{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:17:58Z","timestamp":1750220278350,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":70,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T00:00:00Z","timestamp":1645488000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSERC"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,2,22]]},"DOI":"10.1145\/3478431.3499378","type":"proceedings-article","created":{"date-parts":[[2022,2,23]],"date-time":"2022-02-23T00:53:28Z","timestamp":1645577608000},"page":"175-181","source":"Crossref","is-referenced-by-count":0,"title":["Opening Sentences in Academic Writing"],"prefix":"10.1145","author":[{"given":"Didem","family":"Demirag","sequence":"first","affiliation":[{"name":"Concordia University, Montreal, PQ, Canada"}]},{"given":"Jeremy","family":"Clark","sequence":"additional","affiliation":[{"name":"Concordia University, Montreal, PQ, Canada"}]}],"member":"320","published-online":{"date-parts":[[2022,2,22]]},"reference":[{"unstructured":"Erdem Alkim L\u00e9o Ducas Thomas P\u00f6ppelmann and Peter Schwabe. 2016. Postquantum key exchange-a new hope. In USENIX Security. 327--343.  Erdem Alkim L\u00e9o Ducas Thomas P\u00f6ppelmann and Peter Schwabe. 2016. Postquantum key exchange-a new hope. In USENIX Security. 327--343.","key":"e_1_3_2_2_1_1"},{"unstructured":"Sumayah Alrwais Kan Yuan Eihal Alowaisheq Zhou Li and XiaoFeng Wang. 2014. Understanding the dark side of domain parking. In USENIX Security. 207-- 222.  Sumayah Alrwais Kan Yuan Eihal Alowaisheq Zhou Li and XiaoFeng Wang. 2014. Understanding the dark side of domain parking. In USENIX Security. 207-- 222.","key":"e_1_3_2_2_2_1"},{"key":"e_1_3_2_2_3_1","volume-title":"Asia Slowinska, and Herbert Bos.","author":"Andriesse Dennis","year":"2016","unstructured":"Dennis Andriesse , Xi Chen , Victor Van Der Veen , Asia Slowinska, and Herbert Bos. 2016 . An in-depth analysis of disassembly on full-scale x86\/x64 binaries. In USENIX Security . 583--600. Dennis Andriesse, Xi Chen, Victor Van Der Veen, Asia Slowinska, and Herbert Bos. 2016. An in-depth analysis of disassembly on full-scale x86\/x64 binaries. In USENIX Security. 583--600."},{"unstructured":"Frederico Araujo W Kevin etal 2015. Compiler-instrumented dynamic secretredaction of legacy processes for attacker deception. In USENIX Security. 145--159.  Frederico Araujo W Kevin et al. 2015. Compiler-instrumented dynamic secretredaction of legacy processes for attacker deception. In USENIX Security. 145--159.","key":"e_1_3_2_2_4_1"},{"unstructured":"Eli Ben-Sasson Alessandro Chiesa Eran Tromer and Madars Virza. 2014. Succinct non-interactive zero knowledge for a von Neumann architecture. In USENIX Security. 781--796.  Eli Ben-Sasson Alessandro Chiesa Eran Tromer and Madars Virza. 2014. Succinct non-interactive zero knowledge for a von Neumann architecture. In USENIX Security. 781--796.","key":"e_1_3_2_2_5_1"},{"unstructured":"Lennart Beringer Adam Petcher Q Ye Katherine and Andrew W Appel. 2015. Verified Correctness and Security of OpenSSL HMAC. In USENIX Security. 207-- 221.  Lennart Beringer Adam Petcher Q Ye Katherine and Andrew W Appel. 2015. Verified Correctness and Security of OpenSSL HMAC. In USENIX Security. 207-- 221.","key":"e_1_3_2_2_6_1"},{"unstructured":"Joseph Bonneau and Stuart Schechter. 2014. Towards reliable storage of 56-bit secrets in human memory. In USENIX Security. 607--623.  Joseph Bonneau and Stuart Schechter. 2014. Towards reliable storage of 56-bit secrets in human memory. In USENIX Security. 607--623.","key":"e_1_3_2_2_7_1"},{"key":"e_1_3_2_2_8_1","volume-title":"Meerkat: Detecting website defacements through image-based object recognition. In USENIX Security. 595--610.","author":"Borgolte Kevin","year":"2015","unstructured":"Kevin Borgolte , Christopher Kruegel , and Giovanni Vigna . 