Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '23Exorcising "Wraith": Protecting LiDAR-based Object Detector in Automated Driving System from Appearing AttacksQifan Xiao, Xudong Pan, Yifan Lu, Mi Zhang, Jiarun Dai, Min Yang
    USENIX Security '23GAP: Differentially Private Graph Neural Networks with Aggregation PerturbationSina Sajadmanesh, Ali Shahin Shamsabadi, Aurélien Bellet, Daniel Gatica-Perez
    USENIX Security '23SandDriller: A Fully-Automated Approach for Testing Language-Based JavaScript SandboxesAbdullah AlHamdan, Cristian-Alexandru Staicu
    USENIX Security '23Catch You and I Can: Revealing Source Voiceprint Against Voice ConversionJiangyi Deng, Yanjiao Chen, Yinan Zhong, Qianhao Miao, Xueluan Gong, Wenyuan Xu
    USENIX Security '23How the Great Firewall of China Detects and Blocks Fully Encrypted TrafficMingshi Wu, Jackson Sippe, Danesh Sivakumar, Jack Burg, Peter Anderson, Xiaokang Wang, Kevin Bock, Amir Houmansadr, Dave Levin, Eric Wustrow
    USENIX Security '23Pool-Party: Exploiting Browser Resource Pools for Web TrackingPeter Snyder, Soroush Karami, Arthur Edelstein, Benjamin Livshits, Hamed Haddadi
    USENIX Security '23The Role of Professional Product Reviewers in Evaluating Security and PrivacyWentao Guo, Jason Walter, Michelle L. Mazurek
    USENIX Security '23Near-Ultrasound Inaudible Trojan (Nuit): Exploiting Your Speaker to Attack Your MicrophoneQi Xia, Qian Chen, Shouhuai Xu
    USENIX Security '23Bilingual Problems: Studying the Security Risks Incurred by Native Extensions in Scripting LanguagesCristian-Alexandru Staicu, Sazzadur Rahaman, Ágnes Kiss, Michael Backes
    USENIX Security '23Ultimate SLH: Taking Speculative Load Hardening to the Next LevelZhiyuan Zhang, Gilles Barthe, Chitchanok Chuengsatiansup, Peter Schwabe, Yuval Yarom
    USENIX Security '23Intender: Fuzzing Intent-Based Networking with Intent-State Transition GuidanceJiwon Kim, Benjamin E. Ujcich, Dave (Jing) Tian
    USENIX Security '23Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-MXhani Marvin Saß, Richard Mitev, Ahmad-Reza Sadeghi
    USENIX Security '23No Single Silver Bullet: Measuring the Accuracy of Password Strength MetersDing Wang, Xuan Shan, Qiying Dong, Yaosheng Shen, Chunfu Jia
    USENIX Security '23Place Your Locks Well: Understanding and Detecting Lock Misuse BugsYuandao Cai, Peisen Yao, Chengfeng Ye, Charles Zhang
    USENIX Security '23Three Lessons From Threema: Analysis of a Secure MessengerKenneth G. Paterson, Matteo Scarlata, Kien Tuong Truong
    USENIX Security '23One Size Does not Fit All: Quantifying the Risk of Malicious App Encounters for Different Android User ProfilesSavino Dambra, Leyla Bilge, Platon Kotzias, Yun Shen, Juan Caballero
    USENIX Security '23“Security is not my field, I’m a stats guy”: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in IndustryJaron Mink, Harjot Kaur, Juliane Schmüser, Sascha Fahl, Yasemin Acar
    USENIX Security '23BoKASAN: Binary-only Kernel Address Sanitizer for Effective Kernel FuzzingMingi Cho, Dohyeon An, Hoyong Jin, Taekyoung Kwon
    USENIX Security '23The Blockchain Imitation GameKaihua Qin, Stefanos Chaliasos, Liyi Zhou, Benjamin Livshits, Dawn Song, Arthur Gervais
    USENIX Security '23Duoram: A Bandwidth-Efficient Distributed ORAM for 2- and 3-Party ComputationAdithya Vadapalli, Ryan Henry, Ian Goldberg
    USENIX Security '23Diving into Robocall Content with SnorCallSathvik Prasad, Trevor Dunlap, Alexander Ross, Bradley Reaves
    USENIX Security '23Detecting Multi-Step IAM Attacks in AWS Environments via Model CheckingIlia Shevrin, Oded Margalit
    USENIX Security '23Lost at C: A User Study on the Security Implications of Large Language Model Code AssistantsGustavo Sandoval, Hammond Pearce, Teo Nys, Ramesh Karri, Siddharth Garg, Brendan Dolan-Gavitt
    USENIX Security '23ARGUS: Context-Based Detection of Stealthy IoT Infiltration AttacksPhillip Rieger, Marco Chilese, Reham Mohamed, Markus Miettinen, Hossein Fereidooni, Ahmad-Reza Sadeghi
    USENIX Security '23How to Cover up Anomalous Accesses to Electronic Health RecordsXiaojun Xu, Qingying Hao, Zhuolin Yang, Bo Li, David Liebovitz, Gang Wang, Carl A. Gunter

Pages