Biblio

Export 12686 results:
2024
Pegoraro A, Segna C, Kumari K, Sadeghi A-R.  2024.  DeepEclipse: How to Break White-Box DNN-Watermarking Schemes. 33rd USENIX Security Symposium (USENIX Security 24). :5287--5304.
Xia T, Hu H, Wu D.  2024.  DEEPTYPE: Refining Indirect Call Targets with Strong Multi-layer Type Analysis. 33rd USENIX Security Symposium (USENIX Security 24). :5877--5894.
Maar L, Draschbacher F, Lamster L, Mangard S.  2024.  Defects-in-Depth: Analyzing the Integration of Effective Defenses against One-Day Exploits in Android Kernels. 33rd USENIX Security Symposium (USENIX Security 24). :4517--4534.
Tan Q, Li Q, Zhao Y, Liu Z, Guo X, Xu K.  2024.  Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach. 33rd USENIX Security Symposium (USENIX Security 24). :325--342.
Liu L, Li Y, Li H, Yang J, Liu W, Lan J, Wang Y, Li J, Wu J, Wu Q et al..  2024.  Democratizing Direct-to-Cell Low Earth Orbit Satellite Networks. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :791--808.
He Y, Guan Y, Lun R, Song S, Guo Z, Zhuge J, Chen J, Wei Q, Wu Z, Yu M et al..  2024.  Demystifying the Security Implications in IoT Device Rental Services. 33rd USENIX Security Symposium (USENIX Security 24). :6579--6596.
Jiao Z, Zhang X, Shin H, Choi J, Kim BS.  2024.  The Design and Implementation of a Capacity-Variant Storage System. 22nd USENIX Conference on File and Storage Technologies (FAST 24). :159--176.
Wu Y, Gui X, Luo Y, Li Y.  2024.  Designing the Informing Process with Streamers and Bystanders in Live Streaming. Twentieth Symposium on Usable Privacy and Security (SOUPS 2024). :315--332.
Thirumuruganathan S, Deniz F, Khalil I, Yu T, Nabeel M, Ouzzani M.  2024.  Detecting and Mitigating Sampling Bias in Cybersecurity with Unlabeled Data. 33rd USENIX Security Symposium (USENIX Security 24). :1741--1758.
Liu D, Lu Z, Ji S, Lu K, Chen J, Liu Z, Liu D, Cai R, He Q.  2024.  Detecting Kernel Memory Bugs through Inconsistent Memory Management Intention Inferences. 33rd USENIX Security Symposium (USENIX Security 24). :4069--4086.
Jiang Z-M, Su Z.  2024.  Detecting Logic Bugs in Database Engines via Equivalent Expression Transformation. 18th USENIX Symposium on Operating Systems Design and Implementation (OSDI 24). :821--835.
Chen M, Xu X, Lu L, Ba Z, Lin F, Ren K.  2024.  Devil in the Room: Triggering Audio Backdoors in the Physical World. 33rd USENIX Security Symposium (USENIX Security 24). :7285--7302.
Zou M, Khan A, Wu R, Gao H, Bianchi A, Tian D.  2024.  D-Helix: A Generic Decompiler Testing Framework Using Symbolic Differentiation. 33rd USENIX Security Symposium (USENIX Security 24). :397--414.
Wang Z, Hu H, Kong L, Kang X, Xiang Q, Li J, Lu Y, Song Z, Yang P, Wu J et al..  2024.  Diagnosing Application-network Anomalies for Millions of IPs in Production Clouds. 2024 USENIX Annual Technical Conference (USENIX ATC 24). :885--899.
Meeus M, Jain S, Rei M, de Montjoye Y-A.  2024.  Did the Neurons Read your Book? Document-level Membership Inference for Large Language Models 33rd USENIX Security Symposium (USENIX Security 24). :2369--2385.
Qin L, Hamilton V, Wang S, Aydinalp Y, Scarlett M, Redmiles EM.  2024.  "Did They F***ing Consent to That?": Safer Digital Intimacy via Proactive Protection Against Image-Based Sexual Abuse 33rd USENIX Security Symposium (USENIX Security 24). :55--72.
Williams H, Ahmad S, Hicks M.  2024.  A Difference World: High-performance, NVM-invariant, Software-only Intermittent Computation. 2024 USENIX Annual Technical Conference (USENIX ATC 24). :1223--1238.
Li C, Pang R, Cao B, Xi Z, Chen J, Ji S, Wang T.  2024.  On the Difficulty of Defending Contrastive Learning against Backdoor Attacks. 33rd USENIX Security Symposium (USENIX Security 24). :2901--2918.
Gegenhuber GK, Holzbauer F, Frenzel PÉ, Weippl E, Dabrowski A.  2024.  Diffie-Hellman Picture Show: Key Exchange Stories from Commercial VoWiFi Deployments. 33rd USENIX Security Symposium (USENIX Security 24). :451--468.
Ablove A, Chandrashekaran S, Le H, Raman RSundara, Ramesh R, Oppenheimer H, Ensafi R.  2024.  Digital Discrimination of Users in Sanctioned States: The Case of the Cuba Embargo. 33rd USENIX Security Symposium (USENIX Security 24). :3909--3926.
Baumer T, Reittinger T, Kern S, Pernul G.  2024.  Digital Nudges for Access Reviews: Guiding Deciders to Revoke Excessive Authorizations. Twentieth Symposium on Usable Privacy and Security (SOUPS 2024). :239--258.
Zhou Y, Xiang X, Kiley M, Dharanipragada S, Yu M.  2024.  DINT: Fast In-Kernel Distributed Transactions with eBPF. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :401--417.
Ogut A, Turanlioglu B, Metiner DCan, Levi A, Yilmaz C, Çetin O, Uluagac S.  2024.  Dissecting Privacy Perspectives of Websites Around the World: "Aceptar Todo, Alle Akzeptieren, Accept All...". 33rd USENIX Security Symposium (USENIX Security 24). :2849--2863.
Huang J, Zhang Z, Zheng S, Qin F, Wang Y.  2024.  DISTMM: Accelerating Distributed Multimodal Model Training. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :1157--1171.
Zhong Y, Liu S, Chen J, Hu J, Zhu Y, Liu X, Jin X, Zhang H.  2024.  DistServe: Disaggregating Prefill and Decoding for Goodput-optimized Large Language Model Serving. 18th USENIX Symposium on Operating Systems Design and Implementation (OSDI 24). :193--210.

Pages