Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '24D-Helix: A Generic Decompiler Testing Framework Using Symbolic DifferentiationMuqi Zou, Arslan Khan, Ruoyu Wu, Han Gao, Antonio Bianchi, Dave (Jing) Tian
    USENIX Security '24SWOOSH: Efficient Lattice-Based Non-Interactive Key ExchangePhillip Gajland, Bor de Kock, Miguel Quaresma, Giulio Malavolta, Peter Schwabe
    USENIX Security '24Towards Privacy-Preserving Social-Media SDKs on AndroidHaoran Lu, Yichen Liu, Xiaojing Liao, Luyi Xing
    USENIX Security '24DVa: Extracting Victims and Abuse Vectors from Android Accessibility MalwareHaichuan Xu, Mingxuan Yao, Runze Zhang, Mohamed Moustafa Dawoud, Jeman Park, Brendan Saltaformaggio
    USENIX Security '24SoK: State of the Krawlers – Evaluating the Effectiveness of Crawling Algorithms for Web Security MeasurementsAleksei Stafeev, Giancarlo Pellegrino
    USENIX Security '24Web Platform Threats: Automated Detection of Web Security Issues With WPTPedro Bernardo, Lorenzo Veronese, Valentino Dalla Valle, Stefano Calzavara, Marco Squarcina, Pedro Adão, Matteo Maffei
    USENIX Security '24Fuzzing BusyBox: Leveraging LLM and Crash Reuse for Embedded Bug UnearthingYaroslav Oliinyk, Michael Scott, Ryan Tsang, Chongzhou Fang, Houman Homayoun
    USENIX Security '24SoK: The Good, The Bad, and The Unbalanced: Measuring Structural Limitations of Deepfake Media DatasetsSeth Layton, Tyler Tucker, Daniel Olszewski, Kevin Warren, Kevin Butler, Patrick Traynor
    USENIX Security '24GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent PrefetchersBoru Chen, Yingchen Wang, Pradyumna Shome, Christopher Fletcher, David Kohlbrenner, Riccardo Paccagnella, Daniel Genkin
    USENIX Security '24CacheWarp: Software-based Fault Injection using Selective State ResetRuiyi Zhang, Lukas Gerlach, Daniel Weber, Lorenz Hetterich, Youheng Lü, Andreas Kogler, Michael Schwarz
    USENIX Security '24SeaK: Rethinking the Design of a Secure Allocator for OS KernelZicheng Wang, Yicheng Guang, Yueqi Chen, Zhenpeng Lin, Michael Le, Dang K Le, Dan Williams, Xinyu Xing, Zhongshu Gu, Hani Jamjoom
    USENIX Security '24SafeFetch: Practical Double-Fetch Protection with Kernel-Fetch CachingVictor Duta, Mitchel Josephus Aloserij, Cristiano Giuffrida
    USENIX Security '24Practical Data-Only Attack GenerationBrian Johannesmeyer, Asia Slowinska, Herbert Bos, Cristiano Giuffrida
    USENIX Security '24Two Shuffles Make a RAM: Improved Constant Overhead Zero Knowledge RAMYibin Yang, David Heath
    USENIX Security '24Notus: Dynamic Proofs of Liabilities from Zero-knowledge RSA AccumulatorsJiajun Xin, Arman Haghighi, Xiangan Tian, Dimitrios Papadopoulos
    USENIX Security '24ABACuS: All-Bank Activation Counters for Scalable and Low Overhead RowHammer MitigationAtaberk Olgun, Yahya Can Tugrul, Nisa Bostanci, Ismail Emir Yuksel, Haocong Luo, Steve Rhyner, Abdullah Giray Yaglikci, Geraldo F. Oliveira, Onur Mutlu
    USENIX Security '24SledgeHammer: Amplifying Rowhammer via Bank-level ParallelismIngab Kang, Walter Wang, Jason Kim, Stephan van Schaik, Youssef Tobah, Daniel Genkin, Andrew Kwong, Yuval Yarom
    USENIX Security '24AI Psychiatry: Forensic Investigation of Deep Learning Networks in Memory ImagesDavid Oygenblik, Carter Yagemann, Joseph Zhang, Arianna Mastali, Jeman Park, Brendan Saltaformaggio
    USENIX Security '24Automated Large-Scale Analysis of Cookie Notice ComplianceAhmed Bouhoula, Karel Kubicek, Amit Zac, Carlos Cotrini, David Basin
    USENIX Security '24Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation for Binary Code Similarity DetectionHaojie He, Xingwei Lin, Ziang Weng, Ruijie Zhao, Shuitao Gan, Libo Chen, Yuede Ji, Jiashui Wang, Zhi Xue
    USENIX Security '24Inference of Error Specifications and Bug Detection Using Structural SimilaritiesNiels Dossche, Bart Coppens
    USENIX Security '24Scalable Multi-Party Computation Protocols for Machine Learning in the Honest-Majority Setting
    USENIX Security '24The Challenges of Bringing Cryptography from Research Papers to Products: Results from an Interview Study with ExpertsKonstantin Fischer, Ivana Trummová, Phillip Gajland, Yasemin Acar, Sascha Fahl, Angela Sasse
    USENIX Security '24"These results must be false": A usability evaluation of constant-time analysis toolsMarcel Fourné, Daniel De Almeida Braga, Jan Jancar, Mohamed Sabt, Peter Schwabe, Gilles Barthe, Pierre-Alain Fouque, Yasemin Acar
    USENIX Security '24From the Childhood Past: Views of Young Adults on Parental Sharing of Children's PhotosTania Ghafourian, Nicholas Micallef, Sameer Patil

Pages