USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 12686 results:
Finding Adversarial Inputs for Heuristics using Multi-level Optimization. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :927--949.
.
2024. Finding Traceability Attacks in the Bluetooth Low Energy Specification and Its Implementations. 33rd USENIX Security Symposium (USENIX Security 24). :4499--4516.
.
2024. Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS Handshakes. 33rd USENIX Security Symposium (USENIX Security 24). :2689--2706.
.
2024. FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection. 33rd USENIX Security Symposium (USENIX Security 24). :1867--1884.
.
2024. A First Physical-World Trajectory Prediction Attack via LiDAR-induced Deceptions in Autonomous Driving. 33rd USENIX Security Symposium (USENIX Security 24). :6291--6308.
.
2024. Fledging Will Continue Until Privacy Improves: Empirical Analysis of Google's Privacy-Preserving Targeted Advertising. 33rd USENIX Security Symposium (USENIX Security 24). :4121--4138.
.
2024. FlexMem: Adaptive Page Profiling and Migration for Tiered Memory. 2024 USENIX Annual Technical Conference (USENIX ATC 24). :817--833.
.
2024. Flock: A Framework for Deploying On-Demand Distributed Trust. 18th USENIX Symposium on Operating Systems Design and Implementation (OSDI 24). :721--743.
.
2024. Flow Scheduling with Imprecise Knowledge. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :95--111.
.
2024. A Flushing Attack on the DNS Cache. 33rd USENIX Security Symposium (USENIX Security 24). :2299--2314.
.
2024. Forget and Rewire: Enhancing the Resilience of Transformer-based Models against Bit-Flip Attacks. 33rd USENIX Security Symposium (USENIX Security 24). :1349--1366.
.
2024. A Formal Analysis of SCTP: Attack Synthesis and Patch Verification. 33rd USENIX Security Symposium (USENIX Security 24). :3099--3116.
.
2024. Formal Security Analysis of Widevine through the W3C EME Standard. 33rd USENIX Security Symposium (USENIX Security 24). :6399--6415.
.
2024. Formal verification of the PQXDH Post-Quantum key agreement protocol for end-to-end secure messaging. 33rd USENIX Security Symposium (USENIX Security 24). :469--486.
.
2024. Formalizing and Benchmarking Prompt Injection Attacks and Defenses. 33rd USENIX Security Symposium (USENIX Security 24). :1831--1847.
.
2024. Formalizing Soundness Proofs of Linear PCP SNARKs. 33rd USENIX Security Symposium (USENIX Security 24). :1489--1506.
.
2024. FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker Recognition. 33rd USENIX Security Symposium (USENIX Security 24). :7303--7320.
.
2024. A Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers. 33rd USENIX Security Symposium (USENIX Security 24). :7085--7102.
.
2024. From One Thousand Pages of Specification to Unveiling Hidden Bugs: Large Language Model Assisted Fuzzing of Matter IoT Devices. 33rd USENIX Security Symposium (USENIX Security 24). :4783--4800.
.
2024. From the Childhood Past: Views of Young Adults on Parental Sharing of Children's Photos. 33rd USENIX Security Symposium (USENIX Security 24). :4999--5016.
.
2024. Full Lifecycle Data Analysis on a Large-scale and Leadership Supercomputer: What Can We Learn from It? 2024 USENIX Annual Technical Conference (USENIX ATC 24). :917--933.
.
2024. Fuzzing BusyBox: Leveraging LLM and Crash Reuse for Embedded Bug Unearthing. 33rd USENIX Security Symposium (USENIX Security 24). :883--900.
.
2024. FV8: A Forced Execution JavaScript Engine for Detecting Evasive Techniques. 33rd USENIX Security Symposium (USENIX Security 24). :3747--3764.
.
2024. FVD-DPM: Fine-grained Vulnerability Detection via Conditional Diffusion Probabilistic Models. 33rd USENIX Security Symposium (USENIX Security 24). :7375--7392.
.
2024. FwdFL: Efficient Federated Finetuning of Language Models. 2024 USENIX Annual Technical Conference (USENIX ATC 24).
.
2024.