Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '23Improving Logging to Reduce Permission Over-Granting MistakesBingyu Shen, Tianyi Shan, Yuanyuan Zhou
    USENIX Security '23PUMM: Preventing Use-After-Free Using Execution Unit PartitioningCarter Yagemann, Simon P. Chung, Brendan Saltaformaggio, Wenke Lee
    USENIX Security '23TPatch: A Triggered Physical Adversarial PatchWenjun Zhu, Xiaoyu Ji, Yushi Cheng, Shibo Zhang, Wenyuan Xu
    USENIX Security '23Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine LearningJonathan Prokos, Neil Fendley, Matthew Green, Roei Schuster, Eran Tromer, Tushar Jois, Yinzhi Cao
    USENIX Security '23Combating Robocalls with Phone Virtual Assistant Mediated InteractionSharbani Pandit, Krishanu Sarker, Roberto Perdisci, Mustaque Ahamad, Diyi Yang
    USENIX Security '23Distance-Aware Private Set IntersectionAnrin Chakraborti, Giulia Fanti, Michael K. Reiter
    USENIX Security '23Towards a General Video-based Keystroke Inference AttackZhuolin Yang, Yuxin Chen, Zain Sarwar, Hadleigh Schwartz, Ben Y. Zhao, Haitao Zheng
    USENIX Security '23PhyAuth: Physical-Layer Message Authentication for ZigBee NetworksAng Li, Jiawei Li, Dianqi Han, Yan Zhang, Tao Li, Ting Zhu, Yanchao Zhang
    USENIX Security '23Linear Private Set Union from Multi-Query Reverse Private Membership TestCong Zhang, Yu Chen, Weiran Liu, Min Zhang, Dongdai Lin
    USENIX Security '23Framing Frames: Bypassing Wi-Fi Encryption by Manipulating Transmit QueuesDomien Schepers, Aanjhan Ranganathan, Mathy Vanhoef
    USENIX Security '23Formal Analysis and Patching of BLE-SC PairingMin Shi, Jing Chen, Kun He, Haoran Zhao, Meng Jia, Ruiying Du
    USENIX Security '23CAPatch: Physical Adversarial Patch against Image Captioning SystemsShibo Zhang, Yushi Cheng, Wenjun Zhu, Xiaoyu Ji, Wenyuan Xu
    USENIX Security '23Going through the motions: AR/VR keylogging from user head motionsCarter Slocum, Yicheng Zhang, Nael Abu-Ghazaleh, Jiasi Chen
    USENIX Security '23Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic AugmentationRenjie Xie, Jiahao Cao, Enhuan Dong, Mingwei Xu, Kun Sun, Qi Li, Licheng Shen, Menghao Zhang
    USENIX Security '23MTSan: A Feasible and Practical Memory Sanitizer for Fuzzing COTS BinariesXingman Chen, Yinghao Shi, Zheyu Jiang, Yuan Li, Ruoyu Wang, Haixin Duan, Haoyu Wang, Chao Zhang
    USENIX Security '23Capstone: A Capability-based Foundation for Trustless Secure Memory AccessJason Zhijingcheng Yu, Conrad Watt, Aditya Badole, Trevor E. Carlson, Prateek Saxena
    USENIX Security '23Watch your Watch: Inferring Personality Traits from Wearable Activity TrackersNoé Zufferey, Mathias Humbert, Romain Tavenard, Kévin Huguenin
    USENIX Security '23Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal AbuseSophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Danny Yuxing Huang, Rahul Chatterjee
    USENIX Security '23Diving into Robocall Content with SnorCallSathvik Prasad, Trevor Dunlap, Alexander Ross, Bradley Reaves
    USENIX Security '23How to Cover up Anomalous Accesses to Electronic Health RecordsXiaojun Xu, Qingying Hao, Zhuolin Yang, Bo Li, David Liebovitz, Gang Wang, Carl A. Gunter
    USENIX Security '23Know Your Cybercriminal: Evaluating Attacker Preferences by Measuring Profile Sales on an Active, Leading Criminal Market for User Impersonation at ScaleMichele Campobasso, Luca Allodi
    USENIX Security '23An Input-Agnostic Hierarchical Deep Learning Framework for Traffic FingerprintingJian Qu, Xiaobo Ma, Jianfeng Li, Xiapu Luo, Lei Xue, Junjie Zhang, Zhenhua Li, Li Feng, Xiaohong Guan
    USENIX Security '23Subverting Website Fingerprinting Defenses with Robust Traffic RepresentationMeng Shen, Kexin Ji, Zhenbo Gao, Qi Li, Liehuang Zhu, Ke Xu
    USENIX Security '23POLICYCOMP: Counterpart Comparison of Privacy Policies Uncovers Overbroad Personal Data Collection PracticesLu Zhou, Chengyongxiao Wei, Tong Zhu, Guoxing Chen, Xiaokuan Zhang, Suguo Du, Hui Cao, Haojin Zhu
    USENIX Security '23Exploring User Reactions and Mental Models Towards Perceptual Manipulation Attacks in Mixed RealityKaiming Cheng, Jeffery F. Tian, Tadayoshi Kohno, Franziska Roesner

Pages