Conferences

Search results

    TitleConferenceSpeaker(s)
    Sherlock on Specs: Building LTE Conformance Tests through Automated ReasoningUSENIX Security '23Yi Chen, Di Tang, Yepeng Yao, Mingming Zha, XiaoFeng Wang, Xiaozhong Liu, Haixu Tang, Baoxu Liu
    Did the Shark Eat the Watchdog in the NTP Pool? Deceiving the NTP Pool’s Monitoring SystemUSENIX Security '23Jonghoon Kwon, Jeonggyu Song, Junbeom Hur, Adrian Perrig
    Downfall: Exploiting Speculative Data GatheringUSENIX Security '23Daniel Moghimi
    Formal Analysis of SPDM: Security Protocol and Data Model version 1.2USENIX Security '23Cas Cremers, Alexander Dax, Aurora Naska
    V1SCAN: Discovering 1-day Vulnerabilities in Reused C/C++ Open-source Software Components Using Code Classification TechniquesUSENIX Security '23Seunghoon Woo, Eunjin Choi, Heejo Lee, Hakjoo Oh
    BunnyHop: Exploiting the Instruction PrefetcherUSENIX Security '23Zhiyuan Zhang, Mingtian Tao, Sioli O'Connell, Chitchanok Chuengsatiansup, Daniel Genkin, Yuval Yarom
    DiffSmooth: Certifiably Robust Learning via Diffusion Models and Local SmoothingUSENIX Security '23Jiawei Zhang, Zhongzhu Chen, Huan Zhang, Chaowei Xiao, Bo Li
    ACon^2: Adaptive Conformal Consensus for Provable Blockchain OraclesUSENIX Security '23Sangdon Park, Osbert Bastani, Taesoo Kim
    Measuring Up to (Reasonable) Consumer Expectations: Providing an Empirical Basis for Holding IoT Manufacturers Legally ResponsibleUSENIX Security '23Lorenz Kustosch, Carlos Gañán, Mattis van 't Schip, Michel van Eeten, Simon Parkin
    A Data-free Backdoor Injection Approach in Neural NetworksUSENIX Security '23Peizhuo Lv, Chang Yue, Ruigang Liang, Yunfei Yang, Shengzhi Zhang, Hualong Ma, Kai Chen
    HECO: Fully Homomorphic Encryption CompilerUSENIX Security '23Alexander Viand, Patrick Jattke, Miro Haller, Anwar Hithnawi
    Automated Exploitable Heap Layout Generation for Heap Overflows Through Manipulation Distance-Guided FuzzingUSENIX Security '23Bin Zhang, Jiongyi Chen, Runhao Li, Chao Feng, Ruilin Li, Chaojing Tang
    Attacks are Forwarded: Breaking the Isolation of MicroVM-based Containers Through Operation ForwardingUSENIX Security '23Jietao Xiao, Nanzi Yang, Wenbo Shen, Jinku Li, Xin Guo, Zhiqiang Dong, Fei Xie, Jianfeng Ma
    NAUTILUS: Automated RESTful API Vulnerability DetectionUSENIX Security '23Gelei Deng, Zhiyi Zhang, Yuekang Li, Yi Liu, Tianwei Zhang, Yang Liu, Guo Yu, Dongjin Wang
    An Input-Agnostic Hierarchical Deep Learning Framework for Traffic FingerprintingUSENIX Security '23Jian Qu, Xiaobo Ma, Jianfeng Li, Xiapu Luo, Lei Xue, Junjie Zhang, Zhenhua Li, Li Feng, Xiaohong Guan
    Pass2Edit: A Multi-Step Generative Model for Guessing Edited PasswordsUSENIX Security '23Ding Wang, Yunkai Zou, Yuan-An Xiao, Siqi Ma, Xiaofeng Chen
    PROVIDENCE: a Flexible Round-by-Round Risk-Limiting AuditUSENIX Security '23Oliver Broadrick, Poorvi Vora, Filip Zagórski
    Cipherfix: Mitigating Ciphertext Side-Channel Attacks in SoftwareUSENIX Security '23Jan Wichelmann, Anna Pätschke, Luca Wilke, Thomas Eisenbarth
    Subverting Website Fingerprinting Defenses with Robust Traffic RepresentationUSENIX Security '23Meng Shen, Kexin Ji, Zhenbo Gao, Qi Li, Liehuang Zhu, Ke Xu
    User Awareness and Behaviors Concerning Encrypted DNS Settings in Web BrowsersUSENIX Security '23Alexandra Nisenoff, Ranya Sharma, Nick Feamster
    It's all in your head(set): Side-channel attacks on AR/VR systemsUSENIX Security '23Yicheng Zhang, Carter Slocum, Jiasi Chen, Nael Abu-Ghazaleh
    Work-From-Home and COVID-19: Trajectories of Endpoint Security Management in a Security Operations CenterUSENIX Security '23Kailani R. Jones, Dalton A. Brucker-Hahn, Bradley Fidler, Alexandru G. Bardas
    Adversarial Training for Raw-Binary Malware ClassifiersUSENIX Security '23Keane Lucas, Samruddhi Pai, Weiran Lin, Lujo Bauer, Michael K. Reiter, Mahmood Sharif
    ELASM: Error-Latency-Aware Scale Management for Fully Homomorphic EncryptionUSENIX Security '23Yongwoo Lee, Seonyoung Cheon, Dongkwan Kim, Dongyoon Lee, Hanjun Kim
    Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal AbuseUSENIX Security '23Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Danny Yuxing Huang, Rahul Chatterjee

Pages