Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '23Are Consumers Willing to Pay for Security and Privacy of IoT Devices?Pardis Emami-Naeini, Janarth Dheenadhayalan, Yuvraj Agarwal, Lorrie Faith Cranor
    USENIX Security '23PhyAuth: Physical-Layer Message Authentication for ZigBee NetworksAng Li, Jiawei Li, Dianqi Han, Yan Zhang, Tao Li, Ting Zhu, Yanchao Zhang
    USENIX Security '23Fairness Properties of Face Recognition and Obfuscation SystemsHarrison Rosenberg, Brian Tang, Kassem Fawaz, Somesh Jha
    USENIX Security '23Beyond The Gates: An Empirical Analysis of HTTP-Managed Password Stealers and OperatorsAthanasios Avgetidis, Omar Alrawi, Kevin Valakuzhy, Charles Lever, Paul Burbage, Angelos D. Keromytis, Fabian Monrose, Manos Antonakakis
    USENIX Security '23Decompiling x86 Deep Neural Network ExecutablesZhibo Liu, Yuanyuan Yuan, Shuai Wang, Xiaofei Xie, Lei Ma
    USENIX Security '23PolyFuzz: Holistic Greybox Fuzzing of Multi-Language SystemsWen Li, Jinyang Ruan, Guangbei Yi, Long Cheng, Xiapu Luo, Haipeng Cai
    USENIX Security '23Linear Private Set Union from Multi-Query Reverse Private Membership TestCong Zhang, Yu Chen, Weiran Liu, Min Zhang, Dongdai Lin
    USENIX Security '23An Efficient Design of Intelligent Network Data PlaneGuangmeng Zhou, Zhuotao Liu, Chuanpu Fu, Qi Li, Ke Xu
    USENIX Security '23AIFORE: Smart Fuzzing Based on Automatic Input Format Reverse EngineeringJi Shi, Zhun Wang, Zhiyao Feng, Yang Lan, Shisong Qin, Wei You, Wei Zou, Mathias Payer, Chao Zhang
    USENIX Security '23Inducing Authentication Failures to Bypass Credit Card PINsDavid Basin, Patrick Schaller, Jorge Toro-Pozo
    USENIX Security '23Silent Spring: Prototype Pollution Leads to Remote Code Execution in Node.jsMikhail Shcherbakov, Musard Balliu, Cristian-Alexandru Staicu
    USENIX Security '23Reassembly is Hard: A Reflection on Challenges and StrategiesHyungseok Kim, Soomin Kim, Junoh Lee, Kangkook Jee, Sang Kil Cha
    USENIX Security '23PCAT: Functionality and Data Stealing from Split Learning by Pseudo-Client AttackXinben Gao, Lan Zhang
    USENIX Security '23VulChecker: Graph-based Vulnerability Localization in Source CodeYisroel Mirsky, George Macon, Michael Brown, Carter Yagemann, Matthew Pruett, Evan Downing, Sukarno Mertoguno, Wenke Lee
    USENIX Security '23Examining Consumer Reviews to Understand Security and Privacy Issues in the Market of Smart Home DevicesSwaathi Vetrivel, Veerle van Harten, Carlos H. Gañán, Michel van Eeten, Simon Parkin
    USENIX Security '23Isolated and Exhausted: Attacking Operating Systems via Site Isolation in the BrowserMatthias Gierlings, Marcus Brinkmann, Jörg Schwenk
    USENIX Security '23Internet Service Providers' and Individuals' Attitudes, Barriers, and Incentives to Secure IoTNissy Sombatruang, Tristan Caulfield, Ingolf Becker, Akira Fujita, Takahiro Kasama, Koji Nakao, Daisuke Inoue
    USENIX Security '23Framing Frames: Bypassing Wi-Fi Encryption by Manipulating Transmit QueuesDomien Schepers, Aanjhan Ranganathan, Mathy Vanhoef
    USENIX Security '23Improving Logging to Reduce Permission Over-Granting MistakesBingyu Shen, Tianyi Shan, Yuanyuan Zhou
    USENIX Security '23V-Cloak: Intelligibility-, Naturalness- & Timbre-Preserving Real-Time Voice AnonymizationJiangyi Deng, Fei Teng, Yanjiao Chen, Xiaofu Chen, Zhaohui Wang, Wenyuan Xu
    USENIX Security '23PatchVerif: Discovering Faulty Patches in Robotic VehiclesHyungsub Kim, Muslum Ozgur Ozmen, Z. Berkay Celik, Antonio Bianchi, Dongyan Xu
    USENIX Security '23DISTDET: A Cost-Effective Distributed Cyber Threat Detection SystemFeng Dong, Liu Wang, Xu Nie, Fei Shao, Haoyu Wang, Ding Li, Xiapu Luo, Xusheng Xiao
    USENIX Security '23The Impostor Among US(B): Off-Path Injection Attacks on USB CommunicationsRobert Dumitru, Daniel Genkin, Andrew Wabnitz, Yuval Yarom
    USENIX Security '23Fuzztruction: Using Fault Injection-based Fuzzing to Leverage Implicit Domain KnowledgeNils Bars, Moritz Schloegel, Tobias Scharnowski, Nico Schiller, Thorsten Holz
    USENIX Security '23NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory SystemsZixuan Wang, Mohammadkazem Taram, Daniel Moghimi, Steven Swanson, Dean Tullsen, Jishen Zhao

Pages