Conferences

Search results

    TitleConferenceSpeaker(s)
    HashTag: Hash-based Integrity Protection for Tagged ArchitecturesUSENIX Security '23Lukas Lamster, Martin Unterguggenberger, David Schrammel, Stefan Mangard
    Inductive Graph UnlearningUSENIX Security '23Cheng-Long Wang, Mengdi Huai, Di Wang
    Systematic Assessment of Fuzzers using Mutation AnalysisUSENIX Security '23Philipp Görz, Björn Mathis, Keno Hassler, Emre Güler, Thorsten Holz, Andreas Zeller, Rahul Gopinath
    Auditing Frameworks Need Resource Isolation: A Systematic Study on the Super Producer Threat to System Auditing and Its MitigationUSENIX Security '23Peng Jiang, Ruizhe Huang, Ding Li, Yao Guo, Xiangqun Chen, Jianhai Luan, Yuxin Ren, Xinwei Hu
    SCARF – A Low-Latency Block Cipher for Secure Cache-RandomizationUSENIX Security '23Federico Canale, Tim Güneysu, Gregor Leander, Jan Philipp Thoma, Yosuke Todo, Rei Ueno
    WHIP: Improving Static Vulnerability Detection in Web Application by Forcing tools to CollaborateUSENIX Security '23Feras Al-Kassar, Luca Compagna, Davide Balzarotti
    PORE: Provably Robust Recommender Systems against Data Poisoning AttacksUSENIX Security '23Jinyuan Jia, Yupei Liu, Yuepeng Hu, Neil Zhenqiang Gong
    AnimateDead: Debloating Web Applications Using Concolic ExecutionUSENIX Security '23Babak Amin Azad, Rasoul Jahanshahi, Chris Tsoukaladelis, Manuel Egele, Nick Nikiforakis
    Cheesecloth: Zero-Knowledge Proofs of Real World VulnerabilitiesUSENIX Security '23Santiago Cuéllar, Bill Harris, James Parker, Stuart Pernsteiner, Eran Tromer
    Towards Targeted Obfuscation of Adversarial Unsafe Images using Reconstruction and Counterfactual Super Region Attribution ExplainabilityUSENIX Security '23Mazal Bethany, Andrew Seong, Samuel Henrique Silva, Nicole Beebe, Nishant Vishwamitra, Peyman Najafirad
    Sneaky Spy Devices and Defective Detectors: The Ecosystem of Intimate Partner Surveillance with Covert DevicesUSENIX Security '23Rose Ceccio, Sophie Stephenson, Varun Chadha, Danny Yuxing Huang, Rahul Chatterjee
    Hoedur: Embedded Firmware Fuzzing using Multi-Stream InputsUSENIX Security '23
    Tubes Among Us: Analog Attack on Automatic Speaker IdentificationUSENIX Security '23Shimaa Ahmed, Yash Wani, Ali Shahin Shamsabadi, Mohammad Yaghini, Ilia Shumailov, Nicolas Papernot, Kassem Fawaz
    Practical Asynchronous High-threshold Distributed Key Generation and Distributed Polynomial SamplingUSENIX Security '23Sourav Das, Zhuolun Xiang, Lefteris Kokoris-Kogias, Ling Ren
    Every Vote Counts: Ranking-Based Training of Federated Learning to Resist Poisoning AttacksUSENIX Security '23Hamid Mozaffari, Virat Shejwalkar, Amir Houmansadr
    Hidden Reality: Caution, Your Hand Gesture Inputs in the Immersive Virtual World are Visible to All!USENIX Security '23Sindhu Reddy Kalathur Gopal, Diksha Shukla, James David Wheelock, Nitesh Saxena
    ARI: Attestation of Real-time Mission Execution IntegrityUSENIX Security '23Jinwen Wang, Yujie Wang, Ao Li, Yang Xiao, Ruide Zhang, Wenjing Lou, Y. Thomas Hou, Ning Zhang
    XCheck: Verifying Integrity of 3D Printed Patient-Specific Devices via Computing TomographyUSENIX Security '23Zhiyuan Yu, Yuanhaur Chang, Shixuan Zhai, Nicholas Deily, Tao Ju, XiaoFeng Wang, Uday Jammalamadaka, Ning Zhang
    Eos: Efficient Private Delegation of zkSNARK ProversUSENIX Security '23Alessandro Chiesa, Ryan Lehmkuhl, Pratyush Mishra, Yinuo Zhang
    PELICAN: Exploiting Backdoors of Naturally Trained Deep Learning Models In Binary Code AnalysisUSENIX Security '23Zhuo Zhang, Guanhong Tao, Guangyu Shen, Shengwei An, Qiuling Xu, Yingqi Liu, Yapeng Ye, Yaoxuan Wu, Xiangyu Zhang
    The Gates of Time: Improving Cache Attacks with Transient ExecutionUSENIX Security '23Daniel Katzman, William Kosasih, Chitchanok Chuengsatiansup, Eyal Ronen, Yuval Yarom
    TRust: A Compilation Framework for In-process Isolation to Protect Safe Rust against Untrusted CodeUSENIX Security '23Inyoung Bang, Martin Kayondo, Hyungon Moon, Yunheung Paek
    The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 DecodersUSENIX Security '23Willy R. Vasquez, Stephen Checkoway, Hovav Shacham
    Temporal CDN-Convex Lens: A CDN-Assisted Practical Pulsing DDoS AttackUSENIX Security '23Run Guo, Jianjun Chen, Yihang Wang, Keran Mu, Baojun Liu, Xiang Li, Chao Zhang, Haixin Duan, Jianping Wu
    A Large Scale Study of the Ethereum Arbitrage EcosystemUSENIX Security '23Robert McLaughlin, Christopher Kruegel, Giovanni Vigna

Pages