Conferences

Search results

    TitleConferenceSpeaker(s)
    Stealing Links from Graph Neural NetworksUSENIX Security '21Xinlei He, Jinyuan Jia, Michael Backes, Neil Zhenqiang Gong, Yang Zhang
    SHARD: Fine-Grained Kernel Specialization with Context-Aware HardeningUSENIX Security '21Muhammad Abubakar, Adil Ahmad, Pedro Fonseca, Dongyan Xu
    Detecting Kernel Refcount Bugs with Two-Dimensional Consistency CheckingUSENIX Security '21Xin Tan, Yuan Zhang, Xiyu Yang, Kangjie Lu, Min Yang
    PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack Operations in Android SystemsUSENIX Security '21Yu-Tsung Lee, William Enck, Haining Chen, Hayawardh Vijayakumar, Ninghui Li, Zhiyun Qian, Daimeng Wang, Giuseppe Petracca, Trent Jaeger
    PatchGuard: A Provably Robust Defense against Adversarial Patches via Small Receptive Fields and MaskingUSENIX Security '21Chong Xiang, Arjun Nitin Bhagoji, Vikash Sehwag, Prateek Mittal
    Privacy and Integrity Preserving Computations with CRISPUSENIX Security '21Sylvain Chatel, Apostolos Pyrgelis, Juan Ramón Troncoso-Pastoriza, Jean-Pierre Hubaux
    Senate: A Maliciously-Secure MPC Platform for Collaborative AnalyticsUSENIX Security '21Rishabh Poddar, Sukrit Kalra, Avishay Yanai, Ryan Deng, Raluca Ada Popa, Joseph M. Hellerstein
    Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic PrivacyUSENIX Security '21Saba Eskandarian, Henry Corrigan-Gibbs, Matei Zaharia, Dan Boneh
    KeyForge: Non-Attributable Email from Forward-Forgeable SignaturesUSENIX Security '21Michael A. Specter, Sunoo Park, Matthew Green
    You Autocomplete Me: Poisoning Vulnerabilities in Neural Code CompletionUSENIX Security '21Roei Schuster, Congzheng Song, Eran Tromer, Vitaly Shmatikov
    ARCUS: Symbolic Root Cause Analysis of Exploits in Production SystemsUSENIX Security '21Carter Yagemann, Matthew Pruett, Simon P. Chung, Kennon Bittick, Brendan Saltaformaggio, Wenke Lee
    Virtual Secure Platform: A Five-Stage Pipeline Processor over TFHEUSENIX Security '21Kotaro Matsuoka, Ryotaro Banno, Naoki Matsumoto, Takashi Sato, Song Bian
    ReDMArk: Bypassing RDMA Security MechanismsUSENIX Security '21Benjamin Rothenberger, Konstantin Taranov, Adrian Perrig, Torsten Hoefler
    Ripple: A Programmable, Decentralized Link-Flooding Defense Against Adaptive AdversariesUSENIX Security '21Jiarong Xing, Wenqing Wu, Ang Chen
    A Stealthy Location Identification Attack Exploiting Carrier Aggregation in Cellular NetworksUSENIX Security '21Nitya Lakshmanan, Nishant Budhdev, Min Suk Kang, Mun Choon Chan, Jun Han
    Automatic Policy Generation for Inter-Service Access Control of MicroservicesUSENIX Security '21Xing Li, Yan Chen, Zhiqiang Lin, Xiao Wang, Jim Hao Chen
    Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing AttacksUSENIX Security '21Kaiwen Shen, Chuhan Wang, Minglei Guo, Xiaofeng Zheng, Chaoyi Lu, Baojun Liu, Yuxuan Zhao, Shuang Hao, Haixin Duan, Qingfeng Pan, Min Yang
    ATLAS: A Sequence-based Learning Approach for Attack InvestigationUSENIX Security '21Abdulellah Alsaheel, Yuhong Nan, Shiqing Ma, Le Yu, Gregory Walkup, Z. Berkay Celik, Xiangyu Zhang, Dongyan Xu
    Security Analysis of the Democracy Live Online Voting SystemUSENIX Security '21Michael Specter, J. Alex Halderman
    Domain Shadowing: Leveraging Content Delivery Networks for Robust Blocking-Resistant CommunicationsUSENIX Security '21Mingkui Wei
    mID: Tracing Screen Photos via Moiré PatternsUSENIX Security '21Yushi Cheng, Xiaoyu Ji, Lixu Wang, Qi Pang, Yi-Chao Chen, Wenyuan Xu
    Accurately Measuring Global Risk of Amplification Attacks using AmpMapUSENIX Security '21Soo-Jin Moon, Yucheng Yin, Rahul Anand Sharma, Yifei Yuan, Jonathan M. Spring, Vyas Sekar
    CADE: Detecting and Explaining Concept Drift Samples for Security ApplicationsUSENIX Security '21Limin Yang, Wenbo Guo, Qingying Hao, Arridhana Ciptadi, Ali Ahmadzadeh, Xinyu Xing, Gang Wang
    Adversarial Policy Training against Deep Reinforcement LearningUSENIX Security '21Xian Wu, Wenbo Guo, Hua Wei, Xinyu Xing
    ReDoSHunter: A Combined Static and Dynamic Approach for Regular Expression DoS DetectionUSENIX Security '21Yeting Li, Zixuan Chen, Jialun Cao, Zhiwu Xu, Qiancheng Peng, Haiming Chen, Liyuan Chen, Shing-Chi Cheung

Pages