Conferences

Search results

    TitleConferenceSpeaker(s)
    CalcuLatency: Leveraging Cross-Layer Network Latency Measurements to Detect Proxy-Enabled AbuseUSENIX Security '24Reethika Ramesh, Philipp Winter, Sam Korman, Roya Ensafi
    6Sense: Internet-Wide IPv6 Scanning and its Security ApplicationsUSENIX Security '24Grant Williams, Mert Erdemir, Amanda Hsu, Shraddha Bhat, Abhishek Bhaskar, Frank Li, Paul Pearce
    Intellectual Property Exposure: Subverting and Securing Intellectual Property Encapsulation in Texas Instruments MicrocontrollersUSENIX Security '24Marton Bognar, Cas Magnus, Frank Piessens, Jo Van Bulck
    An Interview Study on Third-Party Cyber Threat Hunting Processes in the U.S. Department of Homeland SecurityUSENIX Security '24William P. Maxam III, James C. Davis
    GFWeb: Measuring the Great Firewall's Web Censorship at ScaleUSENIX Security '24Nguyen Phong Hoang, Jakub Dalek, Masashi Crete-Nishihata, Nicolas Christin, Vinod Yegneswaran, Michalis Polychronakis, Nick Feamster
    I/O-Efficient Dynamic Searchable Encryption meets Forward & Backward PrivacyUSENIX Security '24Priyanka Mondal, Javad Ghareh Chamani, Ioannis Demertzis, Dimitrios Papadopoulos
    Assessing Suspicious Emails with Banner Warnings Among Blind and Low-Vision Users in Realistic SettingsUSENIX Security '24Filipo Sharevski, Aziz Zeidieh
    d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted DatabasesUSENIX Security '24Dongli Liu, Wei Wang, Peng Xu, Laurence T. Yang, Bo Luo, Kaitai Liang
    "But they have overlooked a few things in Afghanistan:" An Analysis of the Integration of Biometric Voter Verification in the 2019 Afghan Presidential ElectionsUSENIX Security '24Kabir Panahi, Shawn Robertson, Yasemin Acar, Alexandru G. Bardas, Tadayoshi Kohno, Lucy Simko
    Exploring digital security and privacy in relative poverty in Germany through qualitative interviewsUSENIX Security '24Anastassija Kostan, Sara Olschar, Lucy Simko, Yasemin Acar
    Snowflake, a censorship circumvention system using temporary WebRTC proxiesUSENIX Security '24Cecylia Bocovich, Arlo Breault, David Fifield, Serene, Xiaokang Wang
    MD-ML: Super Fast Privacy-Preserving Machine Learning for Malicious Security with a Dishonest MajorityUSENIX Security '24Boshi Yuan, Shixuan Yang, Yongxiang Zhang, Ning Ding, Dawu Gu, Shi-Feng Sun
    Property Existence Inference against Generative ModelsUSENIX Security '24Lijin Wang, Jingjing Wang, Jie Wan, Lin Long, Ziqi Yang, Zhan Qin
    SymBisect: Accurate Bisection for Fuzzer-Exposed VulnerabilitiesUSENIX Security '24Zheng Zhang, Yu Hao, Weiteng Chen, Xiaochen Zou, Xingyu Li, Haonan Li, Yizhuo Zhai, Billy Lau
    Did the Neurons Read your Book? Document-level Membership Inference for Large Language ModelsUSENIX Security '24Matthieu Meeus, Shubham Jain, Marek Rei, Yves-Alexandre de Montjoye
    OblivGNN: Oblivious Inference on Transductive and Inductive Graph Neural NetworkUSENIX Security '24Zhibo Xu, Shangqi Lai, Xiaoning Liu, Alsharif Abuadbba, Xingliang Yuan, Xun Yi
    Invalidate+Compare: A Timer-Free GPU Cache Attack PrimitiveUSENIX Security '24Zhenkai Zhang, Kunbei Cai, Yanan Guo, Fan Yao, Xing Gao
    MIST: Defending Against Membership Inference Attacks Through Membership-Invariant Subspace TrainingUSENIX Security '24Jiacheng Li, Ninghui Li, Bruno Ribeiro
    MUSES: Efficient Multi-User Searchable Encrypted DatabaseUSENIX Security '24Tung Le, Rouzbeh Behnia, Jorge Guajardo, Thang Hoang
    Peep With A Mirror: Breaking The Integrity of Android App Sandboxing via Unprivileged Cache Side ChannelUSENIX Security '24Yan Lin, Joshua Wong, Xiang Li, Haoyu Ma, Debin Gao
    Toward Unbiased Multiple-Target Fuzzing with Path DiversityUSENIX Security '24Huanyao Rong, Wei You, XiaoFeng Wang, Tianhao Mao
    Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch PredictorUSENIX Security '24Luyi Li, Hosein Yavarzadeh, Dean Tullsen
    Data Coverage for Guided FuzzingUSENIX Security '24Mingzhe Wang, Jie Liang, Chijin Zhou, Zhiyong Wu, Jingzhou Fu, Zhuo Su, Qing Liao, Bin Gu, Bodong Wu, Yu Jiang
    Navigating Traumatic Stress Reactions During Computer Security InterventionsUSENIX Security '24Lana Ramjit, Natalie Dolci, Francesca Rossi, Ryan Garcia, Thomas Ristenpart, Dana Cuomo
    SnailLoad: Exploiting Remote Network Latency Measurements without JavaScriptUSENIX Security '24Stefan Gast, Roland Czerny, Jonas Juffinger, Fabian Rauscher, Simone Franza, Daniel Gruss

Pages