USENIX Security '24 | Scalable Multi-Party Computation Protocols for Machine Learning in the Honest-Majority Setting | |
USENIX Security '24 | Cascade: CPU Fuzzing via Intricate Program Generation | |
USENIX Security '24 | Spider-Scents: Grey-box Database-aware Web Scanning for Stored XSS | |
USENIX Security '24 | Less is More: Revisiting the Gaussian Mechanism for Differential Privacy | |
USENIX Security '24 | DaCapo: Automatic Bootstrapping Management for Efficient Fully Homomorphic Encryption | |
USENIX Security '24 | Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation for Binary Code Similarity Detection | |
USENIX Security '24 | Is It a Trap? A Large-scale Empirical Study And Comprehensive Assessment of Online Automated Privacy Policy Generators for Mobile Apps | |
USENIX Security '24 | ModelGuard: Information-Theoretic Defense Against Model Extraction Attacks | |
USENIX Security '24 | The Unpatchables: Why Municipalities Persist in Running Vulnerable Hosts | |
USENIX Security '24 | Exploring Covert Third-party Identifiers through External Storage in the Android New Era | |
USENIX Security '24 | Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS Handshakes | |
USENIX Security '24 | VeriSimplePIR: Verifiability in SimplePIR at No Online Cost for Honest Servers | |
USENIX Security '24 | SledgeHammer: Amplifying Rowhammer via Bank-level Parallelism | |
USENIX Security '24 | The Challenges of Bringing Cryptography from Research Papers to Products: Results from an Interview Study with Experts | |
USENIX Security '24 | Hijacking Attacks against Neural Network by Analyzing Training Data | |
USENIX Security '24 | SpecLFB: Eliminating Cache Side Channels in Speculative Executions | |
USENIX Security '24 | Vulnerability-oriented Testing for RESTful APIs | |