Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '24"I'm not convinced that they don't collect more than is necessary": User-Controlled Data Minimization Design in Search EnginesTanusree Sharma, Lin Kyi, Yang Wang, Asia J. Biega
    USENIX Security '24Penetration Vision through Virtual Reality Headsets: Identifying 360-degree Videos from Head MovementsAnh Nguyen, Xiaokuan Zhang, Zhisheng Yan
    USENIX Security '24SOAP: A Social Authentication ProtocolFelix Linker, David Basin
    USENIX Security '24Logic Gone Astray: A Security Analysis Framework for the Control Plane Protocols of 5G BasebandsKai Tu, Abdullah Al Ishtiaq, Syed Md Mukit Rashid, Yilu Dong, Weixuan Wang, Tianwei Wu, Syed Rafiul Hussain
    USENIX Security '24"What Keeps People Secure is That They Met The Security Team": Deconstructing Drivers And Goals of Organizational Security AwarenessJonas Hielscher, Simon Parkin
    USENIX Security '24Fast RS-IOP Multivariate Polynomial Commitments and Verifiable Secret SharingZongyang Zhang, Weihan Li, Yanpei Guo, Kexin Shi, Sherman S. M. Chow, Ximeng Liu, Jin Dong
    USENIX Security '24Rabbit-Mix: Robust Algebraic Anonymous Broadcast from Additive BasesChongwon Cho, Samuel Dittmer, Yuval Ishai, Steve Lu, Rafail Ostrovsky
    USENIX Security '24Abuse Reporting for Metadata-Hiding Communication Based on Secret SharingSaba Eskandarian
    USENIX Security '24PerfOMR: Oblivious Message Retrieval with Reduced Communication and ComputationZeyu Liu, Eran Tromer, Yunhao Wang
    USENIX Security '24Data Subjects' Reactions to Exercising Their Right of AccessArthur Borem, Elleen Pan, Olufunmilola Obielodan, Aurelie Roubinowitz, Luca Dovichi, Michelle L. Mazurek, Blase Ur
    USENIX Security '24Security and Privacy Software Creators' Perspectives on Unintended ConsequencesHarshini Sri Ramulu, Helen Schmitt, Dominik Wermke, Yasemin Acar
    USENIX Security '24CAMP: Compiler and Allocator-based Heap Memory ProtectionZhenpeng Lin, Zheng Yu, Ziyi Guo, Simone Campanoni, Peter Dinda, Xinyu Xing
    USENIX Security '24SecurityNet: Assessing Machine Learning Vulnerabilities on Public ModelsBoyang Zhang, Zheng Li, Ziqing Yang, Xinlei He, Michael Backes, Mario Fritz, Yang Zhang
    USENIX Security '24Machine Learning needs Better Randomness Standards: Randomised Smoothing and PRNG-based attacksPranav Dahiya, Ilia Shumailov, Ross Anderson
    USENIX Security '24Speculative Denial-of-Service Attacks In EthereumAviv Yaish, Kaihua Qin, Liyi Zhou, Aviv Zohar, Arthur Gervais
    USENIX Security '24VoltSchemer: Use Voltage Noise to Manipulate Your Wireless ChargerZihao Zhan, Yirui Yang, Haoqi Shan, Hanqiu Wang, Yier Jin, Shuo Wang
    USENIX Security '24Stop, Don't Click Here Anymore: Boosting Website Fingerprinting By Considering Sets of SubpagesAsya Mitseva, Andriy Panchenko
    USENIX Security '24MetaSafe: Compiling for Protecting Smart Pointer Metadata to Ensure Safe Rust IntegrityMartin Kayondo, Inyoung Bang, Yeongjun Kwak, Hyungon Moon, Yunheung Paek
    USENIX Security '24DONAPI: Malicious NPM Packages Detector using Behavior Sequence Knowledge MappingCheng Huang, Nannan Wang, Ziyan Wang, Siqi Sun, Lingzi Li, Junren Chen, Qianchong Zhao, Jiaxuan Han, Zhen Yang, Lei Shi
    USENIX Security '24VibSpeech: Exploring Practical Wideband Eavesdropping via Bandlimited Signal of Vibration-based Side ChannelChao Wang, Feng Lin, Hao Yan, Tong Wu, Wenyao Xu, Kui Ren
    USENIX Security '24PatchCURE: Improving Certifiable Robustness, Model Utility, and Computation Efficiency of Adversarial Patch DefensesChong Xiang, Tong Wu, Sihui Dai, Jonathan Petit, Suman Jana, Prateek Mittal
    USENIX Security '24Fledging Will Continue Until Privacy Improves: Empirical Analysis of Google's Privacy-Preserving Targeted AdvertisingGiuseppe Calderonio, Mir Masood Ali, Jason Polakis
    USENIX Security '24ZKSMT: A VM for Proving SMT Theorems in Zero KnowledgeDaniel Luick, John C. Kolesar, Timos Antonopoulos, William R. Harris, James Parker, Ruzica Piskac, Eran Tromer, Xiao Wang, Ning Luo
    USENIX Security '24HECKLER: Breaking Confidential VMs with Malicious InterruptsBenedict Schlüter, Supraja Sridhara, Mark Kuhne, Andrin Bertschi, Shweta Shinde
    USENIX Security '24Scalable Zero-knowledge Proofs for Non-linear Functions in Machine LearningMeng Hao, Hanxiao Chen, Hongwei Li, Chenkai Weng, Yuan Zhang, Haomiao Yang, Tianwei Zhang

Pages