1. Erdem Alkim Léo Ducas Thomas Pöppelmann and Peter Schwabe. 2016. Postquantum key exchange-a new hope. In USENIX Security. 327--343. Erdem Alkim Léo Ducas Thomas Pöppelmann and Peter Schwabe. 2016. Postquantum key exchange-a new hope. In USENIX Security. 327--343.
2. Sumayah Alrwais Kan Yuan Eihal Alowaisheq Zhou Li and XiaoFeng Wang. 2014. Understanding the dark side of domain parking. In USENIX Security. 207-- 222. Sumayah Alrwais Kan Yuan Eihal Alowaisheq Zhou Li and XiaoFeng Wang. 2014. Understanding the dark side of domain parking. In USENIX Security. 207-- 222.
3. Dennis Andriesse , Xi Chen , Victor Van Der Veen , Asia Slowinska, and Herbert Bos. 2016 . An in-depth analysis of disassembly on full-scale x86/x64 binaries. In USENIX Security . 583--600. Dennis Andriesse, Xi Chen, Victor Van Der Veen, Asia Slowinska, and Herbert Bos. 2016. An in-depth analysis of disassembly on full-scale x86/x64 binaries. In USENIX Security. 583--600.
4. Frederico Araujo W Kevin etal 2015. Compiler-instrumented dynamic secretredaction of legacy processes for attacker deception. In USENIX Security. 145--159. Frederico Araujo W Kevin et al. 2015. Compiler-instrumented dynamic secretredaction of legacy processes for attacker deception. In USENIX Security. 145--159.
5. Eli Ben-Sasson Alessandro Chiesa Eran Tromer and Madars Virza. 2014. Succinct non-interactive zero knowledge for a von Neumann architecture. In USENIX Security. 781--796. Eli Ben-Sasson Alessandro Chiesa Eran Tromer and Madars Virza. 2014. Succinct non-interactive zero knowledge for a von Neumann architecture. In USENIX Security. 781--796.