Conferences

Search results

    TitleConferenceSpeaker(s)
    Bridging Barriers: A Survey of Challenges and Priorities in the Censorship Circumvention LandscapeUSENIX Security '24Diwen Xue, Anna Ablove, Reethika Ramesh, Grace Kwak Danciu, Roya Ensafi
    A Flushing Attack on the DNS CacheUSENIX Security '24Yehuda Afek, Anat Bremler-Barr, Shoham Danino, Yuval Shavitt
    Exploring ChatGPT's Capabilities on Vulnerability ManagementUSENIX Security '24Peiyu Liu, Junming Liu, Lirong Fu, Kangjie Lu, Yifan Xia, Xuhong Zhang, Wenzhi Chen, Haiqin Weng, Shouling Ji, Wenhai Wang
    Large Language Models for Code Analysis: Do LLMs Really Do Their Job?USENIX Security '24Chongzhou Fang, Ning Miao, Shaurya Srivastav, Jialin Liu, Ruoyu Zhang, Ruijie Fang, Asmita, Ryan Tsang, Najmeh Nazari, Han Wang, Houman Homayoun
    PentestGPT: Evaluating and Harnessing Large Language Models for Automated Penetration TestingUSENIX Security '24Gelei Deng, Yi Liu, Víctor Mayoral-Vilches, Peng Liu, Yuekang Li, Yuan Xu, Tianwei Zhang, Yang Liu, Martin Pinzger, Stefan Rass
    OptFuzz: Optimization Path Guided Fuzzing for JavaScript JIT CompilersUSENIX Security '24Jiming Wang, Yan Kang, Chenggang Wu, Yuhao Hu, Yue Sun, Jikai Ren, Yuanming Lai, Mengyao Xie, Charles Zhang, Tao Li, Zhe Wang
    Can Virtual Reality Protect Users from Keystroke Inference Attacks?USENIX Security '24Zhuolin Yang, Zain Sarwar, Iris Hwang, Ronik Bhaskar, Ben Y. Zhao, Haitao Zheng
    Neural Network Semantic Backdoor Detection and Mitigation: A Causality-Based ApproachUSENIX Security '24Bing Sun, Jun Sun, Wayne Koh, Jie Shi
    The Effect of Design Patterns on (Present and Future) Cookie Consent DecisionsUSENIX Security '24Nataliia Bielova, Laura Litvine, Anysia Nguyen, Mariam Chammat, Vincent Toubiana, Estelle Hary
    ACAI: Protecting Accelerator Execution with Arm Confidential Computing ArchitectureUSENIX Security '24Supraja Sridhara, Andrin Bertschi, Benedict Schlüter, Mark Kuhne, Fabio Aliberti, Shweta Shinde
    How WEIRD is Usable Privacy and Security Research?USENIX Security '24Ayako A. Hasegawa, Daisuke Inoue, Mitsuaki Akiyama
    NetShaper: A Differentially Private Network Side-Channel Mitigation SystemUSENIX Security '24Amir Sabzi, Rut Vora, Swati Goswami, Margo Seltzer, Mathias Lécuyer, Aastha Mehta
    Dissecting Privacy Perspectives of Websites Around the World: "Aceptar Todo, Alle Akzeptieren, Accept All..."USENIX Security '24Aysun Ogut, Berke Turanlioglu, Doruk Can Metiner, Albert Levi, Cemal Yilmaz, Orcun Cetin, Selcuk Uluagac
    Sync+Sync: A Covert Channel Built on fsync with StorageUSENIX Security '24Qisheng Jiang, Chundong Wang
    Mudjacking: Patching Backdoor Vulnerabilities in Foundation ModelsUSENIX Security '24Hongbin Liu, Michael K. Reiter, Neil Zhenqiang Gong
    Pixel Thief: Exploiting SVG Filter Leakage in Firefox and ChromeUSENIX Security '24Sioli O'Connell, Lishay Aben Sour, Ron Magen, Daniel Genkin, Yossi Oren, Hovav Shacham, Yuval Yarom
    Unpacking Privacy Labels: A Measurement and Developer Perspective on Google's Data Safety SectionUSENIX Security '24Rishabh Khandelwal, Asmit Nayak, Paul Chung, Kassem Fawaz
    That Doesn't Go There: Attacks on Shared State in Multi-User Augmented Reality ApplicationsUSENIX Security '24Carter Slocum, Yicheng Zhang, Erfan Shayegani, Pedram Zaree, Nael Abu-Ghazaleh, Jiasi Chen
    On the Difficulty of Defending Contrastive Learning against Backdoor AttacksUSENIX Security '24Changjiang Li, Ren Pang, Bochuan Cao, Zhaohan Xi, Jinghui Chen, Shouling Ji, Ting Wang
    More Simplicity for Trainers, More Opportunity for Attackers: Black-Box Attacks on Speaker Recognition Systems by Inferring Feature ExtractorUSENIX Security '24Yunjie Ge, Pinji Chen, Qian Wang, Lingchen Zhao, Ningping Mou, Peipei Jiang, Cong Wang, Qi Li, Chao Shen
    Transferability of White-box Perturbations: Query-Efficient Adversarial Attacks against Commercial DNN ServicesUSENIX Security '24Meng Shen, Changyue Li, Qi Li, Hao Lu, Liehuang Zhu, Ke Xu
    "I'm not convinced that they don't collect more than is necessary": User-Controlled Data Minimization Design in Search EnginesUSENIX Security '24Tanusree Sharma, Lin Kyi, Yang Wang, Asia J. Biega
    Penetration Vision through Virtual Reality Headsets: Identifying 360-degree Videos from Head MovementsUSENIX Security '24Anh Nguyen, Xiaokuan Zhang, Zhisheng Yan
    SOAP: A Social Authentication ProtocolUSENIX Security '24Felix Linker, David Basin
    Logic Gone Astray: A Security Analysis Framework for the Control Plane Protocols of 5G BasebandsUSENIX Security '24Kai Tu, Abdullah Al Ishtiaq, Syed Md Mukit Rashid, Yilu Dong, Weixuan Wang, Tianwei Wu, Syed Rafiul Hussain

Pages