Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '23Sherlock on Specs: Building LTE Conformance Tests through Automated ReasoningYi Chen, Di Tang, Yepeng Yao, Mingming Zha, XiaoFeng Wang, Xiaozhong Liu, Haixu Tang, Baoxu Liu
    USENIX Security '23ACon^2: Adaptive Conformal Consensus for Provable Blockchain OraclesSangdon Park, Osbert Bastani, Taesoo Kim
    USENIX Security '23A Research Framework and Initial Study of Browser Security for the Visually ImpairedElaine Lau, Zachary Peterson
    USENIX Security '23DynSQL: Stateful Fuzzing for Database Management Systems with Complex and Valid SQL Query GenerationZu-Ming Jiang, Jia-Ju Bai, Zhendong Su
    USENIX Security '23xNIDS: Explaining Deep Learning-based Network Intrusion Detection Systems for Active Intrusion ResponsesFeng Wei, Hongda Li, Ziming Zhao, Hongxin Hu
    USENIX Security '23Remote Attacks on Speech Recognition Systems Using Sound from Power SupplyLanqing Yang, Xinqi Chen, Xiangyong Jian, Leping Yang, Yijie Li, Qianfei Ren, Yi-Chao Chen, Guangtao Xue, Xiaoyu Ji
    USENIX Security '23HOMESPY: The Invisible Sniffer of Infrared Remote Control of Smart TVsKong Huang, YuTong Zhou, Ke Zhang, Jiacen Xu, Jiongyi Chen, Di Tang, Kehuan Zhang
    USENIX Security '23“If sighted people know, I should be able to know:” Privacy Perceptions of Bystanders with Visual Impairments around Camera-based TechnologyYuhang Zhao, Yaxing Yao, Jiaru Fu, Nihan Zhou
    USENIX Security '23AIFORE: Smart Fuzzing Based on Automatic Input Format Reverse EngineeringJi Shi, Zhun Wang, Zhiyao Feng, Yang Lan, Shisong Qin, Wei You, Wei Zou, Mathias Payer, Chao Zhang
    USENIX Security '23Bleem: Packet Sequence Oriented Fuzzing for Protocol ImplementationsZhengxiong Luo, Junze Yu, Feilong Zuo, Jianzhong Liu, Yu Jiang, Ting Chen, Abhik Roychoudhury, Jiaguang Sun
    USENIX Security '23MINER: A Hybrid Data-Driven Approach for REST API FuzzingChenyang Lyu, Jiacheng Xu, Shouling Ji, Xuhong Zhang, Qinying Wang, Binbin Zhao, Gaoning Pan, Wei Cao, Peng Chen, Raheem Beyah
    USENIX Security '23PROGRAPHER: An Anomaly Detection System based on Provenance Graph EmbeddingFan Yang, Jiacen Xu, Chunlin Xiong, Zhou Li, Kehuan Zhang
    USENIX Security '23VeriZexe: Decentralized Private Computation with Universal SetupAlex Luoyuan Xiong, Binyi Chen, Zhenfei Zhang, Benedikt Bünz, Ben Fisch, Fernando Krell, Philippe Camacho
    USENIX Security '23CSHER: A System for Compact Storage with HE-RetrievalAdi Akavia, Neta Oren, Boaz Sapir, Margarita Vald
    USENIX Security '23ELASM: Error-Latency-Aware Scale Management for Fully Homomorphic EncryptionYongwoo Lee, Seonyoung Cheon, Dongkwan Kim, Dongyoon Lee, Hanjun Kim
    USENIX Security '23Near-Ultrasound Inaudible Trojan (Nuit): Exploiting Your Speaker to Attack Your MicrophoneQi Xia, Qian Chen, Shouhuai Xu
    USENIX Security '23Intender: Fuzzing Intent-Based Networking with Intent-State Transition GuidanceJiwon Kim, Benjamin E. Ujcich, Dave (Jing) Tian
    USENIX Security '23We Really Need to Talk About Session Tickets: A Large-Scale Analysis of Cryptographic Dangers with TLS Session TicketsSven Hebrok, Simon Nachtigall, Marcel Maehren, Nurullah Erinola, Robert Merget, Juraj Somorovsky, Jörg Schwenk
    USENIX Security '23ARGUS: Context-Based Detection of Stealthy IoT Infiltration AttacksPhillip Rieger, Marco Chilese, Reham Mohamed, Markus Miettinen, Hossein Fereidooni, Ahmad-Reza Sadeghi
    USENIX Security '23HOLMES: Efficient Distribution Testing for Secure Collaborative LearningIan Chang, Katerina Sotiraki, Weikeng Chen, Murat Kantarcioglu, Raluca Popa
    USENIX Security '23BalanceProofs: Maintainable Vector Commitments with Fast AggregationWeijie Wang, Annie Ulichney, Charalampos Papamanthou
    USENIX Security '23DiffSmooth: Certifiably Robust Learning via Diffusion Models and Local SmoothingJiawei Zhang, Zhongzhu Chen, Huan Zhang, Chaowei Xiao, Bo Li
    USENIX Security '23Automated Exploitable Heap Layout Generation for Heap Overflows Through Manipulation Distance-Guided FuzzingBin Zhang, Jiongyi Chen, Runhao Li, Chao Feng, Ruilin Li, Chaojing Tang
    USENIX Security '23V-Cloak: Intelligibility-, Naturalness- & Timbre-Preserving Real-Time Voice AnonymizationJiangyi Deng, Fei Teng, Yanjiao Chen, Xiaofu Chen, Zhaohui Wang, Wenyuan Xu
    USENIX Security '23The Impostor Among US(B): Off-Path Injection Attacks on USB CommunicationsRobert Dumitru, Daniel Genkin, Andrew Wabnitz, Yuval Yarom

Pages