Conferences

Search results

    TitleConferenceSpeaker(s)
    Wireless Signal Injection Attacks on VSAT Satellite ModemsUSENIX Security '24Robin Bisping, Johannes Willbold, Martin Strohmeier, Vincent Lenders
    Prompt Stealing Attacks Against Text-to-Image Generation ModelsUSENIX Security '24Xinyue Shen, Yiting Qu, Michael Backes, Yang Zhang
    Trust Me If You Can – How Usable Is Trusted Types In Practice?USENIX Security '24Sebastian Roth, Lea Gröber, Philipp Baus, Katharina Krombholz, Ben Stock
    zkCross: A Novel Architecture for Cross-Chain Privacy-Preserving AuditingUSENIX Security '24Yihao Guo, Minghui Xu, Xiuzhen Cheng, Dongxiao Yu, Wangjie Qiu, Gang Qu, Weibing Wang, Mingming Song
    Deciphering Textual Authenticity: A Generalized Strategy through the Lens of Large Language Semantics for Detecting Human vs. Machine-Generated TextUSENIX Security '24Mazal Bethany, Brandon Wherry, Emet Bethany, Nishant Vishwamitra, Anthony Rios, Peyman Najafirad
    Moderating Illicit Online Image Promotion for Unsafe User Generated Content Games Using Large Vision-Language ModelsUSENIX Security '24Keyan Guo, Ayush Utkarsh, Wenbo Ding, Isabelle Ondracek, Ziming Zhao, Guo Freeman, Nishant Vishwamitra, Hongxin Hu
    DEEPTYPE: Refining Indirect Call Targets with Strong Multi-layer Type AnalysisUSENIX Security '24Tianrou Xia, Hong Hu, Dinghao Wu
    Sprints: Intermittent Blockchain PoW MiningUSENIX Security '24Michael Mirkin, Lulu Zhou, Ittay Eyal, Fan Zhang
    Pandawan: Quantifying Progress in Linux-based Firmware RehostingUSENIX Security '24Ioannis Angelakopoulos, Gianluca Stringhini, Manuel Egele
    You Can Obfuscate, but You Cannot Hide: CrossPoint Attacks against Network Topology ObfuscationUSENIX Security '24Xuanbo Huang, Kaiping Xue, Lutong Chen, Mingrui Ai, Huancheng Zhou, Bo Luo, Guofei Gu, Qibin Sun
    Biosignal Authentication Considered Harmful TodayUSENIX Security '24Veena Krish, Nicola Paoletti, Milad Kazemi, Scott Smolka, Amir Rahmati
    ChainReactor: Automated Privilege Escalation Chain Discovery via AI PlanningUSENIX Security '24Giulio De Pasquale, Ilya Grishchenko, Riccardo Iesari, Gabriel Pizarro, Lorenzo Cavallaro, Christopher Kruegel, Giovanni Vigna
    Max Attestation Matters: Making Honest Parties Lose Their Incentives in Ethereum PoSUSENIX Security '24Mingfei Zhang, Rujia Li, Sisi Duan
    CO3: Concolic Co-execution for FirmwareUSENIX Security '24Changming Liu, Alejandro Mera, Engin Kirda, Meng Xu, Long Lu
    Improving Indirect-Call Analysis in LLVM with Type and Data-Flow Co-AnalysisUSENIX Security '24Dinghao Liu, Shouling Ji, Kangjie Lu, Qinming He
    LR-Miner: Static Race Detection in OS Kernels by Mining Locking RulesUSENIX Security '24Tuo Li, Jia-Ju Bai, Gui-Dong Han, Shi-Min Hu
    A First Physical-World Trajectory Prediction Attack via LiDAR-induced Deceptions in Autonomous DrivingUSENIX Security '24Yang Lou, Yi Zhu, Qun Song, Rui Tan, Chunming Qiao, Wei-Bin Lee, Jianping Wang
    The Decisive Power of Indecision: Low-Variance Risk-Limiting Audits and Election Contestation via Marginal Mark RecordingUSENIX Security '24Benjamin Fuller, Rashmi Pai, Alexander Russell
    GlobalConfusion: TrustZone Trusted Application 0-Days by DesignUSENIX Security '24Marcel Busch, Philipp Mao, Mathias Payer
    YPIR: High-Throughput Single-Server PIR with Silent PreprocessingUSENIX Security '24Samir Jordan Menon, David J. Wu
    Abuse-Resistant Location Tracking: Balancing Privacy and Safety in the Offline Finding EcosystemUSENIX Security '24Harry Eldridge, Gabrielle Beck, Matthew Green, Nadia Heninger, Abhishek Jain
    I Experienced More than 10 DeFi Scams: On DeFi Users' Perception of Security Breaches and CountermeasuresUSENIX Security '24Mingyi Liu, Jun Ho Huh, HyungSeok Han, Jaehyuk Lee, Jihae Ahn, Frank Li, Hyoungshick Kim, Taesoo Kim
    CARDSHARK: Understanding and Stablizing Linux Kernel Concurrency Bugs Against the OddsUSENIX Security '24Tianshuo Han, Xiaorui Gong, Jian Liu
    Towards Privacy and Security in Private Clouds: A Representative Survey on the Prevalence of Private Hosting and Administrator CharacteristicsUSENIX Security '24Lea Gröber, Simon Lenau, Rebecca Weil, Elena Groben, Michael Schilling, Katharina Krombholz
    ElectionGuard: a Cryptographic Toolkit to Enable Verifiable ElectionsUSENIX Security '24Josh Benaloh, Michael Naehrig, Olivier Pereira, Dan S. Wallach

Pages