Conferences

Search results

    TitleConferenceSpeaker(s)
    Defining "Broken": User Experiences and Remediation Tactics When Ad-Blocking or Tracking-Protection Tools Break a Website’s User ExperienceUSENIX Security '23Alexandra Nisenoff, Arthur Borem, Madison Pickering, Grant Nakanishi, Maya Thumpasery, Blase Ur
    Log: It’s Big, It’s Heavy, It’s Filled with Personal Data! Measuring the Logging of Sensitive Information in the Android EcosystemUSENIX Security '23Allan Lyons, Julien Gamba, Austin Shawaga, Joel Reardon, Juan Tapiador, Serge Egelman, Narseo Vallina-Rodriguez
    Fact-Saboteurs: A Taxonomy of Evidence Manipulation Attacks against Fact-Verification SystemsUSENIX Security '23Sahar Abdelnabi, Mario Fritz
    Meta-Sift: How to Sift Out a Clean Subset in the Presence of Data Poisoning?USENIX Security '23Yi Zeng, Minzhou Pan, Himanshu Jahagirdar, Ming Jin, Lingjuan Lyu, Ruoxi Jia
    “Employees Who Don’t Accept the Time Security Takes Are Not Aware Enough”: The CISO View of Human-Centred SecurityUSENIX Security '23Jonas Hielscher, Uta Menges, Simon Parkin, Annette Kluge, M. Angela Sasse
    ​​How Library IT Staff Navigate Privacy and Security Challenges and ResponsibilitiesUSENIX Security '23Alan F. Luo, Noel Warford, Samuel Dooley, Rachel Greenstadt, Michelle L. Mazurek, Nora McDonald
    Silent Bugs Matter: A Study of Compiler-Introduced Security BugsUSENIX Security '23Jianhao Xu, Kangjie Lu, Zhengjie Du, Zhu Ding, Linke Li, Qiushi Wu, Mathias Payer, Bing Mao
    IvySyn: Automated Vulnerability Discovery in Deep Learning FrameworksUSENIX Security '23Neophytos Christou, Di Jin, Vaggelis Atlidakis, Baishakhi Ray, Vasileios P. Kemerlis
    User Awareness and Behaviors Concerning Encrypted DNS Settings in Web BrowsersUSENIX Security '23Alexandra Nisenoff, Ranya Sharma, Nick Feamster
    It's all in your head(set): Side-channel attacks on AR/VR systemsUSENIX Security '23Yicheng Zhang, Carter Slocum, Jiasi Chen, Nael Abu-Ghazaleh
    Work-From-Home and COVID-19: Trajectories of Endpoint Security Management in a Security Operations CenterUSENIX Security '23Kailani R. Jones, Dalton A. Brucker-Hahn, Bradley Fidler, Alexandru G. Bardas
    Adversarial Training for Raw-Binary Malware ClassifiersUSENIX Security '23Keane Lucas, Samruddhi Pai, Weiran Lin, Lujo Bauer, Michael K. Reiter, Mahmood Sharif
    ELASM: Error-Latency-Aware Scale Management for Fully Homomorphic EncryptionUSENIX Security '23Yongwoo Lee, Seonyoung Cheon, Dongkwan Kim, Dongyoon Lee, Hanjun Kim
    Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal AbuseUSENIX Security '23Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Danny Yuxing Huang, Rahul Chatterjee
    Trojan Source: Invisible VulnerabilitiesUSENIX Security '23Nicholas Boucher, Ross Anderson
    ARMore: Pushing Love Back Into BinariesUSENIX Security '23Luca Di Bartolomeo, Hossein Moghaddas, Mathias Payer
    ProSpeCT: Provably Secure Speculation for the Constant-Time PolicyUSENIX Security '23Lesly-Ann Daniel, Marton Bognar, Job Noorman, Sébastien Bardin, Tamara Rezk, Frank Piessens
    Exorcising "Wraith": Protecting LiDAR-based Object Detector in Automated Driving System from Appearing AttacksUSENIX Security '23Qifan Xiao, Xudong Pan, Yifan Lu, Mi Zhang, Jiarun Dai, Min Yang
    GAP: Differentially Private Graph Neural Networks with Aggregation PerturbationUSENIX Security '23Sina Sajadmanesh, Ali Shahin Shamsabadi, Aurélien Bellet, Daniel Gatica-Perez
    SandDriller: A Fully-Automated Approach for Testing Language-Based JavaScript SandboxesUSENIX Security '23Abdullah AlHamdan, Cristian-Alexandru Staicu
    Catch You and I Can: Revealing Source Voiceprint Against Voice ConversionUSENIX Security '23Jiangyi Deng, Yanjiao Chen, Yinan Zhong, Qianhao Miao, Xueluan Gong, Wenyuan Xu
    How the Great Firewall of China Detects and Blocks Fully Encrypted TrafficUSENIX Security '23Mingshi Wu, Jackson Sippe, Danesh Sivakumar, Jack Burg, Peter Anderson, Xiaokang Wang, Kevin Bock, Amir Houmansadr, Dave Levin, Eric Wustrow
    Pool-Party: Exploiting Browser Resource Pools for Web TrackingUSENIX Security '23Peter Snyder, Soroush Karami, Arthur Edelstein, Benjamin Livshits, Hamed Haddadi
    The Role of Professional Product Reviewers in Evaluating Security and PrivacyUSENIX Security '23Wentao Guo, Jason Walter, Michelle L. Mazurek
    Near-Ultrasound Inaudible Trojan (Nuit): Exploiting Your Speaker to Attack Your MicrophoneUSENIX Security '23Qi Xia, Qian Chen, Shouhuai Xu

    Pages