Conferences

Search results

    TitleConferenceSpeaker(s)
    Operation Mango: Scalable Discovery of Taint-Style Vulnerabilities in Binary Firmware ServicesUSENIX Security '24Wil Gibbs, Arvind S Raj, Jayakrishna Menon Vadayath, Hui Jun Tay, Justin Miller, Akshay Ajayan, Zion Leonahenahe Basque, Audrey Dutcher, Fangzhou Dong, Xavier Maso, Giovanni Vigna, Christopher Kruegel, Adam Doupé, Yan Shoshitaishvili, Ruoyu Wang
    ShadowBound: Efficient Heap Memory Protection Through Advanced Metadata Management and Customized Compiler OptimizationUSENIX Security '24Zheng Yu, Ganxiang Yang, Xinyu Xing
    Voodoo: Memory Tagging, Authenticated Encryption, and Error Correction through MAGICUSENIX Security '24Lukas Lamster, Martin Unterguggenberger, David Schrammel, Stefan Mangard
    Leakage-Abuse Attacks Against Structured Encryption for SQLUSENIX Security '24Alexander Hoover, Ruth Ng, Daren Khu, Yao'An Li, Joelle Lim, Derrick Ng, Jed Lim, Yiyang Song
    OPTISAN: Using Multiple Spatial Error Defenses to Optimize Stack Memory Protection within a BudgetUSENIX Security '24Rahul George, Mingming Chen, Kaiming Huang, Zhiyun Qian, Thomas La Porta, Trent Jaeger
    π-Jack: Physical-World Adversarial Attack on Monocular Depth Estimation with Perspective HijackingUSENIX Security '24Tianyue Zheng, Jingzhi Hu, Rui Tan, Yinqian Zhang, Ying He, Jun Luo
    Leveraging Semantic Relations in Code and Data to Enhance Taint Analysis of Embedded SystemsUSENIX Security '24Jiaxu Zhao, Yuekang Li, Yanyan Zou, Zhaohui Liang, Yang Xiao, Yeting Li, Bingwei Peng, Nanyu Zhong, Xinyi Wang, Wei Wang, Wei Huo
    Privacy-Preserving Data Aggregation with Public Verifiability Against Internal AdversariesUSENIX Security '24Marco Palazzo, Florine W. Dekker, Alessandro Brighente, Mauro Conti, Zekeriya Erkin
    SCAVY: Automated Discovery of Memory Corruption Targets in Linux Kernel for Privilege EscalationUSENIX Security '24Erin Avllazagaj, Yonghwi Kwon, Tudor Dumitraș
    A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for Evading Learning-based Windows Malware Detection in the WildUSENIX Security '24Xiang Ling, Zhiyu Wu, Bin Wang, Wei Deng, Jingzheng Wu, Shouling Ji, Tianyue Luo, Yanjun Wu
    FVD-DPM: Fine-grained Vulnerability Detection via Conditional Diffusion Probabilistic ModelsUSENIX Security '24Miaomiao Shao, Yuxin Ding
    POPSTAR: Lightweight Threshold Reporting with Reduced LeakageUSENIX Security '24Hanjun Li, Sela Navot, Stefano Tessaro
    RADIUS/UDP Considered HarmfulUSENIX Security '24Sharon Goldberg, Miro Haller, Nadia Heninger, Mike Milano, Dan Shumow, Marc Stevens, Adam Suhl
    IoT Market Dynamics: An Analysis of Device Sales, Security and Privacy Signals, and their InteractionsUSENIX Security '24Swaathi Vetrivel, Brennen Bouwmeester, Michel van Eeten, Carlos H. Gañán
    On a Collision Course: Unveiling Wireless Attacks to the Aircraft Traffic Collision Avoidance System (TCAS)USENIX Security '24Giacomo Longo, Martin Strohmeier, Enrico Russo, Alessio Merlo, Vincent Lenders
    The Challenges of Bringing Cryptography from Research Papers to Products: Results from an Interview Study with ExpertsUSENIX Security '24Konstantin Fischer, Ivana Trummová, Phillip Gajland, Yasemin Acar, Sascha Fahl, Angela Sasse
    Splitting the Difference on Adversarial TrainingUSENIX Security '24Matan Levi, Aryeh Kontorovich
    Cross the Zone: Toward a Covert Domain Hijacking via Shared DNS InfrastructureUSENIX Security '24Yunyi Zhang, Mingming Zhang, Baojun Liu, Zhan Liu, Jia Zhang, Haixin Duan, Min Zhang, Fan Shi, Chengxi Xu
    Lurking in the shadows: Unveiling Stealthy Backdoor Attacks against Personalized Federated LearningUSENIX Security '24Xiaoting Lyu, Yufei Han, Wei Wang, Jingkai Liu, Yongsheng Zhu, Guangquan Xu, Jiqiang Liu, Xiangliang Zhang
    "You have to read 50 different RFCs that contradict each other": An Interview Study on the Experiences of Implementing Cryptographic StandardsUSENIX Security '24Nicolas Huaman, Jacques Suray, Jan H. Klemmer, Marcel Fourné, Sabrina Klivan, Ivana Trummová, Yasemin Acar, Sascha Fahl
    Breaking Espressif’s ESP32 V3: Program Counter Control with Computed Values using Fault InjectionWOOT '24Jeroen Delvaux, Cristofaro Mune, Mario Romero, Niek Timmers
    Introduction to Procedural Debugging through Binary LibificationWOOT '24Jonathan Brossard
    Reverse Engineering the Eufy Ecosystem: A Deep Dive into Security Vulnerabilities and Proprietary ProtocolsWOOT '24Victor Goeman, Dairo de Ruck, Tom Cordemans, Jorn Lapon, Vincent Naessens
    Attacking with Something That Does Not Exist: 'Proof of Non-Existence' Can Exhaust DNS Resolver CPUWOOT '24Olivia Gruza, Elias Heftrig, Oliver Jacobsen, Haya Schulmann, Niklas Vogel, Michael Waidner
    Not Quite Write: On the Effectiveness of Store-Only Bounds CheckingWOOT '24Adriaan Jacobs, Stijn Volckaert

Pages