Conferences

Search results

    TitleConferenceSpeaker(s)
    PriSEC: A Privacy Settings Enforcement ControllerUSENIX Security '21Rishabh Khandelwal, Thomas Linden, Hamza Harkous, Kassem Fawaz
    Effective Notification Campaigns on the Web: A Matter of Trust, Framing, and SupportUSENIX Security '21Max Maass, Alina Stöver, Henning Pridöhl, Sebastian Bretthauer, Dominik Herrmann, Matthias Hollick, Indra Spiecker
    UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating FuzzersUSENIX Security '21Yuwei Li, Shouling Ji, Yuan Chen, Sizhuang Liang, Wei-Han Lee, Yueyao Chen, Chenyang Lyu, Chunming Wu, Raheem Beyah, Peng Cheng, Kangjie Lu, Ting Wang
    Stealing Links from Graph Neural NetworksUSENIX Security '21Xinlei He, Jinyuan Jia, Michael Backes, Neil Zhenqiang Gong, Yang Zhang
    SHARD: Fine-Grained Kernel Specialization with Context-Aware HardeningUSENIX Security '21Muhammad Abubakar, Adil Ahmad, Pedro Fonseca, Dongyan Xu
    Detecting Kernel Refcount Bugs with Two-Dimensional Consistency CheckingUSENIX Security '21Xin Tan, Yuan Zhang, Xiyu Yang, Kangjie Lu, Min Yang
    PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack Operations in Android SystemsUSENIX Security '21Yu-Tsung Lee, William Enck, Haining Chen, Hayawardh Vijayakumar, Ninghui Li, Zhiyun Qian, Daimeng Wang, Giuseppe Petracca, Trent Jaeger
    PatchGuard: A Provably Robust Defense against Adversarial Patches via Small Receptive Fields and MaskingUSENIX Security '21Chong Xiang, Arjun Nitin Bhagoji, Vikash Sehwag, Prateek Mittal
    Privacy and Integrity Preserving Computations with CRISPUSENIX Security '21Sylvain Chatel, Apostolos Pyrgelis, Juan Ramón Troncoso-Pastoriza, Jean-Pierre Hubaux
    Senate: A Maliciously-Secure MPC Platform for Collaborative AnalyticsUSENIX Security '21Rishabh Poddar, Sukrit Kalra, Avishay Yanai, Ryan Deng, Raluca Ada Popa, Joseph M. Hellerstein
    Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic PrivacyUSENIX Security '21Saba Eskandarian, Henry Corrigan-Gibbs, Matei Zaharia, Dan Boneh
    KeyForge: Non-Attributable Email from Forward-Forgeable SignaturesUSENIX Security '21Michael A. Specter, Sunoo Park, Matthew Green
    You Autocomplete Me: Poisoning Vulnerabilities in Neural Code CompletionUSENIX Security '21Roei Schuster, Congzheng Song, Eran Tromer, Vitaly Shmatikov
    ARCUS: Symbolic Root Cause Analysis of Exploits in Production SystemsUSENIX Security '21Carter Yagemann, Matthew Pruett, Simon P. Chung, Kennon Bittick, Brendan Saltaformaggio, Wenke Lee
    Virtual Secure Platform: A Five-Stage Pipeline Processor over TFHEUSENIX Security '21Kotaro Matsuoka, Ryotaro Banno, Naoki Matsumoto, Takashi Sato, Song Bian
    ReDMArk: Bypassing RDMA Security MechanismsUSENIX Security '21Benjamin Rothenberger, Konstantin Taranov, Adrian Perrig, Torsten Hoefler
    Ripple: A Programmable, Decentralized Link-Flooding Defense Against Adaptive AdversariesUSENIX Security '21Jiarong Xing, Wenqing Wu, Ang Chen
    A Stealthy Location Identification Attack Exploiting Carrier Aggregation in Cellular NetworksUSENIX Security '21Nitya Lakshmanan, Nishant Budhdev, Min Suk Kang, Mun Choon Chan, Jun Han
    Automatic Policy Generation for Inter-Service Access Control of MicroservicesUSENIX Security '21Xing Li, Yan Chen, Zhiqiang Lin, Xiao Wang, Jim Hao Chen
    Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing AttacksUSENIX Security '21Kaiwen Shen, Chuhan Wang, Minglei Guo, Xiaofeng Zheng, Chaoyi Lu, Baojun Liu, Yuxuan Zhao, Shuang Hao, Haixin Duan, Qingfeng Pan, Min Yang
    ATLAS: A Sequence-based Learning Approach for Attack InvestigationUSENIX Security '21Abdulellah Alsaheel, Yuhong Nan, Shiqing Ma, Le Yu, Gregory Walkup, Z. Berkay Celik, Xiangyu Zhang, Dongyan Xu
    Security Analysis of the Democracy Live Online Voting SystemUSENIX Security '21Michael Specter, J. Alex Halderman
    Domain Shadowing: Leveraging Content Delivery Networks for Robust Blocking-Resistant CommunicationsUSENIX Security '21Mingkui Wei
    mID: Tracing Screen Photos via Moiré PatternsUSENIX Security '21Yushi Cheng, Xiaoyu Ji, Lixu Wang, Qi Pang, Yi-Chao Chen, Wenyuan Xu
    Accurately Measuring Global Risk of Amplification Attacks using AmpMapUSENIX Security '21Soo-Jin Moon, Yucheng Yin, Rahul Anand Sharma, Yifei Yuan, Jonathan M. Spring, Vyas Sekar

Pages