2015 . Meerkat: Detecting website defacements through image-based object recognition. In USENIX Security. 595--610. Kevin Borgolte, Christopher Kruegel, and Giovanni Vigna. 2015. Meerkat: Detecting website defacements through image-based object recognition. In USENIX Security. 595--610."},{"unstructured":"Matthew Brocker and Stephen Checkoway. 2014. iSeeYou: Disabling the MacBook Webcam Indicator LED. In USENIX Security. 337--352.  Matthew Brocker and Stephen Checkoway. 2014. iSeeYou: Disabling the MacBook Webcam Indicator LED. In USENIX Security. 337--352.","key":"e_1_3_2_2_9_1"},{"unstructured":"Aylin Caliskan-Islam Richard Harang Andrew Liu Arvind Narayanan Clare Voss Fabian Yamaguchi and Rachel Greenstadt. 2015. De-anonymizing programmers via code stylometry. In USENIX Security. 255--270.  Aylin Caliskan-Islam Richard Harang Andrew Liu Arvind Narayanan Clare Voss Fabian Yamaguchi and Rachel Greenstadt. 2015. De-anonymizing programmers via code stylometry. In USENIX Security. 255--270.","key":"e_1_3_2_2_10_1"},{"unstructured":"Nicholas Carlini and David Wagner. 2014. ROP is still dangerous: Breaking modern defenses. In USENIX Security. 385--399.  Nicholas Carlini and David Wagner. 2014. ROP is still dangerous: Breaking modern defenses. In USENIX Security. 385--399.","key":"e_1_3_2_2_11_1"},{"unstructured":"Marco Caselli Emmanuele Zambon Johanna Amann Robin Sommer and Frank Kargl. 2016. Specification mining for intrusion detection in networked control systems. In USENIX Security. 791--806.  Marco Caselli Emmanuele Zambon Johanna Amann Robin Sommer and Frank Kargl. 2016. Specification mining for intrusion detection in networked control systems. In USENIX Security. 791--806.","key":"e_1_3_2_2_12_1"},{"unstructured":"Kai Chen Peng Wang Yeonjoon Lee XiaoFeng Wang Nan Zhang Heqing Huang Wei Zou and Peng Liu. 2015. Finding unknown malice in 10 seconds: Mass vetting for new threats at the google-play scale. In USENIX Security. 659--674.  Kai Chen Peng Wang Yeonjoon Lee XiaoFeng Wang Nan Zhang Heqing Huang Wei Zou and Peng Liu. 2015. Finding unknown malice in 10 seconds: Mass vetting for new threats at the google-play scale. In USENIX Security. 659--674.","key":"e_1_3_2_2_13_1"},{"unstructured":"Kyong-Tak Cho and Kang G Shin. 2016. Fingerprinting electronic control units for vehicle intrusion detection. In USENIX Security. 911--927.  Kyong-Tak Cho and Kang G Shin. 2016. Fingerprinting electronic control units for vehicle intrusion detection. In USENIX Security. 911--927.","key":"e_1_3_2_2_14_1"},{"key":"e_1_3_2_2_15_1","volume-title":"CC2020","author":"Clear Alison","year":"2020","unstructured":"Alison Clear and Allen Parrish . December 31 , 2020 . A Computing Curricula Series Report , CC2020 . Technical Report. Association for Computing Machinery (ACM), IEEE Computer Society (IEEE-CS). Alison Clear and Allen Parrish. December 31, 2020. A Computing Curricula Series Report, CC2020. Technical Report. Association for Computing Machinery (ACM), IEEE Computer Society (IEEE-CS)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_16_1","DOI":"10.1145\/3017680.3017690"},{"unstructured":"Andrei Costin Jonas Zaddach Aur\u00e9lien Francillon and Davide Balzarotti. 2014. A large-scale analysis of the security of embedded firmwares. In USENIX Security. 95--110.  Andrei Costin Jonas Zaddach Aur\u00e9lien Francillon and Davide Balzarotti. 2014. A large-scale analysis of the security of embedded firmwares. In USENIX Security. 95--110.","key":"e_1_3_2_2_17_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_18_1","DOI":"10.1145\/135250.134519"},{"unstructured":"Lucas Davi Ahmad-Reza Sadeghi Daniel Lehmann and Fabian Monrose. 2014. Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection. In USENIX Security. 