Conferences

Search results

    TitleConferenceSpeaker(s)
    Unveiling IoT Security in Reality: A Firmware-Centric JourneyUSENIX Security '24Nicolas Nino, Ruibo Lu, Wei Zhou, Kyu Hyung Lee, Ziming Zhao, Le Guan
    Orbital Trust and Privacy: SoK on PKI and Location Privacy Challenges in Space NetworksUSENIX Security '24David Koisser, Richard Mitev, Nikita Yadav, Franziska Vollmer, Ahmad-Reza Sadeghi
    Dancer in the Dark: Synthesizing and Evaluating Polyglots for Blind Cross-Site ScriptingUSENIX Security '24Robin Kirchner, Jonas Möller, Marius Musch, David Klein, Konrad Rieck, Martin Johns
    Opportunistic Data Flow Integrity for Real-time Cyber-physical Systems Using Worst Case Execution Time ReservationUSENIX Security '24Yujie Wang, Ao Li, Jinwen Wang, Sanjoy Baruah, Ning Zhang
    Spider-Scents: Grey-box Database-aware Web Scanning for Stored XSSUSENIX Security '24Eric Olsson, Benjamin Eriksson, Adam Doupé, Andrei Sabelfeld
    Hijacking Attacks against Neural Network by Analyzing Training DataUSENIX Security '24Yunjie Ge, Qian Wang, Huayang Huang, Qi Li, Cong Wang, Chao Shen, Lingchen Zhao, Peipei Jiang, Zheng Fang, Shenyi Zhang
    How Does a Deep Learning Model Architecture Impact Its Privacy? A Comprehensive Study of Privacy Attacks on CNNs and TransformersUSENIX Security '24Guangsheng Zhang, Bo Liu, Huan Tian, Tianqing Zhu, Ming Ding, Wanlei Zhou
    False Claims against Model Ownership ResolutionUSENIX Security '24Jian Liu, Rui Zhang, Sebastian Szyller, Kui Ren, N. Asokan
    VOGUES: Validation of Object Guise using Estimated ComponentsUSENIX Security '24Raymond Muller, Yanmao Man, Ming Li, Ryan Gerdes, Jonathan Petit, Z. Berkay Celik
    With Great Power Come Great Side Channels: Statistical Timing Side-Channel Analyses with Bounded Type-1 ErrorsUSENIX Security '24Martin Dunsche, Marcel Maehren, Nurullah Erinola, Robert Merget, Nicolai Bissantz, Juraj Somorovsky, Jörg Schwenk
    Enabling Developers, Protecting Users: Investigating Harassment and Safety in VRUSENIX Security '24Abhinaya S.B., Aafaq Sabir, Anupam Das
    FaceObfuscator: Defending Deep Learning-based Privacy Attacks with Gradient Descent-resistant Features in Face RecognitionUSENIX Security '24Shuaifan Jin, He Wang, Zhibo Wang, Feng Xiao, Jiahui Hu, Yuan He, Wenwen Zhang, Zhongjie Ba, Weijie Fang, Shuhong Yuan, Kui Ren
    ENG25519: Faster TLS 1.3 handshake using optimized X25519 and Ed25519USENIX Security '24Jipeng Zhang, Junhao Huang, Lirui Zhao, Donglong Chen, Çetin Kaya Koç
    "These results must be false": A usability evaluation of constant-time analysis toolsUSENIX Security '24Marcel Fourné, Daniel De Almeida Braga, Jan Jancar, Mohamed Sabt, Peter Schwabe, Gilles Barthe, Pierre-Alain Fouque, Yasemin Acar
    Unbalanced Circuit-PSI from Oblivious Key-Value RetrievalUSENIX Security '24Meng Hao, Weiran Liu, Liqiang Peng, Hongwei Li, Cong Zhang, Hanxiao Chen, Tianwei Zhang
    Being Transparent is Merely the Beginning: Enforcing Purpose Limitation with Polynomial ApproximationUSENIX Security '24Shuofeng Liu, Zihan Wang, Minhui Xue, Long Wang, Yuanchao Zhang, Guangdong Bai
    Adversary is on the Road: Attacks on Visual SLAM using Unnoticeable Adversarial PatchUSENIX Security '24Baodong Chen, Wei Wang, Pascal Sikorski, Ting Zhu
    SAIN: Improving ICS Attack Detection Sensitivity via State-Aware InvariantsUSENIX Security '24Syed Ghazanfar Abbas, Muslum Ozgur Ozmen, Abdulellah Alsaheel, Arslan Khan, Z. Berkay Celik, Dongyan Xu
    SSRF vs. Developers: A Study of SSRF-Defenses in PHP ApplicationsUSENIX Security '24Malte Wessels, Simon Koch, Giancarlo Pellegrino, Martin Johns
    Argus: All your (PHP) Injection-sinks are belong to us.USENIX Security '24Rasoul Jahanshahi, Manuel Egele
    PEPSI: Practically Efficient Private Set Intersection in the Unbalanced SettingUSENIX Security '24Rasoul Akhavan Mahdavi, Nils Lukas, Faezeh Ebrahimianghazani, Thomas Humphries, Bailey Kacsmar, John Premkumar, Xinda Li, Simon Oya, Ehsan Amjadian, Florian Kerschbaum
    Reconstructing training data from document understanding modelsUSENIX Security '24Jérémie Dentan, Arnaud Paran, Aymen Shabou
    Demystifying the Security Implications in IoT Device Rental ServicesUSENIX Security '24Yi He, Yunchao Guan, Ruoyu Lun, Shangru Song, Zhihao Guo, Jianwei Zhuge, Jianjun Chen, Qiang Wei, Zehui Wu, Miao Yu, Hetian Shi, Qi Li
    O-Ring and K-Star: Efficient Multi-party Private Set IntersectionUSENIX Security '24Mingli Wu, Tsz Hon Yuen, Kwan Yin Chan
    Landscape More Secure Than Portrait? Zooming Into the Directionality of Digital Images With Security ImplicationsUSENIX Security '24Benedikt Lorch, Rainer Böhme

Pages