USENIX Security '23 | IvySyn: Automated Vulnerability Discovery in Deep Learning Frameworks | |
USENIX Security '23 | Lost at C: A User Study on the Security Implications of Large Language Model Code Assistants | |
USENIX Security '23 | Know Your Cybercriminal: Evaluating Attacker Preferences by Measuring Profile Sales on an Active, Leading Criminal Market for User Impersonation at Scale | |
USENIX Security '23 | autofz: Automated Fuzzer Composition at Runtime | |
USENIX Security '23 | Araña: Discovering and Characterizing Password Guessing Attacks in Practice | |
USENIX Security '23 | Improving Real-world Password Guessing Attacks via Bi-directional Transformers | |
USENIX Security '23 | AURC: Detecting Errors in Program Code and Documentation | |
USENIX Security '23 | InfinityGauntlet: Expose Smartphone Fingerprint Authentication to Brute-force Attack | |
USENIX Security '23 | Authenticated private information retrieval | |
USENIX Security '23 | It's all in your head(set): Side-channel attacks on AR/VR systems | |
USENIX Security '23 | ARMore: Pushing love back into binaries | |
USENIX Security '23 | Intender: Fuzzing Intent-Based Networking with Intent-State Transition Guidance | |
USENIX Security '23 | ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks | |
USENIX Security '23 | ARI: Attestation of Real-time Mission Execution Integrity | |
USENIX Security '23 | Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks | |
USENIX Security '23 | A Plot is Worth a Thousand Words: Model Information Stealing Attacks via Scientific Plots | |
USENIX Security '23 | “Employees Who Don’t Accept the Time Security Takes Are Not Aware Enough”: The CISO View of Human-Centred Security | |
USENIX Security '23 | Adversarial Training for Raw-Binary Malware Classifiers | |
USENIX Security '23 | Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse | |
USENIX Security '23 | “Security is not my field, I’m a stats guy”: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry | |
USENIX Security '23 | A Large Scale Study of the Ethereum Arbitrage Ecosystem | |
USENIX Security '23 | ACon^2: Adaptive Conformal Consensus for Provable Blockchain Oracles | |
USENIX Security '23 | A Data-free Backdoor Injection Approach in Neural Networks | |
USENIX Security '23 | An Input-Agnostic Hierarchical Deep Learning Framework for Traffic Fingerprinting | |
USENIX Security '23 | Capstone: A Capability-based Foundation for Trustless Secure Memory Access | |