Conferences

Search results

    TitleConferenceSpeaker(s)
    Optimizing Shoulder-Surfing Resistance in Augmented and Virtual Reality: A Replication Study Proposal in the USSOUPS 2023
    De-identification in practice: professionals as end usersSOUPS 2023
    Lightning TalksSREcon23 Americas
    Accelerating Secure Collaborative Machine Learning with Protocol-Aware RDMAUSENIX Security '24Zhenghang Ren, Mingxuan Fan, Zilong Wang, Junxue Zhang, Chaoliang Zeng, Zhicong Huang, Cheng Hong, Kai Chen
    ABACuS: All-Bank Activation Counters for Scalable and Low Overhead RowHammer MitigationUSENIX Security '24Ataberk Olgun, Yahya Can Tugrul, Nisa Bostanci, Ismail Emir Yuksel, Haocong Luo, Steve Rhyner, Abdullah Giray Yaglikci, Geraldo F. Oliveira, Onur Mutlu
    On Data Fabrication in Collaborative Vehicular Perception: Attacks and CountermeasuresUSENIX Security '24Qingzhao Zhang, Shuowei Jin, Ruiyang Zhu, Jiachen Sun, Xumiao Zhang, Qi Alfred Chen, Z. Morley Mao
    Understanding the Security and Privacy Implications of Online Toxic Content on RefugeesUSENIX Security '24Arjun Arunasalam, Habiba Farrukh, Eliz Tekcan, Z. Berkay Celik
    Automated Large-Scale Analysis of Cookie Notice ComplianceUSENIX Security '24Ahmed Bouhoula, Karel Kubicek, Amit Zac, Carlos Cotrini, David Basin
    You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise NetworksUSENIX Security '24Rafael Uetz, Marco Herzog, Louis Hackländer, Simon Schwarz, Martin Henze
    Can Virtual Reality Protect Users from Keystroke Inference Attacks?USENIX Security '24Zhuolin Yang, Zain Sarwar, Iris Hwang, Ronik Bhaskar, Ben Y. Zhao, Haitao Zheng
    Neural Network Semantic Backdoor Detection and Mitigation: A Causality-Based ApproachUSENIX Security '24Bing Sun, Jun Sun, Wayne Koh, Jie Shi
    Finding Traceability Attacks in the Bluetooth Low Energy Specification and Its ImplementationsUSENIX Security '24Jianliang Wu, Patrick Traynor, Dongyan Xu, Dave (Jing) Tian, Antonio Bianchi
    Devil in the Room: Triggering Audio Backdoors in the Physical WorldUSENIX Security '24Meng Chen, Xiangyu Xu, Li Lu, Zhongjie Ba, Feng Lin, Kui Ren
    Atropos: Effective Fuzzing of Web Applications for Server-Side VulnerabilitiesUSENIX Security '24Emre Güler, Sergej Schumilo, Moritz Schloegel, Nils Bars, Philipp Görz, Xinyi Xu, Cemal Kaygusuz, Thorsten Holz
    FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker RecognitionUSENIX Security '24Kun Wang, Xiangyu Xu, Li Lu, Zhongjie Ba, Feng Lin, Kui Ren
    Swipe Left for Identity Theft: An Analysis of User Data Privacy Risks on Location-based Dating AppsUSENIX Security '24Karel Dhondt, Victor Le Pochat, Yana Dimova, Wouter Joosen, Stijn Volckaert
    Dancer in the Dark: Synthesizing and Evaluating Polyglots for Blind Cross-Site ScriptingUSENIX Security '24Robin Kirchner, Jonas Möller, Marius Musch, David Klein, Konrad Rieck, Martin Johns
    ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response FuzzingUSENIX Security '24Qifan Zhang, Xuesong Bai, Xiang Li, Haixin Duan, Qi Li, Zhou Li
    Ahoy SAILR! There is No Need to DREAM of C: A Compiler-Aware Structuring Algorithm for Binary DecompilationUSENIX Security '24Zion Leonahenahe Basque, Ati Priya Bajaj, Wil Gibbs, Jude O'Kain, Derron Miao, Tiffany Bao, Adam Doupé, Yan Shoshitaishvili, Ruoyu Wang
    Racing on the Negative Force: Efficient Vulnerability Root-Cause Analysis through Reinforcement Learning on CounterexamplesUSENIX Security '24Dandan Xu, Di Tang, Yi Chen, XiaoFeng Wang, Kai Chen, Haixu Tang, Longxing Li
    WEBRR: A Forensic System for Replaying and Investigating Web-Based Attacks in The Modern WebUSENIX Security '24Joey Allen, Zheng Yang, Feng Xiao, Matthew Landen, Roberto Perdisci, Wenke Lee
    Unleashing the Power of Type-Based Call Graph Construction by Using Regional Pointer InformationUSENIX Security '24Yuandao Cai, Yibo Jin, Charles Zhang
    The Effect of Design Patterns on (Present and Future) Cookie Consent DecisionsUSENIX Security '24Nataliia Bielova, Laura Litvine, Anysia Nguyen, Mariam Chammat, Vincent Toubiana, Estelle Hary
    RECORD: A RECeption-Only Region Determination Attack on LEO Satellite UsersUSENIX Security '24Eric Jedermann, Martin Strohmeier, Vincent Lenders, Jens Schmitt
    A Taxonomy of C Decompiler Fidelity IssuesUSENIX Security '24Luke Dramko, Jeremy Lacomis, Edward J. Schwartz, Bogdan Vasilescu, Claire Le Goues

    Pages