Search results

    USENIX Security '23Towards a General Video-based Keystroke Inference AttackZhuolin Yang, Yuxin Chen, Zain Sarwar, Hadleigh Schwartz, Ben Y. Zhao, Haitao Zheng
    USENIX Security '23URET: Universal Robustness Evaluation Toolkit (for Evasion)Kevin Eykholt, Taesung Lee, Douglas Schales, Jiyong Jang, Ian Molloy
    USENIX Security '23You Can't See Me: Physical Removal Attacks on LiDAR-based Autonomous Vehicles Driving FrameworksYulong Cao, S. Hrushikesh Bhupathiraju, Pirouz Naghavi, Takeshi Sugawara, Z. Morley Mao, Sara Rampazzi
    USENIX Security '23SMACK: Semantically Meaningful Adversarial Audio AttackZhiyuan Yu, Yuanhaur Chang, Ning Zhang, Chaowei Xiao
    USENIX Security '23Gradient Obfuscation Gives a False Sense of Security in Federated LearningKai Yue, Richeng Jin, Chau-Wai Wong, Dror Baron, Huaiyu Dai
    USENIX Security '23Are Consumers Willing to Pay for Security and Privacy of IoT Devices?Pardis Emami-Naeini, Janarth Dheenadhayalan, Yuvraj Agarwal, Lorrie Faith Cranor
    USENIX Security '23PhyAuth: Physical-Layer Message Authentication for ZigBee NetworksAng Li, Jiawei Li, Dianqi Han, Yan Zhang, Tao Li, Ting Zhu, Yanchao Zhang
    USENIX Security '23Fairness Properties of Face Recognition and Obfuscation SystemsHarrison Rosenberg, Brian Tang, Kassem Fawaz, Somesh Jha
    USENIX Security '23Beyond The Gates: An Empirical Analysis of HTTP-Managed Password Stealers and OperatorsAthanasios Avgetidis, Omar Alrawi, Kevin Valakuzhy, Charles Lever, Paul Burbage, Angelos D. Keromytis, Fabian Monrose, Manos Antonakakis
    USENIX Security '23Decompiling x86 Deep Neural Network ExecutablesZhibo Liu, Yuanyuan Yuan, Shuai Wang, Xiaofei Xie, Lei Ma
    USENIX Security '23PolyFuzz: Holistic Greybox Fuzzing of Multi-Language SystemsWen Li, Jinyang Ruan, Guangbei Yi, Long Cheng, Xiapu Luo, Haipeng Cai
    USENIX Security '23Linear Private Set Union from Multi-Query Reverse Private Membership TestCong Zhang, Yu Chen, Weiran Liu, Min Zhang, Dongdai Lin
    USENIX Security '23An Efficient Design of Intelligent Network Data PlaneGuangmeng Zhou, Zhuotao Liu, Chuanpu Fu, Qi Li, Ke Xu
    USENIX Security '23AIFORE: Smart Fuzzing Based on Automatic Input Format Reverse EngineeringJi Shi, Zhun Wang, Zhiyao Feng, Yang Lan, Shisong Qin, Wei You, Wei Zou, Mathias Payer, Chao Zhang
    USENIX Security '23Inducing Authentication Failures to Bypass Credit Card PINsDavid Basin, Patrick Schaller, Jorge Toro-Pozo
    USENIX Security '23Silent Spring: Prototype Pollution Leads to Remote Code Execution in Node.jsMikhail Shcherbakov, Musard Balliu, Cristian-Alexandru Staicu
    USENIX Security '23Reassembly is Hard: A Reflection on Challenges and StrategiesHyungseok Kim, Soomin Kim, Junoh Lee, Kangkook Jee, Sang Kil Cha
    USENIX Security '23PCAT: Functionality and Data Stealing from Split Learning by Pseudo-Client AttackXinben Gao, Lan Zhang
    USENIX Security '23VulChecker: Graph-based Vulnerability Localization in Source CodeYisroel Mirsky, George Macon, Michael Brown, Carter Yagemann, Matthew Pruett, Evan Downing, Sukarno Mertoguno, Wenke Lee
    USENIX Security '23Examining Consumer Reviews to Understand Security and Privacy Issues in the Market of Smart Home DevicesSwaathi Vetrivel, Veerle van Harten, Carlos H. Gañán, Michel van Eeten, Simon Parkin
    USENIX Security '23Isolated and Exhausted: Attacking Operating Systems via Site Isolation in the BrowserMatthias Gierlings, Marcus Brinkmann, Jörg Schwenk
    USENIX Security '23Internet Service Providers' and Individuals' Attitudes, Barriers, and Incentives to Secure IoTNissy Sombatruang, Tristan Caulfield, Ingolf Becker, Akira Fujita, Takahiro Kasama, Koji Nakao, Daisuke Inoue
    USENIX Security '23Framing Frames: Bypassing Wi-Fi Encryption by Manipulating Transmit QueuesDomien Schepers, Aanjhan Ranganathan, Mathy Vanhoef
    USENIX Security '23Improving Logging to Reduce Permission Over-Granting MistakesBingyu Shen, Tianyi Shan, Yuanyuan Zhou
    USENIX Security '23V-Cloak: Intelligibility-, Naturalness- & Timbre-Preserving Real-Time Voice AnonymizationJiangyi Deng, Fei Teng, Yanjiao Chen, Xiaofu Chen, Zhaohui Wang, Wenyuan Xu