Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '23An Input-Agnostic Hierarchical Deep Learning Framework for Traffic FingerprintingJian Qu, Xiaobo Ma, Jianfeng Li, Xiapu Luo, Lei Xue, Junjie Zhang, Zhenhua Li, Li Feng, Xiaohong Guan
    USENIX Security '23Pass2Edit: A Multi-Step Generative Model for Guessing Edited PasswordsDing Wang, Yunkai Zou, Yuan-An Xiao, Siqi Ma, Xiaofeng Chen
    USENIX Security '23PROVIDENCE: a Flexible Round-by-Round Risk-Limiting AuditOliver Broadrick, Poorvi Vora, Filip Zagórski
    USENIX Security '23Cipherfix: Mitigating Ciphertext Side-Channel Attacks in SoftwareJan Wichelmann, Anna Pätschke, Luca Wilke, Thomas Eisenbarth
    USENIX Security '23Subverting Website Fingerprinting Defenses with Robust Traffic RepresentationMeng Shen, Kexin Ji, Zhenbo Gao, Qi Li, Liehuang Zhu, Ke Xu
    USENIX Security '23User Awareness and Behaviors Concerning Encrypted DNS Settings in Web BrowsersAlexandra Nisenoff, Ranya Sharma, Nick Feamster
    USENIX Security '23It's all in your head(set): Side-channel attacks on AR/VR systemsYicheng Zhang, Carter Slocum, Jiasi Chen, Nael Abu-Ghazaleh
    USENIX Security '23Work-From-Home and COVID-19: Trajectories of Endpoint Security Management in a Security Operations CenterKailani R. Jones, Dalton A. Brucker-Hahn, Bradley Fidler, Alexandru G. Bardas
    USENIX Security '23Adversarial Training for Raw-Binary Malware ClassifiersKeane Lucas, Samruddhi Pai, Weiran Lin, Lujo Bauer, Michael K. Reiter, Mahmood Sharif
    USENIX Security '23ELASM: Error-Latency-Aware Scale Management for Fully Homomorphic EncryptionYongwoo Lee, Seonyoung Cheon, Dongkwan Kim, Dongyoon Lee, Hanjun Kim
    USENIX Security '23Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal AbuseSophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Danny Yuxing Huang, Rahul Chatterjee
    USENIX Security '23Trojan Source: Invisible VulnerabilitiesNicholas Boucher, Ross Anderson
    USENIX Security '23ARMore: Pushing Love Back Into BinariesLuca Di Bartolomeo, Hossein Moghaddas, Mathias Payer
    USENIX Security '23ProSpeCT: Provably Secure Speculation for the Constant-Time PolicyLesly-Ann Daniel, Marton Bognar, Job Noorman, Sébastien Bardin, Tamara Rezk, Frank Piessens
    USENIX Security '23Exorcising "Wraith": Protecting LiDAR-based Object Detector in Automated Driving System from Appearing AttacksQifan Xiao, Xudong Pan, Yifan Lu, Mi Zhang, Jiarun Dai, Min Yang
    USENIX Security '23GAP: Differentially Private Graph Neural Networks with Aggregation PerturbationSina Sajadmanesh, Ali Shahin Shamsabadi, Aurélien Bellet, Daniel Gatica-Perez
    USENIX Security '23SandDriller: A Fully-Automated Approach for Testing Language-Based JavaScript SandboxesAbdullah AlHamdan, Cristian-Alexandru Staicu
    USENIX Security '23Catch You and I Can: Revealing Source Voiceprint Against Voice ConversionJiangyi Deng, Yanjiao Chen, Yinan Zhong, Qianhao Miao, Xueluan Gong, Wenyuan Xu
    USENIX Security '23How the Great Firewall of China Detects and Blocks Fully Encrypted TrafficMingshi Wu, Jackson Sippe, Danesh Sivakumar, Jack Burg, Peter Anderson, Xiaokang Wang, Kevin Bock, Amir Houmansadr, Dave Levin, Eric Wustrow
    USENIX Security '23Pool-Party: Exploiting Browser Resource Pools for Web TrackingPeter Snyder, Soroush Karami, Arthur Edelstein, Benjamin Livshits, Hamed Haddadi
    USENIX Security '23The Role of Professional Product Reviewers in Evaluating Security and PrivacyWentao Guo, Jason Walter, Michelle L. Mazurek
    USENIX Security '23Near-Ultrasound Inaudible Trojan (Nuit): Exploiting Your Speaker to Attack Your MicrophoneQi Xia, Qian Chen, Shouhuai Xu
    USENIX Security '23Bilingual Problems: Studying the Security Risks Incurred by Native Extensions in Scripting LanguagesCristian-Alexandru Staicu, Sazzadur Rahaman, Ágnes Kiss, Michael Backes
    USENIX Security '23Ultimate SLH: Taking Speculative Load Hardening to the Next LevelZhiyuan Zhang, Gilles Barthe, Chitchanok Chuengsatiansup, Peter Schwabe, Yuval Yarom
    USENIX Security '23Intender: Fuzzing Intent-Based Networking with Intent-State Transition GuidanceJiwon Kim, Benjamin E. Ujcich, Dave (Jing) Tian

Pages