401--416.  Lucas Davi Ahmad-Reza Sadeghi Daniel Lehmann and Fabian Monrose. 2014. Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection. In USENIX Security. 401--416.","key":"e_1_3_2_2_19_1"},{"unstructured":"Daniel Demmler Thomas Schneider and Michael Zohner. 2014. Ad-hoc secure two-party computation on mobile devices using hardware tokens. In USENIX Security. 893--908.  Daniel Demmler Thomas Schneider and Michael Zohner. 2014. Ad-hoc secure two-party computation on mobile devices using hardware tokens. In USENIX Security. 893--908.","key":"e_1_3_2_2_20_1"},{"unstructured":"Alessandro Di Federico Amat Cama Yan Shoshitaishvili Christopher Kruegel and Giovanni Vigna. 2015. How the ELF Ruined Christmas. In USENIX Security. 643--658.  Alessandro Di Federico Amat Cama Yan Shoshitaishvili Christopher Kruegel and Giovanni Vigna. 2015. How the ELF Ruined Christmas. In USENIX Security. 643--658.","key":"e_1_3_2_2_21_1"},{"key":"e_1_3_2_2_22_1","volume-title":"Beng Chin Ooi, and Chunwang Zhang","author":"Anh Dinh Tien Tuan","year":"2015","unstructured":"Tien Tuan Anh Dinh , Prateek Saxena , Ee-Chien Chang , Beng Chin Ooi, and Chunwang Zhang . 2015 . M2r: Enabling stronger privacy in mapreduce computation. In USENIX Security . 447--462. Tien Tuan Anh Dinh, Prateek Saxena, Ee-Chien Chang, Beng Chin Ooi, and Chunwang Zhang. 2015. M2r: Enabling stronger privacy in mapreduce computation. In USENIX Security. 447--462."},{"unstructured":"Benjamin Dowling Douglas Stebila and Greg Zaverucha. 2016. Authenticated network time synchronization. In USENIX Security. 823--840.  Benjamin Dowling Douglas Stebila and Greg Zaverucha. 2016. Authenticated network time synchronization. In USENIX Security. 823--840.","key":"e_1_3_2_2_23_1"},{"unstructured":"Manuel Egele Maverick Woo Peter Chapman and David Brumley. 2014. Blanket execution: Dynamic similarity testing for program binaries and components. In USENIX Security. 303--317.  Manuel Egele Maverick Woo Peter Chapman and David Brumley. 2014. Blanket execution: Dynamic similarity testing for program binaries and components. In USENIX Security. 303--317.","key":"e_1_3_2_2_24_1"},{"key":"e_1_3_2_2_25_1","volume-title":"Why Stephen King Spends \"Months and Even Years' Writing Opening Sentences. The Atlantic (July","author":"Fasser Joe","year":"2013","unstructured":"Joe Fasser . 2013. Why Stephen King Spends \"Months and Even Years' Writing Opening Sentences. The Atlantic (July 2013 ). Joe Fasser. 2013. Why Stephen King Spends \"Months and Even Years' Writing Opening Sentences. The Atlantic (July 2013)."},{"key":"e_1_3_2_2_26_1","volume-title":"Bohatei: Flexible and elastic ddos defense. In USENIX Security. 817--832.","author":"Fayaz Seyed K","year":"2015","unstructured":"Seyed K Fayaz , Yoshiaki Tobioka , Vyas Sekar , and Michael Bailey . 2015 . Bohatei: Flexible and elastic ddos defense. In USENIX Security. 817--832. Seyed K Fayaz, Yoshiaki Tobioka, Vyas Sekar, and Michael Bailey. 2015. Bohatei: Flexible and elastic ddos defense. In USENIX Security. 817--832."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_27_1","DOI":"10.1145\/236462.236540"},{"key":"e_1_3_2_2_28_1","volume-title":"Z\u00d8: An optimizing distributing zero-knowledge compiler. In USENIX Security. 909--924.","author":"Fredrikson Matthew","year":"2014","unstructured":"Matthew Fredrikson and Benjamin Livshits . 2014 . Z\u00d8: An optimizing distributing zero-knowledge compiler. In USENIX Security. 909--924. Matthew Fredrikson and Benjamin Livshits. 2014. Z\u00d8: An optimizing distributing zero-knowledge compiler. In USENIX Security. 909--924."},{"unstructured":"Flavio D Garcia David Oswald Timo Kasper and Pierre Pavlid\u00e8s. 2016. Lock it and still lose it-on the (in) security of automotive remote keyless entry systems. In USENIX Security.  