Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '24Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation for Binary Code Similarity Detection
    USENIX Security '24Is It a Trap? A Large-scale Empirical Study And Comprehensive Assessment of Online Automated Privacy Policy Generators for Mobile Apps
    USENIX Security '24ModelGuard: Information-Theoretic Defense Against Model Extraction Attacks
    USENIX Security '24The Unpatchables: Why Municipalities Persist in Running Vulnerable Hosts
    USENIX Security '24Exploring Covert Third-party Identifiers through External Storage in the Android New Era
    USENIX Security '24Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS Handshakes
    USENIX Security '24VeriSimplePIR: Verifiability in SimplePIR at No Online Cost for Honest Servers
    USENIX Security '24SledgeHammer: Amplifying Rowhammer via Bank-level Parallelism
    USENIX Security '24The Challenges of Bringing Cryptography from Research Papers to Products: Results from an Interview Study with Experts
    USENIX Security '24SpecLFB: Eliminating Cache Side Channels in Speculative Executions
    USENIX Security '24Vulnerability-oriented Testing for RESTful APIs
    USENIX Security '24Hijacking Attacks against Neural Network by Analyzing Training Data
    USENIX Security '24Practical Security Analysis of Zero-Knowledge Proof Circuits
    USENIX Security '24Hermes: Unlocking Security Analysis of Cellular Network Protocols by Synthesizing Finite State Machines from Natural Language Specifications
    USENIX Security '24Sync+Sync: A Covert Channel Built on fsync with Storage
    USENIX Security '24AutoFHE: Automated Adaption of CNNs for Efficient Evaluation over FHE
    USENIX Security '24SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models
    USENIX Security '24Why Aren't We Using Passkeys? Obstacles Companies Face Deploying FIDO2 Passwordless Authentication
    USENIX Security '24K-Waay: Fast and Deniable Post-Quantum X3DH without Ring Signatures
    USENIX Security '24What IF Is Not Enough? Fixing Null Pointer Dereference With Contextual Check
    USENIX Security '24Unveiling the Secrets without Data: Can Graph Neural Networks Be Exploited through Data-Free Model Extraction Attacks?
    USENIX Security '24CacheWarp: Software-based Fault Injection using Selective State Reset
    USENIX Security '24Yes, One-Bit-Flip Matters! Universal DNN Model Inference Depletion with Runtime Code Fault Injection
    USENIX Security '24Key Recovery Attacks on Approximate Homomorphic Encryption with Non-Worst-Case Noise Flooding Countermeasures
    USENIX Security '24Mudjacking: Patching Backdoor Vulnerabilities in Foundation Models

Pages