USENIX Security '18 - The Battle for New York: A Case Study of Applied Digital Threat Modeling...
USENIX Security '18 - WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring
USENIX Security '18-Q: Why Do Keynote Speakers Keep Suggesting That Improving Security Is Possible?
USENIX Security '18 - Solving the Next Billion-People Privacy Problem
USENIX Security '18 - Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer
USENIX Security '18 - BurnBox: Self-Revocable Encryption in a World Of Compelled Access
USENIX Security '18 - Modelling and Analysis of a Hierarchy of Distance Bounding Attacks
USENIX Security '18 - The Law and Economics of Bug Bounties
USENIX Security '18 - Opening Remarks and Awards
USENIX Security '18 - Studying the Impact of Managers on Password Strength and Reuse
USENIX Security '18 - Simple Password-Hardened Encryption Services
USENIX Security '18 - Polisis: Automated Analysis and Presentation of Privacy Policies...
USENIX Security '18 - Understanding the Reproducibility of Crowd-reported Security Vulnerabilities
USENIX Security '18 - Rethinking Architectures and Abstraction for a World Where...
USENIX Security '18 - With Great Training Comes Great Vulnerability...
USENIX Security '18 - We Still Don’t Have Secure Cross-Domain Requests: an Empirical Study of CORS
USENIX Security '18 - Discovering Flaws in Security-Focused Static Analysis Tools for Android...
USENIX Security '18 - Security Namespace: Making Linux Security Frameworks Available to Containers
USENIX Security '18 - DIZK: A Distributed Zero Knowledge Proof System
USENIX Security '18 - GAZELLE: A Low Latency Framework for Secure Neural Network Inference
USENIX Security '18 - All Your GPS Are Belong To Us...
USENIX Security '18 - QSYM : A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing
USENIX Security '18 - ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands...
USENIX Security '18 - Analogy Cyber Security—From 0101 to Mixed Signals