Flavio D Garcia David Oswald Timo Kasper and Pierre Pavlid\u00e8s. 2016. Lock it and still lose it-on the (in) security of automotive remote keyless entry systems. In USENIX Security.","key":"e_1_3_2_2_29_1"},{"doi-asserted-by":"crossref","unstructured":"Alan Garvey. 2010. Writing in an Upper-Level CS Course. In SIGCSE.  Alan Garvey. 2010. Writing in an Upper-Level CS Course. In SIGCSE.","key":"e_1_3_2_2_30_1","DOI":"10.1145\/1734263.1734337"},{"key":"e_1_3_2_2_31_1","volume-title":"The discovery of grounded theory","author":"Glaser Barney G","year":"1967","unstructured":"Barney G Glaser and Anselm L Strauss . 1967. The discovery of grounded theory ; strategies for qualitative research. ( 1967 ). Barney G Glaser and Anselm L Strauss. 1967. The discovery of grounded theory; strategies for qualitative research. (1967)."},{"unstructured":"Mariano Graziano Davide Canali Leyla Bilge Andrea Lanzi Elaine Shi Davide Balzarotti Marten van Dijk Michael Bailey Srinivas Devadas Mingyan Liu etal 2015. Needles in a haystack: Mining information from public dynamic analysis sandboxes for malware intelligence. In USENIX Security. 1057--1072.  Mariano Graziano Davide Canali Leyla Bilge Andrea Lanzi Elaine Shi Davide Balzarotti Marten van Dijk Michael Bailey Srinivas Devadas Mingyan Liu et al. 2015. Needles in a haystack: Mining information from public dynamic analysis sandboxes for malware intelligence. In USENIX Security. 1057--1072.","key":"e_1_3_2_2_32_1"},{"unstructured":"Ethan Heilman Alison Kendler Aviv Zohar and Sharon Goldberg. 2015. Eclipse attacks on bitcoin's peer-to-peer network. In USENIX Security. 129--144.  Ethan Heilman Alison Kendler Aviv Zohar and Sharon Goldberg. 2015. Eclipse attacks on bitcoin's peer-to-peer network. In USENIX Security. 129--144.","key":"e_1_3_2_2_33_1"},{"key":"e_1_3_2_2_34_1","volume-title":"Moheeb Abu Rajab, and Kurt Thomas","author":"Jagpal Nav","year":"2015","unstructured":"Nav Jagpal , Eric Dingle , Jean-Philippe Gravel , Panayiotis Mavrommatis , Niels Provos , Moheeb Abu Rajab, and Kurt Thomas . 2015 . Trends and lessons from three years fighting malicious extensions. In USENIX Security . 579--593. Nav Jagpal, Eric Dingle, Jean-Philippe Gravel, Panayiotis Mavrommatis, Niels Provos, Moheeb Abu Rajab, and Kurt Thomas. 2015. Trends and lessons from three years fighting malicious extensions. In USENIX Security. 579--593."},{"key":"e_1_3_2_2_35_1","volume-title":"Samuel Roth, and Baishakhi Ray.","author":"Jana Suman","year":"2016","unstructured":"Suman Jana , Yuan Jochen Kang , Samuel Roth, and Baishakhi Ray. 2016 . Automatically detecting error handling bugs using error specifications. In USENIX Security . 345--362. Suman Jana, Yuan Jochen Kang, Samuel Roth, and Baishakhi Ray. 2016. Automatically detecting error handling bugs using error specifications. In USENIX Security. 345--362."},{"doi-asserted-by":"crossref","unstructured":"David G Kay. 1998. Computer scientists can teach writing: an upper division course for computer science majors. In SIGCSE. 117--120.  David G Kay. 1998. Computer scientists can teach writing: an upper division course for computer science majors. In SIGCSE. 117--120.","key":"e_1_3_2_2_36_1","DOI":"10.1145\/274790.273174"},{"unstructured":"Vasileios P Kemerlis Michalis Polychronakis and Angelos D Keromytis. 2014. ret2dir: Rethinking kernel isolation. In USENIX Security. 957--972.  Vasileios P Kemerlis Michalis Polychronakis and Angelos D Keromytis. 2014. ret2dir: Rethinking kernel isolation. In USENIX Security. 957--972.","key":"e_1_3_2_2_37_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_38_1","DOI":"10.1001\/jama.1967.03130190141022"},{"key":"e_1_3_2_2_39_1","volume-title":"Cormac Herley, and Stuart Schechter.","author":"Komanduri Saranga","year":"2014","unstructured":"Saranga Komanduri , Richard Shay , Lorrie Faith Cranor , Cormac Herley, and Stuart Schechter. 