USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 26 results:
Filters: Author is Michael Backes [Clear All Filters]
Bilingual Problems: Studying the Security Risks Incurred by Native Extensions in Scripting Languages. 32nd USENIX Security Symposium (USENIX Security 23). :6133--6150.
.
2023. FACE-AUDITOR: Data Auditing in Facial Recognition Systems. 32nd USENIX Security Symposium (USENIX Security 23). :7195--7212.
.
2023. PrivTrace: Differentially Private Trajectory Synthesis by Adaptive Markov Models. 32nd USENIX Security Symposium (USENIX Security 23). :1649--1666.
.
2023. Two-in-One: A Model Hijacking Attack Against Text Generation Models. 32nd USENIX Security Symposium (USENIX Security 23). :2223--2240.
.
2023. UnGANable: Defending Against GAN-based Face Manipulation. 32nd USENIX Security Symposium (USENIX Security 23). :7213--7230.
.
2023. Industrial practitioners' mental models of adversarial machine learning. Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022). :97--116.
.
2022. Inference Attacks Against Graph Neural Networks. 31st USENIX Security Symposium (USENIX Security 22). :4543--4560.
.
2022. ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models. 31st USENIX Security Symposium (USENIX Security 22). :4525--4542.
.
2022. A11y and Privacy don't have to be mutually exclusive: Constraining Accessibility Service Misuse on Android. 30th USENIX Security Symposium (USENIX Security 21). :3631--3648.
.
2021. Explanation Beats Context: The Effect of Timing & Rationales on Users' Runtime Permission Decisions. 30th USENIX Security Symposium (USENIX Security 21). :785--802.
.
2021. PrivSyn: Differentially Private Data Synthesis. 30th USENIX Security Symposium (USENIX Security 21). :929--946.
.
2021. Share First, Ask Later (or Never?) Studying Violations of GDPR's Explicit Consent in Android Apps 30th USENIX Security Symposium (USENIX Security 21). :3667--3684.
.
2021. Stealing Links from Graph Neural Networks. 30th USENIX Security Symposium (USENIX Security 21). :2669--2686.
.
2021. Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications. 30th USENIX Security Symposium (USENIX Security 21). :4347--4364.
.
2021. A Tale of Two Headers: A Formal Analysis of Inconsistent Click-Jacking Protection on the Web. 29th USENIX Security Symposium (USENIX Security 20). :683--697.
.
2020. Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning. 29th USENIX Security Symposium (USENIX Security 20). :1291-1308.
.
2020. Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse 27th USENIX Security Symposium (USENIX Security 18). :203--220.
.
2018. How the Web Tangled Itself: Uncovering the History of Client-Side Web (In)Security. 26th USENIX Security Symposium (USENIX Security 17). :971--987.
.
2017. Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers. 10th USENIX Workshop on Cyber Security Experimentation and Test (CSET 17).
.
2017. On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis. 25th USENIX Security Symposium (USENIX Security 16). :1101--1118.
.
2016. Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification. 25th USENIX Security Symposium (USENIX Security 16). :1015--1032.
.
2016. Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles. 25th USENIX Security Symposium (USENIX Security 16). :1223--1240.
.
2016. What Cannot Be Read, Cannot Be Leveraged? Revisiting Assumptions of JIT-ROP Defenses 25th USENIX Security Symposium (USENIX Security 16). :139--156.
.
2016. Boxify: Full-fledged App Sandboxing for Stock Android. 24th USENIX Security Symposium (USENIX Security 15). :691--706.
.
2015. Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing. 23rd USENIX Security Symposium (USENIX Security 14). :433--447.
.
2014.