Search results

    USENIX Security '23Eavesdropping Mobile App Activity via Radio-Frequency Energy HarvestingTao Ni, Guohao Lan, Jia Wang, Qingchuan Zhao, Weitao Xu
    USENIX Security '23Guarding Serverless Applications with KaliumDeepak Sirone Jegan, Liang Wang, Siddhant Bhagat, Michael Swift
    USENIX Security '23Investigating Verification Behavior and Perceptions of Visual Digital CertificatesDañiel Gerhardt, Alexander Ponticello, Adrian Dabrowski, Katharina Krombholz
    USENIX Security '23Egg Hunt in Tesla Infotainment: A First Look at Reverse Engineering of Qt BinariesHaohuang Wen, Zhiqiang Lin
    USENIX Security '23Content-Type: multipart/oracle - Tapping into Format Oracles in Email End-to-End EncryptionFabian Ising, Damian Poddebniak, Tobias Kappert, Christoph Saatjohann, Sebastian Schinzel
    USENIX Security '23The Space of Adversarial StrategiesRyan Sheatsley, Blaine Hoak, Eric Pauley, Patrick McDaniel
    USENIX Security '23"My Privacy for their Security": Employees' Privacy Perspectives and Expectations when using Enterprise Security SoftwareJonah Stegman, Patrick J. Trottier, Caroline Hillier, Hassan Khan, Mohammad Mannan
    USENIX Security '23URET: Universal Robustness Evaluation Toolkit (for Evasion)Kevin Eykholt, Taesung Lee, Douglas Schales, Jiyong Jang, Ian Molloy
    USENIX Security '23SMACK: Semantically Meaningful Adversarial Audio AttackZhiyuan Yu, Yuanhaur Chang, Ning Zhang, Chaowei Xiao
    USENIX Security '23Remote Code Execution from SSTI in the Sandbox: Automatically Detecting and Exploiting Template Escape BugsYudi Zhao, Yuan Zhang, Min Yang
    USENIX Security '23Token Spammers, Rug Pulls, and Sniper Bots: An Analysis of the Ecosystem of Tokens in Ethereum and in the Binance Smart Chain (BNB)Federico Cernera, Massimo La Morgia, Alessandro Mei, Francesco Sassi
    USENIX Security '23X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item DetectionAishan Liu, Jun Guo, Jiakai Wang, Siyuan Liang, Renshuai Tao, Wenbo Zhou, Cong Liu, Xianglong Liu, Dacheng Tao
    USENIX Security '23Authenticated private information retrievalSimone Colombo, Kirill Nikitin, Henry Corrigan-Gibbs, David J. Wu, Bryan Ford
    USENIX Security '23Defining "Broken": User Experiences and Remediation Tactics When Ad-Blocking or Tracking-Protection Tools Break a Website’s User ExperienceAlexandra Nisenoff, Arthur Borem, Madison Pickering, Grant Nakanishi, Maya Thumpasery, Blase Ur
    USENIX Security '23Silent Bugs Matter: A Study of Compiler-Introduced Security BugsJianhao Xu, Kangjie Lu, Zhengjie Du, Zhu Ding, Linke Li, Qiushi Wu, Mathias Payer, Bing Mao
    USENIX Security '23It's all in your head(set): Side-channel attacks on AR/VR systemsYicheng Zhang, Carter Slocum, Jiasi Chen, Nael Abu-Ghazaleh
    USENIX Security '23SandDriller: A Fully-Automated Approach for Testing Language-Based JavaScript SandboxesAbdullah AlHamdan, Cristian-Alexandru Staicu
    USENIX Security '23Place Your Locks Well: Understanding and Detecting Lock Misuse BugsYuandao Cai, Peisen Yao, Chengfeng Ye, Charles Zhang
    USENIX Security '23“Security is not my field, I’m a stats guy”: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in IndustryJaron Mink, Harjot Kaur, Juliane Schmüser, Sascha Fahl, Yasemin Acar
    USENIX Security '23The Blockchain Imitation GameKaihua Qin, Stefanos Chaliasos, Liyi Zhou, Benjamin Livshits, Dawn Song, Arthur Gervais
    USENIX Security '23Duoram: A Bandwidth-Efficient Distributed ORAM for 2- and 3-Party ComputationAdithya Vadapalli, Ryan Henry, Ian Goldberg
    USENIX Security '23MobileAtlas: Geographically Decoupled Measurements in Cellular Networks for Security and Privacy ResearchGabriel K. Gegenhuber, Wilfried Mayer, Edgar Weippl, Adrian Dabrowski
    USENIX Security '23Don’t be Dense: Efficient Keyword PIR for Sparse DatabasesSarvar Patel, Joon Young Seo, Kevin Yeo
    USENIX Security '23Controlled Data Races in Enclaves: Attacks and DetectionSanchuan Chen, Zhiqiang Lin, Yinqian Zhang
    USENIX Security '23A Large Scale Study of the Ethereum Arbitrage EcosystemRobert McLaughlin, Christopher Kruegel, Giovanni Vigna