Biblio

Export 12686 results:
2024
Namyar P, Arzani B, Beckett R, Segarra S, Raj H, Krishnaswamy U, Govindan R, Kandula S.  2024.  Finding Adversarial Inputs for Heuristics using Multi-level Optimization. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :927--949.
Wu J, Traynor P, Xu D, Tian D, Bianchi A.  2024.  Finding Traceability Attacks in the Bluetooth Low Energy Specification and Its Implementations. 33rd USENIX Security Symposium (USENIX Security 24). :4499--4516.
Xue D, Kallitsis M, Houmansadr A, Ensafi R.  2024.  Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS Handshakes. 33rd USENIX Security Symposium (USENIX Security 24). :2689--2706.
Feng S, Wu Y, Xue W, Pan S, Zou D, Liu Y, Jin H.  2024.  FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection. 33rd USENIX Security Symposium (USENIX Security 24). :1867--1884.
Lou Y, Zhu Y, Song Q, Tan R, Qiao C, Bin Lee W-, Wang J.  2024.  A First Physical-World Trajectory Prediction Attack via LiDAR-induced Deceptions in Autonomous Driving. 33rd USENIX Security Symposium (USENIX Security 24). :6291--6308.
Calderonio G, Ali MMasood, Polakis J.  2024.  Fledging Will Continue Until Privacy Improves: Empirical Analysis of Google's Privacy-Preserving Targeted Advertising. 33rd USENIX Security Symposium (USENIX Security 24). :4121--4138.
Xu D, Ryu J, Shin K, Su P, Li D.  2024.  FlexMem: Adaptive Page Profiling and Migration for Tiered Memory. 2024 USENIX Annual Technical Conference (USENIX ATC 24). :817--833.
Kaviani D, Tan S, Kannan PGovindan, Popa RAda.  2024.  Flock: A Framework for Deploying On-Demand Distributed Trust. 18th USENIX Symposium on Operating Systems Design and Implementation (OSDI 24). :721--743.
Li W, He X, Liu Y, Li K, Chen K, Ge Z, Guan Z, Qi H, Zhang S, Liu G.  2024.  Flow Scheduling with Imprecise Knowledge. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :95--111.
Afek Y, Bremler-Barr A, Danino S, Shavitt Y.  2024.  A Flushing Attack on the DNS Cache. 33rd USENIX Security Symposium (USENIX Security 24). :2299--2314.
Nazari N, Makrani HMohammadi, Fang C, Sayadi H, Rafatirad S, Khasawneh KN, Homayoun H.  2024.  Forget and Rewire: Enhancing the Resilience of Transformer-based Models against Bit-Flip Attacks. 33rd USENIX Security Symposium (USENIX Security 24). :1349--1366.
Ginesin J, von Hippel M, Defloor E, Nita-Rotaru C, Tüxen M.  2024.  A Formal Analysis of SCTP: Attack Synthesis and Patch Verification. 33rd USENIX Security Symposium (USENIX Security 24). :3099--3116.
Delaune S, Lallemand J, Patat G, Roudot F, Sabt M.  2024.  Formal Security Analysis of Widevine through the W3C EME Standard. 33rd USENIX Security Symposium (USENIX Security 24). :6399--6415.
Bhargavan K, Jacomme C, Kiefer F, Schmidt R.  2024.  Formal verification of the PQXDH Post-Quantum key agreement protocol for end-to-end secure messaging. 33rd USENIX Security Symposium (USENIX Security 24). :469--486.
Liu Y, Jia Y, Geng R, Jia J, Gong NZhenqiang.  2024.  Formalizing and Benchmarking Prompt Injection Attacks and Defenses. 33rd USENIX Security Symposium (USENIX Security 24). :1831--1847.
Bailey B, Miller A.  2024.  Formalizing Soundness Proofs of Linear PCP SNARKs. 33rd USENIX Security Symposium (USENIX Security 24). :1489--1506.
Wang K, Xu X, Lu L, Ba Z, Lin F, Ren K.  2024.  FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker Recognition. 33rd USENIX Security Symposium (USENIX Security 24). :7303--7320.
Lei C, Ling Z, Zhang Y, Yang Y, Luo J, Fu X.  2024.  A Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers. 33rd USENIX Security Symposium (USENIX Security 24). :7085--7102.
Ma X, Luo L, Zeng Q.  2024.  From One Thousand Pages of Specification to Unveiling Hidden Bugs: Large Language Model Assisted Fuzzing of Matter IoT Devices. 33rd USENIX Security Symposium (USENIX Security 24). :4783--4800.
Ghafourian T, Micallef N, Patil S.  2024.  From the Childhood Past: Views of Young Adults on Parental Sharing of Children's Photos. 33rd USENIX Security Symposium (USENIX Security 24). :4999--5016.
Yang B, Wei H, Zhu W, Zhang Y, Liu W, Xue W.  2024.  Full Lifecycle Data Analysis on a Large-scale and Leadership Supercomputer: What Can We Learn from It? 2024 USENIX Annual Technical Conference (USENIX ATC 24). :917--933.
Asmita, Oliinyk Y, Scott M, Tsang R, Fang C, Homayoun H.  2024.  Fuzzing BusyBox: Leveraging LLM and Crash Reuse for Embedded Bug Unearthing. 33rd USENIX Security Symposium (USENIX Security 24). :883--900.
Pantelaios N, Kapravelos A.  2024.  FV8: A Forced Execution JavaScript Engine for Detecting Evasive Techniques. 33rd USENIX Security Symposium (USENIX Security 24). :3747--3764.
Shao M, Ding Y.  2024.  FVD-DPM: Fine-grained Vulnerability Detection via Conditional Diffusion Probabilistic Models. 33rd USENIX Security Symposium (USENIX Security 24). :7375--7392.
[Anonymous].  2024.  FwdFL: Efficient Federated Finetuning of Language Models. 2024 USENIX Annual Technical Conference (USENIX ATC 24).

Pages