Conferences

Search results

    TitleConferenceSpeaker(s)
    FuncTeller: How Well Does eFPGA Hide Functionality?USENIX Security '23Zhaokun Han, Mohammed Shayan, Aneesh Dixit, Mustafa Shihab, Yiorgos Makris, Jeyavijayan (JV) Rajendran
    Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the InternetUSENIX Security '23Tomas Hlavacek, Haya Shulman, Niklas Vogel, Michael Waidner
    McFIL: Model Counting Functionality-Inherent LeakageUSENIX Security '23Maximilian Zinkus, Yinzhi Cao, Matthew D. Green
    UVSCAN: Detecting Third-Party Component Usage Violations in IoT FirmwareUSENIX Security '23Binbin Zhao, Shouling Ji, Xuhong Zhang, Yuan Tian, Qinying Wang, Yuwen Pu, Chenyang Lyu, Raheem Beyah
    LightThief: Your Optical Communication Information is Stolen behind the WallUSENIX Security '23Xin Liu, Wei Wang, Guanqun Song, Ting Zhu
    Fuzz The Power: Dual-role State Guided Black-box Fuzzing for USB Power DeliveryUSENIX Security '23Kyungtae Kim, Sungwoo Kim, Kevin R. B. Butler, Antonio Bianchi, Rick Kennell, Dave (Jing) Tian
    HorusEye: A Realtime IoT Malicious Traffic Detection Framework using Programmable SwitchesUSENIX Security '23Yutao Dong, Qing Li, Kaidong Wu, Ruoyu Li, Dan Zhao, Gareth Tyson, Junkun Peng, Yong Jiang, Shutao Xia, Mingwei Xu
    Exploring Tenants' Preferences of Privacy Negotiation in AirbnbUSENIX Security '23Zixin Wang, Danny Yuxing Huang, Yaxing Yao
    PoliGraph: Automated Privacy Policy Analysis using Knowledge GraphsUSENIX Security '23Hao Cui, Rahmadi Trimananda, Athina Markopoulou, Scott Jordan
    Automated Inference on Financial Security of Ethereum Smart ContractsUSENIX Security '23Wansen Wang, Wenchao Huang, Zhaoyi Meng, Yan Xiong, Fuyou Miao, Xianjin Fang, Caichang Tu, Renjie Ji
    SpectrEM: Exploiting Electromagnetic Emanations During Transient ExecutionUSENIX Security '23Jesse De Meulemeester, Antoon Purnal, Lennert Wouters, Arthur Beckers, Ingrid Verbauwhede
    µFUZZ: Redesign of Parallel Fuzzing using Microservice ArchitectureUSENIX Security '23Yongheng Chen, Rui Zhong, Yupeng Yang, Hong Hu, Dinghao Wu, Wenke Lee
    Powering Privacy: On the Energy Demand and Feasibility of Anonymity Networks on SmartphonesUSENIX Security '23Daniel Hugenroth, Alastair R. Beresford
    ReUSB: Replay-Guided USB Driver FuzzingUSENIX Security '23
    FISHFUZZ: Catch Deeper Bugs by Throwing Larger NetsUSENIX Security '23Han Zheng, Jiayuan Zhang, Yuhang Huang, Zezhong Ren, He Wang, Chunjie Cao, Yuqing Zhang, Flavio Toffalini, Mathias Payer
    Reusable Enclaves for Confidential Serverless ComputingUSENIX Security '23Shixuan Zhao, Pinshen Xu, Guoxing Chen, Mengya Zhang, Yinqian Zhang, Zhiqiang Lin
    HashTag: Hash-based Integrity Protection for Tagged ArchitecturesUSENIX Security '23Lukas Lamster, Martin Unterguggenberger, David Schrammel, Stefan Mangard
    Inductive Graph UnlearningUSENIX Security '23Cheng-Long Wang, Mengdi Huai, Di Wang
    Systematic Assessment of Fuzzers using Mutation AnalysisUSENIX Security '23Philipp Görz, Björn Mathis, Keno Hassler, Emre Güler, Thorsten Holz, Andreas Zeller, Rahul Gopinath
    Auditing Frameworks Need Resource Isolation: A Systematic Study on the Super Producer Threat to System Auditing and Its MitigationUSENIX Security '23Peng Jiang, Ruizhe Huang, Ding Li, Yao Guo, Xiangqun Chen, Jianhai Luan, Yuxin Ren, Xinwei Hu
    SCARF – A Low-Latency Block Cipher for Secure Cache-RandomizationUSENIX Security '23Federico Canale, Tim Güneysu, Gregor Leander, Jan Philipp Thoma, Yosuke Todo, Rei Ueno
    WHIP: Improving Static Vulnerability Detection in Web Application by Forcing tools to CollaborateUSENIX Security '23Feras Al-Kassar, Luca Compagna, Davide Balzarotti
    PORE: Provably Robust Recommender Systems against Data Poisoning AttacksUSENIX Security '23Jinyuan Jia, Yupei Liu, Yuepeng Hu, Neil Zhenqiang Gong
    AnimateDead: Debloating Web Applications Using Concolic ExecutionUSENIX Security '23Babak Amin Azad, Rasoul Jahanshahi, Chris Tsoukaladelis, Manuel Egele, Nick Nikiforakis
    Cheesecloth: Zero-Knowledge Proofs of Real World VulnerabilitiesUSENIX Security '23Santiago Cuéllar, Bill Harris, James Parker, Stuart Pernsteiner, Eran Tromer

Pages