Search results

    GForce: GPU-Friendly Oblivious and Rapid Neural Network InferenceUSENIX Security '21Lucien K. L. Ng, Sherman S. M. Chow
    Are Privacy Dashboards Good for End Users? Evaluating User Perceptions and Reactions to Google's My ActivityUSENIX Security '21
    ABY2.0: Improved Mixed-Protocol Secure Two-Party ComputationUSENIX Security '21Arpita Patra, Thomas Schneider, Ajith Suresh, Hossein Yalame
    Fantastic Four: Honest-Majority Four-Party Secure Computation With Malicious SecurityUSENIX Security '21Anders Dalskov, Daniel Escudero, Marcel Keller
    Muse: Secure Inference Resilient to Malicious ClientsUSENIX Security '21Ryan Lehmkuhl, Pratyush Mishra, Akshayaram Srinivasan, Raluca Ada Popa
    ObliCheck: Efficient Verification of Oblivious Algorithms with Unobservable StateUSENIX Security '21Jeongseok Son, Griffin Prechter, Rishabh Poddar, Raluca Ada Popa, Koushik Sen
    Compromised or Attacker-Owned: A Large Scale Classification and Study of Hosting Domains of Malicious URLsUSENIX Security '21Ravindu De Silva, Mohamed Nabeel, Charith Elvitigala, Issa Khalil, Ting Yu, Chamath Keppitiyagama
    PatchGuard: A Provably Robust Defense against Adversarial Patches via Small Receptive Fields and MaskingUSENIX Security '21Chong Xiang, Arjun Nitin Bhagoji, Vikash Sehwag, Prateek Mittal
    WaveGuard: Understanding and Mitigating Audio Adversarial ExamplesUSENIX Security '21Shehzeen Hussain, Paarth Neekhara, Shlomo Dubnov, Julian McAuley, Farinaz Koushanfar
    Dompteur: Taming Audio Adversarial ExamplesUSENIX Security '21
    CADE: Detecting and Explaining Concept Drift Samples for Security ApplicationsUSENIX Security '21Limin Yang, Wenbo Guo, Qingying Hao, Arridhana Ciptadi, Ali Ahmadzadeh, Xinyu Xing, Gang Wang
    SIGL: Securing Software Installations Through Deep Graph LearningUSENIX Security '21Xueyuan Han, Xiao Yu, Thomas Pasquier, Ding Li, Junghwan Rhee, James Mickens, Margo Seltzer, Haifeng Chen
    Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications to Machine LearningUSENIX Security '21
    T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-based Text ClassificationUSENIX Security '21Ahmadreza Azizi, Ibrahim Asadullah Tahmid, Asim Waheed, Neal Mangaokar, Jiameng Pu, Mobin Javed, Chandan K. Reddy, Bimal Viswanath
    Cost-Aware Robust Tree Ensembles for Security ApplicationsUSENIX Security '21Yizheng Chen, Shiqi Wang, Weifan Jiang, Asaf Cidon, Suman Jana
    Poseidon: A New Hash Function for Zero-Knowledge Proof SystemsUSENIX Security '21Lorenzo Grassi, Dmitry Khovratovich, Christian Rechberger, Arnab Roy, Markus Schofnegger
    Dynamic proofs of retrievability with low server storageUSENIX Security '21
    ExpRace: Exploiting Kernel Races through Raising InterruptsUSENIX Security '21Yoochan Lee, Changwoo Min, Byoungyoung Lee
    Undo Workarounds for Kernel BugsUSENIX Security '21Seyed Mohammadjavad Seyed Talebi, Zhihao Yao, Ardalan Amiri Sani, Zhiyun Qian, Daniel Austin
    Where's Crypto?: Automated Identification and Classification of Proprietary Cryptographic Primitives in Binary CodeUSENIX Security '21Carlo Meijer, Veelasha Moonsamy, Jos Wetzels
    An Analysis of Speculative Type Confusion Vulnerabilities in the WildUSENIX Security '21Ofek Kirzner, Adam Morrison
    SHARD: Fine-Grained Kernel Specialization with Context-Aware HardeningUSENIX Security '21Muhammad Abubakar, Adil Ahmad, Pedro Fonseca, Dongyan Xu
    Preventing Use-After-Free Attacks with Fast Forward AllocationUSENIX Security '21Brian Wickman, Hong Hu, Insu Yun, Daehee Jang, JungWon Lim, Sanidhya Kashyap, Taesoo Kim
    Share First, Ask Later (or Never?) Studying Violations of GDPR's Explicit Consent in Android AppsUSENIX Security '21
    An Investigation of the Android Kernel Patch EcosystemUSENIX Security '21Zheng Zhang, Hang Zhang, Zhiyun Qian, Billy Lau