Conferences

Search results

    TitleConferenceSpeaker(s)
    Automated Analysis of Protocols that use Authenticated Encryption: How Subtle AEAD Differences can impact Protocol SecurityUSENIX Security '23Cas Cremers, Alexander Dax, Charlie Jacomme, Mang Zhao
    A Two-Decade Retrospective Analysis of a University's Vulnerability to Attacks Exploiting Reused PasswordsUSENIX Security '23Alexandra Nisenoff, Maximilian Golla, Miranda Wei, Juliette Hainline, Hayley Szymanek, Annika Braun, Annika Hildebrandt, Blair Christensen, David Langenberg, Blase Ur
    All cops are broadcasting: TETRA under scrutinyUSENIX Security '23Carlo Meijer, Wouter Bokslag, Jos Wetzels
    Anatomy of a High-Profile Data Breach: Dissecting the Aftermath of a Crypto-Wallet CaseUSENIX Security '23Svetlana Abramova, Rainer Böhme
    Near-Optimal Oblivious Key-Value Stores for Efficient PSI, PSU and Volume-Hiding Multi-MapsUSENIX Security '23Alexander Bienstock, Sarvar Patel, Joon Young Seo, Kevin Yeo
    Lost in Conversion: Exploit Data Structure Conversion with Attribute Loss to Break Android SystemsUSENIX Security '23Rui Li, Wenrui Diao, Shishuai Yang, Xiangyu Liu, Shanqing Guo, Kehuan Zhang
    Tight Auditing of Differentially Private Machine LearningUSENIX Security '23Milad Nasr, Jamie Hayes, Thomas Steinke, Borja Balle, Florian Tramèr, Matthew Jagielski, Nicholas Carlini, Andreas Terzis
    SQIRL: Grey-Box Detection of SQL Injection Vulnerabilities Using Reinforcement LearningUSENIX Security '23Salim Al Wahaibi, Myles Foley, Sergio Maffeis
    FedVal: Different good or different bad in federated learningUSENIX Security '23Viktor Valadi, Xinchi Qiu, Pedro Porto Buarque de Gusmão, Nicholas D. Lane, Mina Alibeigi
    Remote Direct Memory IntrospectionUSENIX Security '23Hongyi Liu, Jiarong Xing, Yibo Huang, Danyang Zhuo, Srinivas Devadas, Ang Chen
    Continuous Learning for Android Malware DetectionUSENIX Security '23Yizheng Chen, Zhoujie Ding, David Wagner
    Inception: Exposing New Attack Surfaces with Training in Transient ExecutionUSENIX Security '23Daniël Trujillo, Johannes Wikner, Kaveh Razavi
    A Hybrid Alias Analysis and Its Application to Global Variable Protection in the Linux KernelUSENIX Security '23Guoren Li, Hang Zhang, Jinmeng Zhou, Wenbo Shen, Yulei Sui, Zhiyun Qian
    Unique Identification of 50,000+ Virtual Reality Users from Head & Hand Motion DataUSENIX Security '23Vivek Nair, Wenbo Guo, Justus Mattern, Rui Wang, James F. O'Brien, Louis Rosenberg, Dawn Song
    "If I could do this, I feel anyone could:" The Design and Evaluation of a Secondary Authentication Factor ManagerUSENIX Security '23Garrett Smith, Tarun Yadav, Jonathan Dutson, Scott Ruoti, Kent Seamons
    Generative Intrusion Detection and Prevention on Data StreamUSENIX Security '23HyungBin Seo, MyungKeun Yoon
    ARGUS: A Framework for Staged Static Taint Analysis of GitHub Workflows and ActionsUSENIX Security '23Siddharth Muralee, Igibek Koishybayev, Aleksandr Nahapetyan, Greg Tystahl, Brad Reaves, Antonio Bianchi, William Enck, Alexandros Kapravelos, Aravind Machiry
    Mitigating Security Risks in Linux with KLAUS: A Method for Evaluating Patch CorrectnessUSENIX Security '23Yuhang Wu, Zhenpeng Lin, Yueqi Chen, Dang K Le, Dongliang Mu, Xinyu Xing
    A Large-Scale Measurement of Website Login PoliciesUSENIX Security '23Suood Al Roomi, Frank Li
    Your Exploit is Mine: Instantly Synthesizing Counterattack Smart ContractUSENIX Security '23Zhuo Zhang, Zhiqiang Lin, Marcelo Morales, Xiangyu Zhang, Kaiyuan Zhang
    Is Your Wallet Snitching On You? An Analysis on the Privacy Implications of Web3USENIX Security '23Christof Ferreira Torres, Fiona Willi, Shweta Shinde
    Cookie Crumbles: Breaking and Fixing Web Session IntegrityUSENIX Security '23Marco Squarcina, Pedro Adão, Lorenzo Veronese, Matteo Maffei
    Smart Learning to Find Dumb ContractsUSENIX Security '23Tamer Abdelaziz, Aquinas Hobor
    Auditory Eyesight: Demystifying μs-Precision Keystroke Tracking Attacks on Unconstrained Keyboard InputsUSENIX Security '23Yazhou Tu, Liqun Shan, Md Imran Hossen, Sara Rampazzi, Kevin Butler, Xiali Hei
    PET: Prevent Discovered Errors from Being Triggered in the Linux KernelUSENIX Security '23Zicheng Wang, Yueqi Chen, Qingkai Zeng

Pages