Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '24Assessing Suspicious Emails with Banner Warnings Among Blind and Low-Vision Users in Realistic SettingsFilipo Sharevski, Aziz Zeidieh
    USENIX Security '24d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted DatabasesDongli Liu, Wei Wang, Peng Xu, Laurence T. Yang, Bo Luo, Kaitai Liang
    USENIX Security '24Lightweight Authentication of Web Data via Garble-Then-Prove
    USENIX Security '24A Binary-level Thread Sanitizer or Why Sanitizing on the Binary Level is HardJoschua Schilling, Andreas Wendler, Philipp Görz, Nils Bars, Moritz Schloegel, Thorsten Holz
    USENIX Security '24Exploring digital security and privacy in relative poverty in Germany through qualitative interviewsAnastassija Kostan, Sara Olschar, Lucy Simko, Yasemin Acar
    USENIX Security '24Snowflake, a censorship circumvention system using temporary WebRTC proxiesCecylia Bocovich, Arlo Breault, David Fifield, Xiaokang Wang
    USENIX Security '24Property Existence Inference against Generative ModelsLijin Wang, Jingjing Wang, Jie Wan, Lin Long, Ziqi Yang, Zhan Qin
    USENIX Security '24Can Virtual Reality Protect Users from Keystroke Inference Attacks?Zhuolin Yang, Zain Sarwar, Iris Hwang, Ronik Bhaskar, Ben Y. Zhao, Haitao Zheng
    USENIX Security '24Neural Network Semantic Backdoor Detection and Mitigation: A Causality-Based ApproachBing Sun, Jun Sun, Wayne Koh, Jie Shi
    USENIX Security '24The Effect of Design Patterns on (Present and Future) Cookie Consent DecisionsNataliia Bielova, Laura Litvine, Anysia Nguyen, Mariam Chammat, Vincent Toubiana, Estelle Hary
    USENIX Security '24When the User Is Inside the User Interface: An Empirical Study of UI Security Properties in Augmented RealityKaiming Cheng, Arkaprabha Bhattacharya, Michelle Lin, Jaewook Lee, Aroosh Kumar, Jeffery F. Tian, Tadayoshi Kohno, Franziska Roesner
    USENIX Security '24ACAI: Protecting Accelerator Execution with Arm Confidential Computing ArchitectureSupraja Sridhara, Andrin Bertschi, Benedict Schlüter, Mark Kuhne, Fabio Aliberti, Shweta Shinde
    USENIX Security '24How WEIRD is Usable Privacy and Security Research?Ayako A. Hasegawa, Daisuke Inoue, Mitsuaki Akiyama
    USENIX Security '24NetShaper: A Differentially Private Network Side-Channel Mitigation SystemAmir Sabzi, Rut Vora, Swati Goswami, Margo Seltzer, Mathias Lécuyer, Aastha Mehta
    USENIX Security '24Dissecting Privacy Perspectives of Websites Around the World: "Aceptar Todo, Alle Akzeptieren, Accept All..."Aysun Ogut, Berke Turanlioglu, Doruk Can Metiner, Albert Levi, Cemal Yilmaz, Orcun Cetin, Selcuk Uluagac
    USENIX Security '24Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS HandshakesDiwen Xue, Michalis Kallitsis, Amir Houmansadr, Roya Ensafi
    USENIX Security '24Sync+Sync: A Covert Channel Built on fsync with StorageQisheng Jiang, Chundong Wang
    USENIX Security '24Mudjacking: Patching Backdoor Vulnerabilities in Foundation ModelsHongbin Liu, Michael K. Reiter, Neil Zhenqiang Gong
    USENIX Security '24Pixel Thief: Exploiting SVG Filter Leakage in Firefox and ChromeSioli O'Connell, Lishay Aben Sour, Ron Magen, Daniel Genkin, Yossi Oren, Hovav Shacham, Yuval Yarom
    USENIX Security '24Unpacking Privacy Labels: A Measurement and Developer Perspective on Google's Data Safety SectionRishabh Khandelwal, Asmit Nayak, Paul Chung, Kassem Fawaz
    USENIX Security '24Speculative Denial-of-Service Attacks In EthereumAviv Yaish, Kaihua Qin, Liyi Zhou, Aviv Zohar, Arthur Gervais
    USENIX Security '24That Doesn't Go There: Attacks on Shared State in Multi-User Augmented Reality ApplicationsCarter Slocum, Yicheng Zhang, Erfan Shayegani, Pedram Zaree, Nael Abu-Ghazaleh, Jiasi Chen
    USENIX Security '24On the Difficulty of Defending Contrastive Learning against Backdoor AttacksChangjiang Li, Ren Pang, Bochuan Cao, Zhaohan Xi, Jinghui Chen, Shouling Ji, Ting Wang
    USENIX Security '24More Simplicity for Trainers, More Opportunity for Attackers: Black-Box Attacks on Speaker Recognition Systems by Inferring Feature ExtractorYunjie Ge, Pinji Chen, Qian Wang, Lingchen Zhao, Ningping Mou, Peipei Jiang, Cong Wang, Qi Li, Chao Shen
    USENIX Security '24Transferability of White-box Perturbations: Query-Efficient Adversarial Attacks against Commercial DNN ServicesMeng Shen, Changyue Li, Qi Li, Hao Lu, Liehuang Zhu, Ke Xu

Pages