Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '24Loopy Hell(ow): Infinite Traffic Loops at the Application LayerYepeng Pan, Anna Ascheman, Christian Rossow
    USENIX Security '24Racing for TLS Certificate Validation: A Hijacker's Guide to the Android TLS GalaxySajjad Pourali, Xiufen Yu, Lianying Zhao, Mohammad Mannan, Amr Youssef
    USENIX Security '24A Binary-level Thread Sanitizer or Why Sanitizing on the Binary Level is HardJoschua Schilling, Andreas Wendler, Philipp Görz, Nils Bars, Moritz Schloegel, Thorsten Holz
    USENIX Security '24"I feel physically safe but not politically safe": Understanding the Digital Threats and Safety Practices of OnlyFans CreatorsAnanta Soneji, Vaughn Hamilton, Adam Doupé, Allison McDonald, Elissa M. Redmiles
    USENIX Security '24dp-promise: Differentially Private Diffusion Probabilistic Models for Image SynthesisHaichen Wang, Shuchao Pang, Zhigang Lu, Yihang Rao, Yongbin Zhou, Minhui Xue
    USENIX Security '24Practical Security Analysis of Zero-Knowledge Proof CircuitsHongbo Wen, Jon Stephens, Yanju Chen, Kostas Ferles, Shankara Pailoor, Kyle Charbonnet, Isil Dillig, Yu Feng
    USENIX Security '24What IF Is Not Enough? Fixing Null Pointer Dereference With Contextual CheckYunlong Xing, Shu Wang, Shiyu Sun, Xu He, Kun Sun, Qi Li
    USENIX Security '24Towards Generic Database Management System FuzzingYupeng Yang, Yongheng Chen, Rui Zhong, Jizhou Chen, Wenke Lee
    USENIX Security '24Don't Waste My Efforts: Pruning Redundant Sanitizer Checks by Developer-Implemented Type ChecksYizhuo Zhai, Zhiyun Qian, Chengyu Song, Manu Sridharan, Trent Jaeger, Paul Yu, Srikanth V. Krishnamurthy
    USENIX Security '24Hermes: Unlocking Security Analysis of Cellular Network Protocols by Synthesizing Finite State Machines from Natural Language SpecificationsAbdullah Al Ishtiaq, Sarkar Snigdha Sarathi Das, Syed Md Mukit Rashid, Ali Ranjbar, Kai Tu, Tianwei Wu, Zhezheng Song, Weixuan Wang, Mujtahid Akon, Rui Zhang, Syed Rafiul Hussain
    USENIX Security '24Understanding the Security and Privacy Implications of Online Toxic Content on RefugeesArjun Arunasalam, Habiba Farrukh, Eliz Tekcan, Z. Berkay Celik
    USENIX Security '24AutoFHE: Automated Adaption of CNNs for Efficient Evaluation over FHEWei Ao, Vishnu Naresh Boddeti
    USENIX Security '24The Effect of Design Patterns on (Present and Future) Cookie Consent DecisionsNataliia Bielova, Laura Litvine, Anysia Nguyen, Mariam Chammat, Vincent Toubiana, Estelle Hary
    USENIX Security '24Snowflake, a censorship circumvention system using temporary WebRTC proxiesCecylia Bocovich, Arlo Breault, David Fifield, Xiaokang Wang
    USENIX Security '24Data Subjects' Reactions to Exercising Their Right of AccessArthur Borem, Elleen Pan, Olufunmilola Obielodan, Aurelie Roubinowitz, Luca Dovichi, Michelle L. Mazurek, Blase Ur
    USENIX Security '24Fledging Will Continue Until Privacy Improves: Empirical Analysis of Google's Privacy-Preserving Targeted AdvertisingGiuseppe Calderonio, Mir Masood Ali, Jason Polakis
    USENIX Security '24Learning with Semantics: Towards a Semantics-Aware Routing Anomaly Detection SystemYihao Chen, Qilei Yin, Qi Li, Zhuotao Liu, Ke Xu, Yi Xu, Mingwei Xu, Ziqian Liu, Jianping Wu
    USENIX Security '24Does Online Anonymous Market Vendor Reputation Matter?Alejandro Cuevas, Nicolas Christin
    USENIX Security '24Exploring Covert Third-party Identifiers through External Storage in the Android New EraZikan Dong, Tianming Liu, Jiapeng Deng, Li Li, Minghui Yang, Meng Wang, Guosheng Xu, Guoai Xu
    USENIX Security '24Atropos: Effective Fuzzing of Web Applications for Server-Side VulnerabilitiesEmre Güler, Sergej Schumilo, Moritz Schloegel, Nils Bars, Philipp Görz, Xinyi Xu, Cemal Kaygusuz, Thorsten Holz
    USENIX Security '24Scalable Zero-knowledge Proofs for Non-linear Functions in Machine LearningMeng Hao, Hanxiao Chen, Hongwei Li, Chenkai Weng, Yuan Zhang, Haomiao Yang, Tianwei Zhang
    USENIX Security '24How WEIRD is Usable Privacy and Security Research?Ayako A. Hasegawa, Daisuke Inoue, Mitsuaki Akiyama
    USENIX Security '24"What Keeps People Secure is That They Met The Security Team": Deconstructing Drivers And Goals of Organizational Security AwarenessJonas Hielscher, Simon Parkin
    USENIX Security '24DONAPI: Malicious NPM Packages Detector using Behavior Sequence Knowledge MappingCheng Huang, Nannan Wang, Ziyan Wang, Siqi Sun, Lingzi Li, Junren Chen, Qianchong Zhao, Jiaxuan Han, Zhen Yang, Lei Shi
    USENIX Security '24GFWeb: Measuring the Great Firewall's Web Censorship at ScaleNguyen Phong Hoang, Jakub Dalek, Masashi Crete-Nishihata, Nicolas Christin, Vinod Yegneswaran, Michalis Polychronakis, Nick Feamster

Pages