Conferences

Search results

    TitleConferenceSpeaker(s)
    VoltSchemer: Use Voltage Noise to Manipulate Your Wireless ChargerUSENIX Security '24Zihao Zhan, Yirui Yang, Haoqi Shan, Hanqiu Wang, Yier Jin, Shuo Wang
    RustSan: Retrofitting AddressSanitizer for Efficient Sanitization of RustUSENIX Security '24Kyuwon Cho, Jongyoon Kim, Kha Dinh Duy, Hajeong Lim, Hojoon Lee
    Stop, Don't Click Here Anymore: Boosting Website Fingerprinting By Considering Sets of SubpagesUSENIX Security '24Asya Mitseva, Andriy Panchenko
    MetaSafe: Compiling for Protecting Smart Pointer Metadata to Ensure Safe Rust IntegrityUSENIX Security '24Martin Kayondo, Inyoung Bang, Yeongjun Kwak, Hyungon Moon, Yunheung Paek
    DONAPI: Malicious NPM Packages Detector using Behavior Sequence Knowledge MappingUSENIX Security '24Cheng Huang, Nannan Wang, Ziyan Wang, Siqi Sun, Lingzi Li, Junren Chen, Qianchong Zhao, Jiaxuan Han, Zhen Yang, Lei Shi
    VibSpeech: Exploring Practical Wideband Eavesdropping via Bandlimited Signal of Vibration-based Side ChannelUSENIX Security '24Chao Wang, Feng Lin, Hao Yan, Tong Wu, Wenyao Xu, Kui Ren
    PatchCURE: Improving Certifiable Robustness, Model Utility, and Computation Efficiency of Adversarial Patch DefensesUSENIX Security '24Chong Xiang, Tong Wu, Sihui Dai, Jonathan Petit, Suman Jana, Prateek Mittal
    Fledging Will Continue Until Privacy Improves: Empirical Analysis of Google's Privacy-Preserving Targeted AdvertisingUSENIX Security '24Giuseppe Calderonio, Mir Masood Ali, Jason Polakis
    ZKSMT: A VM for Proving SMT Theorems in Zero KnowledgeUSENIX Security '24Daniel Luick, John C. Kolesar, Timos Antonopoulos, William R. Harris, James Parker, Ruzica Piskac, Eran Tromer, Xiao Wang, Ning Luo
    HECKLER: Breaking Confidential VMs with Malicious InterruptsUSENIX Security '24Benedict Schlüter, Supraja Sridhara, Mark Kuhne, Andrin Bertschi, Shweta Shinde
    Scalable Zero-knowledge Proofs for Non-linear Functions in Machine LearningUSENIX Security '24Meng Hao, Hanxiao Chen, Hongwei Li, Chenkai Weng, Yuan Zhang, Haomiao Yang, Tianwei Zhang
    SLUBStick: Arbitrary Memory Writes through Practical Software Cross-Cache Attacks within the Linux KernelUSENIX Security '24Lukas Maar, Stefan Gast, Martin Unterguggenberger, Mathias Oberhuber, Stefan Mangard
    GraphGuard: Private Time-Constrained Pattern Detection Over Streaming Graphs in the CloudUSENIX Security '24Songlei Wang, Yifeng Zheng, Xiaohua Jia
    MicGuard: A Comprehensive Detection System against Out-of-band Injection Attacks for Different Level Microphone-based DevicesUSENIX Security '24Tiantian Liu, Feng Lin, Zhongjie Ba, Li Lu, Zhan Qin, Kui Ren
    A Broad Comparative Evaluation of Software Debloating ToolsUSENIX Security '24Michael D. Brown, Adam Meily, Brian Fairservice, Akshay Sood, Jonathan Dorn, Eric Kilmer, Ronald Eytchison
    FV8: A Forced Execution JavaScript Engine for Detecting Evasive TechniquesUSENIX Security '24Nikolaos Pantelaios, Alexandros Kapravelos
    Near-Optimal Constrained Padding for Object Retrievals with DependenciesUSENIX Security '24Pranay Jain, Andrew C. Reed, Michael K. Reiter
    GPU Memory Exploitation for Fun and ProfitUSENIX Security '24Yanan Guo, Zhenkai Zhang, Jun Yang
    All Your Tokens are Belong to Us: Demystifying Address Verification Vulnerabilities in Solidity Smart ContractsUSENIX Security '24Tianle Sun, Ningyu He, Jiang Xiao, Yinliang Yue, Xiapu Luo, Haoyu Wang
    Mempool Privacy via Batched Threshold Encryption: Attacks and DefensesUSENIX Security '24Arka Rai Choudhuri, Sanjam Garg, Julien Piet, Guru-Vamsi Policharla
    GuideEnricher: Protecting the Anonymity of Ethereum Mixing Service Users with Deep Reinforcement LearningUSENIX Security '24Ravindu De Silva, Wenbo Guo, Nicola Ruaro, Ilya Grishchenko, Christopher Kruegel, Giovanni Vigna
    Using My Functions Should Follow My Checks: Understanding and Detecting Insecure OpenZeppelin Code in Smart ContractsUSENIX Security '24Han Liu, Daoyuan Wu, Yuqiang Sun, Haijun Wang, Kaixuan Li, Yang Liu, Yixiang Chen
    ChainPatrol: Balancing Attack Detection and Classification with Performance Overhead for Service Function Chains Using Virtual TrailersUSENIX Security '24Momen Oqaily, Hinddeep Purohit, Yosr Jarraya, Lingyu Wang, Boubakr Nour, Makan Pourzandi, Mourad Debbabi
    LaserAdv: Laser Adversarial Attacks on Speech Recognition SystemsUSENIX Security '24Guoming Zhang, Xiaohui Ma, Huiting Zhang, Zhijie Xiang, Xiaoyu Ji, Yanni Yang, Xiuzhen Cheng, Pengfei Hu
    Correction-based Defense Against Adversarial Video Attacks via Discretization-Enhanced Video Compressive SensingUSENIX Security '24Wei Song, Cong Cong, Haonan Zhong, Jingling Xue

Pages