Search results

    USENIX Security '23​​How Library IT Staff Navigate Privacy and Security Challenges and ResponsibilitiesAlan F. Luo, Noel Warford, Samuel Dooley, Rachel Greenstadt, Michelle L. Mazurek, Nora McDonald
    USENIX Security '23One Size Does not Fit All: Quantifying the Risk of Malicious App Encounters for Different Android User ProfilesSavino Dambra, Leyla Bilge, Platon Kotzias, Yun Shen, Juan Caballero
    USENIX Security '23Secure Floating-Point TrainingDeevashwer Rathee, Anwesh Bhattacharya, Divya Gupta, Rahul Sharma, Dawn Song
    USENIX Security '23NeuroPots: Realtime Proactive Defense against Bit-Flip Attacks in Neural NetworksQi Liu, Jieming Yin, Wujie Wen, Chengmo Yang, Shi Sha
    USENIX Security '23Access Denied: Assessing Physical Risks to Internet Access NetworksAlexander Marder, Zesen Zhang, Ricky Mok, Ramakrishna Padmanabhan, Bradley Huffaker, Matthew Luckie, Alberto Dainotti, kc claffy, Alex C. Snoeren, Aaron Schulman
    USENIX Security '23How fast do you heal? A taxonomy for post-compromise security in secure-channel establishmentOlivier Blazy, Ioana Boureanu, Pascal Lafourcade, Cristina Onete, Léo Robert
    USENIX Security '23That Person Moves Like A Car: Misclassification Attack Detection for Autonomous Systems Using Spatiotemporal ConsistencyYanmao Man, Raymond Muller, Ming Li, Z. Berkay Celik, Ryan Gerdes
    USENIX Security '23ZBCAN: A Zero-Byte CAN Defense SystemKhaled Serag, Rohit Bhatia, Akram Faqih, Muslum Ozgur Ozmen, Vireshwar Kumar, Z. Berkay Celik, Dongyan Xu
    USENIX Security '23Jinn: Hijacking Safe Programs with TrojansKomail Dharsee, John Criswell
    USENIX Security '23Pspray: Timing Side-Channel based Linux Kernel Heap Exploitation TechniqueYoochan Lee, Jinhan Kwak, Junesoo Kang, Yuseok Jeon, Byoungyoung Lee
    USENIX Security '23A Study of Multi-Factor and Risk-Based Authentication AvailabilityAnthony Gavazzi, Ryan Williams, Engin Kirda, Long Lu, Andre King, Andy Davis, Tim Leek
    USENIX Security '23Pool-Party: Exploiting Browser Resource Pools for Web TrackingPeter Snyder, Soroush Karami, Arthur Edelstein, Benjamin Livshits, Hamed Haddadi
    USENIX Security '23ClepsydraCache -- Preventing Cache Attacks with Time-Based EvictionsJan Philipp Thoma, Christian Niesler, Dominic Funke, Gregor Leander, Pierre Mayr, Nils Pohl, Lucas Davi, Tim Güneysu
    USENIX Security '23Fine-grained Poisoning Attack to Local Differential Privacy Protocols for Mean and Variance EstimationXiaoguang Li, Ninghui Li, Wenhai Sun, Neil Zhenqiang Gong, Hui Li
    USENIX Security '23Work-From-Home and COVID-19: Trajectories of Endpoint Security Management in a Security Operations CenterKailani R. Jones, Dalton A. Brucker-Hahn, Bradley Fidler, Alexandru G. Bardas
    USENIX Security '23Humans vs. Machines in Malware ClassificationSimone Aonzo, Yufei Han, Alessandro Mantovani, Davide Balzarotti
    USENIX Security '23MTSan: A Feasible and Practical Memory Sanitizer for Fuzzing COTS BinariesXingman Chen, Yinghao Shi, Zheyu Jiang, Yuan Li, Ruoyu Wang, Haixin Duan, Haoyu Wang, Chao Zhang
    USENIX Security '23Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural NetworksJialai Wang, Ziyuan Zhang, Meiqi Wang, Han Qiu, Tianwei Zhang, Qi Li, Zongpeng Li, Tao Wei, Chao Zhang
    USENIX Security '23Lessons Lost: Incident Response in the Age of Cyber Insurance and Breach AttorneysDaniel W. Woods, Rainer Böhme, Josephine Wolff, Daniel Schwarcz
    USENIX Security '23Bug Hunters’ Perspectives on the Challenges and Benefits of the Bug Bounty EcosystemOmer Akgul, Taha Eghtesad, Amit Elazari, Omprakash Gnawali, Jens Grossklags, Michelle L. Mazurek, Daniel Votipka, Aron Laszka
    USENIX Security '23ProSpeCT: Provably Secure Speculation for the Constant-Time PolicyLesly-Ann Daniel, Marton Bognar, Job Noorman, Sébastien Bardin, Tamara Rezk, Frank Piessens
    USENIX Security '23IvySyn: Automated Vulnerability Discovery in Deep Learning FrameworksNeophytos Christou, Di Jin, Vaggelis Atlidakis, Baishakhi Ray, Vasileios P. Kemerlis
    USENIX Security '23UnGANable: Defending Against GAN-based Face ManipulationZheng Li, Ning Yu, Ahmed Salem, Michael Backes, Mario Fritz, Yang Zhang
    USENIX Security '23Fairness Properties of Face Recognition and Obfuscation SystemsHarrison Rosenberg, Brian Tang, Kassem Fawaz, Somesh Jha
    USENIX Security '23GlitchHiker: Uncovering Vulnerabilities of Image Signal Transmission with IEMIQinhong Jiang, Xiaoyu Ji, Chen Yan, Zhixin Xie, Haina Lou, Wenyuan Xu