USENIX Security '24 | Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation for Binary Code Similarity Detection | |
USENIX Security '24 | Is It a Trap? A Large-scale Empirical Study And Comprehensive Assessment of Online Automated Privacy Policy Generators for Mobile Apps | |
USENIX Security '24 | ModelGuard: Information-Theoretic Defense Against Model Extraction Attacks | |
USENIX Security '24 | The Unpatchables: Why Municipalities Persist in Running Vulnerable Hosts | |
USENIX Security '24 | Exploring Covert Third-party Identifiers through External Storage in the Android New Era | |
USENIX Security '24 | Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS Handshakes | |
USENIX Security '24 | VeriSimplePIR: Verifiability in SimplePIR at No Online Cost for Honest Servers | |
USENIX Security '24 | SledgeHammer: Amplifying Rowhammer via Bank-level Parallelism | |
USENIX Security '24 | The Challenges of Bringing Cryptography from Research Papers to Products: Results from an Interview Study with Experts | |
USENIX Security '24 | SpecLFB: Eliminating Cache Side Channels in Speculative Executions | |
USENIX Security '24 | Vulnerability-oriented Testing for RESTful APIs | |
USENIX Security '24 | Hijacking Attacks against Neural Network by Analyzing Training Data | |
USENIX Security '24 | Practical Security Analysis of Zero-Knowledge Proof Circuits | |
USENIX Security '24 | Hermes: Unlocking Security Analysis of Cellular Network Protocols by Synthesizing Finite State Machines from Natural Language Specifications | |
USENIX Security '24 | Sync+Sync: A Covert Channel Built on fsync with Storage | |
USENIX Security '24 | AutoFHE: Automated Adaption of CNNs for Efficient Evaluation over FHE | |
USENIX Security '24 | SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models | |
USENIX Security '24 | Why Aren't We Using Passkeys? Obstacles Companies Face Deploying FIDO2 Passwordless Authentication | |
USENIX Security '24 | K-Waay: Fast and Deniable Post-Quantum X3DH without Ring Signatures | |
USENIX Security '24 | What IF Is Not Enough? Fixing Null Pointer Dereference With Contextual Check | |
USENIX Security '24 | Unveiling the Secrets without Data: Can Graph Neural Networks Be Exploited through Data-Free Model Extraction Attacks? | |
USENIX Security '24 | CacheWarp: Software-based Fault Injection using Selective State Reset | |
USENIX Security '24 | Yes, One-Bit-Flip Matters! Universal DNN Model Inference Depletion with Runtime Code Fault Injection | |
USENIX Security '24 | Key Recovery Attacks on Approximate Homomorphic Encryption with Non-Worst-Case Noise Flooding Countermeasures | |
USENIX Security '24 | Mudjacking: Patching Backdoor Vulnerabilities in Foundation Models | |