2014 . Telepathwords : Preventing weak passwords by reading users' minds. In USENIX Security . 591--606. Saranga Komanduri, Richard Shay, Lorrie Faith Cranor, Cormac Herley, and Stuart Schechter. 2014. Telepathwords: Preventing weak passwords by reading users' minds. In USENIX Security. 591--606."},{"key":"e_1_3_2_2_40_1","volume-title":"Prateek Saxena, and Engin Kirda.","author":"Blond Stevens Le","year":"2014","unstructured":"Stevens Le Blond , Adina Uritesc , C\u00e9dric Gilbert , Zheng Leong Chua , Prateek Saxena, and Engin Kirda. 2014 . A look at targeted attacks through the lense of an NGO. In USENIX Security . 543--558. Stevens Le Blond, Adina Uritesc, C\u00e9dric Gilbert, Zheng Leong Chua, Prateek Saxena, and Engin Kirda. 2014. A look at targeted attacks through the lense of an NGO. In USENIX Security. 543--558."},{"key":"e_1_3_2_2_41_1","volume-title":"Xray: Enhancing the web's transparency with differential correlation. In USENIX Security. 49--64.","author":"L\u00e9cuyer Mathias","year":"2014","unstructured":"Mathias L\u00e9cuyer , Guillaume Ducoffe , Francis Lan , Andrei Papancea , Theofilos Petsios , Riley Spahn , Augustin Chaintreau , and Roxana Geambasu . 2014 . Xray: Enhancing the web's transparency with differential correlation. In USENIX Security. 49--64. Mathias L\u00e9cuyer, Guillaume Ducoffe, Francis Lan, Andrei Papancea, Theofilos Petsios, Riley Spahn, Augustin Chaintreau, and Roxana Geambasu. 2014. Xray: Enhancing the web's transparency with differential correlation. In USENIX Security. 49--64."},{"unstructured":"Sebastian Lekies Ben Stock Martin Wentzel and Martin Johns. 2015. The unexpected dangers of dynamic javascript. In USENIX Security. 723--735.  Sebastian Lekies Ben Stock Martin Wentzel and Martin Johns. 2015. The unexpected dangers of dynamic javascript. In USENIX Security. 723--735.","key":"e_1_3_2_2_42_1"},{"key":"e_1_3_2_2_43_1","volume-title":"SDDR: Light-Weight, Secure Mobile Encounters. In USENIX Security. 925--940.","author":"Lentz Matthew","year":"2014","unstructured":"Matthew Lentz , Viktor Erd\u00e9lyi , Paarijaat Aditya , Elaine Shi , Peter Druschel , and Bobby Bhattacharjee . 2014 . SDDR: Light-Weight, Secure Mobile Encounters. In USENIX Security. 925--940. Matthew Lentz, Viktor Erd\u00e9lyi, Paarijaat Aditya, Elaine Shi, Peter Druschel, and Bobby Bhattacharjee. 2014. SDDR: Light-Weight, Secure Mobile Encounters. In USENIX Security. 925--940."},{"unstructured":"Zhiwei Li Warren He Devdatta Akhawe and Dawn Song. 2014. The emperor's new password manager: Security analysis of web-based password managers. In USENIX Security. 465--479.  Zhiwei Li Warren He Devdatta Akhawe and Dawn Song. 2014. The emperor's new password manager: Security analysis of web-based password managers. In USENIX Security. 465--479.","key":"e_1_3_2_2_44_1"},{"key":"e_1_3_2_2_45_1","volume-title":"CONIKS: Bringing Key Transparency to End Users. In USENIX Security. 383--398.","author":"Melara Marcela S","year":"2015","unstructured":"Marcela S Melara , Aaron Blankstein , Joseph Bonneau , Edward W Felten , and Michael J Freedman . 2015 . CONIKS: Bringing Key Transparency to End Users. In USENIX Security. 383--398. Marcela S Melara, Aaron Blankstein, Joseph Bonneau, Edward W Felten, and Michael J Freedman. 2015. CONIKS: Bringing Key Transparency to End Users. In USENIX Security. 383--398."},{"unstructured":"Christopher Meyer Juraj Somorovsky Eugen Weiss J\u00f6rg Schwenk Sebastian Schinzel and Erik Tews. 2014. Revisiting SSL\/TLS implementations: New bleichenbacher side channels and attacks. In USENIX Security. 733--748.  