USENIX Security ’17 - Understanding the Mirai Botnet
USENIX Security '17 - Digtool: A Virtualization-Based Framework for Detecting Kernel Vulnerabilities
USENIX Security '17 - Phoenix: Rebirth of a Cryptographic Password-Hardening Service
USENIX Security '17 - Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for ART
USENIX Security '17 - Measuring the Insecurity of Mobile Deep Links of Android
USENIX Security '17 - SmartAuth: User-Centered Authorization for the Internet of Things
USENIX Security '17 - kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels
USENIX Security '17 - Towards Efficient Heap Overflow Discovery
USENIX Security '17 - How the Web Tangled Itself
USENIX Security '17 - Extension Breakdown...
USENIX Security '17 - Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts
USENIX Security '17 - CAn’t Touch This...
USENIX Security '17 - BinSim: Trace-based Semantic Binary Diffing...
USENIX Security '17 - Data Hemorrhage, Inequality, and You...
USENIX Security '17 - Beauty and the Burst: Remote Identification of Encrypted Video Streams
USENIX Security '17 - Game of Registrars...
USENIX Security '17 - Hacking in Darkness: Return-oriented Programming against Secure Enclaves
USENIX Security '17 - "I Have No Idea What I'm Doing" - On the Usability of Deploying HTTPS
USENIX Security '17 - Identifier Binding Attacks and Defenses in Software-Defined Networks
USENIX Security '17 - Dead Store Elimination (Still) Considered Harmful