Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '24Arcanum: Detecting and Evaluating the Privacy Risks of Browser Extensions on Web Pages and Web ContentQinge Xie, Manoj Vignesh Kasi Murali, Paul Pearce, Frank Li
    USENIX Security '24Towards More Practical Threat Models in Artificial Intelligence SecurityKathrin Grosse, Lukas Bieringer, Tarek R. Besold, Alexandre M. Alahi
    USENIX Security '24From the Childhood Past: Views of Young Adults on Parental Sharing of Children's PhotosTania Ghafourian, Nicholas Micallef, Sameer Patil
    USENIX Security '24Smudged Fingerprints: Characterizing and Improving the Performance of Web Application FingerprintingBrian Kondracki, Nick Nikiforakis
    USENIX Security '24CellularLint: A Systematic Approach to Identify Inconsistent Behavior in Cellular Network SpecificationsMirza Masfiqur Rahman, Imtiaz Karim, Elisa Bertino
    USENIX Security '24A Decade of Privacy-Relevant Android App Reviews: Large Scale TrendsOmer Akgul, Sai Teja Peddinti, Nina Taft, Michelle L. Mazurek, Hamza Harkous, Animesh Srivastava, Benoit Seguin
    USENIX Security '24PURE: Payments with UWB RElay-protectionDaniele Coppola, Giovanni Camurati, Claudio Anliker, Xenia Hofmeier, Patrick Schaller, David Basin, Srdjan Capkun
    USENIX Security '24PIXELMOD: Improving Soft Moderation of Visual Misleading Information on TwitterPujan Paudel, Chen Ling, Jeremy Blackburn, Gianluca Stringhini
    USENIX Security '24Don't Listen To Me: Understanding and Exploring Jailbreak Prompts of Large Language ModelsZhiyuan Yu, Xiaogeng Liu, Shunning Liang, Zach Cameron, Chaowei Xiao, Ning Zhang
    USENIX Security '24DeepEclipse: How to Break White-Box DNN-Watermarking SchemesAlessandro Pegoraro, Carlotta Segna, Kavita Kumari, Ahmad-Reza Sadeghi
    USENIX Security '24SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and PracticeTushar Nayan, Qiming Guo, Mohammed Al Duniawi, Marcus Botacin, Selcuk Uluagac, Ruimin Sun
    USENIX Security '24ClearStamp: A Human-Visible and Robust Model-Ownership Proof based on Transposed Model TrainingTorsten Krauß, Jasper Stang, Alexandra Dmitrienko
    USENIX Security '24RECORD: A RECeption-Only Region Determination Attack on LEO Satellite UsersEric Jedermann, Martin Strohmeier, Vincent Lenders, Jens Schmitt
    USENIX Security '24FFXE: Dynamic Control Flow Graph Recovery for Embedded Firmware BinariesRyan Tsang, Doreen Joseph, Soheil Salehi, Prasant Mohapatra, Houman Homayoun
    USENIX Security '24Your Firmware Has Arrived: A Study of Firmware Update VulnerabilitiesYuhao Wu, Jinwen Wang, Yujie Wang, Shixuan Zhai, Zihan Li, Yi He, Kun Sun, Qi Li, Ning Zhang
    USENIX Security '24Security and Privacy Analysis of Samsung's Crowd-Sourced Bluetooth Location Tracking SystemTingfeng Yu, James Henderson, Alwen Tiu, Thomas Haines
    USENIX Security '24A High Coverage Cybersecurity Scale Predictive of User BehaviorYukiko Sawaya, Sarah Lu, Takamasa Isohara, Mahmood Sharif
    USENIX Security '24Quantifying Privacy Risks of Prompts in Visual Prompt LearningYixin Wu, Rui Wen, Michael Backes, Pascal Berrang, Mathias Humbert, Yun Shen, Yang Zhang
    USENIX Security '24Is It a Trap? A Large-scale Empirical Study And Comprehensive Assessment of Online Automated Privacy Policy Generators for Mobile AppsShidong Pan, Dawen Zhang, Mark Staples, Zhenchang Xing, Jieshan Chen, Xiwei Xu, Thong Hoang
    USENIX Security '24VeriSimplePIR: Verifiability in SimplePIR at No Online Cost for Honest ServersLeo de Castro, Keewoo Lee
    USENIX Security '24Batch PIR and Labeled PSI with Oblivious Ciphertext CompressionAlexander Bienstock, Sarvar Patel, Joon Young Seo, Kevin Yeo
    USENIX Security '24PointerGuess: Targeted Password Guessing Model Using Pointer MechanismKedong Xiu, Ding Wang
    USENIX Security '24"I just hated it and I want my money back": Data-driven Understanding of Mobile VPN Service Switching Preferences in The WildRohit Raj, Mridul Newar, Mainack Mondal
    USENIX Security '24iHunter: Hunting Privacy Violations at Scale in the Software Supply Chain on iOSDexin Liu, Yue Xiao, Chaoqi Zhang, Kaitao Xie, Xiaolong Bai, Shikun Zhang, Luyi Xing
    USENIX Security '24CDN Cannon: Exploiting CDN Back-to-Origin Strategies for Amplification AttacksZiyu Lin, Zhiwei Lin, Ximeng Liu, Jianjun Chen, Run Guo, Cheng Chen, Shaodong Xiao

Pages