USENIX Security '17 - Picking Up My Tab...
USENIX Security ’17 - Understanding the Mirai Botnet
USENIX Security '17 - CAn’t Touch This...
USENIX Security '17 - Game of Registrars...
USENIX Security '17 - Strong and Efficient Cache Side-Channel Protection...
USENIX Security '17 - Extension Breakdown...
USENIX Security '17 - Computer Security, Privacy, and DNA Sequencing...
USENIX Security '17 - See No Evil, Hear No Evil, Feel No Evil
USENIX Security '17 - Walkie-Talkie...
USENIX Security '17 - Global Measurement of DNS Manipulation
USENIX Security '17 - Telling Your Secrets without Page Faults...
USENIX Security '17 - When the Weakest Link is Strong...
USENIX Security '17 - AutoLock DNP
USENIX Security '17 - When Your Threat Model Is "Everything": Defensive Security in Modern Newsrooms
USENIX Security '17 - The Loopix Anonymity System
USENIX Security '17 - Phoenix: Rebirth of a Cryptographic Password-Hardening Service
USENIX Security '17 - CLKSCREW: Exposing the Perils of Security-Oblivious Energy Management
USENIX Security '17 - DR. CHECKER: A Soundy Analysis for Linux Kernel Drivers
USENIX Security '17 - Data Hemorrhage, Inequality, and You...
USENIX Security '17 - Differential Privacy: From Theory to Deployment