Search results

    What Are the Chances? Explaining the Epsilon Parameter in Differential PrivacyUSENIX Security '23Priyanka Nanayakkara, Mary Anne Smart, Rachel Cummings, Gabriel Kaptchuk, Elissa M. Redmiles
    Glaze: Protecting Artists from Style Mimicry by Text-to-Image ModelsUSENIX Security '23Shawn Shan, Jenna Cryan, Emily Wenger, Haitao Zheng, Rana Hanocka, Ben Y. Zhao
    “To Do This Properly, You Need More Resources”: The Hidden Costs of Introducing Simulated Phishing CampaignsUSENIX Security '23Lina Brunken, Annalina Buckmann, Jonas Hielscher, M. Angela Sasse
    Uncontained: Uncovering Container Confusion in the Linux KernelUSENIX Security '23Jakob Koschel, Pietro Borrello, Daniele Cono D'Elia, Herbert Bos, Cristiano Giuffrida
    DScope: A Cloud-Native Internet TelescopeUSENIX Security '23Eric Pauley, Paul Barford, Patrick McDaniel
    Exploring the Unknown DTLS Universe: Analysis of the DTLS Server Ecosystem on the InternetUSENIX Security '23Nurullah Erinola, Marcel Maehren, Robert Merget, Juraj Somorovsky, Jörg Schwenk
    A Study of China's Censorship and Its Evasion Through the Lens of Online GamingUSENIX Security '23Yuzhou Feng, Ruyu Zhai, Radu Sion, Bogdan Carbunar
    A Mixed-Methods Study of Security Practices of Smart Contract DevelopersUSENIX Security '23Tanusree Sharma, Zhixuan Zhou, Andrew Miller, Yang Wang
    Snapping Snap Sync: Practical Attacks on Go Ethereum Synchronising NodesUSENIX Security '23Massimiliano Taverna, Kenneth G. Paterson
    The Digital-Safety Risks of Financial Technologies for Survivors of Intimate Partner ViolenceUSENIX Security '23Rosanna Bellini, Kevin Lee, Megan A. Brown, Jeremy Shaffer, Rasika Bhalerao, Thomas Ristenpart
    Synchronization Storage Channels (S2C): Timer-less Cache Side-Channel Attacks on the Apple M1 via Hardware Synchronization InstructionsUSENIX Security '23Jiyong Yu, Aishani Dutta, Trent Jaeger, David Kohlbrenner, Christopher W. Fletcher
    PTW: Pivotal Tuning Watermarking for Pre-Trained Image GeneratorsUSENIX Security '23Nils Lukas, Florian Kerschbaum
    Mixed Signals: Analyzing Ground-Truth Data on the Users and Economics of a Bitcoin Mixing ServiceUSENIX Security '23Fieke Miedema, Kelvin Lubbertsen, Verena Schrama, Rolf van Wegberg
    Problematic Advertising and its Disparate Exposure on FacebookUSENIX Security '23Muhammad Ali, Angelica Goetzen, Alan Mislove, Elissa M. Redmiles, Piotr Sapiezynski
    Ethical Frameworks and Computer Security Trolley Problems: Foundations for ConversationsUSENIX Security '23Tadayoshi Kohno, Yasemin Acar, Wulf Loh
    A Peek into the Metaverse: Detecting 3D Model Clones in Mobile GamesUSENIX Security '23Chaoshun Zuo, Chao Wang, Zhiqiang Lin
    Exploring Privacy and Incentives Considerations in Adoption of COVID-19 Contact Tracing AppsUSENIX Security '23Oshrat Ayalon, Dana Turjeman, Elissa M. Redmiles
    Towards A Proactive ML Approach for Detecting Backdoor Poison SamplesUSENIX Security '23Xiangyu Qi, Tinghao Xie, Jiachen T. Wang, Tong Wu, Saeed Mahloujifar, Prateek Mittal
    Extracting Training Data from Diffusion ModelsUSENIX Security '23Nicolas Carlini, Jamie Hayes, Milad Nasr, Matthew Jagielski, Vikash Sehwag, Florian Tramèr, Borja Balle, Daphne Ippolito, Eric Wallace
    BASECOMP: A Comparative Analysis for Integrity Protection in Cellular Baseband SoftwareUSENIX Security '23Eunsoo Kim, Min Woo Baek, CheolJun Park, Dongkwan Kim, Yongdae Kim, Insu Yun
    Instructions Unclear: Undefined Behaviour in Cellular Network SpecificationsUSENIX Security '23Daniel Klischies, Moritz Schloegel, Tobias Scharnowski, Mikhail Bogodukhov, David Rupprecht, Veelasha Moonsamy
    RøB: Ransomware over Modern Web BrowsersUSENIX Security '23Harun Oz, Ahmet Aris, Abbas Acar, Güliz Seray Tuncay, Leonardo Babun, Selcuk Uluagac
    Precise and Generalized Robustness Certification for Neural NetworksUSENIX Security '23Yuanyuan Yuan, Shuai Wang, Zhendong Su
    Account Security Interfaces: Important, Unintuitive, and UntrustworthyUSENIX Security '23Alaa Daffalla, Marina Bohuk, Nicola Dell, Rosanna Bellini, Thomas Ristenpart
    "It's the Equivalent of Feeling Like You're in Jail”: Lessons from Firsthand and Secondhand Accounts of IoT-Enabled Intimate Partner AbuseUSENIX Security '23Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Rahul Chatterjee