Search results

    DeResistor: Toward Detection-Resistant Probing for Evasion of Internet CensorshipUSENIX Security '23Abderrahmen Amich, Birhanu Eshete, Vinod Yegneswaran, Nguyen Phong Hoang
    Can a Deep Learning Model for One Architecture Be Used for Others? Retargeted-Architecture Binary Code AnalysisUSENIX Security '23Junzhe Wang, Matthew Sharp, Chuxiong Wu, Qiang Zeng, Lannan Luo
    A Bug's Life: Analyzing the Lifecycle and Mitigation Process of Content Security Policy BugsUSENIX Security '23Gertjan Franken, Tom Van Goethem, Lieven Desmet, Wouter Joosen
    To Cloud or not to Cloud: A Qualitative Study on Self-Hosters' Motivation, Operation, and Security MindsetUSENIX Security '23Lea Gröber, Rafael Mrowczynski, Nimisha Vijay, Daphne A. Muller, Adrian Dabrowski, Katharina Krombholz
    Extended Hell(o): A Comprehensive Large-Scale Study on Email Confidentiality and Integrity Mechanisms in the WildUSENIX Security '23Birk Blechschmidt, Ben Stock
    Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing TablesUSENIX Security '23Nian Xue, Yashaswi Malla, Zihang Xia, Christina Pöpper, Mathy Vanhoef
    Speculation at Fault: Modeling and Testing Microarchitectural Leakage of CPU ExceptionsUSENIX Security '23Jana Hofmann, Emanuele Vannacci, Cédric Fournet, Boris Köpf, Oleksii Oleksenko
    You've Got Report: Measurement and Security Implications of DMARC ReportingUSENIX Security '23Md. Ishtiaq Ashiq, Weitong Li, Tobias Fiebig, Taejoong Chung
    Cryptographic Deniability: A Multi-perspective Study of User Perceptions and ExpectationsUSENIX Security '23Tarun Kumar Yadav, Devashish Gosain, Kent Seamons
    TVA: A multi-party computation system for secure and expressive time series analyticsUSENIX Security '23Muhammad Faisal, Jerry Zhang, John Liagouris, Vasiliki Kalavri, Mayank Varia
    Greenhouse: Single-Service Rehosting of Linux-Based Firmware Binaries in User-Space EmulationUSENIX Security '23Hui Jun Tay, Kyle Zeng, Jayakrishna Menon Vadayath, Arvind S Raj, Audrey Dutcher, Tejesh Reddy, Wil Gibbs, Zion Leonahenahe Basque, Fangzhou Dong, Zack Smith, Adam Doupé, Tiffany Bao, Yan Shoshitaishvili, Ruoyu Wang
    On the Security Risks of Knowledge Graph ReasoningUSENIX Security '23Zhaohan Xi, Tianyu Du, Changjiang Li, Ren Pang, Shouling Ji, Xiapu Luo, Xusheng Xiao, Fenglong Ma, Ting Wang
    Private Proof-of-Stake Blockchains using Differentially-Private Stake DistortionUSENIX Security '23Chenghong Wang, David Pujol, Kartik Nayak, Ashwin Machanavajjhala
    Union under Duress: Understanding Hazards of Duplicate Resource Mismediation in Android Software Supply ChainUSENIX Security '23Xueqiang Wang, Yifan Zhang, XiaoFeng Wang, Yan Jia, Luyi Xing
    Medusa Attack: Exploring Security Hazards of In-App QR Code ScanningUSENIX Security '23Xing Han, Yuheng Zhang, Xue Zhang, Zeyuan Chen, Mingzhe Wang, Yiwei Zhang, Siqi Ma, Yu Yu, Elisa Bertino, Juanru Li
    LibScan: Towards More Precise Third-Party Library Identification for Android ApplicationsUSENIX Security '23Yafei Wu, Cong Sun, Dongrui Zeng, Gang Tan, Siqi Ma, Peicheng Wang
    Beyond Typosquatting: An In-depth Look at Package ConfusionUSENIX Security '23Shradha Neupane, Grant Holmes, Elizabeth Wyss, Drew Davidson, Lorenzo De Carli
    PrivGraph: Differentially Private Graph Data Publication by Exploiting Community InformationUSENIX Security '23Quan Yuan, Zhikun Zhang, Linkang Du, Min Chen, Peng Cheng, Mingyang Sun
    WaterBear: Practical Asynchronous BFT Matching Security Guarantees of Partially Synchronous BFTUSENIX Security '23Haibin Zhang, Sisi Duan, Boxin Zhao, Liehuang Zhu
    FACE-AUDITOR: Data Auditing in Facial Recognition SystemsUSENIX Security '23Min Chen, Zhikun Zhang, Tianhao Wang, Michael Backes, Yang Zhang
    Rods with Laser Beams: Understanding Browser Fingerprinting on Phishing PagesUSENIX Security '23Iskander Sanchez-Rola, Leyla Bilge, Davide Balzarotti, Armin Buescher, Petros Efstathopoulos
    Dubhe: Succinct Zero-Knowledge Proofs for Standard AES and related ApplicationsUSENIX Security '23Changchang Ding, Yan Huang
    Two-in-One: A Model Hijacking Attack Against Text Generation ModelsUSENIX Security '23Wai Man Si, Michael Backes, Yang Zhang, Ahmed Salem
    Evading Provenance-Based ML Detectors with Adversarial System ActionsUSENIX Security '23Kunal Mukherjee, Joshua Wiedemeier, Tianhao Wang, James Wei, Feng Chen, Muhyun Kim, Murat Kantarcioglu, Kangkook Jee
    Curve Trees: Practical and Transparent Zero-Knowledge AccumulatorsUSENIX Security '23Matteo Campanelli, Mathias Hall-Andersen, Simon Holmgaard Kamp