Conferences

Search results

    TitleConferenceSpeaker(s)
    ACORN: Input Validation for Secure AggregationUSENIX Security '23James Bell, Adrià Gascón, Tancrède Lepoint, Baiyu Li, Sarah Meiklejohn, Mariana Raykova, Cathie Yun
    Two Sides of the Shield: Understanding Protective DNS adoption factorsUSENIX Security '23Elsa Rodríguez, Radu Anghel, Simon Parkin, Michel van Eeten, Carlos Gañán
    Aliasing Backdoor Attacks on Pre-trained ModelsUSENIX Security '23Cheng'an Wei, Yeonjoon Lee, Kai Chen, Guozhu Meng, Peizhuo Lv
    QFA2SR: Query-Free Adversarial Transfer Attacks to Speaker Recognition SystemsUSENIX Security '23Guangke Chen, Yedi Zhang, Zhe Zhao, Fu Song
    BotScreen: Trust Everybody, but Cut the Aimbots YourselfUSENIX Security '23Minyeop Choi, Gihyuk Ko, Sang Kil Cha
    Detecting API Post-Handling Bugs Using Code and Description in PatchesUSENIX Security '23Miaoqian Lin, Kai Chen, Yang Xiao
    Fast IDentity Online with Anonymous Credentials (FIDO-AC)USENIX Security '23Wei-Zhu Yeoh, Michal Kepkowski, Gunnar Heide, Dali Kaafar, Lucjan Hanzlik
    Time for Change: How Clocks Break UWB Secure RangingUSENIX Security '23Claudio Anliker, Giovanni Camurati, Srdjan Čapkun
    Efficient Unbalanced Private Set Intersection Cardinality and User-friendly Privacy-preserving Contact TracingUSENIX Security '23Mingli Wu, Tsz Hon Yuen
    FuncTeller: How Well Does eFPGA Hide Functionality?USENIX Security '23Zhaokun Han, Mohammed Shayan, Aneesh Dixit, Mustafa Shihab, Yiorgos Makris, Jeyavijayan (JV) Rajendran
    Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the InternetUSENIX Security '23Tomas Hlavacek, Haya Shulman, Niklas Vogel, Michael Waidner
    McFIL: Model Counting Functionality-Inherent LeakageUSENIX Security '23Maximilian Zinkus, Yinzhi Cao, Matthew D. Green
    UVSCAN: Detecting Third-Party Component Usage Violations in IoT FirmwareUSENIX Security '23Binbin Zhao, Shouling Ji, Xuhong Zhang, Yuan Tian, Qinying Wang, Yuwen Pu, Chenyang Lyu, Raheem Beyah
    LightThief: Your Optical Communication Information is Stolen behind the WallUSENIX Security '23Xin Liu, Wei Wang, Guanqun Song, Ting Zhu
    Fuzz The Power: Dual-role State Guided Black-box Fuzzing for USB Power DeliveryUSENIX Security '23Kyungtae Kim, Sungwoo Kim, Kevin R. B. Butler, Antonio Bianchi, Rick Kennell, Dave (Jing) Tian
    HorusEye: A Realtime IoT Malicious Traffic Detection Framework using Programmable SwitchesUSENIX Security '23Yutao Dong, Qing Li, Kaidong Wu, Ruoyu Li, Dan Zhao, Gareth Tyson, Junkun Peng, Yong Jiang, Shutao Xia, Mingwei Xu
    Exploring Tenants' Preferences of Privacy Negotiation in AirbnbUSENIX Security '23Zixin Wang, Danny Yuxing Huang, Yaxing Yao
    PoliGraph: Automated Privacy Policy Analysis using Knowledge GraphsUSENIX Security '23Hao Cui, Rahmadi Trimananda, Athina Markopoulou, Scott Jordan
    Automated Inference on Financial Security of Ethereum Smart ContractsUSENIX Security '23Wansen Wang, Wenchao Huang, Zhaoyi Meng, Yan Xiong, Fuyou Miao, Xianjin Fang, Caichang Tu, Renjie Ji
    SpectrEM: Exploiting Electromagnetic Emanations During Transient ExecutionUSENIX Security '23Jesse De Meulemeester, Antoon Purnal, Lennert Wouters, Arthur Beckers, Ingrid Verbauwhede
    µFUZZ: Redesign of Parallel Fuzzing using Microservice ArchitectureUSENIX Security '23Yongheng Chen, Rui Zhong, Yupeng Yang, Hong Hu, Dinghao Wu, Wenke Lee
    Powering Privacy: On the Energy Demand and Feasibility of Anonymity Networks on SmartphonesUSENIX Security '23Daniel Hugenroth, Alastair R. Beresford
    ReUSB: Replay-Guided USB Driver FuzzingUSENIX Security '23
    FISHFUZZ: Catch Deeper Bugs by Throwing Larger NetsUSENIX Security '23Han Zheng, Jiayuan Zhang, Yuhang Huang, Zezhong Ren, He Wang, Chunjie Cao, Yuqing Zhang, Flavio Toffalini, Mathias Payer
    Reusable Enclaves for Confidential Serverless ComputingUSENIX Security '23Shixuan Zhao, Pinshen Xu, Guoxing Chen, Mengya Zhang, Yinqian Zhang, Zhiqiang Lin

Pages