Search Results
USENIX Security '20 - PHMon: A Programmable Hardware Monitor and Its Security Use Cases
USENIX Security '20 - Secure parallel computation on national scale volumes of data
USENIX Security '20 - The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis
USENIX Security '21 - Automatic Firmware Emulation through Invalidity-guided Knowledge Inference
USENIX Security '20 - PKU Pitfalls: Attacks on PKU-based Memory Isolation Systems
USENIX Security '20 - An Off-Chip Attack on Hardware Enclaves via the Memory Bus
Efficient Context-Sensitive CFI Enforcement through a Hardware Monitor
USENIX Security '21 - On the Usability of Authenticity Checks for Hardware Security Tokens
USENIX Security '20 - The Impact of Ad-Blockers on Product Search and Purchase Behavior
USENIX Security '22 - Morphuzz: Bending (Input) Space to Fuzz Virtual Devices
USENIX Security '20 - Fawkes: Protecting Privacy against Unauthorized Deep Learning Models
USENIX Security '18 - Formal Security Analysis of Neural Networks using Symbolic Intervals