Conferences

Search results

    TitleConferenceSpeaker(s)
    No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial LearningUSENIX Security '23Thorsten Eisenhofer, Erwin Quiring, Jonas Möller, Doreen Riepel, Thorsten Holz, Konrad Rieck
    Password Guessing Using Random ForestUSENIX Security '23Ding Wang, Yunkai Zou, Zijian Zhang, Kedong Xiu
    Detecting and Handling IoT Interaction Threats in Multi-Platform Multi-Control-Channel Smart HomesUSENIX Security '23Haotian Chi, Qiang Zeng, Xiaojiang Du
    TRIDENT: Towards Detecting and Mitigating Web-based Social Engineering AttacksUSENIX Security '23Zheng Yang, Joey Allen, Matthew Landen, Roberto Perdisci, Wenke Lee
    “Millions of people are watching you”: Understanding the Digital-Safety Needs and Practices of CreatorsUSENIX Security '23Patrawat Samermit, Anna Turner, Patrick Gage Kelley, Tara Matthews, Vanessia Wu, Sunny Consolvo, Kurt Thomas
    DDRace: Finding Concurrency UAF Vulnerabilities in Linux Drivers with Directed FuzzingUSENIX Security '23
    Secure Floating-Point TrainingUSENIX Security '23Deevashwer Rathee, Anwesh Bhattacharya, Divya Gupta, Rahul Sharma, Dawn Song
    The OK Is Not Enough: A Large Scale Study of Consent Dialogs in Smartphone ApplicationsUSENIX Security '23Simon Koch, Benjamin Altpeter, Martin Johns
    PROGRAPHER: An Anomaly Detection System based on Provenance Graph EmbeddingUSENIX Security '23Fan Yang, Jiacen Xu, Chunlin Xiong, Zhou Li, Kehuan Zhang
    Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic AugmentationUSENIX Security '23Renjie Xie, Jiahao Cao, Enhuan Dong, Mingwei Xu, Kun Sun, Qi Li, Licheng Shen, Menghao Zhang
    Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural NetworksUSENIX Security '23Jialai Wang, Ziyuan Zhang, Meiqi Wang, Han Qiu, Tianwei Zhang, Qi Li, Zongpeng Li, Tao Wei, Chao Zhang
    Design of Access Control Mechanisms in Systems-on-Chip with Formal Integrity GuaranteesUSENIX Security '23Dino Mehmedagić, Mohammad Rahmani Fadiheh, Johannes Müller, Anna Lena Duque Antón, Dominik Stoffel, Wolfgang Kunz
    ICSPatch: Automated Vulnerability Localization and Non-Intrusive Hotpatching in Industrial Control Systems using Data Dependence GraphsUSENIX Security '23Prashant Hari Narayan Rajput, Constantine Doumanidis, Michail Maniatakos
    VeriZexe: Decentralized Private Computation with Universal SetupUSENIX Security '23Alex Luoyuan Xiong, Binyi Chen, Zhenfei Zhang, Benedikt Bünz, Ben Fisch, Fernando Krell, Philippe Camacho
    MTSan: A Feasible and Practical Memory Sanitizer for Fuzzing COTS BinariesUSENIX Security '23Xingman Chen, Yinghao Shi, Zheyu Jiang, Yuan Li, Ruoyu Wang, Haixin Duan, Haoyu Wang, Chao Zhang
    Lessons Lost: Incident Response in the Age of Cyber Insurance and Breach AttorneysUSENIX Security '23Daniel W. Woods, Rainer Böhme, Josephine Wolff, Daniel Schwarcz
    NRDelegationAttack: Complexity DDoS attack on DNS Recursive ResolversUSENIX Security '23Yehuda Afek, Anat Bremler-Barr, Shani Stajnrod
    Jinn: Hijacking Safe Programs with TrojansUSENIX Security '23Komail Dharsee, John Criswell
    Hiding in Plain Sight: An Empirical Study of Web Application Abuse in MalwareUSENIX Security '23Mingxuan Yao, Jonathan Fuller, Ranjita Pai Kasturi, Saumya Agarwal, Amit Kumar Sikder, Brendan Saltaformaggio
    CSHER: A System for Compact Storage with HE-RetrievalUSENIX Security '23Adi Akavia, Neta Oren, Boaz Sapir, Margarita Vald
    The Case for Learned Provenance Graph Storage SystemsUSENIX Security '23Hailun Ding, Juan Zhai, Dong Deng, Shiqing Ma
    Understand Users' Privacy Perception and Decision of V2X Communication in Connected Autonomous VehiclesUSENIX Security '23Zekun Cai, Aiping Xiong
    Long Live The Honey Badger: Robust Asynchronous DPSS and its ApplicationsUSENIX Security '23Thomas Yurek, Zhuolun Xiang, Yu Xia, Andrew Miller
    Automated Cookie Notice Analysis and EnforcementUSENIX Security '23Rishabh Khandelwal, Asmit Nayak, Hamza Harkous, Kassem Fawaz
    Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy LabelsUSENIX Security '23Yue Xiao, Zhengyi Li, Yue Qin, Xiaolong Bai, Jiale Guan, Xiaojing Liao, Luyi Xing

    Pages