Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '23How to Cover up Anomalous Accesses to Electronic Health RecordsXiaojun Xu, Qingying Hao, Zhuolin Yang, Bo Li, David Liebovitz, Gang Wang, Carl A. Gunter
    USENIX Security '23Distance-Aware Private Set IntersectionAnrin Chakraborti, Giulia Fanti, Michael K. Reiter
    USENIX Security '23TPatch: A Triggered Physical Adversarial PatchWenjun Zhu, Xiaoyu Ji, Yushi Cheng, Shibo Zhang, Wenyuan Xu
    USENIX Security '23CAPatch: Physical Adversarial Patch against Image Captioning SystemsShibo Zhang, Yushi Cheng, Wenjun Zhu, Xiaoyu Ji, Wenyuan Xu
    USENIX Security '23Adversarial Training for Raw-Binary Malware ClassifiersKeane Lucas, Samruddhi Pai, Weiran Lin, Lujo Bauer, Michael K. Reiter, Mahmood Sharif
    USENIX Security '23Formal Analysis of Session-Handling in Secure Messaging: Lifting Security from Sessions to ConversationsCas Cremers, Charlie Jacomme, Aurora Naska
    USENIX Security '23Meta-Sift: How to Sift Out a Clean Subset in the Presence of Data Poisoning?Yi Zeng, Minzhou Pan, Himanshu Jahagirdar, Ming Jin, Lingjuan Lyu, Ruoxi Jia
    USENIX Security '23Every Vote Counts: Ranking-Based Training of Federated Learning to Resist Poisoning AttacksHamid Mozaffari, Virat Shejwalkar, Amir Houmansadr
    USENIX Security '23Proxy Hunting: Understanding and Characterizing Proxy-based Upgradeable Smart Contracts in BlockchainsWilliam E Bodell III, Sajad Meisami, Yue Duan
    USENIX Security '23“Employees Who Don’t Accept the Time Security Takes Are Not Aware Enough”: The CISO View of Human-Centred SecurityJonas Hielscher, Uta Menges, Simon Parkin, Annette Kluge, M. Angela Sasse
    USENIX Security '23Framing Frames: Bypassing Wi-Fi Encryption by Manipulating Transmit QueuesDomien Schepers, Aanjhan Ranganathan, Mathy Vanhoef
    USENIX Security '23Towards a General Video-based Keystroke Inference AttackZhuolin Yang, Yuxin Chen, Zain Sarwar, Hadleigh Schwartz, Ben Y. Zhao, Haitao Zheng
    USENIX Security '23Going through the motions: AR/VR keylogging from user head motionsCarter Slocum, Yicheng Zhang, Nael Abu-Ghazaleh, Jiasi Chen
    USENIX Security '23Watch your Watch: Inferring Personality Traits from Wearable Activity TrackersNoé Zufferey, Mathias Humbert, Romain Tavenard, Kévin Huguenin
    USENIX Security '23Combating Robocalls with Phone Virtual Assistant Mediated InteractionSharbani Pandit, Krishanu Sarker, Roberto Perdisci, Mustaque Ahamad, Diyi Yang
    USENIX Security '23The Gates of Time: Improving Cache Attacks with Transient ExecutionDaniel Katzman, William Kosasih, Chitchanok Chuengsatiansup, Eyal Ronen, Yuval Yarom
    USENIX Security '23The Writing on the Wall and 3D Digital Twins: Personal Information in (not so) Private Real EstateRachel McAmis, Tadayoshi Kohno
    USENIX Security '23Hidden Reality: Caution, Your Hand Gesture Inputs in the Immersive Virtual World are Visible to All!Sindhu Reddy Kalathur Gopal, Diksha Shukla, James David Wheelock, Nitesh Saxena
    USENIX Security '23Exploring User Reactions and Mental Models Towards Perceptual Manipulation Attacks in Mixed RealityKaiming Cheng, Jeffery F. Tian, Tadayoshi Kohno, Franziska Roesner
    USENIX Security '23Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy LabelsYue Xiao, Zhengyi Li, Yue Qin, Xiaolong Bai, Jiale Guan, Xiaojing Liao, Luyi Xing
    USENIX Security '23Automated Cookie Notice Analysis and EnforcementRishabh Khandelwal, Asmit Nayak, Hamza Harkous, Kassem Fawaz
    USENIX Security '23Are Consumers Willing to Pay for Security and Privacy of IoT Devices?Pardis Emami-Naeini, Janarth Dheenadhayalan, Yuvraj Agarwal, Lorrie Faith Cranor
    USENIX Security '23Detecting and Handling IoT Interaction Threats in Multi-Platform Multi-Control-Channel Smart HomesHaotian Chi, Qiang Zeng, Xiaojiang Du
    USENIX Security '23PrivateFL: Accurate, Differentially Private Federated Learning via Personalized Data TransformationYuchen Yang, Bo Hui, Haolin Yuan, Neil Gong, Yinzhi Cao
    USENIX Security '23PrivTrace: Differentially Private Trajectory Synthesis by Adaptive Markov ModelsHaiming Wang, Zhikun Zhang, Tianhao Wang, Shibo He, Michael Backes, Jiming Chen, Yang Zhang

Pages