Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '23Attacks are Forwarded: Breaking the Isolation of MicroVM-based Containers Through Operation ForwardingJietao Xiao, Nanzi Yang, Wenbo Shen, Jinku Li, Xin Guo, Zhiqiang Dong, Fei Xie, Jianfeng Ma
    USENIX Security '23NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory SystemsZixuan Wang, Mohammadkazem Taram, Daniel Moghimi, Steven Swanson, Dean Tullsen, Jishen Zhao
    USENIX Security '23PROVIDENCE: a Flexible Round-by-Round Risk-Limiting AuditOliver Broadrick, Poorvi Vora, Filip Zagórski
    USENIX Security '23Strategies and Vulnerabilities of Participants in Venezuelan Influence OperationsRuben Recabarren, Bogdan Carbunar, Nestor Hernandez, Ashfaq Ali Shafin
    USENIX Security '23Formal Analysis of SPDM: Security Protocol and Data Model version 1.2Cas Cremers, Alexander Dax, Aurora Naska
    USENIX Security '23DISTDET: A Cost-Effective Distributed Cyber Threat Detection SystemFeng Dong, Liu Wang, Xu Nie, Fei Shao, Haoyu Wang, Ding Li, Xiapu Luo, Xusheng Xiao
    USENIX Security '23VulChecker: Graph-based Vulnerability Localization in Source CodeYisroel Mirsky, George Macon, Michael Brown, Carter Yagemann, Matthew Pruett, Evan Downing, Sukarno Mertoguno, Wenke Lee
    USENIX Security '23Machine-checking Multi-Round Proofs of Shuffle: Terelius-Wikstrom and Bayer-GrothThomas Haines, Rajeev Gore, Mukesh Tiwari
    USENIX Security '23Gradient Obfuscation Gives a False Sense of Security in Federated LearningKai Yue, Richeng Jin, Chau-Wai Wong, Dror Baron, Huaiyu Dai
    USENIX Security '23AURC: Detecting Errors in Program Code and DocumentationPeiwei Hu, Ruigang Liang, Ying Cao, Kai Chen, Runze Zhang
    USENIX Security '23Araña: Discovering and Characterizing Password Guessing Attacks in PracticeMazharul Islam, Marina Sanusi Bohuk, Paul Chung, Thomas Ristenpart, Rahul Chatterjee
    USENIX Security '23PhyAuth: Physical-Layer Message Authentication for ZigBee NetworksAng Li, Jiawei Li, Dianqi Han, Yan Zhang, Tao Li, Ting Zhu, Yanchao Zhang
    USENIX Security '23Log: It’s Big, It’s Heavy, It’s Filled with Personal Data! Measuring the Logging of Sensitive Information in the Android EcosystemAllan Lyons, Julien Gamba, Austin Shawaga, Joel Reardon, Juan Tapiador, Serge Egelman, Narseo Vallina-Rodriguez
    USENIX Security '23“Security is not my field, I’m a stats guy”: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in IndustryJaron Mink, Harjot Kaur, Juliane Schmüser, Sascha Fahl, Yasemin Acar
    USENIX Security '23Intender: Fuzzing Intent-Based Networking with Intent-State Transition GuidanceJiwon Kim, Benjamin E. Ujcich, Dave (Jing) Tian
    USENIX Security '23Inducing Authentication Failures to Bypass Credit Card PINsDavid Basin, Patrick Schaller, Jorge Toro-Pozo
    USENIX Security '23Place Your Locks Well: Understanding and Detecting Lock Misuse BugsYuandao Cai, Peisen Yao, Chengfeng Ye, Charles Zhang
    USENIX Security '23Token Spammers, Rug Pulls, and Sniper Bots: An Analysis of the Ecosystem of Tokens in Ethereum and in the Binance Smart Chain (BNB)Federico Cernera, Massimo La Morgia, Alessandro Mei, Francesco Sassi
    USENIX Security '23Sherlock on Specs: Building LTE Conformance Tests through Automated ReasoningYi Chen, Di Tang, Yepeng Yao, Mingming Zha, XiaoFeng Wang, Xiaozhong Liu, Haixu Tang, Baoxu Liu
    USENIX Security '23Timeless Timing Attacks and Preload Defenses in Tor's DNS CacheRasmus Dahlberg, Tobias Pulls
    USENIX Security '23Investigating Verification Behavior and Perceptions of Visual Digital CertificatesDañiel Gerhardt, Alexander Ponticello, Adrian Dabrowski, Katharina Krombholz
    USENIX Security '23The Role of Professional Product Reviewers in Evaluating Security and PrivacyWentao Guo, Jason Walter, Michelle L. Mazurek
    USENIX Security '23Fourteen Years in the Life: A Root Server’s Perspective on DNS Resolver SecurityAlden Hilton, Casey Deccio, Jacob Davis
    USENIX Security '23KextFuzz: Fuzzing macOS Kernel EXTensions on Apple Silicon via Exploiting MitigationsTingting Yin, Zicong Gao, Zhenghang Xiao, Zheyu Ma, Min Zheng, Chao Zhang
    USENIX Security '23HOMESPY: The Invisible Sniffer of Infrared Remote Control of Smart TVsKong Huang, YuTong Zhou, Ke Zhang, Jiacen Xu, Jiongyi Chen, Di Tang, Kehuan Zhang

Pages