Search results

    USENIX Security '23DISTDET: A Cost-Effective Distributed Cyber Threat Detection System
    USENIX Security '23The Impostor Among US(B): Off-Path Injection Attacks on USB Communications
    USENIX Security '23TAP: Transparent and Privacy-Preserving Data Services
    USENIX Security '23CipherH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations
    USENIX Security '23"My Privacy for their Security": Employees' Privacy Perspectives and Expectations when using Enterprise Security Software
    USENIX Security '23Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine Learning
    USENIX Security '23V-Cloak: Intelligibility-, Naturalness- & Timbre-Preserving Real-Time Voice Anonymization
    USENIX Security '23Timeless Timing Attacks and Preload Defenses in Tor's DNS Cache
    USENIX Security '23Content-Type: multipart/oracle - Tapping into Format Oracles in Email End-to-End Encryption
    USENIX Security '23Framing Frames: Bypassing Wi-Fi Encryption by Manipulating Transmit Queues
    USENIX Security '23Formal Analysis and Patching of BLE-SC Pairing
    USENIX Security '23Extending a Hand to Attackers: Browser Privilege Escalation Attacks via Extensions
    USENIX Security '23Exorcising "Wraith": Protecting LiDAR-based Object Detector in Automated Driving System from Appearing Attacks
    USENIX Security '23ZBCAN: A Zero-Byte CAN Defense System
    USENIX Security '23Formal Analysis of Session-Handling in Secure Messaging: Lifting Security from Sessions to Conversations
    USENIX Security '23XCheck: Verifying Integrity of 3D Printed Patient-Specific Devices via Computing Tomography
    USENIX Security '23Formal Analysis of SPDM: Security Protocol and Data Model version 1.2
    USENIX Security '23Attacks are Forwarded: Breaking the Isolation of MicroVM-based Containers Through Operation Forwarding
    USENIX Security '23X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item Detection
    USENIX Security '23Watch your Watch: Inferring Personality Traits from Wearable Activity Trackers
    USENIX Security '23User Awareness and Behaviors Concerning Encrypted DNS Settings in Web Browsers
    USENIX Security '23Work-From-Home and COVID-19: Trajectories of Endpoint Security Management in a Security Operations Center
    USENIX Security '23Trojan Source: Invisible Vulnerabilities
    USENIX Security '23Ultimate SLH: Taking Speculative Load Hardening to the Next Level
    USENIX Security '23We Really Need to Talk About Session Tickets: A Large-Scale Analysis of Cryptographic Dangers with TLS Session Tickets