Conferences

Search results

    TitleConferenceSpeaker(s)
    INSIGHT: Attacking Industry-Adopted Learning Resilient Logic Locking Techniques Using Explainable Graph Neural NetworkUSENIX Security '24Lakshmi Likhitha Mankali, Ozgur Sinanoglu, Satwik Patnaik
    A World Where We Trust Hard-Won Lessons in Security Research, Technology, and PeopleUSENIX Security '24David Brumley
    Unleashing the Power of Type-Based Call Graph Construction by Using Regional Pointer InformationUSENIX Security '24Yuandao Cai, Yibo Jin, Charles Zhang
    Less is More: Revisiting the Gaussian Mechanism for Differential PrivacyUSENIX Security '24Tianxi Ji, Pan Li
    What IF Is Not Enough? Fixing Null Pointer Dereference With Contextual CheckUSENIX Security '24Yunlong Xing, Shu Wang, Shiyu Sun, Xu He, Kun Sun, Qi Li
    CacheWarp: Software-based Fault Injection using Selective State ResetUSENIX Security '24Ruiyi Zhang, Lukas Gerlach, Daniel Weber, Lorenz Hetterich, Youheng Lü, Andreas Kogler, Michael Schwarz
    Yes, One-Bit-Flip Matters! Universal DNN Model Inference Depletion with Runtime Code Fault InjectionUSENIX Security '24Shaofeng Li, Xinyu Wang, Minhui Xue, Haojin Zhu, Zhi Zhang, Yansong Gao, Wen Wu, Xuemin (Sherman) Shen
    Tossing in the Dark: Practical Bit-Flipping on Gray-box Deep Neural Networks for Runtime Trojan InjectionUSENIX Security '24Zihao Wang, Di Tang, XiaoFeng Wang, Wei He, Zhaoyang Geng, Wenhao Wang
    Towards Generic Database Management System FuzzingUSENIX Security '24Yupeng Yang, Yongheng Chen, Rui Zhong, Jizhou Chen, Wenke Lee
    DNN-GP: Diagnosing and Mitigating Model's Faults Using Latent ConceptsUSENIX Security '24Shuo Wang, Hongsheng Hu, Jiamin Chang, Benjamin Zi Hao Zhao, Qi Alfred Chen, Minhui Xue
    Relation Mining Under Local Differential PrivacyUSENIX Security '24Kai Dong, Zheng Zhang, Chuang Jia, Zhen Ling, Ming Yang, Junzhou Luo, Xinwen Fu
    Rethinking the Security Threats of Stale DNS Glue RecordsUSENIX Security '24Yunyi Zhang, Baojun Liu, Haixin Duan, Min Zhang, Xiang Li, Fan Shi, Chengxi Xu, Eihal Alowaisheq
    HYPERPILL: Fuzzing for Hypervisor-bugs by Leveraging the Hardware Virtualization InterfaceUSENIX Security '24Alexander Bulekov, Qiang Liu, Manuel Egele, Mathias Payer
    DPAdapter: Improving Differentially Private Deep Learning through Noise Tolerance Pre-trainingUSENIX Security '24Zihao Wang, Rui Zhu, Dongruo Zhou, Zhikun Zhang, John Mitchell, Haixu Tang, XiaoFeng Wang
    EVOKE: Efficient Revocation of Verifiable Credentials in IoT NetworksUSENIX Security '24Carlo Mazzocca, Abbas Acar, Selcuk Uluagac, Rebecca Montanari
    Fuzzing BusyBox: Leveraging LLM and Crash Reuse for Embedded Bug UnearthingUSENIX Security '24 Asmita, Yaroslav Oliinyk, Michael Scott, Ryan Tsang, Chongzhou Fang, Houman Homayoun
    Practical Data-Only Attack GenerationUSENIX Security '24Brian Johannesmeyer, Asia Slowinska, Herbert Bos, Cristiano Giuffrida
    dp-promise: Differentially Private Diffusion Probabilistic Models for Image SynthesisUSENIX Security '24Haichen Wang, Shuchao Pang, Zhigang Lu, Yihang Rao, Yongbin Zhou, Minhui Xue
    GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent PrefetchersUSENIX Security '24Boru Chen, Yingchen Wang, Pradyumna Shome, Christopher Fletcher, David Kohlbrenner, Riccardo Paccagnella, Daniel Genkin
    SafeFetch: Practical Double-Fetch Protection with Kernel-Fetch CachingUSENIX Security '24Victor Duta, Mitchel Josephus Aloserij, Cristiano Giuffrida
    SoK: The Good, The Bad, and The Unbalanced: Measuring Structural Limitations of Deepfake Media DatasetsUSENIX Security '24Seth Layton, Tyler Tucker, Daniel Olszewski, Kevin Warren, Kevin Butler, Patrick Traynor
    SeaK: Rethinking the Design of a Secure Allocator for OS KernelUSENIX Security '24Zicheng Wang, Yicheng Guang, Yueqi Chen, Zhenpeng Lin, Michael Le, Dang K Le, Dan Williams, Xinyu Xing, Zhongshu Gu, Hani Jamjoom
    Gradients Look Alike: Sensitivity is Often Overestimated in DP-SGDUSENIX Security '24Anvith Thudi, Hengrui Jia, Casey Meehan, Ilia Shumailov, Nicolas Papernot
    MOAT: Towards Safe BPF Kernel ExtensionUSENIX Security '24Hongyi Lu, Shuai Wang, Yechang Wu, Wanning He, Fengwei Zhang
    DMAAUTH: A Lightweight Pointer Integrity-based Secure Architecture to Defeat DMA AttacksUSENIX Security '24Xingkai Wang, Wenbo Shen, Yujie Bu, Jinmeng Zhou, Yajin Zhou

Pages