Conferences

Search results

    TitleConferenceSpeaker(s)
    Formalizing and Benchmarking Prompt Injection Attacks and DefensesUSENIX Security '24Yupei Liu, Yuqi Jia, Runpeng Geng, Jinyuan Jia, Neil Zhenqiang Gong
    Cost-effective Attack Forensics by Recording and Correlating File System ChangesUSENIX Security '24Le Yu, Yapeng Ye, Zhuo Zhang, Xiangyu Zhang
    True Attacks, Attack Attempts, or Benign Triggers? An Empirical Measurement of Network Alerts in a Security Operations CenterUSENIX Security '24Limin Yang, Zhi Chen, Chenkai Wang, Zhenning Zhang, Sushruth Booma, Phuong Cao, Constantin Adam, Alexander Withers, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Gang Wang
    Secure Account Recovery for a Privacy-Preserving Web ServiceUSENIX Security '24
    REMARK-LLM: A Robust and Efficient Watermarking Framework for Generative Large Language ModelsUSENIX Security '24Ruisi Zhang, Shehzeen Samarah Hussain, Paarth Neekhara, Farinaz Koushanfar
    Detecting and Mitigating Sampling Bias in Cybersecurity with Unlabeled DataUSENIX Security '24Saravanan Thirumuruganathan, Fatih Deniz, Issa Khalil, Ting Yu, Mohamed Nabeel, Mourad Ouzzani
    Into the Dark: Unveiling Internal Site Search Abused for Black Hat SEOUSENIX Security '24Yunyi Zhang, Mingxuan Liu, Baojun Liu, Yiming Zhang, Haixin Duan, Min Zhang, Hui Jiang, Yanzhe Li, Fan Shi
    Guardians of the Galaxy: Content Moderation in the InterPlanetary File SystemUSENIX Security '24Saidu Sokoto, Leonhard Balduf, Dennis Trautwein, Yiluo Wei, Gareth Tyson, Ignacio Castro, Onur Ascigil, George Pavlou, Maciej Korczyński, Björn Scheuermann, Michał Król
    VulSim: Leveraging Similarity of Multi-Dimensional Neighbor Embeddings for Vulnerability DetectionUSENIX Security '24Samiha Shimmi, Ashiqur Rahman, Mohan Gadde, Hamed Okhravi, Mona Rahimi
    Holding Secrets Accountable: Auditing Privacy-Preserving Machine LearningUSENIX Security '24
    ORANalyst: Systematic Testing Framework for Open RAN ImplementationsUSENIX Security '24Tianchang Yang, Syed Md Mukit Rashid, Ali Ranjbar, Gang Tan, Syed Rafiul Hussain
    FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability DetectionUSENIX Security '24Siyue Feng, Yueming Wu, Wenjie Xue, Sikui Pan, Deqing Zou, Yang Liu, Hai Jin
    Instruction Backdoor Attacks Against Customized LLMsUSENIX Security '24Rui Zhang, Hongwei Li, Rui Wen, Wenbo Jiang, Yuan Zhang, Michael Backes, Yun Shen, Yang Zhang
    An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong DetectionUSENIX Security '24Shenao Yan, Shen Wang, Yue Duan, Hanbin Hong, Kiho Lee, Doowon Kim, Yuan Hong
    Accelerating Secure Collaborative Machine Learning with Protocol-Aware RDMAUSENIX Security '24Zhenghang Ren, Mingxuan Fan, Zilong Wang, Junxue Zhang, Chaoliang Zeng, Zhicong Huang, Cheng Hong, Kai Chen
    When the User Is Inside the User Interface: An Empirical Study of UI Security Properties in Augmented RealityUSENIX Security '24Kaiming Cheng, Arkaprabha Bhattacharya, Michelle Lin, Jaewook Lee, Aroosh Kumar, Jeffery F. Tian, Tadayoshi Kohno, Franziska Roesner
    Understanding How to Inform Blind and Low-Vision Users about Data Privacy through Privacy Question Answering AssistantsUSENIX Security '24Yuanyuan Feng, Abhilasha Ravichander, Yaxing Yao, Shikun Zhang, Rex Chen
    Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS HandshakesUSENIX Security '24Diwen Xue, Michalis Kallitsis, Amir Houmansadr, Roya Ensafi
    AutoFHE: Automated Adaption of CNNs for Efficient Evaluation over FHEUSENIX Security '24Wei Ao, Vishnu Naresh Boddeti
    SDFuzz: Target States Driven Directed FuzzingUSENIX Security '24Penghui Li, Wei Meng, Chao Zhang
    FEASE: Fast and Expressive Asymmetric Searchable EncryptionUSENIX Security '24Long Meng, Liqun Chen, Yangguang Tian, Mark Manulis, Suhui Liu
    Critical Code Guided Directed Greybox Fuzzing for CommitsUSENIX Security '24Yi Xiang, Xuhong Zhang, Peiyu Liu, Shouling Ji, Hong Liang, Jiacheng Xu, Wenhai Wang
    A Linear Reconstruction Approach for Attribute Inference Attacks against Synthetic DataUSENIX Security '24Meenatchi Sundaram Muthu Selva Annamalai, Andrea Gadotti, Luc Rocher
    Fast and Private Inference of Deep Neural Networks by Co-designing Activation FunctionsUSENIX Security '24Abdulrahman Diaa, Lucas Fenaux, Thomas Humphries, Marian Dietz, Faezeh Ebrahimianghazani, Bailey Kacsmar, Xinda Li, Nils Lukas, Rasoul Akhavan Mahdavi, Simon Oya, Ehsan Amjadian, Florian Kerschbaum
    Query Recovery from Easy to Hard: Jigsaw Attack against SSEUSENIX Security '24Hao Nie, Wei Wang, Peng Xu, Xianglong Zhang, Laurence T. Yang, Kaitai Liang

Pages