USENIX Security '20 - Understanding security mistakes developers make: Qualitative analysis...
USENIX Security '20 - That Was Then, This Is Now: A Security Evaluation of Password Generation
USENIX Security '20 - High Accuracy and High Fidelity Extraction of Neural Networks
USENIX Security '20 - The Industrial Age of Hacking
USENIX Security '20 - Certified Side Channels
USENIX Security '20 - Automating the Development of Chosen Ciphertext Attacks
USENIX Security '20 - Remote Side-Channel Attacks on Anonymous Transactions
USENIX Security '20 - Who's Calling? Characterizing Robocalls through Audio and Metadata Analysis
USENIX Security '20 - Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis
USENIX Security '20 - Secure parallel computation on national scale volumes of data
USENIX Security '20 - A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis
USENIX Security '20 - On Training Robust PDF Malware Classifiers
USENIX Security '20 - Datalog Disassembly
USENIX Security '20 - Achieving Keyless CDNs with Conclaves
USENIX Security '20 - EPIC: Every Packet Is Checked in the Data Plane of a Path-Aware Internet
USENIX Security '20 - CopyCat: Controlled Instruction-Level Attacks on Enclaves
USENIX Security '20 - An Off-Chip Attack on Hardware Enclaves via the Memory Bus
USENIX Security '20 - P2IM: Scalable and Hardware-independent Firmware Testing via Automatic
USENIX Security '20 - DeepHammer: Depleting the Intelligence of Deep Neural Networks through Target
USENIX Security '20 - SHA-1 is a Shambles: First Chosen-Prefix Collision on SHA-1 and Application