Conferences

Search results

    TitleConferenceSpeaker(s)
    Double Face: Leveraging User Intelligence to Characterize and Recognize AI-synthesized FacesUSENIX Security '24Matthew Joslin, Xian Wang, Shuang Hao
    Take a Step Further: Understanding Page Spray in Linux Kernel ExploitationUSENIX Security '24Ziyi Guo, Dang K Le, Zhenpeng Lin, Kyle Zeng, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Adam Doupé, Xinyu Xing
    Can I Hear Your Face? Pervasive Attack on Voice Authentication Systems with a Single Face ImageUSENIX Security '24Nan Jiang, Bangjie Sun, Terence Sim, Jun Han
    LanDscAPe: Exploring LDAP Weaknesses and Data Leaks at Internet ScaleUSENIX Security '24Jonas Kaspereit, Gurur Öndarö, Gustavo Luvizotto Cesar, Simon Ebbers, Fabian Ising, Christoph Saatjohann, Mattijs Jonker, Ralph Holz, Sebastian Schinzel
    Bending microarchitectural weird machines towards practicalityUSENIX Security '24Ping-Lun Wang, Riccardo Paccagnella, Riad S. Wahby, Fraser Brown
    FakeBehalf: Imperceptible Email Spoofing Attacks against the Delegation Mechanism in Email SystemsUSENIX Security '24Jinrui Ma, Lutong Chen, Kaiping Xue, Bo Luo, Xuanbo Huang, Mingrui Ai, Huanjie Zhang, David S.L. Wei, Yan Zhuang
    Forget and Rewire: Enhancing the Resilience of Transformer-based Models against Bit-Flip AttacksUSENIX Security '24Najmeh Nazari, Hosein Mohammadi Makrani, Chongzhou Fang, Hossein Sayadi, Setareh Rafatirad, Khaled N. Khasawneh, Houman Homayoun
    ABACuS: All-Bank Activation Counters for Scalable and Low Overhead RowHammer MitigationUSENIX Security '24Ataberk Olgun, Yahya Can Tugrul, Nisa Bostanci, Ismail Emir Yuksel, Haocong Luo, Steve Rhyner, Abdullah Giray Yaglikci, Geraldo F. Oliveira, Onur Mutlu
    Automated Large-Scale Analysis of Cookie Notice ComplianceUSENIX Security '24Ahmed Bouhoula, Karel Kubicek, Amit Zac, Carlos Cotrini, David Basin
    WEBRR: A Forensic System for Replaying and Investigating Web-Based Attacks in The Modern WebUSENIX Security '24Joey Allen, Zheng Yang, Feng Xiao, Matthew Landen, Roberto Perdisci, Wenke Lee
    Go Go Gadget Hammer: Flipping Nested Pointers for Arbitrary Data LeakageUSENIX Security '24Youssef Tobah, Andrew Kwong, Ingab Kang, Daniel Genkin, Kang G. Shin
    Two Shuffles Make a RAM: Improved Constant Overhead Zero Knowledge RAMUSENIX Security '24Yibin Yang, David Heath
    Scalable Multi-Party Computation Protocols for Machine Learning in the Honest-Majority SettingUSENIX Security '24
    Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation for Binary Code Similarity DetectionUSENIX Security '24Haojie He, Xingwei Lin, Ziang Weng, Ruijie Zhao, Shuitao Gan, Libo Chen, Yuede Ji, Jiashui Wang, Zhi Xue
    SledgeHammer: Amplifying Rowhammer via Bank-level ParallelismUSENIX Security '24Ingab Kang, Walter Wang, Jason Kim, Stephan van Schaik, Youssef Tobah, Daniel Genkin, Andrew Kwong, Yuval Yarom
    Practical Security Analysis of Zero-Knowledge Proof CircuitsUSENIX Security '24Hongbo Wen, Jon Stephens, Yanju Chen, Kostas Ferles, Shankara Pailoor, Kyle Charbonnet, Isil Dillig, Yu Feng
    AI Psychiatry: Forensic Investigation of Deep Learning Networks in Memory ImagesUSENIX Security '24David Oygenblik, Carter Yagemann, Joseph Zhang, Arianna Mastali, Jeman Park, Brendan Saltaformaggio
    Don't Waste My Efforts: Pruning Redundant Sanitizer Checks by Developer-Implemented Type ChecksUSENIX Security '24Yizhuo Zhai, Zhiyun Qian, Chengyu Song, Manu Sridharan, Trent Jaeger, Paul Yu, Srikanth V. Krishnamurthy
    Formalizing Soundness Proofs of Linear PCP SNARKsUSENIX Security '24Bolton Bailey, Andrew Miller
    Inference of Error Specifications and Bug Detection Using Structural SimilaritiesUSENIX Security '24Niels Dossche, Bart Coppens
    Notus: Dynamic Proofs of Liabilities from Zero-knowledge RSA AccumulatorsUSENIX Security '24Jiajun Xin, Arman Haghighi, Xiangan Tian, Dimitrios Papadopoulos
    A Binary-level Thread Sanitizer or Why Sanitizing on the Binary Level is HardUSENIX Security '24Joschua Schilling, Andreas Wendler, Philipp Görz, Nils Bars, Moritz Schloegel, Thorsten Holz
    ZenHammer: Rowhammer Attacks on AMD Zen-based PlatformsUSENIX Security '24Patrick Jattke, Max Wipfli, Flavien Solt, Michele Marazzi, Matej Bölcskei, Kaveh Razavi
    DARKFLEECE: Probing the Dark Side of Android Subscription AppsUSENIX Security '24Chang Yue, Chen Zhong, Kai Chen, Zhiyu Zhang, Yeonjoon Lee
    00SEVen – Re-enabling Virtual Machine Forensics: Introspecting Confidential VMs Using Privileged in-VM AgentsUSENIX Security '24Fabian Schwarz, Christian Rossow

Pages