Conferences

Search results

    TitleConferenceSpeaker(s)
    PrivImage: Differentially Private Synthetic Image Generation using Diffusion Models with Semantic-Aware PretrainingUSENIX Security '24Kecen Li, Chen Gong, Zhixiang Li, Yuzhong Zhao, Xinwen Hou, Tianhao Wang
    Simulated Stress: A Case Study of the Effects of a Simulated Phishing Campaign on Employees' Perception, Stress and Self-EfficacyUSENIX Security '24Markus Schöps, Marco Gutfleisch, Eric Wolter, M. Angela Sasse
    Uncovering the Limits of Machine Learning for Automatic Vulnerability DetectionUSENIX Security '24Niklas Risse, Marcel Böhme
    Improving ML-based Binary Function Similarity Detection by Assessing and Deprioritizing Control Flow Graph FeaturesUSENIX Security '24Jialai Wang, Chao Zhang, Longfei Chen, Yi Rong, Yuxiao Wu, Hao Wang, Wende Tan, Qi Li, Zongpeng Li
    Understanding Ethereum Mempool Security under Asymmetric DoS by Symbolized Stateful FuzzingUSENIX Security '24Yibo Wang, Yuzhe Tang, Kai Li, Wanning Ding, Zhihua Yang
    Malla: Demystifying Real-world Large Language Model Integrated Malicious ServicesUSENIX Security '24Zilong Lin, Jian Cui, Xiaojing Liao, XiaoFeng Wang
    ACE: A Model Poisoning Attack on Contribution Evaluation Methods in Federated LearningUSENIX Security '24Zhangchen Xu, Fengqing Jiang, Luyao Niu, Jinyuan Jia, Bo Li, Radha Poovendran
    LLM-Fuzzer: Scaling Assessment of Large Language Model JailbreaksUSENIX Security '24Jiahao Yu, Xingwei Lin, Zheng Yu, Xinyu Xing
    Do You See How I Pose? Using Poses as an Implicit Authentication Factor for QR Code PaymentUSENIX Security '24Chuxiong Wu, Qiang Zeng
    TYGR: Type Inference on Stripped Binaries using Graph Neural NetworksUSENIX Security '24Chang Zhu, Ziyang Li, Anton Xue, Ati Priya Bajaj, Wil Gibbs, Yibo Liu, Rajeev Alur, Tiffany Bao, Hanjun Dai, Adam Doupé, Mayur Naik, Yan Shoshitaishvili, Ruoyu Wang, Aravind Machiry
    Defects-in-Depth: Analyzing the Integration of Effective Defenses against One-Day Exploits in Android KernelsUSENIX Security '24Lukas Maar, Florian Draschbacher, Lukas Lamster, Stefan Mangard
    "What do you want from theory alone?" Experimenting with Tight Auditing of Differentially Private Synthetic Data GenerationUSENIX Security '24Meenatchi Sundaram Muthu Selva Annamalai, Georgi Ganev, Emiliano De Cristofaro
    On the Criticality of Integrity Protection in 5G Fronthaul NetworksUSENIX Security '24Jiarong Xing, Sophia Yoo, Xenofon Foukas, Daehyeok Kim, Michael K. Reiter
    Understanding Help-Seeking and Help-Giving on Social Media for Image-Based Sexual AbuseUSENIX Security '24Miranda Wei, Sunny Consolvo, Patrick Gage Kelley, Tadayoshi Kohno, Tara Matthews, Sarah Meiklejohn, Franziska Roesner, Renee Shelby, Kurt Thomas, Rebecca Umbach
    UBA-Inf: Unlearning Activated Backdoor Attack with Influence-Driven CamouflageUSENIX Security '24Zirui Huang, Yunlong Mao, Sheng Zhong
    SIMurai: Slicing Through the Complexity of SIM Card Security ResearchUSENIX Security '24Tomasz Piotr Lisowski, Merlin Chlosta, Jinjin Wang, Marius Muench
    Making Them Ask and Answer: Jailbreaking Large Language Models in Few Queries via Disguise and ReconstructionUSENIX Security '24Tong Liu, Yingjie Zhang, Zhe Zhao, Yinpeng Dong, Guozhu Meng, Kai Chen
    The Imitation Game: Exploring Brand Impersonation Attacks on Social Media PlatformsUSENIX Security '24Bhupendra Acharya, Dario Lazzaro, Efrén López-Morales, Adam Oest, Muhammad Saad, Antonio Emanuele Cinà, Lea Schönherr, Thorsten Holz
    BackdoorIndicator: Leveraging OOD Data for Proactive Backdoor Detection in Federated LearningUSENIX Security '24Songze Li, Yanbo Dai
    MFKDF: Multiple Factors Knocked Down FlatUSENIX Security '24Matteo Scarlata, Matilda Backendal, Miro Haller
    Exploiting Leakage in Password Managers via Injection AttacksUSENIX Security '24Andrés Fábrega, Armin Namavari, Rachit Agarwal, Ben Nassi, Thomas Ristenpart
    From One Thousand Pages of Specification to Unveiling Hidden Bugs: Large Language Model Assisted Fuzzing of Matter IoT DevicesUSENIX Security '24Xiaoyue Ma, Lannan Luo, Qiang Zeng
    Ahoy SAILR! There is No Need to DREAM of C: A Compiler-Aware Structuring Algorithm for Binary DecompilationUSENIX Security '24Zion Leonahenahe Basque, Ati Priya Bajaj, Wil Gibbs, Jude O'Kain, Derron Miao, Tiffany Bao, Adam Doupé, Yan Shoshitaishvili, Ruoyu Wang
    Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsUSENIX Security '24Sebastian Angel, Eleftherios Ioannidis, Elizabeth Margolin, Srinath Setty, Jess Woods
    You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise NetworksUSENIX Security '24Rafael Uetz, Marco Herzog, Louis Hackländer, Simon Schwarz, Martin Henze

Pages