USENIX Security '19 - The Anatomy of a Cryptocurrency Pump-and-Dump Scheme
USENIX Security '19 - CANvas: Fast and Inexpensive Automotive Network Mapping
USENIX Security '19 - A Systematic Evaluation of Transient Execution Attacks and Defenses
USENIX Security '19 - Wireless Attacks on Aircraft Instrument Landing Systems
USENIX Security '19 - Discovering and Understanding the Security Hazards in the
USENIX Security '19 - All Things Considered: An Analysis of IoT Devices on Home Networks
USENIX Security '19 - The KNOB is Broken: Exploiting Low Entropy in the Encryption Key
USENIX Security '19 - Reading the Tea leaves: A Comparative Analysis of Threat Intelligence
USENIX Security '19 - Secure Multi-User Content Sharing for Augmented Reality Applications
USENIX Security '19 - High Precision Detection of Business Email Compromise
USENIX Security '19 - RAZOR: A Framework for Post-deployment Software Debloating
USENIX Security '19 - The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile
USENIX Security '19 - What Are You Searching For? A Remote Keylogging Attack
USENIX Security '19 - PAC it up: Towards Pointer Integrity using ARM Pointer Authentication
USENIX Security '19 - Protecting Cloud Virtual Machines from Hypervisor and Host Operating
USENIX Security '19 - No Right to Remain Silent: Isolating Malicious Mixes
USENIX Security '19 - ERIM: Secure, Efficient In-process Isolation with Protection Keys (MPK)
USENIX Security '19 - Please Pay Inside: Evaluating Bluetooth-based Detection of Gas Pump Skimmers
USENIX Security '19 - Small World with High Risks: A Study of Security Threats in the npm Ecosystem
USENIX Security '19 - Hiding in Plain Signal: Physical Signal Overshadowing Attack on LTE