USENIX Security '20 - Understanding security mistakes developers make: Qualitative analysis...
USENIX Security '20 - Exploring Connections Between Active Learning and Model Extraction
USENIX Security '20 - The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis
USENIX Security '20 - Certified Side Channels
USENIX Security '20 - The Industrial Age of Hacking
USENIX Security '20 - An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses
USENIX Security '20 - Composition Kills: A Case Study of Email Sender Authentication
USENIX Security '20 - A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web
USENIX Security '20 - APEX: A Verified Architecture for Proofs of Execution on Remote Devices...
USENIX Security '20 - You Are What You Broadcast: Identification of Mobile and IoT Devices...
USENIX Security '20 - Analysis of DTLS Implementations Using Protocol State Fuzzing
USENIX Security '20 - Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow
USENIX Security '20 - A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis
USENIX Security '20 - From Needs to Actions to Secure Apps? The Effect of Requirements...
USENIX Security '20 - From Control Model to Program: Investigating Robotic Aerial Vehicle Accidents
USENIX Security '20 - V0LTpwn: Attacking x86 Processor Integrity from Software
USENIX Security '20 - An Observational Investigation of Reverse Engineers’ Processes
USENIX Security '20 - AURORA: Statistical Crash Analysis for Automated Root Cause Explanation
USENIX Security '20 - A Tale of Two Headers: A Formal Analysis of Inconsistent Click-Jacking...