Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '24Unleashing the Power of Type-Based Call Graph Construction by Using Regional Pointer InformationYuandao Cai, Yibo Jin, Charles Zhang
    USENIX Security '24Less is More: Revisiting the Gaussian Mechanism for Differential PrivacyTianxi Ji, Pan Li
    USENIX Security '24What IF Is Not Enough? Fixing Null Pointer Dereference With Contextual CheckYunlong Xing, Shu Wang, Shiyu Sun, Xu He, Kun Sun, Qi Li
    USENIX Security '24CacheWarp: Software-based Fault Injection using Selective State ResetRuiyi Zhang, Lukas Gerlach, Daniel Weber, Lorenz Hetterich, Youheng Lü, Andreas Kogler, Michael Schwarz
    USENIX Security '24Yes, One-Bit-Flip Matters! Universal DNN Model Inference Depletion with Runtime Code Fault InjectionShaofeng Li, Xinyu Wang, Minhui Xue, Haojin Zhu, Zhi Zhang, Yansong Gao, Wen Wu, Xuemin (Sherman) Shen
    USENIX Security '24Tossing in the Dark: Practical Bit-Flipping on Gray-box Deep Neural Networks for Runtime Trojan InjectionZihao Wang, Di Tang, XiaoFeng Wang, Wei He, Zhaoyang Geng, Wenhao Wang
    USENIX Security '24Towards Generic Database Management System FuzzingYupeng Yang, Yongheng Chen, Rui Zhong, Jizhou Chen, Wenke Lee
    USENIX Security '24DNN-GP: Diagnosing and Mitigating Model's Faults Using Latent ConceptsShuo Wang, Hongsheng Hu, Jiamin Chang, Benjamin Zi Hao Zhao, Qi Alfred Chen, Minhui Xue
    USENIX Security '24Relation Mining Under Local Differential PrivacyKai Dong, Zheng Zhang, Chuang Jia, Zhen Ling, Ming Yang, Junzhou Luo, Xinwen Fu
    USENIX Security '24HYPERPILL: Fuzzing for Hypervisor-bugs by Leveraging the Hardware Virtualization InterfaceAlexander Bulekov, Qiang Liu, Manuel Egele, Mathias Payer
    USENIX Security '24DPAdapter: Improving Differentially Private Deep Learning through Noise Tolerance Pre-trainingZihao Wang, Rui Zhu, Dongruo Zhou, Zhikun Zhang, John Mitchell, Haixu Tang, XiaoFeng Wang
    USENIX Security '24EVOKE: Efficient Revocation of Verifiable Credentials in IoT NetworksCarlo Mazzocca, Abbas Acar, Selcuk Uluagac, Rebecca Montanari
    USENIX Security '24Fuzzing BusyBox: Leveraging LLM and Crash Reuse for Embedded Bug UnearthingYaroslav Oliinyk, Michael Scott, Ryan Tsang, Chongzhou Fang, Houman Homayoun
    USENIX Security '24Practical Data-Only Attack GenerationBrian Johannesmeyer, Asia Slowinska, Herbert Bos, Cristiano Giuffrida
    USENIX Security '24dp-promise: Differentially Private Diffusion Probabilistic Models for Image SynthesisHaichen Wang, Shuchao Pang, Zhigang Lu, Yihang Rao, Yongbin Zhou, Minhui Xue
    USENIX Security '24GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent PrefetchersBoru Chen, Yingchen Wang, Pradyumna Shome, Christopher Fletcher, David Kohlbrenner, Riccardo Paccagnella, Daniel Genkin
    USENIX Security '24SafeFetch: Practical Double-Fetch Protection with Kernel-Fetch CachingVictor Duta, Mitchel Josephus Aloserij, Cristiano Giuffrida
    USENIX Security '24SoK: The Good, The Bad, and The Unbalanced: Measuring Structural Limitations of Deepfake Media DatasetsSeth Layton, Tyler Tucker, Daniel Olszewski, Kevin Warren, Kevin Butler, Patrick Traynor
    USENIX Security '24SeaK: Rethinking the Design of a Secure Allocator for OS KernelZicheng Wang, Yicheng Guang, Yueqi Chen, Zhenpeng Lin, Michael Le, Dang K Le, Dan Williams, Xinyu Xing, Zhongshu Gu, Hani Jamjoom
    USENIX Security '24ABACuS: All-Bank Activation Counters for Scalable and Low Overhead RowHammer MitigationAtaberk Olgun, Yahya Can Tugrul, Nisa Bostanci, Ismail Emir Yuksel, Haocong Luo, Steve Rhyner, Abdullah Giray Yaglikci, Geraldo F. Oliveira, Onur Mutlu
    USENIX Security '24Automated Large-Scale Analysis of Cookie Notice ComplianceAhmed Bouhoula, Karel Kubicek, Amit Zac, Carlos Cotrini, David Basin
    USENIX Security '24WEBRR: A Forensic System for Replaying and Investigating Web-Based Attacks in The Modern WebJoey Allen, Zheng Yang, Feng Xiao, Matthew Landen, Roberto Perdisci, Wenke Lee
    USENIX Security '24Go Go Gadget Hammer: Flipping Nested Pointers for Arbitrary Data LeakageYoussef Tobah, Andrew Kwong, Ingab Kang, Daniel Genkin, Kang G. Shin
    USENIX Security '24Two Shuffles Make a RAM: Improved Constant Overhead Zero Knowledge RAMYibin Yang, David Heath
    USENIX Security '24Scalable Multi-Party Computation Protocols for Machine Learning in the Honest-Majority Setting

Pages