Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '23Don’t be Dense: Efficient Keyword PIR for Sparse DatabasesSarvar Patel, Joon Young Seo, Kevin Yeo
    USENIX Security '23Proxy Hunting: Understanding and Characterizing Proxy-based Upgradeable Smart Contracts in BlockchainsWilliam E Bodell III, Sajad Meisami, Yue Duan
    USENIX Security '23Fine-grained Poisoning Attack to Local Differential Privacy Protocols for Mean and Variance EstimationXiaoguang Li, Ninghui Li, Wenhai Sun, Neil Zhenqiang Gong, Hui Li
    USENIX Security '23PrivateFL: Accurate, Differentially Private Federated Learning via Personalized Data TransformationYuchen Yang, Bo Hui, Haolin Yuan, Neil Gong, Yinzhi Cao
    USENIX Security '23Controlled Data Races in Enclaves: Attacks and DetectionSanchuan Chen, Zhiqiang Lin, Yinqian Zhang
    USENIX Security '23BalanceProofs: Maintainable Vector Commitments with Fast AggregationWeijie Wang, Annie Ulichney, Charalampos Papamanthou
    USENIX Security '23autofz: Automated Fuzzer Composition at RuntimeYu-Fu Fu, Jaehyuk Lee, Taesoo Kim
    USENIX Security '23ICSPatch: Automated Vulnerability Localization and Non-Intrusive Hotpatching in Industrial Control Systems using Data Dependence GraphsPrashant Hari Narayan Rajput, Constantine Doumanidis, Michail Maniatakos
    USENIX Security '23VeriZexe: Decentralized Private Computation with Universal SetupAlex Luoyuan Xiong, Binyi Chen, Zhenfei Zhang, Benedikt Bünz, Ben Fisch, Fernando Krell, Philippe Camacho
    USENIX Security '23MTSan: A Feasible and Practical Memory Sanitizer for Fuzzing COTS BinariesXingman Chen, Yinghao Shi, Zheyu Jiang, Yuan Li, Ruoyu Wang, Haixin Duan, Haoyu Wang, Chao Zhang
    USENIX Security '23Lessons Lost: Incident Response in the Age of Cyber Insurance and Breach AttorneysDaniel W. Woods, Rainer Böhme, Josephine Wolff, Daniel Schwarcz
    USENIX Security '23NRDelegationAttack: Complexity DDoS attack on DNS Recursive ResolversYehuda Afek, Anat Bremler-Barr, Shani Stajnrod
    USENIX Security '23Jinn: Hijacking Safe Programs with TrojansKomail Dharsee, John Criswell
    USENIX Security '23Hiding in Plain Sight: An Empirical Study of Web Application Abuse in MalwareMingxuan Yao, Jonathan Fuller, Ranjita Pai Kasturi, Saumya Agarwal, Amit Kumar Sikder, Brendan Saltaformaggio
    USENIX Security '23CSHER: A System for Compact Storage with HE-RetrievalAdi Akavia, Neta Oren, Boaz Sapir, Margarita Vald
    USENIX Security '23The Case for Learned Provenance Graph Storage SystemsHailun Ding, Juan Zhai, Dong Deng, Shiqing Ma
    USENIX Security '23Understand Users' Privacy Perception and Decision of V2X Communication in Connected Autonomous VehiclesZekun Cai, Aiping Xiong
    USENIX Security '23Long Live The Honey Badger: Robust Asynchronous DPSS and its ApplicationsThomas Yurek, Zhuolun Xiang, Yu Xia, Andrew Miller
    USENIX Security '23Automated Cookie Notice Analysis and EnforcementRishabh Khandelwal, Asmit Nayak, Hamza Harkous, Kassem Fawaz
    USENIX Security '23Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy LabelsYue Xiao, Zhengyi Li, Yue Qin, Xiaolong Bai, Jiale Guan, Xiaojing Liao, Luyi Xing
    USENIX Security '23High Recovery with Fewer Injections: Practical Binary Volumetric Injection Attacks against Dynamic Searchable EncryptionXianglong Zhang, Wei Wang, Peng Xu, Laurence T. Yang, Kaitai Liang
    USENIX Security '23Improving Real-world Password Guessing Attacks via Bi-directional TransformersMing Xu, Jitao Yu, Xinyi Zhang, Chuanwang Wang, Shenghao Zhang, Haoqi Wu, Weili Han
    USENIX Security '23KextFuzz: Fuzzing macOS Kernel EXTensions on Apple Silicon via Exploiting MitigationsTingting Yin, Zicong Gao, Zhenghang Xiao, Zheyu Ma, Min Zheng, Chao Zhang
    USENIX Security '23Forming Faster Firmware Fuzzers
    USENIX Security '23AURC: Detecting Errors in Program Code and DocumentationPeiwei Hu, Ruigang Liang, Ying Cao, Kai Chen, Runze Zhang

    Pages