Conferences

Search results

    TitleConferenceSpeaker(s)
    Swipe Left for Identity Theft: An Analysis of User Data Privacy Risks on Location-based Dating AppsUSENIX Security '24Karel Dhondt, Victor Le Pochat, Yana Dimova, Wouter Joosen, Stijn Volckaert
    "Belt and suspenders" or "just red tape"?: Investigating Early Artifacts and User Perceptions of IoT App Security CertificationUSENIX Security '24Prianka Mandal, Amit Seal Ami, Victor Olaiya, Sayyed Hadi Razmjo, Adwait Nadkarni
    MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation LearningUSENIX Security '24Zian Jia, Yun Xiong, Yuhong Nan, Yao Zhang, Jinjing Zhao, Mi Wen
    "I Don't Know If We're Doing Good. I Don't Know If We're Doing Bad": Investigating How Practitioners Scope, Motivate, and Conduct Privacy Work When Developing AI ProductsUSENIX Security '24Hao-Ping (Hank) Lee, Lan Gao, Stephanie Yang, Jodi Forlizzi, Sauvik Das
    Voice App Developer Experiences with Alexa and Google Assistant: Juggling Risks, Liability, and SecurityUSENIX Security '24William Seymour, Noura Abdi, Kopo M. Ramokapane, Jide Edu, Guillermo Suarez-Tangil, Jose Such
    Cascade: CPU Fuzzing via Intricate Program GenerationUSENIX Security '24Flavien Solt, Katharina Ceesay-Seitz, Kaveh Razavi
    ModelGuard: Information-Theoretic Defense Against Model Extraction AttacksUSENIX Security '24Minxue Tang, Anna Dai, Louis DiValentin, Aolin Ding, Amin Hass, Neil Zhenqiang Gong, Yiran Chen, Hai "Helen" Li
    Unveiling the Secrets without Data: Can Graph Neural Networks Be Exploited through Data-Free Model Extraction Attacks?USENIX Security '24Yuanxin Zhuang, Chuan Shi, Mengmei Zhang, Jinghui Chen, Lingjuan Lyu, Pan Zhou, Lichao Sun
    ATTention Please! An Investigation of the App Tracking Transparency PermissionUSENIX Security '24Reham Mohamed, Arjun Arunasalam, Habiba Farrukh, Jason Tong, Antonio Bianchi, Z. Berkay Celik
    SHiFT: Semi-hosted Fuzz Testing for Embedded ApplicationsUSENIX Security '24Alejandro Mera, Changming Liu, Ruimin Sun, Engin Kirda, Long Lu
    Learning with Semantics: Towards a Semantics-Aware Routing Anomaly Detection SystemUSENIX Security '24Yihao Chen, Qilei Yin, Qi Li, Zhuotao Liu, Ke Xu, Yi Xu, Mingwei Xu, Ziqian Liu, Jianping Wu
    EL3XIR: Fuzzing COTS Secure MonitorsUSENIX Security '24Christian Lindenmeier, Mathias Payer, Marcel Busch
    MultiFuzz: A Multi-Stream Fuzzer For Testing Monolithic FirmwareUSENIX Security '24Michael Chesser, Surya Nepal, Damith C. Ranasinghe
    "There are rabbit holes I want to go down that I'm not allowed to go down": An Investigation of Security Expert Threat Modeling Practices for Medical DevicesUSENIX Security '24Ronald E. Thompson, Madline McLaughlin, Carson Powers, Daniel Votipka
    Towards More Practical Threat Models in Artificial Intelligence SecurityUSENIX Security '24Kathrin Grosse, Lukas Bieringer, Tarek R. Besold, Alexandre M. Alahi
    From the Childhood Past: Views of Young Adults on Parental Sharing of Children's PhotosUSENIX Security '24Tania Ghafourian, Nicholas Micallef, Sameer Patil
    WhisperFuzz: White-Box Fuzzing for Detecting and Locating Timing Vulnerabilities in ProcessorsUSENIX Security '24Pallavi Borkar, Chen Chen, Mohamadreza Rostami, Nikhilesh Singh, Rahul Kande, Ahmad-Reza Sadeghi, Chester Rebeiro, Jeyavijayan Rajendran
    CellularLint: A Systematic Approach to Identify Inconsistent Behavior in Cellular Network SpecificationsUSENIX Security '24Mirza Masfiqur Rahman, Imtiaz Karim, Elisa Bertino
    Spill the TeA: An Empirical Study of Trusted Application Rollback Prevention on Android SmartphonesUSENIX Security '24Marcel Busch, Philipp Mao, Mathias Payer
    A Decade of Privacy-Relevant Android App Reviews: Large Scale TrendsUSENIX Security '24Omer Akgul, Sai Teja Peddinti, Nina Taft, Michelle L. Mazurek, Hamza Harkous, Animesh Srivastava, Benoit Seguin
    PIXELMOD: Improving Soft Moderation of Visual Misleading Information on TwitterUSENIX Security '24Pujan Paudel, Chen Ling, Jeremy Blackburn, Gianluca Stringhini
    DeepEclipse: How to Break White-Box DNN-Watermarking SchemesUSENIX Security '24Alessandro Pegoraro, Carlotta Segna, Kavita Kumari, Ahmad-Reza Sadeghi
    SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and PracticeUSENIX Security '24Tushar Nayan, Qiming Guo, Mohammed Al Duniawi, Marcus Botacin, Selcuk Uluagac, Ruimin Sun
    ClearStamp: A Human-Visible and Robust Model-Ownership Proof based on Transposed Model TrainingUSENIX Security '24Torsten Krauß, Jasper Stang, Alexandra Dmitrienko
    TAPFixer: Automatic Detection and Repair of Home Automation Vulnerabilities based on Negated-property ReasoningUSENIX Security '24Yinbo Yu, Yuanqi Xu, Kepu Huang, Jiajia Liu

Pages