USENIX Security '24 | Automated Large-Scale Analysis of Cookie Notice Compliance | |
USENIX Security '24 | You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise Networks | |
USENIX Security '24 | Can Virtual Reality Protect Users from Keystroke Inference Attacks? | |
USENIX Security '24 | Neural Network Semantic Backdoor Detection and Mitigation: A Causality-Based Approach | |
USENIX Security '24 | Finding Traceability Attacks in the Bluetooth Low Energy Specification and Its Implementations | |
USENIX Security '24 | Devil in the Room: Triggering Audio Backdoors in the Physical World | |
USENIX Security '24 | Atropos: Effective Fuzzing of Web Applications for Server-Side Vulnerabilities | |
USENIX Security '24 | FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker Recognition | |
USENIX Security '24 | Dancer in the Dark: Synthesizing and Evaluating Polyglots for Blind Cross-Site Scripting | |
USENIX Security '24 | ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing | |
USENIX Security '24 | Ahoy SAILR! There is No Need to DREAM of C: A Compiler-Aware Structuring Algorithm for Binary Decompilation | |
USENIX Security '24 | Racing on the Negative Force: Efficient Vulnerability Root-Cause Analysis through Reinforcement Learning on Counterexamples | |
USENIX Security '24 | WEBRR: A Forensic System for Replaying and Investigating Web-Based Attacks in The Modern Web | |
USENIX Security '24 | Unleashing the Power of Type-Based Call Graph Construction by Using Regional Pointer Information | |
USENIX Security '24 | The Effect of Design Patterns on (Present and Future) Cookie Consent Decisions | |
USENIX Security '24 | RECORD: A RECeption-Only Region Determination Attack on LEO Satellite Users | |
USENIX Security '24 | A Taxonomy of C Decompiler Fidelity Issues | |
USENIX Security '24 | CAMP: Compiler and Allocator-based Heap Memory Protection | |
USENIX Security '24 | "Belt and suspenders" or "just red tape"?: Investigating Early Artifacts and User Perceptions of IoT App Security Certification | |
USENIX Security '24 | Go Go Gadget Hammer: Flipping Nested Pointers for Arbitrary Data Leakage | |
USENIX Security '24 | FFXE: Dynamic Control Flow Graph Recovery for Embedded Firmware Binaries | |
USENIX Security '24 | Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities | |
USENIX Security '24 | Opportunistic Data Flow Integrity for Real-time Cyber-physical Systems Using Worst Case Execution Time Reservation | |
USENIX Security '24 | MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning | |
USENIX Security '24 | Security and Privacy Analysis of Samsung's Crowd-Sourced Bluetooth Location Tracking System | |