Conferences

Search results

    TitleConferenceSpeaker(s)
    MTSan: A Feasible and Practical Memory Sanitizer for Fuzzing COTS BinariesUSENIX Security '23Xingman Chen, Yinghao Shi, Zheyu Jiang, Yuan Li, Ruoyu Wang, Haixin Duan, Haoyu Wang, Chao Zhang
    Capstone: A Capability-based Foundation for Trustless Secure Memory AccessUSENIX Security '23Jason Zhijingcheng Yu, Conrad Watt, Aditya Badole, Trevor E. Carlson, Prateek Saxena
    Watch your Watch: Inferring Personality Traits from Wearable Activity TrackersUSENIX Security '23Noé Zufferey, Mathias Humbert, Romain Tavenard, Kévin Huguenin
    Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal AbuseUSENIX Security '23Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Danny Yuxing Huang, Rahul Chatterjee
    Diving into Robocall Content with SnorCallUSENIX Security '23Sathvik Prasad, Trevor Dunlap, Alexander Ross, Bradley Reaves
    How to Cover up Anomalous Accesses to Electronic Health RecordsUSENIX Security '23Xiaojun Xu, Qingying Hao, Zhuolin Yang, Bo Li, David Liebovitz, Gang Wang, Carl A. Gunter
    Know Your Cybercriminal: Evaluating Attacker Preferences by Measuring Profile Sales on an Active, Leading Criminal Market for User Impersonation at ScaleUSENIX Security '23Michele Campobasso, Luca Allodi
    An Input-Agnostic Hierarchical Deep Learning Framework for Traffic FingerprintingUSENIX Security '23Jian Qu, Xiaobo Ma, Jianfeng Li, Xiapu Luo, Lei Xue, Junjie Zhang, Zhenhua Li, Li Feng, Xiaohong Guan
    Subverting Website Fingerprinting Defenses with Robust Traffic RepresentationUSENIX Security '23Meng Shen, Kexin Ji, Zhenbo Gao, Qi Li, Liehuang Zhu, Ke Xu
    HorusEye: A Realtime IoT Malicious Traffic Detection Framework using Programmable SwitchesUSENIX Security '23Yutao Dong, Qing Li, Kaidong Wu, Ruoyu Li, Dan Zhao, Gareth Tyson, Junkun Peng, Yong Jiang, Shutao Xia, Mingwei Xu
    Exploring Tenants' Preferences of Privacy Negotiation in AirbnbUSENIX Security '23Zixin Wang, Danny Yuxing Huang, Yaxing Yao
    Auditing Frameworks Need Resource Isolation: A Systematic Study on the Super Producer Threat to System Auditing and Its MitigationUSENIX Security '23Peng Jiang, Ruizhe Huang, Ding Li, Yao Guo, Xiangqun Chen, Jianhai Luan, Yuxin Ren, Xinwei Hu
    Towards Targeted Obfuscation of Adversarial Unsafe Images using Reconstruction and Counterfactual Super Region Attribution ExplainabilityUSENIX Security '23Mazal Bethany, Andrew Seong, Samuel Henrique Silva, Nicole Beebe, Nishant Vishwamitra, Peyman Najafirad
    Sneaky Spy Devices and Defective Detectors: The Ecosystem of Intimate Partner Surveillance with Covert DevicesUSENIX Security '23Rose Ceccio, Sophie Stephenson, Varun Chadha, Danny Yuxing Huang, Rahul Chatterjee
    AIRTAG: Towards Automated Attack Investigation by Unsupervised Learning with Log TextsUSENIX Security '23Hailun Ding, Juan Zhai, Yuhong Nan, Shiqing Ma
    KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR SystemsUSENIX Security '23Xinghui Wu, Shiqing Ma, Chao Shen, Chenhao Lin, Qian Wang, Qi Li, Yuan Rao
    BotScreen: Trust Everybody, but Cut the Aimbots YourselfUSENIX Security '23Minyeop Choi, Gihyuk Ko, Sang Kil Cha
    Time for Change: How Clocks Break UWB Secure RangingUSENIX Security '23Claudio Anliker, Giovanni Camurati, Srdjan Čapkun
    Efficient Unbalanced Private Set Intersection Cardinality and User-friendly Privacy-preserving Contact TracingUSENIX Security '23Mingli Wu, Tsz Hon Yuen
    FloatZone: Accelerating Memory Error Detection using the Floating Point UnitUSENIX Security '23Floris Gorter, Enrico Barberis, Raphael Isemann, Erik van der Kouwe, Cristiano Giuffrida, Herbert Bos
    The Digital-Safety Risks of Financial Technologies for Survivors of Intimate Partner ViolenceUSENIX Security '23Rosanna Bellini, Kevin Lee, Megan A. Brown, Jeremy Shaffer, Rasika Bhalerao, Thomas Ristenpart
    Mixed Signals: Analyzing Ground-Truth Data on the Users and Economics of a Bitcoin Mixing ServiceUSENIX Security '23Fieke Miedema, Kelvin Lubbertsen, Verena Schrama, Rolf van Wegberg
    Exploring Privacy and Incentives Considerations in Adoption of COVID-19 Contact Tracing AppsUSENIX Security '23Oshrat Ayalon, Dana Turjeman, Elissa M. Redmiles
    "It's the Equivalent of Feeling Like You're in Jail”: Lessons from Firsthand and Secondhand Accounts of IoT-Enabled Intimate Partner AbuseUSENIX Security '23Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Rahul Chatterjee
    Anatomy of a High-Profile Data Breach: Dissecting the Aftermath of a Crypto-Wallet CaseUSENIX Security '23Svetlana Abramova, Rainer Böhme

Pages