Conferences

Search results

    TitleConferenceSpeaker(s)
    In Wallet We Trust: Bypassing the Digital Wallets Payment Security for Free ShoppingUSENIX Security '24Raja Hasnain Anwar, Syed Rafiul Hussain, Muhammad Taqi Raza
    Racing for TLS Certificate Validation: A Hijacker's Guide to the Android TLS GalaxyUSENIX Security '24Sajjad Pourali, Xiufen Yu, Lianying Zhao, Mohammad Mannan, Amr Youssef
    D-Helix: A Generic Decompiler Testing Framework Using Symbolic DifferentiationUSENIX Security '24Muqi Zou, Arslan Khan, Ruoyu Wu, Han Gao, Antonio Bianchi, Dave (Jing) Tian
    Web Platform Threats: Automated Detection of Web Security Issues With WPTUSENIX Security '24Pedro Bernardo, Lorenzo Veronese, Valentino Dalla Valle, Stefano Calzavara, Marco Squarcina, Pedro Adão, Matteo Maffei
    The Impact of Exposed Passwords on Honeyword EfficacyUSENIX Security '24Zonghao Huang, Lujo Bauer, Michael K. Reiter
    AttackGNN: Red-Teaming GNNs in Hardware Security Using Reinforcement LearningUSENIX Security '24Vasudev Gohil, Satwik Patnaik, Dileep Kalathil, Jeyavijayan Rajendran
    PhishDecloaker: Detecting CAPTCHA-cloaked Phishing Websites via Hybrid Vision-based Interactive ModelsUSENIX Security '24Xiwen Teoh, Yun Lin, Ruofan Liu, Zhiyong Huang, Jin Song Dong
    BeeBox: Hardening BPF against Transient Execution AttacksUSENIX Security '24Di Jin, Alexander J. Gaidis, Vasileios P. Kemerlis
    FAMOS: Robust Privacy-Preserving Authentication on Payment Apps via Federated Multi-Modal Contrastive LearningUSENIX Security '24Yifeng Cai, Ziqi Zhang, Jiaping Gui, Bingyan Liu, Xiaoke Zhao, Ruoyu Li, Zhe Li, Ding Li
    SymFit: Making the Common (Concrete) Case Fast for Binary-Code Concolic ExecutionUSENIX Security '24Zhenxiao Qi, Jie Hu, Zhaoqi Xiao, Heng Yin
    Investigating Moderation Challenges to Combating Hate and Harassment: The Case of Mod-Admin Power Dynamics and Feature Misuse on RedditUSENIX Security '24Madiha Tabassum, Alana Mackey, Ashley Schuett, Ada Lerner
    Efficient Privacy Auditing in Federated LearningUSENIX Security '24Hongyan Chang, Brandon Edwards, Anindya S. Paul, Reza Shokri
    InSpectre Gadget: Inspecting the Residual Attack Surface of Cross-privilege Spectre v2USENIX Security '24Sander Wiebing, Alvise de Faveri Tron, Herbert Bos, Cristiano Giuffrida
    Shesha: Multi-head Microarchitectural Leakage Discovery in new-generation Intel ProcessorsUSENIX Security '24Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyay
    BUDAlloc: Defeating Use-After-Free Bugs by Decoupling Virtual Address Management from KernelUSENIX Security '24Junho Ahn, Jaehyeon Lee, Kanghyuk Lee, Wooseok Gwak, Minseong Hwang, Youngjin Kwon
    Towards an Effective Method of ReDoS Detection for Non-backtracking EnginesUSENIX Security '24Weihao Su, Hong Huang, Rongchen Li, Haiming Chen, Tingjian Ge
    "Did They F***ing Consent to That?": Safer Digital Intimacy via Proactive Protection Against Image-Based Sexual AbuseUSENIX Security '24Lucy Qin, Vaughn Hamilton, Sharon Wang, Yigit Aydinalp, Marin Scarlett, Elissa M. Redmiles
    Improving the Ability of Thermal Radiation Based Hardware Trojan DetectionUSENIX Security '24Ting Su, Yaohua Wang, Shi Xu, Lusi Zhang, Simin Feng, Jialong Song, Yiming Liu, Yongkang Tang, Yang Zhang, Shaoqing Li, Yang Guo, Hengzhu Liu
    KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-Based Phishing DetectionUSENIX Security '24Yuexin Li, Chengyu Huang, Shumin Deng, Mei Lin Lock, Tri Cao, Nay Oo, Hoon Wei Lim, Bryan Hooi
    HIVE: A Hardware-assisted Isolated Execution Environment for eBPF on AArch64USENIX Security '24Peihua Zhang, Chenggang Wu, Xiangyu Meng, Yinqian Zhang, Mingfan Peng, Shiyang Zhang, Bing Hu, Mengyao Xie, Yuanming Lai, Yan Kang, Zhe Wang
    Zero-setup Intermediate-rate Communication Guarantees in a Global InternetUSENIX Security '24Marc Wyss, Adrian Perrig
    Diffie-Hellman Picture Show: Key Exchange Stories from Commercial VoWiFi DeploymentsUSENIX Security '24Gabriel K. Gegenhuber, Florian Holzbauer, Philipp É. Frenzel, Edgar Weippl, Adrian Dabrowski
    Formal verification of the PQXDH Post-Quantum key agreement protocol for end-to-end secure messagingUSENIX Security '24Karthikeyan Bhargavan, Charlie Jacomme, Franziskus Kiefer, Rolfe Schmidt
    Less Defined Knowledge and More True Alarms: Reference-based Phishing Detection without a Pre-defined Reference ListUSENIX Security '24Ruofan Liu, Yun Lin, Xiwen Teoh, Gongshen Liu, Zhiyong Huang, Jin Song Dong
    Endokernel: A Thread Safe Monitor for Lightweight Subprocess IsolationUSENIX Security '24Fangfei Yang, Bumjin Im, Weijie Huang, Kelly Kaoudis, Anjo Vahldiek-Oberwagner, Chia-Che Tsai, Nathan Dautenhahn

Pages