Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '23IvySyn: Automated Vulnerability Discovery in Deep Learning Frameworks
    USENIX Security '23Lost at C: A User Study on the Security Implications of Large Language Model Code Assistants
    USENIX Security '23Know Your Cybercriminal: Evaluating Attacker Preferences by Measuring Profile Sales on an Active, Leading Criminal Market for User Impersonation at Scale
    USENIX Security '23autofz: Automated Fuzzer Composition at Runtime
    USENIX Security '23Araña: Discovering and Characterizing Password Guessing Attacks in Practice
    USENIX Security '23Improving Real-world Password Guessing Attacks via Bi-directional Transformers
    USENIX Security '23AURC: Detecting Errors in Program Code and Documentation
    USENIX Security '23InfinityGauntlet: Expose Smartphone Fingerprint Authentication to Brute-force Attack
    USENIX Security '23Authenticated private information retrieval
    USENIX Security '23It's all in your head(set): Side-channel attacks on AR/VR systems
    USENIX Security '23ARMore: Pushing love back into binaries
    USENIX Security '23Intender: Fuzzing Intent-Based Networking with Intent-State Transition Guidance
    USENIX Security '23ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks
    USENIX Security '23ARI: Attestation of Real-time Mission Execution Integrity
    USENIX Security '23Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks
    USENIX Security '23A Plot is Worth a Thousand Words: Model Information Stealing Attacks via Scientific Plots
    USENIX Security '23“Employees Who Don’t Accept the Time Security Takes Are Not Aware Enough”: The CISO View of Human-Centred Security
    USENIX Security '23Adversarial Training for Raw-Binary Malware Classifiers
    USENIX Security '23Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse
    USENIX Security '23“Security is not my field, I’m a stats guy”: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry
    USENIX Security '23A Large Scale Study of the Ethereum Arbitrage Ecosystem
    USENIX Security '23ACon^2: Adaptive Conformal Consensus for Provable Blockchain Oracles
    USENIX Security '23A Data-free Backdoor Injection Approach in Neural Networks
    USENIX Security '23An Input-Agnostic Hierarchical Deep Learning Framework for Traffic Fingerprinting
    USENIX Security '23Capstone: A Capability-based Foundation for Trustless Secure Memory Access

Pages