Christopher Meyer Juraj Somorovsky Eugen Weiss J\u00f6rg Schwenk Sebastian Schinzel and Erik Tews. 2014. Revisiting SSL\/TLS implementations: New bleichenbacher side channels and attacks. In USENIX Security. 733--748.","key":"e_1_3_2_2_46_1"},{"key":"e_1_3_2_2_47_1","volume-title":"Dan Boneh, and Gabi Nakibly.","author":"Michalevsky Yan","year":"2015","unstructured":"Yan Michalevsky , Aaron Schulman , Gunaa Arumugam Veerapandian , Dan Boneh, and Gabi Nakibly. 2015 . Powerspy : Location tracking using mobile device power analysis. In USENIX Security . 785--800. Yan Michalevsky, Aaron Schulman, Gunaa Arumugam Veerapandian, Dan Boneh, and Gabi Nakibly. 2015. Powerspy: Location tracking using mobile device power analysis. In USENIX Security. 785--800."},{"doi-asserted-by":"crossref","unstructured":"Joe Mir\u00f3 Juli\u00e0. 2011. An engineering approach to teaching writing.. In SIGCSE.  Joe Mir\u00f3 Juli\u00e0. 2011. An engineering approach to teaching writing.. In SIGCSE.","key":"e_1_3_2_2_48_1","DOI":"10.1145\/1953163.1953315"},{"unstructured":"Gabi Nakibly Jaime Schcolnik and Yossi Rubin. 2016. Website-targeted false content injection by network operators. In USENIX Security. 227--244.  Gabi Nakibly Jaime Schcolnik and Yossi Rubin. 2016. Website-targeted false content injection by network operators. In USENIX Security. 227--244.","key":"e_1_3_2_2_49_1"},{"key":"e_1_3_2_2_50_1","volume-title":"Uipicker: User-input privacy identification in mobile applications. In USENIX Security. 993--1008.","author":"Nan Yuhong","year":"2015","unstructured":"Yuhong Nan , Min Yang , Zhemin Yang , Shunfan Zhou , Guofei Gu , and XiaoFeng Wang . 2015 . Uipicker: User-input privacy identification in mobile applications. In USENIX Security. 993--1008. Yuhong Nan, Min Yang, Zhemin Yang, Shunfan Zhou, Guofei Gu, and XiaoFeng Wang. 2015. Uipicker: User-input privacy identification in mobile applications. In USENIX Security. 993--1008."},{"key":"e_1_3_2_2_51_1","volume-title":"Webwitness: Investigating, categorizing, and mitigating malware download paths. In USENIX Security. 1025--1040.","author":"Nelms Terry","year":"2015","unstructured":"Terry Nelms , Roberto Perdisci , Manos Antonakakis , and Mustaque Ahamad . 2015 . Webwitness: Investigating, categorizing, and mitigating malware download paths. In USENIX Security. 1025--1040. Terry Nelms, Roberto Perdisci, Manos Antonakakis, and Mustaque Ahamad. 2015. Webwitness: Investigating, categorizing, and mitigating malware download paths. In USENIX Security. 1025--1040."},{"unstructured":"Marten Oltrogge Yasemin Acar Sergej Dechand Matthew Smith and Sascha Fahl. 2015. To Pin or Not to Pin-Helping App Developers Bullet Proof Their TLS Connections. In USENIX Security. 239--254.  Marten Oltrogge Yasemin Acar Sergej Dechand Matthew Smith and Sascha Fahl. 2015. To Pin or Not to Pin-Helping App Developers Bullet Proof Their TLS Connections. In USENIX Security. 239--254.","key":"e_1_3_2_2_52_1"},{"unstructured":"Yossef Oren and Angelos D Keromytis. 2014. From the aether to the ethernet- attacking the internet using broadcast digital television. In USENIX Security. 353--368.  Yossef Oren and Angelos D Keromytis. 2014. From the aether to the ethernet- attacking the internet using broadcast digital television. In USENIX Security. 353--368.","key":"e_1_3_2_2_53_1"},{"unstructured":"Erman Pattuk Murat Kantarcioglu Zhiqiang Lin and Huseyin Ulusoy. 2014. Preventing cryptographic key leakage in cloud virtual machines. In USENIX Security. 703--718.  Erman Pattuk Murat Kantarcioglu Zhiqiang Lin and Huseyin Ulusoy. 2014. Preventing cryptographic key leakage in cloud virtual machines. In USENIX Security. 703--718.","key":"e_1_3_2_2_54_1"},{"doi-asserted-by":"crossref","unstructured":"Linda H Pesante. 