Conferences

Search results

    TitleConferenceSpeaker(s)
    Freaky Leaky SMS: Extracting User Locations by Analyzing SMS TimingsUSENIX Security '23Evangelos Bitsikas, Theodor Schnitzler, Christina Pöpper, Aanjhan Ranganathan
    EnigMap: External-Memory Oblivious Map for Secure EnclavesUSENIX Security '23Afonso Tinoco, Sixiang Gao, Elaine Shi
    Spying through Your Voice Assistants: Realistic Voice Command FingerprintingUSENIX Security '23Dilawer Ahmed, Aafaq Sabir, Anupam Das
    Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN InferenceUSENIX Security '23Yun Li, Yufei Duan, Zhicong Huang, Cheng Hong, Chao Zhang, Yifan Song
    "Un-Equal Online Safety?" A Gender Analysis of Security and Privacy Protection Advice and Behaviour PatternsUSENIX Security '23Kovila P.L. Coopamootoo, Magdalene Ng
    Extracting Protocol Format as State Machine via Controlled Static Loop AnalysisUSENIX Security '23Qingkai Shi, Xiangzhe Xu, Xiangyu Zhang
    Network Detection of Interactive SSH Impostors Using Deep LearningUSENIX Security '23Julien Piet, Aashish Sharma, Vern Paxson, David Wagner
    Calpric: Inclusive and Fine-grain Labeling of Privacy Policies with Crowdsourcing and Active LearningUSENIX Security '23Wenjun Qiu, David Lie, Lisa Austin
    One Size Does Not Fit All: Uncovering and Exploiting Cross Platform Discrepant APIs in WeChatUSENIX Security '23Chao Wang, Yue Zhang, Zhiqiang Lin
    KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR SystemsUSENIX Security '23Xinghui Wu, Shiqing Ma, Chao Shen, Chenhao Lin, Qian Wang, Qi Li, Yuan Rao
    “I wouldn't want my unsafe code to run my pacemaker”: An Interview Study on the Use, Comprehension, and Perceived Risks of Unsafe RustUSENIX Security '23Sandra Höltervennhoff, Philip Klostermeyer, Noah Wöhler, Yasemin Acar, Sascha Fahl
    Detecting Union Type Confusion in Component Object ModelUSENIX Security '23Yuxing Zhang, Xiaogang Zhu, Daojing He, Minhui Xue, Shouling Ji, Mohammad Sayad Haghighi, Sheng Wen, Zhiniang Peng
    AlphaEXP: An Expert System for Identifying Security-Sensitive Kernel ObjectsUSENIX Security '23Ruipeng Wang, Kaixiang Chen, Chao Zhang, Zulie Pan, Qianyu Li, Siliang Qin, Shenglin Xu, Min Zhang, Yang Li
    Knowledge Expansion and Counterfactual Interaction for Reference-Based Phishing DetectionUSENIX Security '23Ruofan Liu, Yun Lin, Yifan Zhang, Penn Han Lee, Jin Song Dong
    Discovering Adversarial Driving Maneuvers against Autonomous VehiclesUSENIX Security '23Ruoyu Song, Muslum Ozgur Ozmen, Hyungsub Kim, Raymond Muller, Z. Berkay Celik, Antonio Bianchi
    Demystifying Pointer Authentication on Apple M1USENIX Security '23Zechao Cai, Jiaxun Zhu, Wenbo Shen, Yutian Yang, Rui Chang, Yu Wang, Jinku Li, Kui Ren
    ACORN: Input Validation for Secure AggregationUSENIX Security '23James Bell, Adrià Gascón, Tancrède Lepoint, Baiyu Li, Sarah Meiklejohn, Mariana Raykova, Cathie Yun
    Two Sides of the Shield: Understanding Protective DNS adoption factorsUSENIX Security '23Elsa Rodríguez, Radu Anghel, Simon Parkin, Michel van Eeten, Carlos Gañán
    Aliasing Backdoor Attacks on Pre-trained ModelsUSENIX Security '23Cheng'an Wei, Yeonjoon Lee, Kai Chen, Guozhu Meng, Peizhuo Lv
    QFA2SR: Query-Free Adversarial Transfer Attacks to Speaker Recognition SystemsUSENIX Security '23Guangke Chen, Yedi Zhang, Zhe Zhao, Fu Song
    BotScreen: Trust Everybody, but Cut the Aimbots YourselfUSENIX Security '23Minyeop Choi, Gihyuk Ko, Sang Kil Cha
    Detecting API Post-Handling Bugs Using Code and Description in PatchesUSENIX Security '23Miaoqian Lin, Kai Chen, Yang Xiao
    Fast IDentity Online with Anonymous Credentials (FIDO-AC)USENIX Security '23Wei-Zhu Yeoh, Michal Kepkowski, Gunnar Heide, Dali Kaafar, Lucjan Hanzlik
    Time for Change: How Clocks Break UWB Secure RangingUSENIX Security '23Claudio Anliker, Giovanni Camurati, Srdjan Čapkun
    Efficient Unbalanced Private Set Intersection Cardinality and User-friendly Privacy-preserving Contact TracingUSENIX Security '23Mingli Wu, Tsz Hon Yuen

Pages