Search results

    USENIX Security '24Automated Large-Scale Analysis of Cookie Notice Compliance
    USENIX Security '24You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise Networks
    USENIX Security '24Can Virtual Reality Protect Users from Keystroke Inference Attacks?
    USENIX Security '24Neural Network Semantic Backdoor Detection and Mitigation: A Causality-Based Approach
    USENIX Security '24Finding Traceability Attacks in the Bluetooth Low Energy Specification and Its Implementations
    USENIX Security '24Devil in the Room: Triggering Audio Backdoors in the Physical World
    USENIX Security '24Atropos: Effective Fuzzing of Web Applications for Server-Side Vulnerabilities
    USENIX Security '24FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker Recognition
    USENIX Security '24Dancer in the Dark: Synthesizing and Evaluating Polyglots for Blind Cross-Site Scripting
    USENIX Security '24ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing
    USENIX Security '24Ahoy SAILR! There is No Need to DREAM of C: A Compiler-Aware Structuring Algorithm for Binary Decompilation
    USENIX Security '24Racing on the Negative Force: Efficient Vulnerability Root-Cause Analysis through Reinforcement Learning on Counterexamples
    USENIX Security '24WEBRR: A Forensic System for Replaying and Investigating Web-Based Attacks in The Modern Web
    USENIX Security '24Unleashing the Power of Type-Based Call Graph Construction by Using Regional Pointer Information
    USENIX Security '24The Effect of Design Patterns on (Present and Future) Cookie Consent Decisions
    USENIX Security '24RECORD: A RECeption-Only Region Determination Attack on LEO Satellite Users
    USENIX Security '24A Taxonomy of C Decompiler Fidelity Issues
    USENIX Security '24CAMP: Compiler and Allocator-based Heap Memory Protection
    USENIX Security '24"Belt and suspenders" or "just red tape"?: Investigating Early Artifacts and User Perceptions of IoT App Security Certification
    USENIX Security '24Go Go Gadget Hammer: Flipping Nested Pointers for Arbitrary Data Leakage
    USENIX Security '24FFXE: Dynamic Control Flow Graph Recovery for Embedded Firmware Binaries
    USENIX Security '24Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities
    USENIX Security '24Opportunistic Data Flow Integrity for Real-time Cyber-physical Systems Using Worst Case Execution Time Reservation
    USENIX Security '24MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning
    USENIX Security '24Security and Privacy Analysis of Samsung's Crowd-Sourced Bluetooth Location Tracking System