1991. Integrating writing into computer science courses. In SIGCSE. 205--209.  Linda H Pesante. 1991. Integrating writing into computer science courses. In SIGCSE. 205--209.","key":"e_1_3_2_2_55_1","DOI":"10.1145\/107005.107040"},{"volume-title":"The sense of style: The thinking person's guide to writing in the 21st century","author":"Pinker Steven","unstructured":"Steven Pinker . 2015. The sense of style: The thinking person's guide to writing in the 21st century . Penguin Books . Steven Pinker. 2015. The sense of style: The thinking person's guide to writing in the 21st century. Penguin Books.","key":"e_1_3_2_2_56_1"},{"key":"e_1_3_2_2_57_1","volume-title":"Raccoon: Closing digital sidechannels through obfuscated execution. In USENIX Security. 431--446.","author":"Rane Ashay","year":"2015","unstructured":"Ashay Rane , Calvin Lin , and Mohit Tiwari . 2015 . Raccoon: Closing digital sidechannels through obfuscated execution. In USENIX Security. 431--446. Ashay Rane, Calvin Lin, and Mohit Tiwari. 2015. Raccoon: Closing digital sidechannels through obfuscated execution. In USENIX Security. 431--446."},{"key":"e_1_3_2_2_58_1","volume-title":"Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, and David Brumley.","author":"Rebert Alexandre","year":"2014","unstructured":"Alexandre Rebert , Sang Kil Cha , Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, and David Brumley. 2014 . Optimizing seed selection for fuzzing. In USENIX Security . 861--875. Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, and David Brumley. 2014. Optimizing seed selection for fuzzing. In USENIX Security. 861--875."},{"key":"e_1_3_2_2_59_1","volume-title":"DSCRETE: Automatic rendering of forensic information from memory images via application logic reuse. In USENIX Security. 255--269.","author":"Saltaformaggio Brendan","year":"2014","unstructured":"Brendan Saltaformaggio , Zhongshu Gu , Xiangyu Zhang , and Dongyan Xu . 2014 . DSCRETE: Automatic rendering of forensic information from memory images via application logic reuse. In USENIX Security. 255--269. Brendan Saltaformaggio, Zhongshu Gu, Xiangyu Zhang, and Dongyan Xu. 2014. DSCRETE: Automatic rendering of forensic information from memory images via application logic reuse. In USENIX Security. 255--269."},{"unstructured":"Igor Smolyar Muli Ben-Yehuda and Dan Tsafrir. 2015. Securing self-virtualizing ethernet devices. In USENIX Security. 335--350.  Igor Smolyar Muli Ben-Yehuda and Dan Tsafrir. 2015. Securing self-virtualizing ethernet devices. In USENIX Security. 335--350.","key":"e_1_3_2_2_60_1"},{"unstructured":"Kyle Soska and Nicolas Christin. 2015. Measuring the longitudinal evolution of the online anonymous marketplace ecosystem. In USENIX Security. 33--48.  Kyle Soska and Nicolas Christin. 2015. Measuring the longitudinal evolution of the online anonymous marketplace ecosystem. In USENIX Security. 33--48.","key":"e_1_3_2_2_61_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_62_1","DOI":"10.1145\/169073.169501"},{"key":"e_1_3_2_2_63_1","volume-title":"Ryan Rasti, Jean-Michel Picod, Cait Phillips, Marc-Andr\u00e9 Decoste, Chris Sharp, Fabio Tirelo, Ali Tofigh, Marc-Antoine Courteau, et al.","author":"Thomas Kurt","year":"2016","unstructured":"Kurt Thomas , Juan A Elices Crespo , Ryan Rasti, Jean-Michel Picod, Cait Phillips, Marc-Andr\u00e9 Decoste, Chris Sharp, Fabio Tirelo, Ali Tofigh, Marc-Antoine Courteau, et al. 2016 . Investigating commercial pay-per-install and the distribution of unwanted software. In USENIX Security . 721--739. Kurt Thomas, Juan A Elices Crespo, Ryan Rasti, Jean-Michel Picod, Cait Phillips, Marc-Andr\u00e9 Decoste, Chris Sharp, Fabio Tirelo, Ali Tofigh, Marc-Antoine Courteau, et al. 2016. Investigating commercial pay-per-install and the distribution of unwanted software. In USENIX Security. 