Conferences

Search results

    TitleConferenceSpeaker(s)
    InfinityGauntlet: Expose Smartphone Fingerprint Authentication to Brute-force AttackUSENIX Security '23Yu Chen, Yang Yu, Lidong Zhai
    Multiview: Finding Blind Spots in Access-Deny Issues DiagnosisUSENIX Security '23Bingyu Shen, Tianyi Shan, Yuanyuan Zhou
    A Plot is Worth a Thousand Words: Model Information Stealing Attacks via Scientific PlotsUSENIX Security '23Boyang Zhang, Xinlei He, Yun Shen, Tianhao Wang, Yang Zhang
    X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item DetectionUSENIX Security '23Aishan Liu, Jun Guo, Jiakai Wang, Siyuan Liang, Renshuai Tao, Wenbo Zhou, Cong Liu, Xianglong Liu, Dacheng Tao
    Extending a Hand to Attackers: Browser Privilege Escalation Attacks via ExtensionsUSENIX Security '23Young Min Kim, Byoungyoung Lee
    Hey Kimya, Is My Smart Speaker Spying on Me? Taking Control of Sensor Privacy Through Isolation and AmnesiaUSENIX Security '23Piet De Vaere, Adrian Perrig
    Capstone: A Capability-based Foundation for Trustless Secure Memory AccessUSENIX Security '23Jason Zhijingcheng Yu, Conrad Watt, Aditya Badole, Trevor E. Carlson, Prateek Saxena
    Watch your Watch: Inferring Personality Traits from Wearable Activity TrackersUSENIX Security '23Noé Zufferey, Mathias Humbert, Romain Tavenard, Kévin Huguenin
    Squirrel: A Scalable Secure Two-Party Computation Framework for Training Gradient Boosting Decision TreeUSENIX Security '23Wen-jie Lu, Zhicong Huang, Qizhi Zhang, Yuchen Wang, Cheng Hong
    Authenticated private information retrievalUSENIX Security '23Simone Colombo, Kirill Nikitin, Henry Corrigan-Gibbs, David J. Wu, Bryan Ford
    Bug Hunters’ Perspectives on the Challenges and Benefits of the Bug Bounty EcosystemUSENIX Security '23Omer Akgul, Taha Eghtesad, Amit Elazari, Omprakash Gnawali, Jens Grossklags, Michelle L. Mazurek, Daniel Votipka, Aron Laszka
    Defining "Broken": User Experiences and Remediation Tactics When Ad-Blocking or Tracking-Protection Tools Break a Website’s User ExperienceUSENIX Security '23Alexandra Nisenoff, Arthur Borem, Madison Pickering, Grant Nakanishi, Maya Thumpasery, Blase Ur
    Log: It’s Big, It’s Heavy, It’s Filled with Personal Data! Measuring the Logging of Sensitive Information in the Android EcosystemUSENIX Security '23Allan Lyons, Julien Gamba, Austin Shawaga, Joel Reardon, Juan Tapiador, Serge Egelman, Narseo Vallina-Rodriguez
    Fact-Saboteurs: A Taxonomy of Evidence Manipulation Attacks against Fact-Verification SystemsUSENIX Security '23Sahar Abdelnabi, Mario Fritz
    Meta-Sift: How to Sift Out a Clean Subset in the Presence of Data Poisoning?USENIX Security '23Yi Zeng, Minzhou Pan, Himanshu Jahagirdar, Ming Jin, Lingjuan Lyu, Ruoxi Jia
    “Employees Who Don’t Accept the Time Security Takes Are Not Aware Enough”: The CISO View of Human-Centred SecurityUSENIX Security '23Jonas Hielscher, Uta Menges, Simon Parkin, Annette Kluge, M. Angela Sasse
    ​​How Library IT Staff Navigate Privacy and Security Challenges and ResponsibilitiesUSENIX Security '23Alan F. Luo, Noel Warford, Samuel Dooley, Rachel Greenstadt, Michelle L. Mazurek, Nora McDonald
    Silent Bugs Matter: A Study of Compiler-Introduced Security BugsUSENIX Security '23Jianhao Xu, Kangjie Lu, Zhengjie Du, Zhu Ding, Linke Li, Qiushi Wu, Mathias Payer, Bing Mao
    IvySyn: Automated Vulnerability Discovery in Deep Learning FrameworksUSENIX Security '23Neophytos Christou, Di Jin, Vaggelis Atlidakis, Baishakhi Ray, Vasileios P. Kemerlis
    Bleem: Packet Sequence Oriented Fuzzing for Protocol ImplementationsUSENIX Security '23Zhengxiong Luo, Junze Yu, Feilong Zuo, Jianzhong Liu, Yu Jiang, Ting Chen, Abhik Roychoudhury, Jiaguang Sun
    Araña: Discovering and Characterizing Password Guessing Attacks in PracticeUSENIX Security '23Mazharul Islam, Marina Sanusi Bohuk, Paul Chung, Thomas Ristenpart, Rahul Chatterjee
    Eye-Shield: Real-Time Protection of Mobile Device Screen Information from Shoulder SurfingUSENIX Security '23Brian Jay Tang, Kang G. Shin
    AIRS: Explanation for Deep Reinforcement Learning based Security ApplicationsUSENIX Security '23Jiahao Yu, Wenbo Guo, Qi Qin, Gang Wang, Ting Wang, Xinyu Xing
    Minimalist: Semi-automated Debloating of PHP Web Applications through Static AnalysisUSENIX Security '23Rasoul Jahanshahi, Babak Amin Azad, Nick Nikiforakis, Manuel Egele
    Machine-checking Multi-Round Proofs of Shuffle: Terelius-Wikstrom and Bayer-GrothUSENIX Security '23Thomas Haines, Rajeev Gore, Mukesh Tiwari

Pages