USENIX Security '24 | SmartCookie: Blocking Large-Scale SYN Floods with a Split-Proxy Defense on Programmable Data Planes | Sophia Yoo, Xiaoqi Chen, Jennifer Rexford |
USENIX Security '24 | When the User Is Inside the User Interface: An Empirical Study of UI Security Properties in Augmented Reality | Kaiming Cheng, Arkaprabha Bhattacharya, Michelle Lin, Jaewook Lee, Aroosh Kumar, Jeffery F. Tian, Tadayoshi Kohno, Franziska Roesner |
USENIX Security '24 | ACAI: Protecting Accelerator Execution with Arm Confidential Computing Architecture | Supraja Sridhara, Andrin Bertschi, Benedict Schlüter, Mark Kuhne, Fabio Aliberti, Shweta Shinde |
USENIX Security '24 | How WEIRD is Usable Privacy and Security Research? | Ayako A. Hasegawa, Daisuke Inoue, Mitsuaki Akiyama |
USENIX Security '24 | "I Don't Know If We're Doing Good. I Don't Know If We're Doing Bad": Investigating How Practitioners Scope, Motivate, and Conduct Privacy Work When Developing AI Products | Hao-Ping (Hank) Lee, Lan Gao, Stephanie Yang, Jodi Forlizzi, Sauvik Das |
USENIX Security '23 | Tubes Among Us: Analog Attack on Automatic Speaker Identification | Shimaa Ahmed, Yash Wani, Ali Shahin Shamsabadi, Mohammad Yaghini, Ilia Shumailov, Nicolas Papernot, Kassem Fawaz |
USENIX Security '23 | Practical Asynchronous High-threshold Distributed Key Generation and Distributed Polynomial Sampling | Sourav Das, Zhuolun Xiang, Lefteris Kokoris-Kogias, Ling Ren |
USENIX Security '23 | Every Vote Counts: Ranking-Based Training of Federated Learning to Resist Poisoning Attacks | Hamid Mozaffari, Virat Shejwalkar, Amir Houmansadr |
USENIX Security '23 | Hidden Reality: Caution, Your Hand Gesture Inputs in the Immersive Virtual World are Visible to All! | Sindhu Reddy Kalathur Gopal, Diksha Shukla, James David Wheelock, Nitesh Saxena |
USENIX Security '23 | ARI: Attestation of Real-time Mission Execution Integrity | Jinwen Wang, Yujie Wang, Ao Li, Yang Xiao, Ruide Zhang, Wenjing Lou, Y. Thomas Hou, Ning Zhang |
USENIX Security '23 | XCheck: Verifying Integrity of 3D Printed Patient-Specific Devices via Computing Tomography | Zhiyuan Yu, Yuanhaur Chang, Shixuan Zhai, Nicholas Deily, Tao Ju, XiaoFeng Wang, Uday Jammalamadaka, Ning Zhang |
USENIX Security '23 | Eos: Efficient Private Delegation of zkSNARK Provers | Alessandro Chiesa, Ryan Lehmkuhl, Pratyush Mishra, Yinuo Zhang |
USENIX Security '23 | PELICAN: Exploiting Backdoors of Naturally Trained Deep Learning Models In Binary Code Analysis | Zhuo Zhang, Guanhong Tao, Guangyu Shen, Shengwei An, Qiuling Xu, Yingqi Liu, Yapeng Ye, Yaoxuan Wu, Xiangyu Zhang |
USENIX Security '23 | The Gates of Time: Improving Cache Attacks with Transient Execution | Daniel Katzman, William Kosasih, Chitchanok Chuengsatiansup, Eyal Ronen, Yuval Yarom |
USENIX Security '23 | TRust: A Compilation Framework for In-process Isolation to Protect Safe Rust against Untrusted Code | Inyoung Bang, Martin Kayondo, Hyungon Moon, Yunheung Paek |
USENIX Security '23 | The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 Decoders | Willy R. Vasquez, Stephen Checkoway, Hovav Shacham |
USENIX Security '23 | A Large Scale Study of the Ethereum Arbitrage Ecosystem | Robert McLaughlin, Christopher Kruegel, Giovanni Vigna |
USENIX Security '23 | Sherlock on Specs: Building LTE Conformance Tests through Automated Reasoning | Yi Chen, Di Tang, Yepeng Yao, Mingming Zha, XiaoFeng Wang, Xiaozhong Liu, Haixu Tang, Baoxu Liu |
USENIX Security '23 | Did the Shark Eat the Watchdog in the NTP Pool? Deceiving the NTP Pool’s Monitoring System | Jonghoon Kwon, Jeonggyu Song, Junbeom Hur, Adrian Perrig |
USENIX Security '23 | Formal Analysis of SPDM: Security Protocol and Data Model version 1.2 | Cas Cremers, Alexander Dax, Aurora Naska |
USENIX Security '23 | V1SCAN: Discovering 1-day Vulnerabilities in Reused C/C++ Open-source Software Components Using Code Classification Techniques | Seunghoon Woo, Eunjin Choi, Heejo Lee, Hakjoo Oh |
USENIX Security '23 | BunnyHop: Exploiting the Instruction Prefetcher | Zhiyuan Zhang, Mingtian Tao, Sioli O'Connell, Chitchanok Chuengsatiansup, Daniel Genkin, Yuval Yarom |
USENIX Security '23 | DiffSmooth: Certifiably Robust Learning via Diffusion Models and Local Smoothing | Jiawei Zhang, Zhongzhu Chen, Huan Zhang, Chaowei Xiao, Bo Li |
USENIX Security '23 | ACon^2: Adaptive Conformal Consensus for Provable Blockchain Oracles | Sangdon Park, Osbert Bastani, Taesoo Kim |
USENIX Security '23 | Measuring Up to (Reasonable) Consumer Expectations: Providing an Empirical Basis for Holding IoT Manufacturers Legally Responsible | Lorenz Kustosch, Carlos Gañán, Mattis van 't Schip, Michel van Eeten, Simon Parkin |