Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '23How the Great Firewall of China Detects and Blocks Fully Encrypted TrafficMingshi Wu, Jackson Sippe, Danesh Sivakumar, Jack Burg, Peter Anderson, Xiaokang Wang, Kevin Bock, Amir Houmansadr, Dave Levin, Eric Wustrow
    USENIX Security '23ARI: Attestation of Real-time Mission Execution IntegrityJinwen Wang, Yujie Wang, Ao Li, Yang Xiao, Ruide Zhang, Wenjing Lou, Y. Thomas Hou, Ning Zhang
    USENIX Security '23Understand Users' Privacy Perception and Decision of V2X Communication in Connected Autonomous VehiclesZekun Cai, Aiping Xiong
    USENIX Security '23You Can't See Me: Physical Removal Attacks on LiDAR-based Autonomous Vehicles Driving FrameworksYulong Cao, S. Hrushikesh Bhupathiraju, Pirouz Naghavi, Takeshi Sugawara, Z. Morley Mao, Sara Rampazzi
    USENIX Security '23NRDelegationAttack: Complexity DDoS attack on DNS Recursive ResolversYehuda Afek, Anat Bremler-Barr, Shani Stajnrod
    USENIX Security '23The Case for Learned Provenance Graph Storage SystemsHailun Ding, Juan Zhai, Dong Deng, Shiqing Ma
    USENIX Security '23DynSQL: Stateful Fuzzing for Database Management Systems with Complex and Valid SQL Query GenerationZu-Ming Jiang, Jia-Ju Bai, Zhendong Su
    USENIX Security '23ELASM: Error-Latency-Aware Scale Management for Fully Homomorphic EncryptionYongwoo Lee, Seonyoung Cheon, Dongkwan Kim, Dongyoon Lee, Hanjun Kim
    USENIX Security '23“If sighted people know, I should be able to know:” Privacy Perceptions of Bystanders with Visual Impairments around Camera-based TechnologyYuhang Zhao, Yaxing Yao, Jiaru Fu, Nihan Zhou
    USENIX Security '23Remote Attacks on Speech Recognition Systems Using Sound from Power SupplyLanqing Yang, Xinqi Chen, Xiangyong Jian, Leping Yang, Yijie Li, Qianfei Ren, Yi-Chao Chen, Guangtao Xue, Xiaoyu Ji
    USENIX Security '23The Space of Adversarial StrategiesRyan Sheatsley, Blaine Hoak, Eric Pauley, Patrick McDaniel
    USENIX Security '23"My Privacy for their Security": Employees' Privacy Perspectives and Expectations when using Enterprise Security SoftwareJonah Stegman, Patrick J. Trottier, Caroline Hillier, Hassan Khan, Mohammad Mannan
    USENIX Security '23Don’t be Dense: Efficient Keyword PIR for Sparse DatabasesSarvar Patel, Joon Young Seo, Kevin Yeo
    USENIX Security '23VeriZexe: Decentralized Private Computation with Universal SetupAlex Luoyuan Xiong, Binyi Chen, Zhenfei Zhang, Benedikt Bünz, Ben Fisch, Fernando Krell, Philippe Camacho
    USENIX Security '23SMACK: Semantically Meaningful Adversarial Audio AttackZhiyuan Yu, Yuanhaur Chang, Ning Zhang, Chaowei Xiao
    USENIX Security '23Duoram: A Bandwidth-Efficient Distributed ORAM for 2- and 3-Party ComputationAdithya Vadapalli, Ryan Henry, Ian Goldberg
    USENIX Security '23Controlled Data Races in Enclaves: Attacks and DetectionSanchuan Chen, Zhiqiang Lin, Yinqian Zhang
    USENIX Security '23Know Your Cybercriminal: Evaluating Attacker Preferences by Measuring Profile Sales on an Active, Leading Criminal Market for User Impersonation at ScaleMichele Campobasso, Luca Allodi
    USENIX Security '23autofz: Automated Fuzzer Composition at RuntimeYu-Fu Fu, Jaehyuk Lee, Taesoo Kim
    USENIX Security '23Black-box Adversarial Example Attack towards FCG Based Android Malware Detection under Incomplete Feature InformationHeng Li, Zhang Cheng, Bang Wu, Liheng Yuan, Cuiying Gao, Wei Yuan, Xiapu Luo
    USENIX Security '23Three Lessons From Threema: Analysis of a Secure MessengerKenneth G. Paterson, Matteo Scarlata, Kien Tuong Truong
    USENIX Security '23GLeeFuzz: Fuzzing WebGL Through Error Message Guided MutationHui Peng, Zhihao Yao, Ardalan Amiri Sani, Dave (Jing) Tian, Mathias Payer
    USENIX Security '23An Input-Agnostic Hierarchical Deep Learning Framework for Traffic FingerprintingJian Qu, Xiaobo Ma, Jianfeng Li, Xiapu Luo, Lei Xue, Junjie Zhang, Zhenhua Li, Li Feng, Xiaohong Guan
    USENIX Security '23Improving Logging to Reduce Permission Over-Granting MistakesBingyu Shen, Tianyi Shan, Yuanyuan Zhou
    USENIX Security '23Subverting Website Fingerprinting Defenses with Robust Traffic RepresentationMeng Shen, Kexin Ji, Zhenbo Gao, Qi Li, Liehuang Zhu, Ke Xu

Pages