Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '23PrivTrace: Differentially Private Trajectory Synthesis by Adaptive Markov ModelsHaiming Wang, Zhikun Zhang, Tianhao Wang, Shibo He, Michael Backes, Jiming Chen, Yang Zhang
    USENIX Security '23Humans vs. Machines in Malware ClassificationSimone Aonzo, Yufei Han, Alessandro Mantovani, Davide Balzarotti
    USENIX Security '23Are Consumers Willing to Pay for Security and Privacy of IoT Devices?Pardis Emami-Naeini, Janarth Dheenadhayalan, Yuvraj Agarwal, Lorrie Faith Cranor
    USENIX Security '23PolyFuzz: Holistic Greybox Fuzzing of Multi-Language SystemsWen Li, Jinyang Ruan, Guangbei Yi, Long Cheng, Xiapu Luo, Haipeng Cai
    USENIX Security '23Reassembly is Hard: A Reflection on Challenges and StrategiesHyungseok Kim, Soomin Kim, Junoh Lee, Kangkook Jee, Sang Kil Cha
    USENIX Security '23Examining Consumer Reviews to Understand Security and Privacy Issues in the Market of Smart Home DevicesSwaathi Vetrivel, Veerle van Harten, Carlos H. Gañán, Michel van Eeten, Simon Parkin
    USENIX Security '23Internet Service Providers' and Individuals' Attitudes, Barriers, and Incentives to Secure IoTNissy Sombatruang, Tristan Caulfield, Ingolf Becker, Akira Fujita, Takahiro Kasama, Koji Nakao, Daisuke Inoue
    USENIX Security '23Araña: Discovering and Characterizing Password Guessing Attacks in PracticeMazharul Islam, Marina Sanusi Bohuk, Paul Chung, Thomas Ristenpart, Rahul Chatterjee
    USENIX Security '23Password Guessing Using Random ForestDing Wang, Yunkai Zou, Zijian Zhang, Kedong Xiu
    USENIX Security '23Detecting and Handling IoT Interaction Threats in Multi-Platform Multi-Control-Channel Smart HomesHaotian Chi, Qiang Zeng, Xiaojiang Du
    USENIX Security '23Automated Cookie Notice Analysis and EnforcementRishabh Khandelwal, Asmit Nayak, Hamza Harkous, Kassem Fawaz
    USENIX Security '23Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy LabelsYue Xiao, Zhengyi Li, Yue Qin, Xiaolong Bai, Jiale Guan, Xiaojing Liao, Luyi Xing
    USENIX Security '23Improving Real-world Password Guessing Attacks via Bi-directional TransformersMing Xu, Jitao Yu, Xinyi Zhang, Chuanwang Wang, Shenghao Zhang, Haoqi Wu, Weili Han
    USENIX Security '23AURC: Detecting Errors in Program Code and DocumentationPeiwei Hu, Ruigang Liang, Ying Cao, Kai Chen, Runze Zhang
    USENIX Security '23Black-box Adversarial Example Attack towards FCG Based Android Malware Detection under Incomplete Feature InformationHeng Li, Zhang Cheng, Bang Wu, Liheng Yuan, Cuiying Gao, Wei Yuan, Xiapu Luo
    USENIX Security '23MorFuzz: Fuzzing Processor via Runtime Instruction Morphing enhanced Synchronizable Co-simulationJinyan Xu, Yiyuan Liu, Sirui He, Haoran Lin, Yajin Zhou, Cong Wang
    USENIX Security '23Meta-Sift: How to Sift Out a Clean Subset in the Presence of Data Poisoning?Yi Zeng, Minzhou Pan, Himanshu Jahagirdar, Ming Jin, Lingjuan Lyu, Ruoxi Jia
    USENIX Security '23Adversarial Training for Raw-Binary Malware ClassifiersKeane Lucas, Samruddhi Pai, Weiran Lin, Lujo Bauer, Michael K. Reiter, Mahmood Sharif
    USENIX Security '23No Single Silver Bullet: Measuring the Accuracy of Password Strength MetersDing Wang, Xuan Shan, Qiying Dong, Yaosheng Shen, Chunfu Jia
    USENIX Security '23Three Lessons From Threema: Analysis of a Secure MessengerKenneth G. Paterson, Matteo Scarlata, Kien Tuong Truong
    USENIX Security '23TreeSync: Authenticated Group Management for Messaging Layer SecurityThéophile Wallez, Jonathan Protzenko, Benjamin Beurdouche, Karthikeyan Bhargavan
    USENIX Security '23Formal Analysis of Session-Handling in Secure Messaging: Lifting Security from Sessions to ConversationsCas Cremers, Charlie Jacomme, Aurora Naska
    USENIX Security '23Fine-grained Poisoning Attack to Local Differential Privacy Protocols for Mean and Variance EstimationXiaoguang Li, Ninghui Li, Wenhai Sun, Neil Zhenqiang Gong, Hui Li
    USENIX Security '23PrivateFL: Accurate, Differentially Private Federated Learning via Personalized Data TransformationYuchen Yang, Bo Hui, Haolin Yuan, Neil Gong, Yinzhi Cao
    USENIX Security '23Every Vote Counts: Ranking-Based Training of Federated Learning to Resist Poisoning AttacksHamid Mozaffari, Virat Shejwalkar, Amir Houmansadr

Pages