Conferences

Search results

    TitleConferenceSpeaker(s)
    A Research Framework and Initial Study of Browser Security for the Visually ImpairedUSENIX Security '23Elaine Lau, Zachary Peterson
    PUMM: Preventing Use-After-Free Using Execution Unit PartitioningUSENIX Security '23Carter Yagemann, Simon P. Chung, Brendan Saltaformaggio, Wenke Lee
    POLICYCOMP: Counterpart Comparison of Privacy Policies Uncovers Overbroad Personal Data Collection PracticesUSENIX Security '23Lu Zhou, Chengyongxiao Wei, Tong Zhu, Guoxing Chen, Xiaokuan Zhang, Suguo Du, Hui Cao, Haojin Zhu
    One Server for the Price of Two: Simple and Fast Single-Server Private Information RetrievalUSENIX Security '23Alexandra Henzinger, Matthew M. Hong, Henry Corrigan-Gibbs, Sarah Meiklejohn, Vinod Vaikuntanathan
    Exploring User Reactions and Mental Models Towards Perceptual Manipulation Attacks in Mixed RealityUSENIX Security '23Kaiming Cheng, Jeffery F. Tian, Tadayoshi Kohno, Franziska Roesner
    Eavesdropping Mobile App Activity via Radio-Frequency Energy HarvestingUSENIX Security '23Tao Ni, Guohao Lan, Jia Wang, Qingchuan Zhao, Weitao Xu
    Side-Channel Attacks on Optane Persistent MemoryUSENIX Security '23Sihang Liu, Suraaj Kanniwadi, Martin Schwarzl, Andreas Kogler, Daniel Gruss, Samira Khan
    A Study of Multi-Factor and Risk-Based Authentication AvailabilityUSENIX Security '23Anthony Gavazzi, Ryan Williams, Engin Kirda, Long Lu, Andre King, Andy Davis, Tim Leek
    Person Re-identification in 3D Space: A WiFi Vision-based ApproachUSENIX Security '23Yili Ren, Yichao Wang, Sheng Tan, Yingying Chen, Jie Yang
    Fourteen Years in the Life: A Root Server’s Perspective on DNS Resolver SecurityUSENIX Security '23Alden Hilton, Casey Deccio, Jacob Davis
    ClepsydraCache -- Preventing Cache Attacks with Time-Based EvictionsUSENIX Security '23Jan Philipp Thoma, Christian Niesler, Dominic Funke, Gregor Leander, Pierre Mayr, Nils Pohl, Lucas Davi, Tim Güneysu
    Guarding Serverless Applications with KaliumUSENIX Security '23Deepak Sirone Jegan, Liang Wang, Siddhant Bhagat, Michael Swift
    DynSQL: Stateful Fuzzing for Database Management Systems with Complex and Valid SQL Query GenerationUSENIX Security '23Zu-Ming Jiang, Jia-Ju Bai, Zhendong Su
    Automated Security Analysis of Exposure Notification SystemsUSENIX Security '23Kevin Morio, Ilkan Esiyok, Dennis Jackson, Robert Künnemann
    xNIDS: Explaining Deep Learning-based Network Intrusion Detection Systems for Active Intrusion ResponsesUSENIX Security '23Feng Wei, Hongda Li, Ziming Zhao, Hongxin Hu
    Pspray: Timing Side-Channel based Linux Kernel Heap Exploitation TechniqueUSENIX Security '23Yoochan Lee, Jinhan Kwak, Junesoo Kang, Yuseok Jeon, Byoungyoung Lee
    Strategies and Vulnerabilities of Participants in Venezuelan Influence OperationsUSENIX Security '23Ruben Recabarren, Bogdan Carbunar, Nestor Hernandez, Ashfaq Ali Shafin
    Investigating Verification Behavior and Perceptions of Visual Digital CertificatesUSENIX Security '23Dañiel Gerhardt, Alexander Ponticello, Adrian Dabrowski, Katharina Krombholz
    Remote Attacks on Speech Recognition Systems Using Sound from Power SupplyUSENIX Security '23Lanqing Yang, Xinqi Chen, Xiangyong Jian, Leping Yang, Yijie Li, Qianfei Ren, Yi-Chao Chen, Guangtao Xue, Xiaoyu Ji
    HOMESPY: The Invisible Sniffer of Infrared Remote Control of Smart TVsUSENIX Security '23Kong Huang, YuTong Zhou, Ke Zhang, Jiacen Xu, Jiongyi Chen, Di Tang, Kehuan Zhang
    FuzzJIT: Oracle-Enhanced Fuzzing for JavaScript Engine JIT CompilerUSENIX Security '23Junjie Wang, Zhiyi Zhang, Shuang Liu, Xiaoning Du, Junjie Chen
    TPatch: A Triggered Physical Adversarial PatchUSENIX Security '23Wenjun Zhu, Xiaoyu Ji, Yushi Cheng, Shibo Zhang, Wenyuan Xu
    TAP: Transparent and Privacy-Preserving Data ServicesUSENIX Security '23Daniel Reijsbergen, Aung Maw, Zheng Yang, Tien Tuan Anh Dinh, Jianying Zhou
    UnGANable: Defending Against GAN-based Face ManipulationUSENIX Security '23Zheng Li, Ning Yu, Ahmed Salem, Michael Backes, Mario Fritz, Yang Zhang
    Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine LearningUSENIX Security '23Jonathan Prokos, Neil Fendley, Matthew Green, Roei Schuster, Eran Tromer, Tushar Jois, Yinzhi Cao

Pages