Search results

    USENIX Security '23Educators’ Perspectives of Using (or Not Using) Online Exam Proctoring
    USENIX Security '23Detecting and Handling IoT Interaction Threats in Multi-Platform Multi-Control-Channel Smart Homes
    USENIX Security '23Design of Access Control Mechanisms in Systems-on-Chip with Formal Integrity Guarantees
    USENIX Security '23Duoram: A Bandwidth-Efficient Distributed ORAM for 2- and 3-Party Computation
    USENIX Security '23Diving into Robocall Content with SnorCall
    USENIX Security '23Detecting Multi-Step IAM Attacks in AWS Environments via Model Checking
    USENIX Security '23Don’t be Dense: Efficient Keyword PIR for Sparse Databases
    USENIX Security '23PrivateFL: Accurate, Differentially Private Federated Learning via Personalized Data Transformation
    USENIX Security '23Did the Shark Eat the Watchdog in the NTP Pool? Deceiving the NTP Pool’s Monitoring System
    USENIX Security '23DiffSmooth: Certifiably Robust Learning via Diffusion Models and Local Smoothing
    USENIX Security '23DDRace: Finding Concurrency UAF Vulnerabilities in Linux Drivers with Directed Fuzzing
    USENIX Security '23Prime Match: A Privacy Preserving Inventory Matching System
    USENIX Security '23Defining "Broken": User Experiences and Remediation Tactics When Ad-Blocking or Tracking-Protection Tools Break a Website’s User Experience
    USENIX Security '23Catch You and I Can: Revealing Source Voiceprint Against Voice Conversion
    USENIX Security '23Pool-Party: Exploiting Browser Resource Pools for Web Tracking
    USENIX Security '23Place Your Locks Well: Understanding and Detecting Lock Misuse Bugs
    USENIX Security '23Practical Asynchronous High-threshold Distributed Key Generation and Distributed Polynomial Sampling
    USENIX Security '23PELICAN: Exploiting Backdoors of Naturally Trained Deep Learning Models In Binary Code Analysis
    USENIX Security '23Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software
    USENIX Security '23Bleem: Packet Sequence Oriented Fuzzing for Protocol Implementations
    USENIX Security '23Password Guessing Using Random Forest
    USENIX Security '23NRDelegationAttack: Complexity DDoS attack on DNS Recursive Resolvers
    USENIX Security '23CarpetFuzz: Automatic Program Option Constraint Extraction from Documentation for Fuzzing
    USENIX Security '23Bug Hunters’ Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem
    USENIX Security '23BoKASAN: Binary-only Kernel Address Sanitizer for Effective Kernel Fuzzing