Conferences

Search results

    TitleConferenceSpeaker(s)
    Atropos: Effective Fuzzing of Web Applications for Server-Side VulnerabilitiesUSENIX Security '24Emre Güler, Sergej Schumilo, Moritz Schloegel, Nils Bars, Philipp Görz, Xinyi Xu, Cemal Kaygusuz, Thorsten Holz
    FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker RecognitionUSENIX Security '24Kun Wang, Xiangyu Xu, Li Lu, Zhongjie Ba, Feng Lin, Kui Ren
    Swipe Left for Identity Theft: An Analysis of User Data Privacy Risks on Location-based Dating AppsUSENIX Security '24Karel Dhondt, Victor Le Pochat, Yana Dimova, Wouter Joosen, Stijn Volckaert
    Dancer in the Dark: Synthesizing and Evaluating Polyglots for Blind Cross-Site ScriptingUSENIX Security '24Robin Kirchner, Jonas Möller, Marius Musch, David Klein, Konrad Rieck, Martin Johns
    ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response FuzzingUSENIX Security '24Qifan Zhang, Xuesong Bai, Xiang Li, Haixin Duan, Qi Li, Zhou Li
    Ahoy SAILR! There is No Need to DREAM of C: A Compiler-Aware Structuring Algorithm for Binary DecompilationUSENIX Security '24Zion Leonahenahe Basque, Ati Priya Bajaj, Wil Gibbs, Jude O'Kain, Derron Miao, Tiffany Bao, Adam Doupé, Yan Shoshitaishvili, Ruoyu Wang
    Racing on the Negative Force: Efficient Vulnerability Root-Cause Analysis through Reinforcement Learning on CounterexamplesUSENIX Security '24Dandan Xu, Di Tang, Yi Chen, XiaoFeng Wang, Kai Chen, Haixu Tang, Longxing Li
    WEBRR: A Forensic System for Replaying and Investigating Web-Based Attacks in The Modern WebUSENIX Security '24Joey Allen, Zheng Yang, Feng Xiao, Matthew Landen, Roberto Perdisci, Wenke Lee
    Unleashing the Power of Type-Based Call Graph Construction by Using Regional Pointer InformationUSENIX Security '24Yuandao Cai, Yibo Jin, Charles Zhang
    The Effect of Design Patterns on (Present and Future) Cookie Consent DecisionsUSENIX Security '24Nataliia Bielova, Laura Litvine, Anysia Nguyen, Mariam Chammat, Vincent Toubiana, Estelle Hary
    RECORD: A RECeption-Only Region Determination Attack on LEO Satellite UsersUSENIX Security '24Eric Jedermann, Martin Strohmeier, Vincent Lenders, Jens Schmitt
    A Taxonomy of C Decompiler Fidelity IssuesUSENIX Security '24Luke Dramko, Jeremy Lacomis, Edward J. Schwartz, Bogdan Vasilescu, Claire Le Goues
    CAMP: Compiler and Allocator-based Heap Memory ProtectionUSENIX Security '24Zhenpeng Lin, Zheng Yu, Ziyi Guo, Simone Campanoni, Peter Dinda, Xinyu Xing
    "Belt and suspenders" or "just red tape"?: Investigating Early Artifacts and User Perceptions of IoT App Security CertificationUSENIX Security '24Prianka Mandal, Amit Seal Ami, Victor Olaiya, Sayyed Hadi Razmjo, Adwait Nadkarni
    Go Go Gadget Hammer: Flipping Nested Pointers for Arbitrary Data LeakageUSENIX Security '24Youssef Tobah, Andrew Kwong, Ingab Kang, Daniel Genkin, Kang G. Shin
    FFXE: Dynamic Control Flow Graph Recovery for Embedded Firmware BinariesUSENIX Security '24Ryan Tsang, Asmita, Doreen Joseph, Soheil Salehi, Prasant Mohapatra, Houman Homayoun
    Your Firmware Has Arrived: A Study of Firmware Update VulnerabilitiesUSENIX Security '24Yuhao Wu, Jinwen Wang, Yujie Wang, Shixuan Zhai, Zihan Li, Yi He, Kun Sun, Qi Li, Ning Zhang
    Opportunistic Data Flow Integrity for Real-time Cyber-physical Systems Using Worst Case Execution Time ReservationUSENIX Security '24Yujie Wang, Ao Li, Jinwen Wang, Sanjoy Baruah, Ning Zhang
    MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation LearningUSENIX Security '24Zian Jia, Yun Xiong, Yuhong Nan, Yao Zhang, Jinjing Zhao, Mi Wen
    Security and Privacy Analysis of Samsung's Crowd-Sourced Bluetooth Location Tracking SystemUSENIX Security '24Tingfeng Yu, James Henderson, Alwen Tiu, Thomas Haines
    SmartCookie: Blocking Large-Scale SYN Floods with a Split-Proxy Defense on Programmable Data PlanesUSENIX Security '24Sophia Yoo, Xiaoqi Chen, Jennifer Rexford
    When the User Is Inside the User Interface: An Empirical Study of UI Security Properties in Augmented RealityUSENIX Security '24Kaiming Cheng, Arkaprabha Bhattacharya, Michelle Lin, Jaewook Lee, Aroosh Kumar, Jeffery F. Tian, Tadayoshi Kohno, Franziska Roesner
    ACAI: Protecting Accelerator Execution with Arm Confidential Computing ArchitectureUSENIX Security '24Supraja Sridhara, Andrin Bertschi, Benedict Schlüter, Mark Kuhne, Fabio Aliberti, Shweta Shinde
    How WEIRD is Usable Privacy and Security Research?USENIX Security '24Ayako A. Hasegawa, Daisuke Inoue, Mitsuaki Akiyama
    "I Don't Know If We're Doing Good. I Don't Know If We're Doing Bad": Investigating How Practitioners Scope, Motivate, and Conduct Privacy Work When Developing AI ProductsUSENIX Security '24Hao-Ping (Hank) Lee, Lan Gao, Stephanie Yang, Jodi Forlizzi, Sauvik Das

    Pages