Conferences

Search results

    TitleConferenceSpeaker(s)
    On the Security Risks of Knowledge Graph ReasoningUSENIX Security '23Zhaohan Xi, Tianyu Du, Changjiang Li, Ren Pang, Shouling Ji, Xiapu Luo, Xusheng Xiao, Fenglong Ma, Ting Wang
    Private Proof-of-Stake Blockchains using Differentially-Private Stake DistortionUSENIX Security '23Chenghong Wang, David Pujol, Kartik Nayak, Ashwin Machanavajjhala
    Union under Duress: Understanding Hazards of Duplicate Resource Mismediation in Android Software Supply ChainUSENIX Security '23Xueqiang Wang, Yifan Zhang, XiaoFeng Wang, Yan Jia, Luyi Xing
    Medusa Attack: Exploring Security Hazards of In-App QR Code ScanningUSENIX Security '23Xing Han, Yuheng Zhang, Xue Zhang, Zeyuan Chen, Mingzhe Wang, Yiwei Zhang, Siqi Ma, Yu Yu, Elisa Bertino, Juanru Li
    LibScan: Towards More Precise Third-Party Library Identification for Android ApplicationsUSENIX Security '23Yafei Wu, Cong Sun, Dongrui Zeng, Gang Tan, Siqi Ma, Peicheng Wang
    Beyond Typosquatting: An In-depth Look at Package ConfusionUSENIX Security '23Shradha Neupane, Grant Holmes, Elizabeth Wyss, Drew Davidson, Lorenzo De Carli
    PrivGraph: Differentially Private Graph Data Publication by Exploiting Community InformationUSENIX Security '23Quan Yuan, Zhikun Zhang, Linkang Du, Min Chen, Peng Cheng, Mingyang Sun
    WaterBear: Practical Asynchronous BFT Matching Security Guarantees of Partially Synchronous BFTUSENIX Security '23Haibin Zhang, Sisi Duan, Boxin Zhao, Liehuang Zhu
    FACE-AUDITOR: Data Auditing in Facial Recognition SystemsUSENIX Security '23Min Chen, Zhikun Zhang, Tianhao Wang, Michael Backes, Yang Zhang
    Rods with Laser Beams: Understanding Browser Fingerprinting on Phishing PagesUSENIX Security '23Iskander Sanchez-Rola, Leyla Bilge, Davide Balzarotti, Armin Buescher, Petros Efstathopoulos
    Dubhe: Succinct Zero-Knowledge Proofs for Standard AES and related ApplicationsUSENIX Security '23Changchang Ding, Yan Huang
    Two-in-One: A Model Hijacking Attack Against Text Generation ModelsUSENIX Security '23Wai Man Si, Michael Backes, Yang Zhang, Ahmed Salem
    Evading Provenance-Based ML Detectors with Adversarial System ActionsUSENIX Security '23Kunal Mukherjee, Joshua Wiedemeier, Tianhao Wang, James Wei, Feng Chen, Muhyun Kim, Murat Kantarcioglu, Kangkook Jee
    Curve Trees: Practical and Transparent Zero-Knowledge AccumulatorsUSENIX Security '23Matteo Campanelli, Mathias Hall-Andersen, Simon Holmgaard Kamp
    An Empirical Study & Evaluation of Modern CAPTCHAsUSENIX Security '23Andrew Searles, Yoshimichi Nakatsuka, Ercan Ozturk, Andrew Paverd, Gene Tsudik, Ai Enkoji
    Checking Passwords on Leaky Computers: A Side Channel Analysis of Chrome's Password Leak Detect ProtocolUSENIX Security '23Andrew Kwong, Walter Wang, Jason Kim, Jonathan Berger, Daniel Genkin, Eyal Ronen, Hovav Shacham, Riad Wahby, Yuval Yarom
    AIRTAG: Towards Automated Attack Investigation by Unsupervised Learning with Log TextsUSENIX Security '23Hailun Ding, Juan Zhai, Yuhong Nan, Shiqing Ma
    Wink: Deniable Secure MessagingUSENIX Security '23Anrin Chakraborti, Darius Suciu, Radu Sion
    PATROL: Provable Defense against Adversarial Policy in Two-player GamesUSENIX Security '23Wenbo Guo, Xian Wu, Lun Wang, Xinyu Xing, Dawn Song
    Cryptographic Administration for Secure Group MessagingUSENIX Security '23David Balbás, Daniel Collins, Serge Vaudenay
    RIDAS: Real-time identification of attack sources on controller area networksUSENIX Security '23Jiwoo Shin, Hyunghoon Kim, Seyoung Lee, Wonsuk Choi, Dong Hoon Lee, Hyo Jin Jo
    No Linux, No Problem: Fast and Correct Windows Binary Fuzzing via Target-embedded SnapshottingUSENIX Security '23Leo Stone, Rishi Ranjan, Stefan Nagy, Matthew Hicks
    Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against Data-Oriented AttacksUSENIX Security '23Salman Ahmed, Hans Liljestrand, Hani Jamjoom, Matthew Hicks, N. Asokan, Danfeng (Daphne) Yao
    Freaky Leaky SMS: Extracting User Locations by Analyzing SMS TimingsUSENIX Security '23Evangelos Bitsikas, Theodor Schnitzler, Christina Pöpper, Aanjhan Ranganathan
    EnigMap: External-Memory Oblivious Map for Secure EnclavesUSENIX Security '23Afonso Tinoco, Sixiang Gao, Elaine Shi

Pages