Conferences

Search results

    TitleConferenceSpeaker(s)
    Tickets or Privacy? Understand the Ecosystem of Chinese Ticket Grabbing AppsUSENIX Security '24Yijing Liu, Yiming Zhang, Baojun Liu, Haixin Duan, Qiang Li, Mingxuan Liu, Ruixuan Li, Jia Yao
    GridSE: Towards Practical Secure Geographic Search via Prefix Symmetric Searchable EncryptionUSENIX Security '24Ruoyang Guo, Jiarui Li, Shucheng Yu
    Co-Designing a Mobile App for Bystander Privacy Protection in Jordanian Smart Homes: A Step Towards Addressing a Complex Privacy LandscapeUSENIX Security '24Wael Albayaydh, Ivan Flechais
    "I really just leaned on my community for support": Barriers, Challenges, and Coping Mechanisms Used by Survivors of Technology-Facilitated Abuse to Seek Social SupportUSENIX Security '24Naman Gupta, Kate Walsh, Sanchari Das, Rahul Chatterjee
    Enhancing Network Attack Detection with Distributed and In-Network Data Collection SystemUSENIX Security '24Seyed Mohammad Mehdi Mirnajafizadeh, Ashwin Raam Sethuram, David Mohaisen, DaeHun Nyang, Rhongho Jang
    On Data Fabrication in Collaborative Vehicular Perception: Attacks and CountermeasuresUSENIX Security '24Qingzhao Zhang, Shuowei Jin, Ruiyang Zhu, Jiachen Sun, Xumiao Zhang, Qi Alfred Chen, Z. Morley Mao
    RECORD: A RECeption-Only Region Determination Attack on LEO Satellite UsersUSENIX Security '24Eric Jedermann, Martin Strohmeier, Vincent Lenders, Jens Schmitt
    FFXE: Dynamic Control Flow Graph Recovery for Embedded Firmware BinariesUSENIX Security '24Ryan Tsang, Asmita, Doreen Joseph, Soheil Salehi, Prasant Mohapatra, Houman Homayoun
    Your Firmware Has Arrived: A Study of Firmware Update VulnerabilitiesUSENIX Security '24Yuhao Wu, Jinwen Wang, Yujie Wang, Shixuan Zhai, Zihan Li, Yi He, Kun Sun, Qi Li, Ning Zhang
    Security and Privacy Analysis of Samsung's Crowd-Sourced Bluetooth Location Tracking SystemUSENIX Security '24Tingfeng Yu, James Henderson, Alwen Tiu, Thomas Haines
    A High Coverage Cybersecurity Scale Predictive of User BehaviorUSENIX Security '24Yukiko Sawaya, Sarah Lu, Takamasa Isohara, Mahmood Sharif
    Quantifying Privacy Risks of Prompts in Visual Prompt LearningUSENIX Security '24Yixin Wu, Rui Wen, Michael Backes, Pascal Berrang, Mathias Humbert, Yun Shen, Yang Zhang
    Is It a Trap? A Large-scale Empirical Study And Comprehensive Assessment of Online Automated Privacy Policy Generators for Mobile AppsUSENIX Security '24Shidong Pan, Dawen Zhang, Mark Staples, Zhenchang Xing, Jieshan Chen, Xiwei Xu, Thong Hoang
    Batch PIR and Labeled PSI with Oblivious Ciphertext CompressionUSENIX Security '24Alexander Bienstock, Sarvar Patel, Joon Young Seo, Kevin Yeo
    CAMP: Compositional Amplification Attacks against DNSUSENIX Security '24Huayi Duan, Marco Bearzi, Jodok Vieli, David Basin, Adrian Perrig, Si Liu, Bernhard Tellenbach
    PointerGuess: Targeted Password Guessing Model Using Pointer MechanismUSENIX Security '24Kedong Xiu, Ding Wang
    "I just hated it and I want my money back": Data-driven Understanding of Mobile VPN Service Switching Preferences in The WildUSENIX Security '24Rohit Raj, Mridul Newar, Mainack Mondal
    iHunter: Hunting Privacy Violations at Scale in the Software Supply Chain on iOSUSENIX Security '24Dexin Liu, Yue Xiao, Chaoqi Zhang, Kaitao Xie, Xiaolong Bai, Shikun Zhang, Luyi Xing
    CDN Cannon: Exploiting CDN Back-to-Origin Strategies for Amplification AttacksUSENIX Security '24Ziyu Lin, Zhiwei Lin, Ximeng Liu, Jianjun Chen, Run Guo, Cheng Chen, Shaodong Xiao
    Single Pass Client-Preprocessing Private Information RetrievalUSENIX Security '24Arthur Lazzaretti, Charalampos Papamanthou
    GhostRace: Exploiting and Mitigating Speculative Race ConditionsUSENIX Security '24Hany Ragab, Andrea Mambretti, Anil Kurmus, Cristiano Giuffrida
    A NEW HOPE: Contextual Privacy Policies for Mobile Applications and An Approach Toward Automated GenerationUSENIX Security '24Shidong Pan, Zhen Tao, Thong Hoang, Dawen Zhang, Tianshi Li, Zhenchang Xing, Xiwei Xu, Mark Staples, Thierry Rakotoarivelo, David Lo
    Abandon All Hope Ye Who Enter Here: A Dynamic, Longitudinal Investigation of Android's Data Safety SectionUSENIX Security '24Ioannis Arkalakis, Michalis Diamantaris, Serafeim Moustakas, Sotiris Ioannidis, Jason Polakis, Panagiotis Ilia
    Pixel+ and Pixel++: Compact and Efficient Forward-Secure Multi-Signatures for PoS Blockchain ConsensusUSENIX Security '24Jianghong Wei, Guohua Tian, Ding Wang, Fuchun Guo, Willy Susilo, Xiaofeng Chen
    When Threads Meet Interrupts: Effective Static Detection of Interrupt-Based Deadlocks in LinuxUSENIX Security '24Chengfeng Ye, Yuandao Cai, Charles Zhang

Pages