Search results

    USENIX Security '23Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-MXhani Marvin Saß, Richard Mitev, Ahmad-Reza Sadeghi
    USENIX Security '23No Single Silver Bullet: Measuring the Accuracy of Password Strength MetersDing Wang, Xuan Shan, Qiying Dong, Yaosheng Shen, Chunfu Jia
    USENIX Security '23Place Your Locks Well: Understanding and Detecting Lock Misuse BugsYuandao Cai, Peisen Yao, Chengfeng Ye, Charles Zhang
    USENIX Security '23Three Lessons From Threema: Analysis of a Secure MessengerKenneth G. Paterson, Matteo Scarlata, Kien Tuong Truong
    USENIX Security '23One Size Does not Fit All: Quantifying the Risk of Malicious App Encounters for Different Android User ProfilesSavino Dambra, Leyla Bilge, Platon Kotzias, Yun Shen, Juan Caballero
    USENIX Security '23“Security is not my field, I’m a stats guy”: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in IndustryJaron Mink, Harjot Kaur, Juliane Schmüser, Sascha Fahl, Yasemin Acar
    USENIX Security '23BoKASAN: Binary-only Kernel Address Sanitizer for Effective Kernel FuzzingMingi Cho, Dohyeon An, Hoyong Jin, Taekyoung Kwon
    USENIX Security '23The Blockchain Imitation GameKaihua Qin, Stefanos Chaliasos, Liyi Zhou, Benjamin Livshits, Dawn Song, Arthur Gervais
    USENIX Security '23We Really Need to Talk About Session Tickets: A Large-Scale Analysis of Cryptographic Dangers with TLS Session TicketsSven Hebrok, Simon Nachtigall, Marcel Maehren, Nurullah Erinola, Robert Merget, Juraj Somorovsky, Jörg Schwenk
    USENIX Security '23Duoram: A Bandwidth-Efficient Distributed ORAM for 2- and 3-Party ComputationAdithya Vadapalli, Ryan Henry, Ian Goldberg
    USENIX Security '23Diving into Robocall Content with SnorCallSathvik Prasad, Trevor Dunlap, Alexander Ross, Bradley Reaves
    USENIX Security '23Detecting Multi-Step IAM Attacks in AWS Environments via Model CheckingIlia Shevrin, Oded Margalit
    USENIX Security '23Lost at C: A User Study on the Security Implications of Large Language Model Code AssistantsGustavo Sandoval, Hammond Pearce, Teo Nys, Ramesh Karri, Siddharth Garg, Brendan Dolan-Gavitt
    USENIX Security '23ARGUS: Context-Based Detection of Stealthy IoT Infiltration AttacksPhillip Rieger, Marco Chilese, Reham Mohamed, Markus Miettinen, Hossein Fereidooni, Ahmad-Reza Sadeghi
    USENIX Security '23How to Cover up Anomalous Accesses to Electronic Health RecordsXiaojun Xu, Qingying Hao, Zhuolin Yang, Bo Li, David Liebovitz, Gang Wang, Carl A. Gunter
    USENIX Security '23TreeSync: Authenticated Group Management for Messaging Layer SecurityThéophile Wallez, Jonathan Protzenko, Benjamin Beurdouche, Karthikeyan Bhargavan
    USENIX Security '23Network Responses to Russia's Invasion of Ukraine in 2022: A Cautionary Tale for Internet FreedomReethika Ramesh, Ram Sundara Raman, Apurva Virkud, Alexandra Dirksen, Armin Huremagic, David Fifield, Dirk Rodenburg, Rod Hynes, Doug Madory, Roya Ensafi
    USENIX Security '23ZBCAN: A Zero-Byte CAN Defense SystemKhaled Serag, Rohit Bhatia, Akram Faqih, Muslum Ozgur Ozmen, Vireshwar Kumar, Z. Berkay Celik, Dongyan Xu
    USENIX Security '23Know Your Cybercriminal: Evaluating Attacker Preferences by Measuring Profile Sales on an Active, Leading Criminal Market for User Impersonation at ScaleMichele Campobasso, Luca Allodi
    USENIX Security '23Formal Analysis of Session-Handling in Secure Messaging: Lifting Security from Sessions to ConversationsCas Cremers, Charlie Jacomme, Aurora Naska
    USENIX Security '23HOLMES: Efficient Distribution Testing for Secure Collaborative LearningIan Chang, Katerina Sotiraki, Weikeng Chen, Murat Kantarcioglu, Raluca Popa
    USENIX Security '23MobileAtlas: Geographically Decoupled Measurements in Cellular Networks for Security and Privacy ResearchGabriel K. Gegenhuber, Wilfried Mayer, Edgar Weippl, Adrian Dabrowski
    USENIX Security '23Don’t be Dense: Efficient Keyword PIR for Sparse DatabasesSarvar Patel, Joon Young Seo, Kevin Yeo
    USENIX Security '23Proxy Hunting: Understanding and Characterizing Proxy-based Upgradeable Smart Contracts in BlockchainsWilliam E Bodell III, Sajad Meisami, Yue Duan
    USENIX Security '23Fine-grained Poisoning Attack to Local Differential Privacy Protocols for Mean and Variance EstimationXiaoguang Li, Ninghui Li, Wenhai Sun, Neil Zhenqiang Gong, Hui Li