USENIX Security '17 - Phoenix: Rebirth of a Cryptographic Password-Hardening Service
USENIX Security '17 - When the Weakest Link is Strong...
USENIX Security '17 - ROTE: Rollback Protection for Trusted Execution
USENIX Security '17 - Extension Breakdown...
USENIX Security '17 - Same-Origin Policy: Evaluation in Modern Browsers
USENIX Security '17 - Efficient Protection of Path-Sensitive Control Security
USENIX Security '17 - Detecting Credential Spearphishing in Enterprise Settings
USENIX Security '17 - How the Web Tangled Itself
USENIX Security '17 - Data Hemorrhage, Inequality, and You...
USENIX Security '17 - Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing
USENIX Security '17 - CLKSCREW: Exposing the Perils of Security-Oblivious Energy Management
USENIX Security '17 - Game of Registrars...
USENIX Security '17 - AWare: Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings
USENIX Security '17 - BootStomp: On the Security of Bootloaders in Mobile Devices
USENIX Security '17 - HELP: Helper-Enabled In-Band Device Pairing…
USENIX Security '17 - Global Measurement of DNS Manipulation
USENIX Security '17 - Telling Your Secrets without Page Faults...
USENIX Security '17 - Walkie-Talkie...
USENIX Security '17 - vTZ: Virtualizing ARM TrustZone
USENIX Security '17 - Oscar: A Practical Page-Permissions-Based Scheme...