Conferences

Search results

    TitleConferenceSpeaker(s)
    Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery AttacksUSENIX Security '24Robin Leander Schröder, Stefan Gast, Qian Guo
    Information Flow Control in Machine Learning through Modular Model ArchitectureUSENIX Security '24Trishita Tiwari, Suchin Gururangan, Chuan Guo, Weizhe Hua, Sanjay Kariyappa, Udit Gupta, Wenjie Xiong, Kiwan Maeng, Hsien-Hsin S. Lee, G. Edward Suh
    Length Leakage in Oblivious Data Access MechanismsUSENIX Security '24Grace Jia, Rachit Agarwal, Anurag Khandelwal
    Formal Security Analysis of Widevine through the W3C EME StandardUSENIX Security '24Stéphanie Delaune, Joseph Lallemand, Gwendal Patat, Florian Roudot, Mohamed Sabt
    Cryptographic Analysis of Delta ChatUSENIX Security '24Yuanming Song, Lenka Mareková, Kenneth G. Paterson
    On Bridging the Gap between Control Flow Integrity and Attestation SchemesUSENIX Security '24Mahmoud Ammar, Ahmed Abdelraoof, Silviu Vlasceanu
    Windows into the Past: Exploiting Legacy Crypto in Modern OS's Kerberos ImplementationUSENIX Security '24Michal Shagam, Eyal Ronen
    Privacy Side Channels in Machine Learning SystemsUSENIX Security '24Edoardo Debenedetti, Giorgio Severi, Nicholas Carlini, Christopher A. Choquette-Choo, Matthew Jagielski, Milad Nasr, Eric Wallace, Florian Tramèr
    Scalable Private Set Union, with Stronger SecurityUSENIX Security '24Yanxue Jia, Shi-Feng Sun, Hong-Sheng Zhou, Dawu Gu
    DVSorder: Ballot Randomization Flaws Threaten Voter PrivacyUSENIX Security '24Braden L. Crimmins, Dhanya Y. Narayanan, Drew Springall, J. Alex Halderman
    Navigating the Privacy Compliance Maze: Understanding Risks with Privacy-Configurable Mobile SDKsUSENIX Security '24Yifan Zhang, Zhaojie Hu, Xueqiang Wang, Yuhui Hong, Yuhong Nan, XiaoFeng Wang, Jiatao Cheng, Luyi Xing
    Devil in the Room: Triggering Audio Backdoors in the Physical WorldUSENIX Security '24Meng Chen, Xiangyu Xu, Li Lu, Zhongjie Ba, Feng Lin, Kui Ren
    FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker RecognitionUSENIX Security '24Kun Wang, Xiangyu Xu, Li Lu, Zhongjie Ba, Feng Lin, Kui Ren
    DaCapo: Automatic Bootstrapping Management for Efficient Fully Homomorphic EncryptionUSENIX Security '24Seonyoung Cheon, Yongwoo Lee, Dongkwan Kim, Ju Min Lee, Sunchul Jung, Taekyung Kim, Dongyoon Lee, Hanjun Kim
    The Unpatchables: Why Municipalities Persist in Running Vulnerable HostsUSENIX Security '24Aksel Ethembabaoglu, Rolf van Wegberg, Yury Zhauniarovich, Michel van Eeten
    Why Aren't We Using Passkeys? Obstacles Companies Face Deploying FIDO2 Passwordless AuthenticationUSENIX Security '24Leona Lassak, Elleen Pan, Blase Ur, Maximilian Golla
    Key Recovery Attacks on Approximate Homomorphic Encryption with Non-Worst-Case Noise Flooding CountermeasuresUSENIX Security '24Qian Guo, Denis Nabokov, Elias Suvanto, Thomas Johansson
    PINE: Efficient Verification of a Euclidean Norm Bound of a Secret-Shared VectorUSENIX Security '24Guy N. Rothblum, Eran Omri, Junye Chen, Kunal Talwar
    SoK (or SoLK?): On the Quantitative Study of Sociodemographic Factors and Computer Security BehaviorsUSENIX Security '24Miranda Wei, Jaron Mink, Yael Eiger, Tadayoshi Kohno, Elissa M. Redmiles, Franziska Roesner
    EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability DetectionUSENIX Security '24Shigang Liu, Di Cao, Junae Kim, Tamas Abraham, Paul Montague, Seyit Camtepe, Jun Zhang, Yang Xiang
    SoK: Security of Programmable Logic ControllersUSENIX Security '24Efrén López-Morales, Ulysse Planta, Carlos Rubio-Medrano, Ali Abbasi, Alvaro A. Cardenas
    A Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral DriversUSENIX Security '24Chongqing Lei, Zhen Ling, Yue Zhang, Yan Yang, Junzhou Luo, Xinwen Fu
    AE-Morpher: Improve Physical Robustness of Adversarial Objects against LiDAR-based Detectors via Object ReconstructionUSENIX Security '24Shenchen Zhu, Yue Zhao, Kai Chen, Bo Wang, Hualong Ma, Cheng'an Wei
    Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number ManipulationUSENIX Security '24Fabian Bäumer, Marcus Brinkmann, Jörg Schwenk
    A Mixed-Methods Study on User Experiences and Challenges of Recovery Codes for an End-to-End Encrypted ServiceUSENIX Security '24Sandra Höltervennhoff, Noah Wöhler, Arne Möhle, Marten Oltrogge, Yasemin Acar, Oliver Wiese, Sascha Fahl

Pages