Conferences

Search results

    TitleConferenceSpeaker(s)
    Othered, Silenced and Scapegoated: Understanding the Situated Security of Marginalised Populations in LebanonUSENIX Security '23Jessica McClearn, Rikke Bjerg Jensen, Reem Talhouk
    Glimpse: On-Demand PoW Light Client with Constant-Size Storage for DeFiUSENIX Security '23Giulia Scaffino, Lukas Aumayr, Zeta Avarikioti, Matteo Maffei
    VIPER: Spotting Syscall-Guard Variables for Data-Only AttacksUSENIX Security '23Hengkai Ye, Song Liu, Zhechang Zhang, Hong Hu
    How to Bind Anonymous Credentials to HumansUSENIX Security '23Julia Hesse, Nitin Singh, Alessandro Sorniotti
    zkSaaS: Zero-Knowledge SNARKs as a ServiceUSENIX Security '23Sanjam Garg, Aarushi Goel, Abhishek Jain, Guru-Vamsi Policharla, Sruthi Sekar
    Auditing Framework APIs via Inferred App-side Security SpecificationsUSENIX Security '23Parjanya Vyas, Asim Waheed, Yousra Aafer, N. Asokan
    Hot Pixels: Frequency, Power, and Temperature Attacks on GPUs and Arm SoCsUSENIX Security '23Hritvik Taneja, Jason Kim, Jie Jeff Xu, Stephan van Schaik, Daniel Genkin, Yuval Yarom
    Notice the Imposter! A Study on User Tag Spoofing Attack in Mobile AppsUSENIX Security '23Shuai Li, Zhemin Yang, Guangliang Yang, Hange Zhang, Nan Hua, Yurui Huang, Min Yang
    CodexLeaks: Privacy Leaks from Code Generation Language Models in GitHub CopilotUSENIX Security '23Liang Niu, Shujaat Mirza, Zayd Maradni, Christina Pöpper
    Differential Testing of Cross Deep Learning Framework APIs: Revealing Inconsistencies and VulnerabilitiesUSENIX Security '23Zizhuang Deng, Guozhu Meng, Kai Chen, Tong Liu, Lu Xiang, Chunyang Chen
    HyPFuzz: Formal-Assisted Processor FuzzingUSENIX Security '23Chen Chen, Rahul Kande, Nathan Nguyen, Flemming Andersen, Aakash Tyagi, Ahmad-Reza Sadeghi, Jeyavijayan Rajendran
    Cross Container Attacks: The Bewildered eBPF on CloudsUSENIX Security '23Yi He, Roland Guo, Yunlong Xing, Xijia Che, Kun Sun, Zhuotao Liu, Ke Xu, Qi Li
    Security Analysis of MongoDB Queryable EncryptionUSENIX Security '23Zichen Gui, Kenneth G. Paterson, Tianxin Tang
    LocIn: Inferring Semantic Location from Spatial Maps in Mixed RealityUSENIX Security '23Habiba Farrukh, Reham Mohamed, Aniket Nare, Antonio Bianchi, Z. Berkay Celik
    FloatZone: Accelerating Memory Error Detection using the Floating Point UnitUSENIX Security '23Floris Gorter, Enrico Barberis, Raphael Isemann, Erik van der Kouwe, Cristiano Giuffrida, Herbert Bos
    How Effective is Multiple-Vantage-Point Domain Control Validation?USENIX Security '23Grace H. Cimaszewski, Henry Birge-Lee, Liang Wang, Jennifer Rexford, Prateek Mittal
    Sparsity Brings Vulnerabilities: Exploring New Metrics in Backdoor AttacksUSENIX Security '23Jianwen Tian, Kefan Qiu, Debin Gao, Zhi Wang, Xiaohui Kuang, Gang Zhao
    Examining Power Dynamics and User Privacy in Smart Technology Use Among Jordanian HouseholdsUSENIX Security '23Wael Albayaydh, Ivan Flechais
    "I'm going to trust this until it burns me" Parents' Privacy Concerns and Delegation of Trust in K-8 Educational TechnologyUSENIX Security '23Victoria Zhong, Susan McGregor, Rachel Greenstadt
    DAFL: Directed Grey-box Fuzzing guided by Data DependencyUSENIX Security '23Tae Eun Kim, Jaeseung Choi, Kihong Heo, Sang Kil Cha
    Powering for Privacy: Improving User Trust in Smart Speaker Microphones with Intentional Powering and Perceptible AssuranceUSENIX Security '23Youngwook Do, Nivedita Arora, Ali Mirzazadeh, Injoo Moon, Eryue Xu, Zhihan Zhang, Gregory D. Abowd, Sauvik Das
    Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secret Information in Source Code RepositoriesUSENIX Security '23Alexander Krause, Jan H. Klemmer, Nicolas Huaman, Dominik Wermke, Yasemin Acar, Sascha Fahl
    ACFA: Secure Runtime Auditing & Guaranteed Device Healing via Active Control Flow AttestationUSENIX Security '23Adam Caulfield, Norrathep Rattanavipanon, Ivan De Oliveira Nunes
    Account Verification on Social Media: User Perceptions and Paid EnrollmentUSENIX Security '23Madelyne Xiao, Mona Wang, Anunay Kulshrestha, Jonathan Mayer
    In the Quest to Protect Users from Side-Channel Attacks – A User-Centred Design Space to Mitigate Thermal Attacks on Public Payment TerminalsUSENIX Security '23Karola Marky, Shaun Macdonald, Yasmeen Abdrabou, Mohamed Khamis

Pages