USENIX Security '19 - Tackling the Trust and Safety Crisis
USENIX Security '19 - Discovering and Understanding the Security Hazards in the
USENIX Security '19 - Lessons Learned from Evaluating the Robustness of Defenses to
USENIX Security '19 - Seeing is Not Believing: Camouflage Attacks on Image Scaling Algorithms
USENIX Security '19 - Embracing the "Hack." A Better Strategy for Team-Defense
USENIX Security '19 - Lessons Learned About Building Secure Software: It's About the Developers!
USENIX Security '19 - GRIMOIRE: Synthesizing Structure while Fuzzing
USENIX Security '19 - ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the
USENIX Security '19 - Security Educational Panel
USENIX Security '19 - Small World with High Risks: A Study of Security Threats in the npm Ecosystem
USENIX Security '19 - Less is More: Quantifying the Security Benefits of Debloating Web Applications
USENIX Security '19 - The Spies Hacking our Phones are Going Dark, and We're All in Trouble
USENIX Security '19 - What Are You Searching For? A Remote Keylogging Attack
USENIX Security '19 - A Systematic Evaluation of Transient Execution Attacks and Defenses
USENIX Security '19 - Understanding and Improving Security and Privacy in Multi-User
USENIX Security '19 - Wireless Attacks on Aircraft Instrument Landing Systems
USENIX Security '19 - Security Research and Public Policy
USENIX Security '19 - Shining Light on Internet-based Crimes Against Children
USENIX Security '19 - Origin-sensitive Control Flow Integrity
USENIX Security '19 - Hiding in Plain Signal: Physical Signal Overshadowing Attack on LTE