Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '23FuzzJIT: Oracle-Enhanced Fuzzing for JavaScript Engine JIT CompilerJunjie Wang, Zhiyi Zhang, Shuang Liu, Xiaoning Du, Junjie Chen
    USENIX Security '23TPatch: A Triggered Physical Adversarial PatchWenjun Zhu, Xiaoyu Ji, Yushi Cheng, Shibo Zhang, Wenyuan Xu
    USENIX Security '23TAP: Transparent and Privacy-Preserving Data ServicesDaniel Reijsbergen, Aung Maw, Zheng Yang, Tien Tuan Anh Dinh, Jianying Zhou
    USENIX Security '23UnGANable: Defending Against GAN-based Face ManipulationZheng Li, Ning Yu, Ahmed Salem, Michael Backes, Mario Fritz, Yang Zhang
    USENIX Security '23Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine LearningJonathan Prokos, Neil Fendley, Matthew Green, Roei Schuster, Eran Tromer, Tushar Jois, Yinzhi Cao
    USENIX Security '23"All of them claim to be the best": Multi-perspective study of VPN users and VPN providersReethika Ramesh, Anjali Vyas, Roya Ensafi
    USENIX Security '23GlitchHiker: Uncovering Vulnerabilities of Image Signal Transmission with IEMIQinhong Jiang, Xiaoyu Ji, Chen Yan, Zhixin Xie, Haina Lou, Wenyuan Xu
    USENIX Security '23Device Tracking via Linux’s New TCP Source Port Selection AlgorithmMoshe Kol, Amit Klein, Yossi Gilad
    USENIX Security '23The Writing on the Wall and 3D Digital Twins: Personal Information in (not so) Private Real EstateRachel McAmis, Tadayoshi Kohno
    USENIX Security '23PrivTrace: Differentially Private Trajectory Synthesis by Adaptive Markov ModelsHaiming Wang, Zhikun Zhang, Tianhao Wang, Shibo He, Michael Backes, Jiming Chen, Yang Zhang
    USENIX Security '23Egg Hunt in Tesla Infotainment: A First Look at Reverse Engineering of Qt BinariesHaohuang Wen, Zhiqiang Lin
    USENIX Security '23Learning Normality is Enough: A Software-based Mitigation against Inaudible Voice AttacksXinfeng Li, Xiaoyu Ji, Chen Yan, Chaohao Li, Yichen Li, Zhenning Zhang, Wenyuan Xu
    USENIX Security '23FirmSolo: Enabling dynamic analysis of binary Linux-based IoT kernel modulesIoannis Angelakopoulos, Gianluca Stringhini, Manuel Egele
    USENIX Security '22Membership Inference Attacks and Defenses in Neural Network PruningXiaoyong Yuan, Lan Zhang
    USENIX Security '22Efficient Differentially Private Secure Aggregation for Federated Learning via Hardness of Learning with ErrorsTimothy Stevens, Christian Skalka, Christelle Vincent, John Ring, Samuel Clark, Joseph Near
    USENIX Security '22OpenVPN is Open to VPN FingerprintingDiwen Xue, Reethika Ramesh, Arham Jain, Michalis Kallitsis, J. Alex Halderman, Jedidiah R. Crandall, Roya Ensafi
    USENIX Security '22Backporting Security Patches of Web Applications: A Prototype Design and Implementation on Injection Vulnerability PatchesYoukun Shi, Yuan Zhang, Tianhan Luo, Xiangyu Mao, Yinzhi Cao, Ziwen Wang, Yudi Zhao, Zongan Huang, Min Yang
    USENIX Security '22MaDIoT 2.0: Modern High-Wattage IoT Botnet Attacks and DefensesTohid Shekari, Alvaro A. Cardenas, Raheem Beyah
    USENIX Security '22Physical-Layer Attacks Against Pulse Width Modulation-Controlled ActuatorsGökçen Yılmaz Dayanıklı, Sourav Sinha, Devaprakash Muniraj, Ryan M. Gerdes, Mazen Farhood, Mani Mina
    USENIX Security '22Who Are You (I Really Wanna Know)? Detecting Audio DeepFakes Through Vocal Tract ReconstructionLogan Blue, Kevin Warren, Hadi Abdullah, Cassidy Gibson, Luis Vargas, Jessica O'Dell, Kevin Butler, Patrick Traynor
    USENIX Security '22Shuffle-based Private Set Union: Faster and More SecureYanxue Jia, Shi-Feng Sun, Hong-Sheng Zhou, Jiajun Du, Dawu Gu
    USENIX Security '22Pacer: Comprehensive Network Side-Channel Mitigation in the CloudAastha Mehta, Mohamed Alzayat, Roberta De Viti, Björn B. Brandenburg, Peter Druschel, Deepak Garg
    USENIX Security '22Zero-Knowledge MiddleboxesPaul Grubbs, Arasu Arun, Ye Zhang, Joseph Bonneau, Michael Walfish
    USENIX Security '22TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable VulnerabilitiesRahul Kande, Addison Crump, Garrett Persyn, Patrick Jauernig, Ahmad-Reza Sadeghi, Aakash Tyagi, Jeyavijayan Rajendran
    USENIX Security '22Private SignalingVarun Madathil, Alessandra Scafuro, István András Seres, Omer Shlomovits, Denis Varlakov

Pages