Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '23Did the Shark Eat the Watchdog in the NTP Pool? Deceiving the NTP Pool’s Monitoring SystemJonghoon Kwon, Jeonggyu Song, Junbeom Hur, Adrian Perrig
    USENIX Security '23Formal Analysis of SPDM: Security Protocol and Data Model version 1.2Cas Cremers, Alexander Dax, Aurora Naska
    USENIX Security '23V1SCAN: Discovering 1-day Vulnerabilities in Reused C/C++ Open-source Software Components Using Code Classification TechniquesSeunghoon Woo, Eunjin Choi, Heejo Lee, Hakjoo Oh
    USENIX Security '23BunnyHop: Exploiting the Instruction PrefetcherZhiyuan Zhang, Mingtian Tao, Sioli O'Connell, Chitchanok Chuengsatiansup, Daniel Genkin, Yuval Yarom
    USENIX Security '23DiffSmooth: Certifiably Robust Learning via Diffusion Models and Local SmoothingJiawei Zhang, Zhongzhu Chen, Huan Zhang, Chaowei Xiao, Bo Li
    USENIX Security '23ACon^2: Adaptive Conformal Consensus for Provable Blockchain OraclesSangdon Park, Osbert Bastani, Taesoo Kim
    USENIX Security '23Measuring Up to (Reasonable) Consumer Expectations: Providing an Empirical Basis for Holding IoT Manufacturers Legally ResponsibleLorenz Kustosch, Carlos Gañán, Mattis van 't Schip, Michel van Eeten, Simon Parkin
    USENIX Security '23A Data-free Backdoor Injection Approach in Neural NetworksPeizhuo Lv, Chang Yue, Ruigang Liang, Yunfei Yang, Shengzhi Zhang, Hualong Ma, Kai Chen
    USENIX Security '23HECO: Fully Homomorphic Encryption CompilerAlexander Viand, Patrick Jattke, Miro Haller, Anwar Hithnawi
    USENIX Security '23Automated Exploitable Heap Layout Generation for Heap Overflows Through Manipulation Distance-Guided FuzzingBin Zhang, Jiongyi Chen, Runhao Li, Chao Feng, Ruilin Li, Chaojing Tang
    USENIX Security '23Attacks are Forwarded: Breaking the Isolation of MicroVM-based Containers Through Operation ForwardingJietao Xiao, Nanzi Yang, Wenbo Shen, Jinku Li, Xin Guo, Zhiqiang Dong, Fei Xie, Jianfeng Ma
    USENIX Security '23NAUTILUS: Automated RESTful API Vulnerability DetectionGelei Deng, Zhiyi Zhang, Yuekang Li, Yi Liu, Tianwei Zhang, Yang Liu, Guo Yu, Dongjin Wang
    USENIX Security '23An Input-Agnostic Hierarchical Deep Learning Framework for Traffic FingerprintingJian Qu, Xiaobo Ma, Jianfeng Li, Xiapu Luo, Lei Xue, Junjie Zhang, Zhenhua Li, Li Feng, Xiaohong Guan
    USENIX Security '23Pass2Edit: A Multi-Step Generative Model for Guessing Edited PasswordsDing Wang, Yunkai Zou, Yuan-An Xiao, Siqi Ma, Xiaofeng Chen
    USENIX Security '23PROVIDENCE: a Flexible Round-by-Round Risk-Limiting AuditOliver Broadrick, Poorvi Vora, Filip Zagórski
    USENIX Security '23Cipherfix: Mitigating Ciphertext Side-Channel Attacks in SoftwareJan Wichelmann, Anna Pätschke, Luca Wilke, Thomas Eisenbarth
    USENIX Security '23Subverting Website Fingerprinting Defenses with Robust Traffic RepresentationMeng Shen, Kexin Ji, Zhenbo Gao, Qi Li, Liehuang Zhu, Ke Xu
    USENIX Security '23User Awareness and Behaviors Concerning Encrypted DNS Settings in Web BrowsersAlexandra Nisenoff, Ranya Sharma, Nick Feamster
    USENIX Security '23It's all in your head(set): Side-channel attacks on AR/VR systemsYicheng Zhang, Carter Slocum, Jiasi Chen, Nael Abu-Ghazaleh
    USENIX Security '23Work-From-Home and COVID-19: Trajectories of Endpoint Security Management in a Security Operations CenterKailani R. Jones, Dalton A. Brucker-Hahn, Bradley Fidler, Alexandru G. Bardas
    USENIX Security '23Adversarial Training for Raw-Binary Malware ClassifiersKeane Lucas, Samruddhi Pai, Weiran Lin, Lujo Bauer, Michael K. Reiter, Mahmood Sharif
    USENIX Security '23ELASM: Error-Latency-Aware Scale Management for Fully Homomorphic EncryptionYongwoo Lee, Seonyoung Cheon, Dongkwan Kim, Dongyoon Lee, Hanjun Kim
    USENIX Security '23Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal AbuseSophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Danny Yuxing Huang, Rahul Chatterjee
    USENIX Security '23Trojan Source: Invisible VulnerabilitiesNicholas Boucher, Ross Anderson
    USENIX Security '23ProSpeCT: Provably Secure Speculation for the Constant-Time PolicyLesly-Ann Daniel, Marton Bognar, Job Noorman, Sébastien Bardin, Tamara Rezk, Frank Piessens

Pages