Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '24A High Coverage Cybersecurity Scale Predictive of User Behavior
    USENIX Security '24NetShaper: A Differentially Private Network Side-Channel Mitigation System
    USENIX Security '24Splitting the Difference on Adversarial Training
    USENIX Security '24Quantifying Privacy Risks of Prompts in Visual Prompt Learning
    USENIX Security '24Understanding How to Inform Blind and Low-Vision Users about Data Privacy through Privacy Question Answering Assistants
    USENIX Security '24Two Shuffles Make a RAM: Improved Constant Overhead Zero Knowledge RAM
    USENIX Security '24Dissecting Privacy Perspectives of Websites Around the World: "Aceptar Todo, Alle Akzeptieren, Accept All..."
    USENIX Security '24Voice App Developer Experiences with Alexa and Google Assistant: Juggling Risks, Liability, and Security
    USENIX Security '24Scalable Multi-Party Computation Protocols for Machine Learning in the Honest-Majority Setting
    USENIX Security '24Cascade: CPU Fuzzing via Intricate Program Generation
    USENIX Security '24Spider-Scents: Grey-box Database-aware Web Scanning for Stored XSS
    USENIX Security '24Less is More: Revisiting the Gaussian Mechanism for Differential Privacy
    USENIX Security '24DaCapo: Automatic Bootstrapping Management for Efficient Fully Homomorphic Encryption
    USENIX Security '24Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation for Binary Code Similarity Detection
    USENIX Security '24Is It a Trap? A Large-scale Empirical Study And Comprehensive Assessment of Online Automated Privacy Policy Generators for Mobile Apps
    USENIX Security '24ModelGuard: Information-Theoretic Defense Against Model Extraction Attacks
    USENIX Security '24The Unpatchables: Why Municipalities Persist in Running Vulnerable Hosts
    USENIX Security '24Exploring Covert Third-party Identifiers through External Storage in the Android New Era
    USENIX Security '24Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS Handshakes
    USENIX Security '24VeriSimplePIR: Verifiability in SimplePIR at No Online Cost for Honest Servers
    USENIX Security '24SledgeHammer: Amplifying Rowhammer via Bank-level Parallelism
    USENIX Security '24The Challenges of Bringing Cryptography from Research Papers to Products: Results from an Interview Study with Experts
    USENIX Security '24SpecLFB: Eliminating Cache Side Channels in Speculative Executions
    USENIX Security '24Vulnerability-oriented Testing for RESTful APIs
    USENIX Security '24Hijacking Attacks against Neural Network by Analyzing Training Data

Pages