721--739."},{"unstructured":"Omer Tripp and Julia Rubin. 2014. A bayesian approach to privacy enforcement in smartphones. In USENIX Security. 175--190.  Omer Tripp and Julia Rubin. 2014. A bayesian approach to privacy enforcement in smartphones. In USENIX Security. 175--190.","key":"e_1_3_2_2_64_1"},{"unstructured":"Tom Van Goethem Mathy Vanhoef Frank Piessens and Wouter Joosen. 2016. Request and conquer: Exposing cross-origin resource size. In USENIX Security. 447--462.  Tom Van Goethem Mathy Vanhoef Frank Piessens and Wouter Joosen. 2016. Request and conquer: Exposing cross-origin resource size. In USENIX Security. 447--462.","key":"e_1_3_2_2_65_1"},{"unstructured":"Bimal Viswanath M Ahmad Bashir Mark Crovella Saikat Guha Krishna P Gummadi Balachander Krishnamurthy and Alan Mislove. 2014. Towards detecting anomalous user behavior in online social networks. In USENIX Security. 223--238.  Bimal Viswanath M Ahmad Bashir Mark Crovella Saikat Guha Krishna P Gummadi Balachander Krishnamurthy and Alan Mislove. 2014. Towards detecting anomalous user behavior in online social networks. In USENIX Security. 223--238.","key":"e_1_3_2_2_66_1"},{"unstructured":"Yi Xu True Price Jan-Michael Frahm and Fabian Monrose. 2016. Virtual u: Defeating face liveness detection by building virtual models from your public photos. In USENIX Security. 497--512.  Yi Xu True Price Jan-Michael Frahm and Fabian Monrose. 2016. Virtual u: Defeating face liveness detection by building virtual models from your public photos. In USENIX Security. 497--512.","key":"e_1_3_2_2_67_1"},{"unstructured":"Yuval Yarom and Katrina Falkner. 2014. FLUSH+ RELOAD: A high resolution low noise L3 cache side-channel attack. In USENIX Security. 719--732.  Yuval Yarom and Katrina Falkner. 2014. FLUSH+ RELOAD: A high resolution low noise L3 cache side-channel attack. In USENIX Security. 719--732.","key":"e_1_3_2_2_68_1"},{"key":"e_1_3_2_2_69_1","volume-title":"Apisan: Sanitizing API usages through semantic cross-checking. In USENIX Security. 363--378.","author":"Yun Insu","year":"2016","unstructured":"Insu Yun , Changwoo Min , Xujie Si , Yeongjin Jang , Taesoo Kim , and Mayur Naik . 2016 . Apisan: Sanitizing API usages through semantic cross-checking. In USENIX Security. 363--378. Insu Yun, Changwoo Min, Xujie Si, Yeongjin Jang, Taesoo Kim, and Mayur Naik. 2016. Apisan: Sanitizing API usages through semantic cross-checking. In USENIX Security. 363--378."},{"unstructured":"Xiaofeng Zheng Jian Jiang Jinjin Liang Haixin Duan Shuo Chen Tao Wan and Nicholas Weaver. 2015. Cookies lack integrity: Real-world implications. In USENIX Security. 707--721.  Xiaofeng Zheng Jian Jiang Jinjin Liang Haixin Duan Shuo Chen Tao Wan and Nicholas Weaver. 2015. Cookies lack integrity: Real-world implications. In USENIX Security. 707--721.","key":"e_1_3_2_2_70_1"}],"event":{"sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"],"acronym":"SIGCSE 2022","name":"SIGCSE 2022: The 53rd ACM Technical Symposium on Computer Science Education","location":"Providence RI USA"},"container-title":["Proceedings of the 53rd ACM Technical Symposium on Computer Science Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3478431.3499378","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3478431.3499378","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:14Z","timestamp":1750188674000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3478431.3499378"}},"subtitle":["How Security Researchers Defeat the Blinking Cursor"],"short-title":[],"issued":{"date-parts":[[2022,2,22]]},"references-count":70,"alternative-id":["10.1145\/3478431.3499378","10.1145\/3478431"],"URL":"https:\/\/doi.org\/10.1145\/3478431.3499378","relation":{},"subject":[],"published":{"date-parts":[[2022,2,22]]}}}