Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '24"I'm not convinced that they don't collect more than is necessary": User-Controlled Data Minimization Design in Search EnginesTanusree Sharma, Lin Kyi, Yang Wang, Asia J. Biega
    USENIX Security '24Penetration Vision through Virtual Reality Headsets: Identifying 360-degree Videos from Head MovementsAnh Nguyen, Xiaokuan Zhang, Zhisheng Yan
    USENIX Security '24SOAP: A Social Authentication ProtocolFelix Linker, David Basin
    USENIX Security '24Logic Gone Astray: A Security Analysis Framework for the Control Plane Protocols of 5G BasebandsKai Tu, Abdullah Al Ishtiaq, Syed Md Mukit Rashid, Yilu Dong, Weixuan Wang, Tianwei Wu, Syed Rafiul Hussain
    USENIX Security '24"What Keeps People Secure is That They Met The Security Team": Deconstructing Drivers And Goals of Organizational Security AwarenessJonas Hielscher, Simon Parkin
    USENIX Security '24Fast RS-IOP Multivariate Polynomial Commitments and Verifiable Secret SharingZongyang Zhang, Weihan Li, Yanpei Guo, Kexin Shi, Sherman S. M. Chow, Ximeng Liu, Jin Dong
    USENIX Security '24Rabbit-Mix: Robust Algebraic Anonymous Broadcast from Additive BasesChongwon Cho, Samuel Dittmer, Yuval Ishai, Steve Lu, Rafail Ostrovsky
    USENIX Security '24Abuse Reporting for Metadata-Hiding Communication Based on Secret SharingSaba Eskandarian
    USENIX Security '24PerfOMR: Oblivious Message Retrieval with Reduced Communication and ComputationZeyu Liu, Eran Tromer, Yunhao Wang
    USENIX Security '24Data Subjects' Reactions to Exercising Their Right of AccessArthur Borem, Elleen Pan, Olufunmilola Obielodan, Aurelie Roubinowitz, Luca Dovichi, Michelle L. Mazurek, Blase Ur
    USENIX Security '24Security and Privacy Software Creators' Perspectives on Unintended ConsequencesHarshini Sri Ramulu, Helen Schmitt, Dominik Wermke, Yasemin Acar
    USENIX Security '24HECKLER: Breaking Confidential VMs with Malicious InterruptsBenedict Schlüter, Supraja Sridhara, Mark Kuhne, Andrin Bertschi, Shweta Shinde
    USENIX Security '24Understanding the Security and Privacy Implications of Online Toxic Content on RefugeesArjun Arunasalam, Habiba Farrukh, Eliz Tekcan, Z. Berkay Celik
    USENIX Security '24Racing on the Negative Force: Efficient Vulnerability Root-Cause Analysis through Reinforcement Learning on CounterexamplesDandan Xu, Di Tang, Yi Chen, XiaoFeng Wang, Kai Chen, Haixu Tang, Longxing Li
    USENIX Security '24CAMP: Compiler and Allocator-based Heap Memory ProtectionZhenpeng Lin, Zheng Yu, Ziyi Guo, Simone Campanoni, Peter Dinda, Xinyu Xing
    USENIX Security '24Splitting the Difference on Adversarial TrainingMatan Levi, Aryeh Kontorovich
    USENIX Security '24Hermes: Unlocking Security Analysis of Cellular Network Protocols by Synthesizing Finite State Machines from Natural Language SpecificationsAbdullah Al Ishtiaq, Sarkar Snigdha Sarathi Das, Syed Md Mukit Rashid, Ali Ranjbar, Kai Tu, Tianwei Wu, Zhezheng Song, Weixuan Wang, Mujtahid Akon, Rui Zhang, Syed Rafiul Hussain
    USENIX Security '24SecurityNet: Assessing Machine Learning Vulnerabilities on Public ModelsBoyang Zhang, Zheng Li, Ziqing Yang, Xinlei He, Michael Backes, Mario Fritz, Yang Zhang
    USENIX Security '24Machine Learning needs Better Randomness Standards: Randomised Smoothing and PRNG-based attacksPranav Dahiya, Ilia Shumailov, Ross Anderson
    USENIX Security '24VoltSchemer: Use Voltage Noise to Manipulate Your Wireless ChargerZihao Zhan, Yirui Yang, Haoqi Shan, Hanqiu Wang, Yier Jin, Shuo Wang
    USENIX Security '24OPTIKS: An Optimized Key Transparency SystemJulia Len, Melissa Chase, Esha Ghosh, Kim Laine, Radames Cruz Moreno
    USENIX Security '24Stop, Don't Click Here Anymore: Boosting Website Fingerprinting By Considering Sets of SubpagesAsya Mitseva, Andriy Panchenko
    USENIX Security '24MetaSafe: Compiling for Protecting Smart Pointer Metadata to Ensure Safe Rust IntegrityMartin Kayondo, Inyoung Bang, Yeongjun Kwak, Hyungon Moon, Yunheung Paek
    USENIX Security '24DONAPI: Malicious NPM Packages Detector using Behavior Sequence Knowledge MappingCheng Huang, Nannan Wang, Ziyan Wang, Siqi Sun, Lingzi Li, Junren Chen, Qianchong Zhao, Jiaxuan Han, Zhen Yang, Lei Shi
    USENIX Security '24VibSpeech: Exploring Practical Wideband Eavesdropping via Bandlimited Signal of Vibration-based Side ChannelChao Wang, Feng Lin, Hao Yan, Tong Wu, Wenyao Xu, Kui Ren

Pages