Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '23Person Re-identification in 3D Space: A WiFi Vision-based ApproachYili Ren, Yichao Wang, Sheng Tan, Yingying Chen, Jie Yang
    USENIX Security '23"All of them claim to be the best": Multi-perspective study of VPN users and VPN providersReethika Ramesh, Anjali Vyas, Roya Ensafi
    USENIX Security '23FirmSolo: Enabling dynamic analysis of binary Linux-based IoT kernel modulesIoannis Angelakopoulos, Gianluca Stringhini, Manuel Egele
    USENIX Security '23Assessing Anonymity Techniques Employed in German Court Decisions: A De-Anonymization ExperimentDominic Deuber, Michael Keuchen, Nicolas Christin
    USENIX Security '23Beyond The Gates: An Empirical Analysis of HTTP-Managed Password Stealers and OperatorsAthanasios Avgetidis, Omar Alrawi, Kevin Valakuzhy, Charles Lever, Paul Burbage, Angelos D. Keromytis, Fabian Monrose, Manos Antonakakis
    USENIX Security '23Silent Spring: Prototype Pollution Leads to Remote Code Execution in Node.jsMikhail Shcherbakov, Musard Balliu, Cristian-Alexandru Staicu
    USENIX Security '23PCAT: Functionality and Data Stealing from Split Learning by Pseudo-Client AttackXinben Gao, Lan Zhang
    USENIX Security '23Minimalist: Semi-automated Debloating of PHP Web Applications through Static AnalysisRasoul Jahanshahi, Babak Amin Azad, Nick Nikiforakis, Manuel Egele
    USENIX Security '23FABRID: Flexible Attestation-Based Routing for Inter-Domain NetworksCyrill Krähenbühl, Marc Wyss, David Basin, Vincent Lenders, Adrian Perrig, Martin Strohmeier
    USENIX Security '23Educators’ Perspectives of Using (or Not Using) Online Exam ProctoringDavid G. Balash, Elena Korkes, Miles Grant, Adam J. Aviv, Rahel A. Fainchtein, Micah Sherr
    USENIX Security '23No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial LearningThorsten Eisenhofer, Erwin Quiring, Jonas Möller, Doreen Riepel, Thorsten Holz, Konrad Rieck
    USENIX Security '23The OK Is Not Enough: A Large Scale Study of Consent Dialogs in Smartphone ApplicationsSimon Koch, Benjamin Altpeter, Martin Johns
    USENIX Security '23Long Live The Honey Badger: Robust Asynchronous DPSS and its ApplicationsThomas Yurek, Zhuolun Xiang, Yu Xia, Andrew Miller
    USENIX Security '23KextFuzz: Fuzzing macOS Kernel EXTensions on Apple Silicon via Exploiting MitigationsTingting Yin, Zicong Gao, Zhenghang Xiao, Zheyu Ma, Min Zheng, Chao Zhang
    USENIX Security '23A Plot is Worth a Thousand Words: Model Information Stealing Attacks via Scientific PlotsBoyang Zhang, Xinlei He, Yun Shen, Tianhao Wang, Yang Zhang
    USENIX Security '23​​How Library IT Staff Navigate Privacy and Security Challenges and ResponsibilitiesAlan F. Luo, Noel Warford, Samuel Dooley, Rachel Greenstadt, Michelle L. Mazurek, Nora McDonald
    USENIX Security '23Catch You and I Can: Revealing Source Voiceprint Against Voice ConversionJiangyi Deng, Yanjiao Chen, Yinan Zhong, Qianhao Miao, Xueluan Gong, Wenyuan Xu
    USENIX Security '23BoKASAN: Binary-only Kernel Address Sanitizer for Effective Kernel FuzzingMingi Cho, Dohyeon An, Hoyong Jin, Taekyoung Kwon
    USENIX Security '23Practical Asynchronous High-threshold Distributed Key Generation and Distributed Polynomial SamplingSourav Das, Zhuolun Xiang, Lefteris Kokoris-Kogias, Ling Ren
    USENIX Security '23NAUTILUS: Automated RESTful API Vulnerability DetectionGelei Deng, Zhiyi Zhang, Yuekang Li, Yi Liu, Tianwei Zhang, Yang Liu, Guo Yu, Dongjin Wang
    USENIX Security '23DISTDET: A Cost-Effective Distributed Cyber Threat Detection SystemFeng Dong, Liu Wang, Xu Nie, Fei Shao, Haoyu Wang, Ding Li, Xiapu Luo, Xusheng Xiao
    USENIX Security '23Automated Security Analysis of Exposure Notification SystemsKevin Morio, Ilkan Esiyok, Dennis Jackson, Robert Künnemann
    USENIX Security '23Strategies and Vulnerabilities of Participants in Venezuelan Influence OperationsRuben Recabarren, Bogdan Carbunar, Nestor Hernandez, Ashfaq Ali Shafin
    USENIX Security '23TAP: Transparent and Privacy-Preserving Data ServicesDaniel Reijsbergen, Aung Maw, Zheng Yang, Tien Tuan Anh Dinh, Jianying Zhou
    USENIX Security '23Device Tracking via Linux’s New TCP Source Port Selection AlgorithmMoshe Kol, Amit Klein, Yossi Gilad

Pages