Conferences

Search results

    TitleConferenceSpeaker(s)
    MorFuzz: Fuzzing Processor via Runtime Instruction Morphing enhanced Synchronizable Co-simulationUSENIX Security '23Jinyan Xu, Yiyuan Liu, Sirui He, Haoran Lin, Yajin Zhou, Cong Wang
    Meta-Sift: How to Sift Out a Clean Subset in the Presence of Data Poisoning?USENIX Security '23Yi Zeng, Minzhou Pan, Himanshu Jahagirdar, Ming Jin, Lingjuan Lyu, Ruoxi Jia
    Adversarial Training for Raw-Binary Malware ClassifiersUSENIX Security '23Keane Lucas, Samruddhi Pai, Weiran Lin, Lujo Bauer, Michael K. Reiter, Mahmood Sharif
    No Single Silver Bullet: Measuring the Accuracy of Password Strength MetersUSENIX Security '23Ding Wang, Xuan Shan, Qiying Dong, Yaosheng Shen, Chunfu Jia
    Three Lessons From Threema: Analysis of a Secure MessengerUSENIX Security '23Kenneth G. Paterson, Matteo Scarlata, Kien Tuong Truong
    TreeSync: Authenticated Group Management for Messaging Layer SecurityUSENIX Security '23Théophile Wallez, Jonathan Protzenko, Benjamin Beurdouche, Karthikeyan Bhargavan
    Formal Analysis of Session-Handling in Secure Messaging: Lifting Security from Sessions to ConversationsUSENIX Security '23Cas Cremers, Charlie Jacomme, Aurora Naska
    Fine-grained Poisoning Attack to Local Differential Privacy Protocols for Mean and Variance EstimationUSENIX Security '23Xiaoguang Li, Ninghui Li, Wenhai Sun, Neil Zhenqiang Gong, Hui Li
    PrivateFL: Accurate, Differentially Private Federated Learning via Personalized Data TransformationUSENIX Security '23Yuchen Yang, Bo Hui, Haolin Yuan, Neil Gong, Yinzhi Cao
    Every Vote Counts: Ranking-Based Training of Federated Learning to Resist Poisoning AttacksUSENIX Security '23Hamid Mozaffari, Virat Shejwalkar, Amir Houmansadr
    Hidden Reality: Caution, Your Hand Gesture Inputs in the Immersive Virtual World are Visible to All!USENIX Security '23Sindhu Reddy Kalathur Gopal, Diksha Shukla, James David Wheelock, Nitesh Saxena
    Measuring Up to (Reasonable) Consumer Expectations: Providing an Empirical Basis for Holding IoT Manufacturers Legally ResponsibleUSENIX Security '23Lorenz Kustosch, Carlos Gañán, Mattis van 't Schip, Michel van Eeten, Simon Parkin
    Pass2Edit: A Multi-Step Generative Model for Guessing Edited PasswordsUSENIX Security '23Ding Wang, Yunkai Zou, Yuan-An Xiao, Siqi Ma, Xiaofeng Chen
    PoliGraph: Automated Privacy Policy Analysis using Knowledge GraphsUSENIX Security '23Hao Cui, Rahmadi Trimananda, Athina Markopoulou, Scott Jordan
    µFUZZ: Redesign of Parallel Fuzzing using Microservice ArchitectureUSENIX Security '23Yongheng Chen, Rui Zhong, Yupeng Yang, Hong Hu, Dinghao Wu, Wenke Lee
    FISHFUZZ: Catch Deeper Bugs by Throwing Larger NetsUSENIX Security '23Han Zheng, Jiayuan Zhang, Yuhang Huang, Zezhong Ren, He Wang, Chunjie Cao, Yuqing Zhang, Flavio Toffalini, Mathias Payer
    PORE: Provably Robust Recommender Systems against Data Poisoning AttacksUSENIX Security '23Jinyuan Jia, Yupei Liu, Yuepeng Hu, Neil Zhenqiang Gong
    Private Proof-of-Stake Blockchains using Differentially-Private Stake DistortionUSENIX Security '23Chenghong Wang, David Pujol, Kartik Nayak, Ashwin Machanavajjhala
    Evading Provenance-Based ML Detectors with Adversarial System ActionsUSENIX Security '23Kunal Mukherjee, Joshua Wiedemeier, Tianhao Wang, James Wei, Feng Chen, Muhyun Kim, Murat Kantarcioglu, Kangkook Jee
    Wink: Deniable Secure MessagingUSENIX Security '23Anrin Chakraborti, Darius Suciu, Radu Sion
    Cryptographic Administration for Secure Group MessagingUSENIX Security '23David Balbás, Daniel Collins, Serge Vaudenay
    Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against Data-Oriented AttacksUSENIX Security '23Salman Ahmed, Hans Liljestrand, Hani Jamjoom, Matthew Hicks, N. Asokan, Danfeng (Daphne) Yao
    Calpric: Inclusive and Fine-grain Labeling of Privacy Policies with Crowdsourcing and Active LearningUSENIX Security '23Wenjun Qiu, David Lie, Lisa Austin
    HyPFuzz: Formal-Assisted Processor FuzzingUSENIX Security '23Chen Chen, Rahul Kande, Nathan Nguyen, Flemming Andersen, Aakash Tyagi, Ahmad-Reza Sadeghi, Jeyavijayan Rajendran
    LocIn: Inferring Semantic Location from Spatial Maps in Mixed RealityUSENIX Security '23Habiba Farrukh, Reham Mohamed, Aniket Nare, Antonio Bianchi, Z. Berkay Celik

Pages