Search results

    USENIX Security '23URET: Universal Robustness Evaluation Toolkit (for Evasion)Kevin Eykholt, Taesung Lee, Douglas Schales, Jiyong Jang, Ian Molloy
    USENIX Security '23Investigating Verification Behavior and Perceptions of Visual Digital CertificatesDañiel Gerhardt, Alexander Ponticello, Adrian Dabrowski, Katharina Krombholz
    USENIX Security '23The Role of Professional Product Reviewers in Evaluating Security and PrivacyWentao Guo, Jason Walter, Michelle L. Mazurek
    USENIX Security '23We Really Need to Talk About Session Tickets: A Large-Scale Analysis of Cryptographic Dangers with TLS Session TicketsSven Hebrok, Simon Nachtigall, Marcel Maehren, Nurullah Erinola, Robert Merget, Juraj Somorovsky, Jörg Schwenk
    USENIX Security '23Fourteen Years in the Life: A Root Server’s Perspective on DNS Resolver SecurityAlden Hilton, Casey Deccio, Jacob Davis
    USENIX Security '23BoKASAN: Binary-only Kernel Address Sanitizer for Effective Kernel FuzzingMingi Cho, Dohyeon An, Hoyong Jin, Taekyoung Kwon
    USENIX Security '23KextFuzz: Fuzzing macOS Kernel EXTensions on Apple Silicon via Exploiting MitigationsTingting Yin, Zicong Gao, Zhenghang Xiao, Zheyu Ma, Min Zheng, Chao Zhang
    USENIX Security '23HOMESPY: The Invisible Sniffer of Infrared Remote Control of Smart TVsKong Huang, YuTong Zhou, Ke Zhang, Jiacen Xu, Jiongyi Chen, Di Tang, Kehuan Zhang
    USENIX Security '23No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial LearningThorsten Eisenhofer, Erwin Quiring, Jonas Möller, Doreen Riepel, Thorsten Holz, Konrad Rieck
    USENIX Security '23Assessing Anonymity Techniques Employed in German Court Decisions: A De-Anonymization ExperimentDominic Deuber, Michael Keuchen, Nicolas Christin
    USENIX Security '23Content-Type: multipart/oracle - Tapping into Format Oracles in Email End-to-End EncryptionFabian Ising, Damian Poddebniak, Tobias Kappert, Christoph Saatjohann, Sebastian Schinzel
    USENIX Security '23PCAT: Functionality and Data Stealing from Split Learning by Pseudo-Client AttackXinben Gao, Lan Zhang
    USENIX Security '23Guarding Serverless Applications with KaliumDeepak Sirone Jegan, Liang Wang, Siddhant Bhagat, Michael Swift
    USENIX Security '23PatchVerif: Discovering Faulty Patches in Robotic VehiclesHyungsub Kim, Muslum Ozgur Ozmen, Z. Berkay Celik, Antonio Bianchi, Dongyan Xu
    USENIX Security '23A Research Framework and Initial Study of Browser Security for the Visually ImpairedElaine Lau, Zachary Peterson
    USENIX Security '23X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item DetectionAishan Liu, Jun Guo, Jiakai Wang, Siyuan Liang, Renshuai Tao, Wenbo Zhou, Cong Liu, Xianglong Liu, Dacheng Tao
    USENIX Security '23A Data-free Backdoor Injection Approach in Neural NetworksPeizhuo Lv, Chang Yue, Ruigang Liang, Yunfei Yang, Shengzhi Zhang, Hualong Ma, Kai Chen
    USENIX Security '23A Large Scale Study of the Ethereum Arbitrage EcosystemRobert McLaughlin, Christopher Kruegel, Giovanni Vigna
    USENIX Security '23Design of Access Control Mechanisms in Systems-on-Chip with Formal Integrity GuaranteesDino Mehmedagić, Mohammad Rahmani Fadiheh, Johannes Müller, Anna Lena Duque Antón, Dominik Stoffel, Wolfgang Kunz
    USENIX Security '23Eavesdropping Mobile App Activity via Radio-Frequency Energy HarvestingTao Ni, Guohao Lan, Jia Wang, Qingchuan Zhao, Weitao Xu
    USENIX Security '23Defining "Broken": User Experiences and Remediation Tactics When Ad-Blocking or Tracking-Protection Tools Break a Website’s User ExperienceAlexandra Nisenoff, Arthur Borem, Madison Pickering, Grant Nakanishi, Maya Thumpasery, Blase Ur
    USENIX Security '23User Awareness and Behaviors Concerning Encrypted DNS Settings in Web BrowsersAlexandra Nisenoff, Ranya Sharma, Nick Feamster
    USENIX Security '23ACon^2: Adaptive Conformal Consensus for Provable Blockchain OraclesSangdon Park, Osbert Bastani, Taesoo Kim
    USENIX Security '23The Blockchain Imitation GameKaihua Qin, Stefanos Chaliasos, Liyi Zhou, Benjamin Livshits, Dawn Song, Arthur Gervais
    USENIX Security '23ARGUS: Context-Based Detection of Stealthy IoT Infiltration AttacksPhillip Rieger, Marco Chilese, Reham Mohamed, Markus Miettinen, Hossein Fereidooni, Ahmad-Reza Sadeghi