Conferences

Search results

    TitleConferenceSpeaker(s)
    On the Necessity of Auditable Algorithmic Definitions for Machine UnlearningUSENIX Security '22Anvith Thudi, Hengrui Jia, Ilia Shumailov, Nicolas Papernot
    Stalloris: RPKI Downgrade AttackUSENIX Security '22Tomas Hlavacek, Philipp Jeitner, Donika Mirdita, Haya Shulman, Michael Waidner
    V'CER: Efficient Certificate Validation in Constrained NetworksUSENIX Security '22David Koisser, Patrick Jauernig, Gene Tsudik, Ahmad-Reza Sadeghi
    Themis: Accelerating the Detection of Route Origin Hijacking by Distinguishing Legitimate and Illegitimate MOASUSENIX Security '22Lancheng Qin, Dan Li, Ruifeng Li, Kang Wang
    ÆPIC Leak: Architecturally Leaking Uninitialized Data from the MicroarchitectureUSENIX Security '22Pietro Borrello, Andreas Kogler, Martin Schwarzl, Moritz Lipp, Daniel Gruss, Michael Schwarz
    XDRI Attacks - and - How to Enhance Resilience of Residential RoutersUSENIX Security '22Philipp Jeitner, Haya Shulman, Lucas Teichmann, Michael Waidner
    Investigating State-of-the-Art Practices for Fostering Subjective Trust in Online Voting through InterviewsUSENIX Security '22Karola Marky, Paul Gerber, Sebastian Günther, Mohamed Khamis, Maximilian Fries, Max Mühlhäuser
    RegexScalpel: Regular Expression Denial of Service (ReDoS) Defense by Localize-and-FixUSENIX Security '22Yeting Li, Yecheng Sun, Zhiwu Xu, Jialun Cao, Yuekang Li, Rongchen Li, Haiming Chen, Shing-Chi Cheung, Yang Liu, Yang Xiao
    MaDIoT 2.0: Modern High-Wattage IoT Botnet Attacks and DefensesUSENIX Security '22Tohid Shekari, Alvaro A. Cardenas, Raheem Beyah
    Inference Attacks Against Graph Neural NetworksUSENIX Security '22Zhikun Zhang, Min Chen, Michael Backes, Yun Shen, Yang Zhang
    Uninvited Guests: Analyzing the Identity and Behavior of Certificate Transparency BotsUSENIX Security '22Brian Kondracki, Johnny So, Nick Nikiforakis
    Midas: Systematic Kernel TOCTTOU ProtectionUSENIX Security '22Atri Bhattacharyya, Uros Tesic, Mathias Payer
    Playing for K(H)eaps: Understanding and Improving Linux Kernel Exploit ReliabilityUSENIX Security '22Kyle Zeng, Yueqi Chen, Haehyun Cho, Xinyu Xing, Adam Doupé, Yan Shoshitaishvili, Tiffany Bao
    In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer AuthenticationUSENIX Security '22Sungbae Yoo, Jinbum Park, Seolheui Kim, Yeji Kim, Taesoo Kim
    Mining Node.js Vulnerabilities via Object Dependence Graph and QueryUSENIX Security '22Song Li, Mingqing Kang, Jianwei Hou, Yinzhi Cao
    FUGIO: Automatic Exploit Generation for PHP Object Injection VulnerabilitiesUSENIX Security '22Sunnyeo Park, Daejun Kim, Suman Jana, Sooel Son
    TLS-Anvil: Adapting Combinatorial Testing for TLS LibrariesUSENIX Security '22Marcel Maehren, Philipp Nieting, Sven Hebrok, Robert Merget, Juraj Somorovsky, Jörg Schwenk
    Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster DesignUSENIX Security '22Alon Shakevsky, Eyal Ronen, Avishai Wool
    How Long Do Vulnerabilities Live in the Code? A Large-Scale Empirical Measurement Study on FOSS Vulnerability LifetimesUSENIX Security '22Nikolaos Alexopoulos, Manuel Brack, Jan Philipp Wagner, Tim Grube, Max Mühlhäuser
    Expected Exploitability: Predicting the Development of Functional Vulnerability ExploitsUSENIX Security '22Octavian Suciu, Connor Nelson, Zhuoer Lyu, Tiffany Bao, Tudor Dumitraș
    Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary ProgramsUSENIX Security '22Jayakrishna Vadayath, Moritz Eckert, Kyle Zeng, Nicolaas Weideman, Gokulkrishna Praveen Menon, Yanick Fratantonio, Davide Balzarotti, Adam Doupé, Tiffany Bao, Ruoyu Wang, Christophe Hauser, Yan Shoshitaishvili
    Spoki: Unveiling a New Wave of Scanners through a Reactive Network TelescopeUSENIX Security '22Raphael Hiesgen, Marcin Nawrocki, Alistair King, Alberto Dainotti, Thomas C. Schmidt, Matthias Wählisch
    GET /out: Automated Discovery of Application-Layer Censorship Evasion StrategiesUSENIX Security '22Michael Harrity, Kevin Bock, Frederick Sell, Dave Levin
    Twilight: A Differentially Private Payment Channel NetworkUSENIX Security '22Maya Dotan, Saar Tochner, Aviv Zohar, Yossi Gilad
    Building an Open, Robust, and Stable Voting-Based Domain Top ListUSENIX Security '22Qinge Xie, Shujun Tang, Xiaofeng Zheng, Qingran Lin, Baojun Liu, Haixin Duan, Frank Li

Pages