Title |
Conference |
Tags |
MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs |
29thUSENIXSecuritySymposium-2020 - Berkeley, USA |
|
Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts |
IEEEEuroS&P-2019 - Stockholm, Sweden |
|
Towards Practical Differentially Private Convex Optimization |
IEEESymposium-2019 - San Francisco, US |
|
Adversarial Example Defense: Ensembles of Weak Defenses are not Strong |
woot-2017 - vancouver,canada |
|
VTrust: Regaining Trust on Virtual Calls |
NDSS-2016 - california,usa |
|
Next-Generation Security Technologies in a Connected and Intelligent World |
CRC-2016 - uni of singapore,singapore |
|
Recognizing Functions in Binaries with Neural Networks |
SecuritySymposium-2015 - washington,USA |
|
ASPIRE: Iterative Specification Synthesis for Security |
HOTos-2015 - Katause,Switzerland |
|
VTint: Protecting Virtual Function Tables' Integrity |
NDSS-2015 - san diego,usa |
|
ShadowCrypt: Encrypted Web Applications for Everyone |
CCS-2014 - Scottsdale,USA |
|
Ask us before you download: Lessons from Analyzing 3 Million Android Apps |
CANS-2014 - crete,greece |
|
Code-Pointer Integrity |
OSDI-2014 - broomfield,usa |
|
Apple without a shell - iOS under targeted attack |
VirusBulletin-2014 - seattle,usa |
|
The Emperor’s New Password Manager: Security Analysis of Web-based Password Managers |
usenix-2014 - san diego,usa |
|
Clickjacking Revisited: A Perceptual View of UI Security |
Woot-2014 - san diego,usa |
|
Keynote: Ask us before you download: Lessons from Analyzing 3 Million Android Apps |
MOST-2014 - Sam Framcisco,USA |
|
Next-generation Security Solutions for Emerging Threats |
ASIACCS-2013 - Hangzhou,China |
Security
|
Privacy-Preserving Stream Aggregation with Fault Tolerance |
Financial Cryptography and Data Security-2013 - Bonaire,Netherlands |
|
On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces |
USENIX-2012 - Washington, D.C. |
|
Privilege Separation in HTML5 Applications |
USENIX-2012 - Washington, D.C. |
|
Context-Sensitive Auto-Sanitization in Web Templating Languages Using Type Qualifiers |
Confrence-on-computer-communications-security-2011 - Chicago, USA |
|
Android Permissions Demystified |
Confrence-on-computer-communications-security-2011 - Chicago, USA |
|
Insights From The Inside: A View Of Botnet Management From Infiltration |
3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats-2010 - San Jose, USA |
Security
|
Cross-Origin Javascript Capability Leaks: Detection, Exploitation, And Defense |
18th USENIX Security Symposium-2009 - Montreal, Canada |
Security
|
Towards Automatic Discovery Of Deviations In Binary Implementations With Applications To Error Detection And Fingerprint Generation |
16th USENIX Security Symposium-2007 - Boston, USA |
Security
|
Toward Attack-Agnostic Defenses |
1st USENIX Workshop on Hot Topics in Security-2006 - Vancouver, Canada |
Security
|
Privtrans: Automatically Partitioning Programs For Privilege Separation |
13th USENIX Security Symposium-2004 - San Diego, USA |
Security
|
On Gray-Box Program Tracking For Anomaly Detection |
13th USENIX Security Symposium-2004 - San Diego, USA |
Security
|
Detection |
12th USENIX Security Symposium-2003 - Washington DC, USA |
Security
|
Timing Analysis Of Keystrokes And Timing Attacks On Ssh |
10th USENIX Security Symposium-2001 - Washington DC, USA |
Security
Analysis
|