Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '24Automated Large-Scale Analysis of Cookie Notice ComplianceAhmed Bouhoula, Karel Kubicek, Amit Zac, Carlos Cotrini, David Basin
    USENIX Security '24You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise NetworksRafael Uetz, Marco Herzog, Louis Hackländer, Simon Schwarz, Martin Henze
    USENIX Security '24Can Virtual Reality Protect Users from Keystroke Inference Attacks?Zhuolin Yang, Zain Sarwar, Iris Hwang, Ronik Bhaskar, Ben Y. Zhao, Haitao Zheng
    USENIX Security '24Neural Network Semantic Backdoor Detection and Mitigation: A Causality-Based ApproachBing Sun, Jun Sun, Wayne Koh, Jie Shi
    USENIX Security '24Finding Traceability Attacks in the Bluetooth Low Energy Specification and Its ImplementationsJianliang Wu, Patrick Traynor, Dongyan Xu, Dave (Jing) Tian, Antonio Bianchi
    USENIX Security '24Devil in the Room: Triggering Audio Backdoors in the Physical WorldMeng Chen, Xiangyu Xu, Li Lu, Zhongjie Ba, Feng Lin, Kui Ren
    USENIX Security '24Atropos: Effective Fuzzing of Web Applications for Server-Side VulnerabilitiesEmre Güler, Sergej Schumilo, Moritz Schloegel, Nils Bars, Philipp Görz, Xinyi Xu, Cemal Kaygusuz, Thorsten Holz
    USENIX Security '24FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker RecognitionKun Wang, Xiangyu Xu, Li Lu, Zhongjie Ba, Feng Lin, Kui Ren
    USENIX Security '24Dancer in the Dark: Synthesizing and Evaluating Polyglots for Blind Cross-Site ScriptingRobin Kirchner, Jonas Möller, Marius Musch, David Klein, Konrad Rieck, Martin Johns
    USENIX Security '24ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response FuzzingQifan Zhang, Xuesong Bai, Xiang Li, Haixin Duan, Qi Li, Zhou Li
    USENIX Security '24Ahoy SAILR! There is No Need to DREAM of C: A Compiler-Aware Structuring Algorithm for Binary DecompilationZion Leonahenahe Basque, Ati Priya Bajaj, Wil Gibbs, Jude O'Kain, Derron Miao, Tiffany Bao, Adam Doupé, Yan Shoshitaishvili, Ruoyu Wang
    USENIX Security '24Racing on the Negative Force: Efficient Vulnerability Root-Cause Analysis through Reinforcement Learning on CounterexamplesDandan Xu, Di Tang, Yi Chen, XiaoFeng Wang, Kai Chen, Haixu Tang, Longxing Li
    USENIX Security '24WEBRR: A Forensic System for Replaying and Investigating Web-Based Attacks in The Modern WebJoey Allen, Zheng Yang, Feng Xiao, Matthew Landen, Roberto Perdisci, Wenke Lee
    USENIX Security '24Unleashing the Power of Type-Based Call Graph Construction by Using Regional Pointer InformationYuandao Cai, Yibo Jin, Charles Zhang
    USENIX Security '24The Effect of Design Patterns on (Present and Future) Cookie Consent DecisionsNataliia Bielova, Laura Litvine, Anysia Nguyen, Mariam Chammat, Vincent Toubiana, Estelle Hary
    USENIX Security '24RECORD: A RECeption-Only Region Determination Attack on LEO Satellite UsersEric Jedermann, Martin Strohmeier, Vincent Lenders, Jens Schmitt
    USENIX Security '24A Taxonomy of C Decompiler Fidelity IssuesLuke Dramko, Jeremy Lacomis, Edward J. Schwartz, Bogdan Vasilescu, Claire Le Goues
    USENIX Security '24CAMP: Compiler and Allocator-based Heap Memory ProtectionZhenpeng Lin, Zheng Yu, Ziyi Guo, Simone Campanoni, Peter Dinda, Xinyu Xing
    USENIX Security '24"Belt and suspenders" or "just red tape"?: Investigating Early Artifacts and User Perceptions of IoT App Security CertificationPrianka Mandal, Amit Seal Ami, Victor Olaiya, Sayyed Hadi Razmjo, Adwait Nadkarni
    USENIX Security '24Go Go Gadget Hammer: Flipping Nested Pointers for Arbitrary Data LeakageYoussef Tobah, Andrew Kwong, Ingab Kang, Daniel Genkin, Kang G. Shin
    USENIX Security '24FFXE: Dynamic Control Flow Graph Recovery for Embedded Firmware BinariesRyan Tsang, Doreen Joseph, Soheil Salehi, Prasant Mohapatra, Houman Homayoun
    USENIX Security '24Your Firmware Has Arrived: A Study of Firmware Update VulnerabilitiesYuhao Wu, Jinwen Wang, Yujie Wang, Shixuan Zhai, Zihan Li, Yi He, Kun Sun, Qi Li, Ning Zhang
    USENIX Security '24Opportunistic Data Flow Integrity for Real-time Cyber-physical Systems Using Worst Case Execution Time ReservationYujie Wang, Ao Li, Jinwen Wang, Sanjoy Baruah, Ning Zhang
    USENIX Security '24MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation LearningZian Jia, Yun Xiong, Yuhong Nan, Yao Zhang, Jinjing Zhao, Mi Wen
    USENIX Security '24Security and Privacy Analysis of Samsung's Crowd-Sourced Bluetooth Location Tracking SystemTingfeng Yu, James Henderson, Alwen Tiu, Thomas Haines

Pages