Search results

    USENIX Security '23Egg Hunt in Tesla Infotainment: A First Look at Reverse Engineering of Qt Binaries
    USENIX Security '23Learning Normality is Enough: A Software-based Mitigation against the Inaudible Voice Attacks
    USENIX Security '23FirmSolo: Enabling dynamic analysis of binary Linux-based IoT kernel modules
    USENIX Security '23Fairness Properties of Face Recognition and Obfuscation Systems
    USENIX Security '23POLICYCOMP: Counterpart Comparison of Privacy Policies Uncovers Overbroad Personal Data Collection Practices
    USENIX Security '23"All of them claim to be the best": Multi-perspective study of VPN users and VPN providers
    USENIX Security '23GlitchHiker: Uncovering Vulnerabilities of Image Signal Transmission with IEMI
    USENIX Security '23SMACK: Semantically Meaningful Adversarial Audio Attack
    USENIX Security '23Gradient Obfuscation Gives a False Sense of Security in Federated Learning
    USENIX Security '23Are Consumers Willing to Pay for Security and Privacy of IoT Devices?
    USENIX Security '23Beyond The Gates: An Empirical Analysis of HTTP-Managed Password Stealers and Operators
    USENIX Security '23Decompiling x86 Deep Neural Network Executables
    USENIX Security '23PolyFuzz: Holistic Greybox Fuzzing of Multi-Language Systems
    USENIX Security '23Linear Private Set Union from Multi-Query Reverse Private Membership Test
    USENIX Security '23Fuzztruction: Using Fault Injection-based Fuzzing to Leverage Implicit Domain Knowledge
    USENIX Security '23NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems
    USENIX Security '23A Research Framework and Initial Study of Browser Security for the Visually Impaired
    USENIX Security '23PUMM: Preventing Use-After-Free Using Execution Unit Partitioning
    USENIX Security '23UnGANable: Defending Against GAN-based Face Manipulation
    USENIX Security '23NeuroPots: Realtime Proactive Defense against Bit-Flip Attacks in Neural Networks
    USENIX Security '23Towards a General Video-based Keystroke Inference Attack
    USENIX Security '23URET: Universal Robustness Evaluation Toolkit (for Evasion)
    USENIX Security '23You Can't See Me: Physical Removal Attacks on LiDAR-based Autonomous Vehicles Driving Frameworks
    USENIX Security '23Improving Logging to Reduce Permission Over-Granting Mistakes
    USENIX Security '23PatchVerif: Discovering Faulty Patches in Robotic Vehicles