Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '23High Recovery with Fewer Injections: Practical Binary Volumetric Injection Attacks against Dynamic Searchable EncryptionXianglong Zhang, Wei Wang, Peng Xu, Laurence T. Yang, Kaitai Liang
    USENIX Security '23Prime Match: A Privacy-Preserving Inventory Matching SystemAntigoni Polychroniadou, Gilad Asharov, Benjamin Diamond, Tucker Balch, Hans Buehler, Richard Hua, Suwen Gu, Greg Gimler, Manuela Veloso
    USENIX Security '23Squirrel: A Scalable Secure Two-Party Computation Framework for Training Gradient Boosting Decision TreeWen-jie Lu, Zhicong Huang, Qizhi Zhang, Yuchen Wang, Cheng Hong
    USENIX Security '23TAP: Transparent and Privacy-Preserving Data ServicesDaniel Reijsbergen, Aung Maw, Zheng Yang, Tien Tuan Anh Dinh, Jianying Zhou
    USENIX Security '23TRust: A Compilation Framework for In-process Isolation to Protect Safe Rust against Untrusted CodeInyoung Bang, Martin Kayondo, Hyungon Moon, Yunheung Paek
    USENIX Security '23Every Signature is Broken: On the Insecurity of Microsoft Office’s OOXML SignaturesSimon Rohlmann, Vladislav Mladenov, Christian Mainka, Daniel Hirschberger, Jörg Schwenk
    USENIX Security '23Detecting Multi-Step IAM Attacks in AWS Environments via Model CheckingIlia Shevrin, Oded Margalit
    USENIX Security '23V1SCAN: Discovering 1-day Vulnerabilities in Reused C/C++ Open-source Software Components Using Code Classification TechniquesSeunghoon Woo, Eunjin Choi, Heejo Lee, Hakjoo Oh
    USENIX Security '23Isolated and Exhausted: Attacking Operating Systems via Site Isolation in the BrowserMatthias Gierlings, Marcus Brinkmann, Jörg Schwenk
    USENIX Security '23AutoFR: Automated Filter Rule Generation for AdblockingHieu Le, Salma Elmalaki, Athina Markopoulou, Zubair Shafiq
    USENIX Security '23Cipherfix: Mitigating Ciphertext Side-Channel Attacks in SoftwareJan Wichelmann, Anna Pätschke, Luca Wilke, Thomas Eisenbarth
    USENIX Security '23PELICAN: Exploiting Backdoors of Naturally Trained Deep Learning Models In Binary Code AnalysisZhuo Zhang, Guanhong Tao, Guangyu Shen, Shengwei An, Qiuling Xu, Yingqi Liu, Yapeng Ye, Yaoxuan Wu, Xiangyu Zhang
    USENIX Security '23The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 DecodersWilly R. Vasquez, Stephen Checkoway, Hovav Shacham
    USENIX Security '23Extending a Hand to Attackers: Browser Privilege Escalation Attacks via ExtensionsYoung Min Kim, Byoungyoung Lee
    USENIX Security '23Eos: Efficient Private Delegation of zkSNARK ProversAlessandro Chiesa, Ryan Lehmkuhl, Pratyush Mishra, Yinuo Zhang
    USENIX Security '23Improving Real-world Password Guessing Attacks via Bi-directional TransformersMing Xu, Jitao Yu, Xinyi Zhang, Chuanwang Wang, Shenghao Zhang, Haoqi Wu, Weili Han
    USENIX Security '23Glowing in the Dark: Uncovering IPv6 Address Discovery and Scanning Strategies in the WildHammas Bin Tanveer, Rachee Singh, Paul Pearce, Rishab Nithyanand
    USENIX Security '23One Server for the Price of Two: Simple and Fast Single-Server Private Information RetrievalAlexandra Henzinger, Matthew M. Hong, Henry Corrigan-Gibbs, Sarah Meiklejohn, Vinod Vaikuntanathan
    USENIX Security '23POLICYCOMP: Counterpart Comparison of Privacy Policies Uncovers Overbroad Personal Data Collection PracticesLu Zhou, Chengyongxiao Wei, Tong Zhu, Guoxing Chen, Xiaokuan Zhang, Suguo Du, Hui Cao, Haojin Zhu
    USENIX Security '23Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-MXhani Marvin Saß, Richard Mitev, Ahmad-Reza Sadeghi
    USENIX Security '23ICSPatch: Automated Vulnerability Localization and Non-Intrusive Hotpatching in Industrial Control Systems using Data Dependence GraphsPrashant Hari Narayan Rajput, Constantine Doumanidis, Michail Maniatakos
    USENIX Security '23Beyond The Gates: An Empirical Analysis of HTTP-Managed Password Stealers and OperatorsAthanasios Avgetidis, Omar Alrawi, Kevin Valakuzhy, Charles Lever, Paul Burbage, Angelos D. Keromytis, Fabian Monrose, Manos Antonakakis
    USENIX Security '23Trojan Source: Invisible VulnerabilitiesNicholas Boucher, Ross Anderson
    USENIX Security '23FirmSolo: Enabling dynamic analysis of binary Linux-based IoT kernel modulesIoannis Angelakopoulos, Gianluca Stringhini, Manuel Egele
    USENIX Security '23Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknessesVincent Cheval, Cas Cremers, Alexander Dax, Lucca Hirschi, Charlie Jacomme, Steve Kremer

Pages