Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '24SmartCookie: Blocking Large-Scale SYN Floods with a Split-Proxy Defense on Programmable Data Planes
    USENIX Security '24When the User Is Inside the User Interface: An Empirical Study of UI Security Properties in Augmented Reality
    USENIX Security '24ACAI: Protecting Accelerator Execution with Arm Confidential Computing Architecture
    USENIX Security '24How WEIRD is Usable Privacy and Security Research?
    USENIX Security '24"I Don't Know If We're Doing Good. I Don't Know If We're Doing Bad": Investigating How Practitioners Scope, Motivate, and Conduct Privacy Work When Developing AI Products
    USENIX Security '23Tubes Among Us: Analog Attack on Automatic Speaker IdentificationShimaa Ahmed, Yash Wani, Ali Shahin Shamsabadi, Mohammad Yaghini, Ilia Shumailov, Nicolas Papernot, Kassem Fawaz
    USENIX Security '23Practical Asynchronous High-threshold Distributed Key Generation and Distributed Polynomial SamplingSourav Das, Zhuolun Xiang, Lefteris Kokoris-Kogias, Ling Ren
    USENIX Security '23Every Vote Counts: Ranking-Based Training of Federated Learning to Resist Poisoning AttacksHamid Mozaffari, Virat Shejwalkar, Amir Houmansadr
    USENIX Security '23Hidden Reality: Caution, Your Hand Gesture Inputs in the Immersive Virtual World are Visible to All!Sindhu Reddy Kalathur Gopal, Diksha Shukla, James David Wheelock, Nitesh Saxena
    USENIX Security '23ARI: Attestation of Real-time Mission Execution IntegrityJinwen Wang, Yujie Wang, Ao Li, Yang Xiao, Ruide Zhang, Wenjing Lou, Y. Thomas Hou, Ning Zhang
    USENIX Security '23XCheck: Verifying Integrity of 3D Printed Patient-Specific Devices via Computing TomographyZhiyuan Yu, Yuanhaur Chang, Shixuan Zhai, Nicholas Deily, Tao Ju, XiaoFeng Wang, Uday Jammalamadaka, Ning Zhang
    USENIX Security '23Eos: Efficient Private Delegation of zkSNARK ProversAlessandro Chiesa, Ryan Lehmkuhl, Pratyush Mishra, Yinuo Zhang
    USENIX Security '23PELICAN: Exploiting Backdoors of Naturally Trained Deep Learning Models In Binary Code AnalysisZhuo Zhang, Guanhong Tao, Guangyu Shen, Shengwei An, Qiuling Xu, Yingqi Liu, Yapeng Ye, Yaoxuan Wu, Xiangyu Zhang
    USENIX Security '23The Gates of Time: Improving Cache Attacks with Transient ExecutionDaniel Katzman, William Kosasih, Chitchanok Chuengsatiansup, Eyal Ronen, Yuval Yarom
    USENIX Security '23TRust: A Compilation Framework for In-process Isolation to Protect Safe Rust against Untrusted CodeInyoung Bang, Martin Kayondo, Hyungon Moon, Yunheung Paek
    USENIX Security '23The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 DecodersWilly R. Vasquez, Stephen Checkoway, Hovav Shacham
    USENIX Security '23A Large Scale Study of the Ethereum Arbitrage EcosystemRobert McLaughlin, Christopher Kruegel, Giovanni Vigna
    USENIX Security '23Sherlock on Specs: Building LTE Conformance Tests through Automated ReasoningYi Chen, Di Tang, Yepeng Yao, Mingming Zha, XiaoFeng Wang, Xiaozhong Liu, Haixu Tang, Baoxu Liu
    USENIX Security '23Did the Shark Eat the Watchdog in the NTP Pool? Deceiving the NTP Pool’s Monitoring SystemJonghoon Kwon, Jeonggyu Song, Junbeom Hur, Adrian Perrig
    USENIX Security '23Formal Analysis of SPDM: Security Protocol and Data Model version 1.2Cas Cremers, Alexander Dax, Aurora Naska
    USENIX Security '23V1SCAN: Discovering 1-day Vulnerabilities in Reused C/C++ Open-source Software Components Using Code Classification TechniquesSeunghoon Woo, Eunjin Choi, Heejo Lee, Hakjoo Oh
    USENIX Security '23BunnyHop: Exploiting the Instruction PrefetcherZhiyuan Zhang, Mingtian Tao, Sioli O'Connell, Chitchanok Chuengsatiansup, Daniel Genkin, Yuval Yarom
    USENIX Security '23DiffSmooth: Certifiably Robust Learning via Diffusion Models and Local SmoothingJiawei Zhang, Zhongzhu Chen, Huan Zhang, Chaowei Xiao, Bo Li
    USENIX Security '23ACon^2: Adaptive Conformal Consensus for Provable Blockchain OraclesSangdon Park, Osbert Bastani, Taesoo Kim
    USENIX Security '23Measuring Up to (Reasonable) Consumer Expectations: Providing an Empirical Basis for Holding IoT Manufacturers Legally ResponsibleLorenz Kustosch, Carlos Gañán, Mattis van 't Schip, Michel van Eeten, Simon Parkin

Pages