Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '23Formal Analysis and Patching of BLE-SC PairingMin Shi, Jing Chen, Kun He, Haoran Zhao, Meng Jia, Ruiying Du
    USENIX Security '23Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal AbuseSophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Danny Yuxing Huang, Rahul Chatterjee
    USENIX Security '23CarpetFuzz: Automatic Program Option Constraint Extraction from Documentation for FuzzingDawei Wang, Ying Li, Zhiyu Zhang, Kai Chen
    USENIX Security '23No Single Silver Bullet: Measuring the Accuracy of Password Strength MetersDing Wang, Xuan Shan, Qiying Dong, Yaosheng Shen, Chunfu Jia
    USENIX Security '23Pass2Edit: A Multi-Step Generative Model for Guessing Edited PasswordsDing Wang, Yunkai Zou, Yuan-An Xiao, Siqi Ma, Xiaofeng Chen
    USENIX Security '23Password Guessing Using Random ForestDing Wang, Yunkai Zou, Zijian Zhang, Kedong Xiu
    USENIX Security '23FuzzJIT: Oracle-Enhanced Fuzzing for JavaScript Engine JIT CompilerJunjie Wang, Zhiyi Zhang, Shuang Liu, Xiaoning Du, Junjie Chen
    USENIX Security '23Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic AugmentationRenjie Xie, Jiahao Cao, Enhuan Dong, Mingwei Xu, Kun Sun, Qi Li, Licheng Shen, Menghao Zhang
    USENIX Security '23MorFuzz: Fuzzing Processor via Runtime Instruction Morphing enhanced Synchronizable Co-simulationJinyan Xu, Yiyuan Liu, Sirui He, Haoran Lin, Yajin Zhou, Cong Wang
    USENIX Security '23PUMM: Preventing Use-After-Free Using Execution Unit PartitioningCarter Yagemann, Simon P. Chung, Brendan Saltaformaggio, Wenke Lee
    USENIX Security '23Rethinking White-Box Watermarks on Deep Learning Models under Neural Structural ObfuscationYifan Yan, Xudong Pan, Mi Zhang, Min Yang
    USENIX Security '23InfinityGauntlet: Expose Smartphone Fingerprint Authentication to Brute-force AttackYu Chen, Yang Yu, Lidong Zhai
    USENIX Security '23Internet Service Providers' and Individuals' Attitudes, Barriers, and Incentives to Secure IoTNissy Sombatruang, Tristan Caulfield, Ingolf Becker, Akira Fujita, Takahiro Kasama, Koji Nakao, Daisuke Inoue
    USENIX Security '23TreeSync: Authenticated Group Management for Messaging Layer SecurityThéophile Wallez, Jonathan Protzenko, Benjamin Beurdouche, Karthikeyan Bhargavan
    USENIX Security '23XCheck: Verifying Integrity of 3D Printed Patient-Specific Devices via Computing TomographyZhiyuan Yu, Yuanhaur Chang, Shixuan Zhai, Nicholas Deily, Tao Ju, XiaoFeng Wang, Uday Jammalamadaka, Ning Zhang
    USENIX Security '23Multi-Factor Key Derivation Function (MFKDF) for Fast, Flexible, Secure, & Practical Key ManagementVivek Nair, Dawn Song
    USENIX Security '23Fuzztruction: Using Fault Injection-based Fuzzing to Leverage Implicit Domain KnowledgeNils Bars, Moritz Schloegel, Tobias Scharnowski, Nico Schiller, Thorsten Holz
    USENIX Security '23Educators’ Perspectives of Using (or Not Using) Online Exam ProctoringDavid G. Balash, Elena Korkes, Miles Grant, Adam J. Aviv, Rahel A. Fainchtein, Micah Sherr
    USENIX Security '23Person Re-identification in 3D Space: A WiFi Vision-based ApproachYili Ren, Yichao Wang, Sheng Tan, Yingying Chen, Jie Yang
    USENIX Security '23A Plot is Worth a Thousand Words: Model Information Stealing Attacks via Scientific PlotsBoyang Zhang, Xinlei He, Yun Shen, Tianhao Wang, Yang Zhang
    USENIX Security '23Practical Asynchronous High-threshold Distributed Key Generation and Distributed Polynomial SamplingSourav Das, Zhuolun Xiang, Lefteris Kokoris-Kogias, Ling Ren
    USENIX Security '23Device Tracking via Linux’s New TCP Source Port Selection AlgorithmMoshe Kol, Amit Klein, Yossi Gilad
    USENIX Security '23Long Live The Honey Badger: Robust Asynchronous DPSS and its ApplicationsThomas Yurek, Zhuolun Xiang, Yu Xia, Andrew Miller
    USENIX Security '23The OK Is Not Enough: A Large Scale Study of Consent Dialogs in Smartphone ApplicationsSimon Koch, Benjamin Altpeter, Martin Johns
    USENIX Security '23NAUTILUS: Automated RESTful API Vulnerability DetectionGelei Deng, Zhiyi Zhang, Yuekang Li, Yi Liu, Tianwei Zhang, Yang Liu, Guo Yu, Dongjin Wang

Pages