Conferences

Search results

    TitleConferenceSpeaker(s)
    GHunter: Universal Prototype Pollution Gadgets in JavaScript RuntimesUSENIX Security '24Eric Cornelissen, Mikhail Shcherbakov, Musard Balliu
    PURL: Safe and Effective Sanitization of Link DecorationUSENIX Security '24Shaoor Munir, Patrick Lee, Umar Iqbal, Zubair Shafiq, Sandra Siby
    Digital Discrimination of Users in Sanctioned States: The Case of the Cuba EmbargoUSENIX Security '24Anna Ablove, Shreyas Chandrashekaran, Hieu Le, Ram Sundara Raman, Reethika Ramesh, Harry Oppenheimer, Roya Ensafi
    Stateful Least Privilege Authorization for the CloudUSENIX Security '24Leo Cao, Luoxi Meng, Deian Stefan, Earlence Fernandes
    SoK: What Don't We Know? Understanding Security Vulnerabilities in SNARKsUSENIX Security '24Stefanos Chaliasos, Jens Ernstberger, David Theodore, David Wong, Mohammad Jahanara, Benjamin Livshits
    How does Endpoint Detection use the MITRE ATT&CK Framework?USENIX Security '24Apurva Virkud, Muhammad Adil Inam, Andy Riddle, Jason Liu, Gang Wang, Adam Bates
    Election Eligibility with OpenID: Turning Authentication into Transferable Proof of EligibilityUSENIX Security '24Véronique Cortier, Alexandre Debant, Anselme Goetschmann, Lucca Hirschi
    Rethinking the Invisible Protection against Unauthorized Image Usage in Stable DiffusionUSENIX Security '24Shengwei An, Lu Yan, Siyuan Cheng, Guangyu Shen, Kaiyuan Zhang, Qiuling Xu, Guanhong Tao, Xiangyu Zhang
    Detecting Kernel Memory Bugs through Inconsistent Memory Management Intention InferencesUSENIX Security '24Dinghao Liu, Zhipeng Lu, Shouling Ji, Kangjie Lu, Jianhai Chen, Zhenguang Liu, Dexin Liu, Renyi Cai, Qinming He
    Understanding the Security and Privacy Implications of Online Toxic Content on RefugeesUSENIX Security '24Arjun Arunasalam, Habiba Farrukh, Eliz Tekcan, Z. Berkay Celik
    Finding Traceability Attacks in the Bluetooth Low Energy Specification and Its ImplementationsUSENIX Security '24Jianliang Wu, Patrick Traynor, Dongyan Xu, Dave (Jing) Tian, Antonio Bianchi
    Atropos: Effective Fuzzing of Web Applications for Server-Side VulnerabilitiesUSENIX Security '24Emre Güler, Sergej Schumilo, Moritz Schloegel, Nils Bars, Philipp Görz, Xinyi Xu, Cemal Kaygusuz, Thorsten Holz
    ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response FuzzingUSENIX Security '24Qifan Zhang, Xuesong Bai, Xiang Li, Haixin Duan, Qi Li, Zhou Li
    Racing on the Negative Force: Efficient Vulnerability Root-Cause Analysis through Reinforcement Learning on CounterexamplesUSENIX Security '24Dandan Xu, Di Tang, Yi Chen, XiaoFeng Wang, Kai Chen, Haixu Tang, Longxing Li
    Exploring Covert Third-party Identifiers through External Storage in the Android New EraUSENIX Security '24Zikan Dong, Tianming Liu, Jiapeng Deng, Li Li, Minghui Yang, Meng Wang, Guosheng Xu, Guoai Xu
    Hermes: Unlocking Security Analysis of Cellular Network Protocols by Synthesizing Finite State Machines from Natural Language SpecificationsUSENIX Security '24Abdullah Al Ishtiaq, Sarkar Snigdha Sarathi Das, Syed Md Mukit Rashid, Ali Ranjbar, Kai Tu, Tianwei Wu, Zhezheng Song, Weixuan Wang, Mujtahid Akon, Rui Zhang, Syed Rafiul Hussain
    Closed-Form Bounds for DP-SGD against Record-level Inference AttacksUSENIX Security '24Giovanni Cherubin, Boris Köpf, Andrew Paverd, Shruti Tople, Lukas Wutschitz, Santiago Zanella-Béguelin
    Does Online Anonymous Market Vendor Reputation Matter?USENIX Security '24Alejandro Cuevas, Nicolas Christin
    OPTIKS: An Optimized Key Transparency SystemUSENIX Security '24Julia Len, Melissa Chase, Esha Ghosh, Kim Laine, Radames Cruz Moreno
    Arcanum: Detecting and Evaluating the Privacy Risks of Browser Extensions on Web Pages and Web ContentUSENIX Security '24Qinge Xie, Manoj Vignesh Kasi Murali, Paul Pearce, Frank Li
    Smudged Fingerprints: Characterizing and Improving the Performance of Web Application FingerprintingUSENIX Security '24Brian Kondracki, Nick Nikiforakis
    PURE: Payments with UWB RElay-protectionUSENIX Security '24Daniele Coppola, Giovanni Camurati, Claudio Anliker, Xenia Hofmeier, Patrick Schaller, David Basin, Srdjan Capkun
    LaKey: Efficient Lattice-Based Distributed PRFs Enable Scalable Distributed Key ManagementUSENIX Security '24Matthias Geihs, Hart Montgomery
    Don't Listen To Me: Understanding and Exploring Jailbreak Prompts of Large Language ModelsUSENIX Security '24Zhiyuan Yu, Xiaogeng Liu, Shunning Liang, Zach Cameron, Chaowei Xiao, Ning Zhang
    Enabling Contextual Soft Moderation on Social Media through Contrastive Textual DeviationUSENIX Security '24Pujan Paudel, Mohammad Hammas Saeed, Rebecca Auger, Chris Wells, Gianluca Stringhini

Pages