFILTER
USENIX Security '16 - Authenticated Network Time Synchronization
USENIX Security '16 - Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability
USENIX Security '16 - Towards Measuring and Mitigating Social Engineering Software Download Attacks
USENIX Security '16 - Practical DIFC Enforcement on Android
USENIX Security '16 - UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware
USENIX Security '16 - An Empirical Study of Textual Key-Fingerprint Representations
USENIX Security '16 - Thoth: Comprehensive Policy Compliance in Data Retrieval Systems
USENIX Security '16 - DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks