USENIX Security '24 | Practical Security Analysis of Zero-Knowledge Proof Circuits | |
USENIX Security '24 | Hermes: Unlocking Security Analysis of Cellular Network Protocols by Synthesizing Finite State Machines from Natural Language Specifications | |
USENIX Security '24 | Sync+Sync: A Covert Channel Built on fsync with Storage | |
USENIX Security '24 | AutoFHE: Automated Adaption of CNNs for Efficient Evaluation over FHE | |
USENIX Security '24 | SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models | |
USENIX Security '24 | Why Aren't We Using Passkeys? Obstacles Companies Face Deploying FIDO2 Passwordless Authentication | |
USENIX Security '24 | K-Waay: Fast and Deniable Post-Quantum X3DH without Ring Signatures | |
USENIX Security '24 | What IF Is Not Enough? Fixing Null Pointer Dereference With Contextual Check | |
USENIX Security '24 | Unveiling the Secrets without Data: Can Graph Neural Networks Be Exploited through Data-Free Model Extraction Attacks? | |
USENIX Security '24 | CacheWarp: Software-based Fault Injection using Selective State Reset | |
USENIX Security '24 | Yes, One-Bit-Flip Matters! Universal DNN Model Inference Depletion with Runtime Code Fault Injection | |
USENIX Security '24 | Key Recovery Attacks on Approximate Homomorphic Encryption with Non-Worst-Case Noise Flooding Countermeasures | |
USENIX Security '24 | Mudjacking: Patching Backdoor Vulnerabilities in Foundation Models | |
USENIX Security '24 | Does Online Anonymous Market Vendor Reputation Matter? | |
USENIX Security '24 | SWOOSH: Efficient Lattice-Based Non-Interactive Key Exchange | |
USENIX Security '24 | Machine Learning needs Better Randomness Standards: Randomised Smoothing and PRNG-based attacks | |
USENIX Security '24 | Tossing in the Dark: Practical Bit-Flipping on Gray-box Deep Neural Networks for Runtime Trojan Injection | |
USENIX Security '24 | Batch PIR and Labeled PSI with Oblivious Ciphertext Compression | |
USENIX Security '24 | Pixel Thief: Exploiting SVG Filter Leakage in Firefox and Chrome | |
USENIX Security '24 | ATTention Please! An Investigation of the App Tracking Transparency Permission | |
USENIX Security '24 | Unpacking Privacy Labels: A Measurement and Developer Perspective on Google's Data Safety Section | |
USENIX Security '24 | Accelerating Secure Collaborative Machine Learning with Protocol-Aware RDMA | |
USENIX Security '24 | ABACuS: All-Bank Activation Counters for Scalable and Low Overhead RowHammer Mitigation | |
USENIX Security '24 | On Data Fabrication in Collaborative Vehicular Perception: Attacks and Countermeasures | |
USENIX Security '24 | Understanding the Security and Privacy Implications of Online Toxic Content on Refugees | |