Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '24Unveiling the Secrets without Data: Can Graph Neural Networks Be Exploited through Data-Free Model Extraction Attacks?Yuanxin Zhuang, Chuan Shi, Mengmei Zhang, Jinghui Chen, Lingjuan Lyu, Pan Zhou, Lichao Sun
    USENIX Security '24ATTention Please! An Investigation of the App Tracking Transparency PermissionReham Mohamed, Arjun Arunasalam, Habiba Farrukh, Jason Tong, Antonio Bianchi, Z. Berkay Celik
    USENIX Security '24SHiFT: Semi-hosted Fuzz Testing for Embedded ApplicationsAlejandro Mera, Changming Liu, Ruimin Sun, Engin Kirda, Long Lu
    USENIX Security '24Learning with Semantics: Towards a Semantics-Aware Routing Anomaly Detection SystemYihao Chen, Qilei Yin, Qi Li, Zhuotao Liu, Ke Xu, Yi Xu, Mingwei Xu, Ziqian Liu, Jianping Wu
    USENIX Security '24MultiFuzz: A Multi-Stream Fuzzer For Testing Monolithic FirmwareMichael Chesser, Surya Nepal, Damith C. Ranasinghe
    USENIX Security '24"There are rabbit holes I want to go down that I'm not allowed to go down": An Investigation of Security Expert Threat Modeling Practices for Medical DevicesRonald E. Thompson, Madline McLaughlin, Carson Powers, Daniel Votipka
    USENIX Security '24Towards More Practical Threat Models in Artificial Intelligence SecurityKathrin Grosse, Lukas Bieringer, Tarek R. Besold, Alexandre M. Alahi
    USENIX Security '24From the Childhood Past: Views of Young Adults on Parental Sharing of Children's PhotosTania Ghafourian, Nicholas Micallef, Sameer Patil
    USENIX Security '24WhisperFuzz: White-Box Fuzzing for Detecting and Locating Timing Vulnerabilities in ProcessorsPallavi Borkar, Chen Chen, Mohamadreza Rostami, Nikhilesh Singh, Rahul Kande, Ahmad-Reza Sadeghi, Chester Rebeiro, Jeyavijayan Rajendran
    USENIX Security '24CellularLint: A Systematic Approach to Identify Inconsistent Behavior in Cellular Network SpecificationsMirza Masfiqur Rahman, Imtiaz Karim, Elisa Bertino
    USENIX Security '24A Decade of Privacy-Relevant Android App Reviews: Large Scale TrendsOmer Akgul, Sai Teja Peddinti, Nina Taft, Michelle L. Mazurek, Hamza Harkous, Animesh Srivastava, Benoit Seguin
    USENIX Security '24PIXELMOD: Improving Soft Moderation of Visual Misleading Information on TwitterPujan Paudel, Chen Ling, Jeremy Blackburn, Gianluca Stringhini
    USENIX Security '24DeepEclipse: How to Break White-Box DNN-Watermarking SchemesAlessandro Pegoraro, Carlotta Segna, Kavita Kumari, Ahmad-Reza Sadeghi
    USENIX Security '24SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and PracticeTushar Nayan, Qiming Guo, Mohammed Al Duniawi, Marcus Botacin, Selcuk Uluagac, Ruimin Sun
    USENIX Security '24ClearStamp: A Human-Visible and Robust Model-Ownership Proof based on Transposed Model TrainingTorsten Krauß, Jasper Stang, Alexandra Dmitrienko
    USENIX Security '24On Data Fabrication in Collaborative Vehicular Perception: Attacks and CountermeasuresQingzhao Zhang, Shuowei Jin, Ruiyang Zhu, Jiachen Sun, Xumiao Zhang, Qi Alfred Chen, Z. Morley Mao
    USENIX Security '24RECORD: A RECeption-Only Region Determination Attack on LEO Satellite UsersEric Jedermann, Martin Strohmeier, Vincent Lenders, Jens Schmitt
    USENIX Security '24FFXE: Dynamic Control Flow Graph Recovery for Embedded Firmware BinariesRyan Tsang, Doreen Joseph, Soheil Salehi, Prasant Mohapatra, Houman Homayoun
    USENIX Security '24Your Firmware Has Arrived: A Study of Firmware Update VulnerabilitiesYuhao Wu, Jinwen Wang, Yujie Wang, Shixuan Zhai, Zihan Li, Yi He, Kun Sun, Qi Li, Ning Zhang
    USENIX Security '24Security and Privacy Analysis of Samsung's Crowd-Sourced Bluetooth Location Tracking SystemTingfeng Yu, James Henderson, Alwen Tiu, Thomas Haines
    USENIX Security '24A High Coverage Cybersecurity Scale Predictive of User BehaviorYukiko Sawaya, Sarah Lu, Takamasa Isohara, Mahmood Sharif
    USENIX Security '24Quantifying Privacy Risks of Prompts in Visual Prompt LearningYixin Wu, Rui Wen, Michael Backes, Pascal Berrang, Mathias Humbert, Yun Shen, Yang Zhang
    USENIX Security '24Is It a Trap? A Large-scale Empirical Study And Comprehensive Assessment of Online Automated Privacy Policy Generators for Mobile AppsShidong Pan, Dawen Zhang, Mark Staples, Zhenchang Xing, Jieshan Chen, Xiwei Xu, Thong Hoang
    USENIX Security '24Batch PIR and Labeled PSI with Oblivious Ciphertext CompressionAlexander Bienstock, Sarvar Patel, Joon Young Seo, Kevin Yeo
    USENIX Security '24PointerGuess: Targeted Password Guessing Model Using Pointer MechanismKedong Xiu, Ding Wang

Pages