Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '24ZenHammer: Rowhammer Attacks on AMD Zen-based PlatformsPatrick Jattke, Max Wipfli, Flavien Solt, Michele Marazzi, Matej Bölcskei, Kaveh Razavi
    USENIX Security '24Practical Data-Only Attack GenerationBrian Johannesmeyer, Asia Slowinska, Herbert Bos, Cristiano Giuffrida
    USENIX Security '24dp-promise: Differentially Private Diffusion Probabilistic Models for Image SynthesisHaichen Wang, Shuchao Pang, Zhigang Lu, Yihang Rao, Yongbin Zhou, Minhui Xue
    USENIX Security '24GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent PrefetchersBoru Chen, Yingchen Wang, Pradyumna Shome, Christopher Fletcher, David Kohlbrenner, Riccardo Paccagnella, Daniel Genkin
    USENIX Security '24SafeFetch: Practical Double-Fetch Protection with Kernel-Fetch CachingVictor Duta, Mitchel Josephus Aloserij, Cristiano Giuffrida
    USENIX Security '24SoK: The Good, The Bad, and The Unbalanced: Measuring Structural Limitations of Deepfake Media DatasetsSeth Layton, Tyler Tucker, Daniel Olszewski, Kevin Warren, Kevin Butler, Patrick Traynor
    USENIX Security '24SeaK: Rethinking the Design of a Secure Allocator for OS KernelZicheng Wang, Yicheng Guang, Yueqi Chen, Zhenpeng Lin, Michael Le, Dang K Le, Dan Williams, Xinyu Xing, Zhongshu Gu, Hani Jamjoom
    USENIX Security '24DARKFLEECE: Probing the Dark Side of Android Subscription AppsChang Yue, Chen Zhong, Kai Chen, Zhiyu Zhang, Yeonjoon Lee
    USENIX Security '24Accelerating Secure Collaborative Machine Learning with Protocol-Aware RDMAZhenghang Ren, Mingxuan Fan, Zilong Wang, Junxue Zhang, Chaoliang Zeng, Zhicong Huang, Cheng Hong, Kai Chen
    USENIX Security '24Understanding How to Inform Blind and Low-Vision Users about Data Privacy through Privacy Question Answering AssistantsYuanyuan Feng, Abhilasha Ravichander, Yaxing Yao, Shikun Zhang, Rex Chen
    USENIX Security '24Scalable Multi-Party Computation Protocols for Machine Learning in the Honest-Majority Setting
    USENIX Security '24AutoFHE: Automated Adaption of CNNs for Efficient Evaluation over FHEWei Ao, Vishnu Naresh Boddeti
    USENIX Security '24SDFuzz: Target States Driven Directed FuzzingPenghui Li, Wei Meng, Chao Zhang
    USENIX Security '24FEASE: Fast and Expressive Asymmetric Searchable EncryptionLong Meng, Liqun Chen, Yangguang Tian, Mark Manulis, Suhui Liu
    USENIX Security '24Critical Code Guided Directed Greybox Fuzzing for CommitsYi Xiang, Xuhong Zhang, Peiyu Liu, Shouling Ji, Hong Liang, Jiacheng Xu, Wenhai Wang
    USENIX Security '24A Linear Reconstruction Approach for Attribute Inference Attacks against Synthetic DataMeenatchi Sundaram Muthu Selva Annamalai, Andrea Gadotti, Luc Rocher
    USENIX Security '24Fast and Private Inference of Deep Neural Networks by Co-designing Activation FunctionsAbdulrahman Diaa, Lucas Fenaux, Thomas Humphries, Marian Dietz, Faezeh Ebrahimianghazani, Bailey Kacsmar, Xinda Li, Nils Lukas, Rasoul Akhavan Mahdavi, Simon Oya, Ehsan Amjadian, Florian Kerschbaum
    USENIX Security '24Query Recovery from Easy to Hard: Jigsaw Attack against SSEHao Nie, Wei Wang, Peng Xu, Xianglong Zhang, Laurence T. Yang, Kaitai Liang
    USENIX Security '24CalcuLatency: Leveraging Cross-Layer Network Latency Measurements to Detect Proxy-Enabled AbuseReethika Ramesh, Philipp Winter, Sam Korman, Roya Ensafi
    USENIX Security '246Sense: Internet-Wide IPv6 Scanning and its Security ApplicationsGrant Williams, Mert Erdemir, Amanda Hsu, Shraddha Bhat, Abhishek Bhaskar, Frank Li, Paul Pearce
    USENIX Security '24Intellectual Property Exposure: Subverting and Securing Intellectual Property Encapsulation in Texas Instruments MicrocontrollersMarton Bognar, Cas Magnus, Frank Piessens, Jo Van Bulck
    USENIX Security '24An Interview Study on Third-Party Cyber Threat Hunting Processes in the U.S. Department of Homeland SecurityWilliam P. Maxam III, James C. Davis
    USENIX Security '24Inference of Error Specifications and Bug Detection Using Structural SimilaritiesNiels Dossche, Bart Coppens
    USENIX Security '24GFWeb: Measuring the Great Firewall's Web Censorship at ScaleNguyen Phong Hoang, Jakub Dalek, Masashi Crete-Nishihata, Nicolas Christin, Vinod Yegneswaran, Michalis Polychronakis, Nick Feamster
    USENIX Security '24I/O-Efficient Dynamic Searchable Encryption meets Forward & Backward PrivacyPriyanka Mondal, Javad Ghareh Chamani, Ioannis Demertzis, Dimitrios Papadopoulos

Pages