Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '23“If sighted people know, I should be able to know:” Privacy Perceptions of Bystanders with Visual Impairments around Camera-based TechnologyYuhang Zhao, Yaxing Yao, Jiaru Fu, Nihan Zhou
    USENIX Security '23Access Denied: Assessing Physical Risks to Internet Access NetworksAlexander Marder, Zesen Zhang, Ricky Mok, Ramakrishna Padmanabhan, Bradley Huffaker, Matthew Luckie, Alberto Dainotti, kc claffy, Alex C. Snoeren, Aaron Schulman
    USENIX Security '23Security and Privacy Failures in Popular 2FA AppsConor Gilsenan, Fuzail Shakir, Noura Alomar, Serge Egelman
    USENIX Security '23Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknessesVincent Cheval, Cas Cremers, Alexander Dax, Lucca Hirschi, Charlie Jacomme, Steve Kremer
    USENIX Security '23Content-Type: multipart/oracle - Tapping into Format Oracles in Email End-to-End EncryptionFabian Ising, Damian Poddebniak, Tobias Kappert, Christoph Saatjohann, Sebastian Schinzel
    USENIX Security '23Glowing in the Dark: Uncovering IPv6 Address Discovery and Scanning Strategies in the WildHammas Bin Tanveer, Rachee Singh, Paul Pearce, Rishab Nithyanand
    USENIX Security '23Every Signature is Broken: On the Insecurity of Microsoft Office’s OOXML SignaturesSimon Rohlmann, Vladislav Mladenov, Christian Mainka, Daniel Hirschberger, Jörg Schwenk
    USENIX Security '23Humans vs. Machines in Malware ClassificationSimone Aonzo, Yufei Han, Alessandro Mantovani, Davide Balzarotti
    USENIX Security '23How fast do you heal? A taxonomy for post-compromise security in secure-channel establishmentOlivier Blazy, Ioana Boureanu, Pascal Lafourcade, Cristina Onete, Léo Robert
    USENIX Security '23Assessing Anonymity Techniques Employed in German Court Decisions: A De-Anonymization ExperimentDominic Deuber, Michael Keuchen, Nicolas Christin
    USENIX Security '23GLeeFuzz: Fuzzing WebGL Through Error Message Guided MutationHui Peng, Zhihao Yao, Ardalan Amiri Sani, Dave (Jing) Tian, Mathias Payer
    USENIX Security '23Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion AppsYuhong Nan, Xueqiang Wang, Luyi Xing, Xiaojing Liao, Ruoyu Wu, Jianliang Wu, Yifan Zhang, XiaoFeng Wang
    USENIX Security '23The Space of Adversarial StrategiesRyan Sheatsley, Blaine Hoak, Eric Pauley, Patrick McDaniel
    USENIX Security '23Credit Karma: Understanding Security Implications of Exposed Cloud Services through Automated Capability InferenceXueqiang Wang, Yuqiong Sun, Susanta Nanda, XiaoFeng Wang
    USENIX Security '23That Person Moves Like A Car: Misclassification Attack Detection for Autonomous Systems Using Spatiotemporal ConsistencyYanmao Man, Raymond Muller, Ming Li, Z. Berkay Celik, Ryan Gerdes
    USENIX Security '23CipherH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic ImplementationsSen Deng, Mengyuan Li, Yining Tang, Shuai Wang, Shoumeng Yan, Yinqian Zhang
    USENIX Security '23"My Privacy for their Security": Employees' Privacy Perspectives and Expectations when using Enterprise Security SoftwareJonah Stegman, Patrick J. Trottier, Caroline Hillier, Hassan Khan, Mohammad Mannan
    USENIX Security '23Combating Robocalls with Phone Virtual Assistant Mediated InteractionSharbani Pandit, Krishanu Sarker, Roberto Perdisci, Mustaque Ahamad, Diyi Yang
    USENIX Security '23Distance-Aware Private Set IntersectionAnrin Chakraborti, Giulia Fanti, Michael K. Reiter
    USENIX Security '23NeuroPots: Realtime Proactive Defense against Bit-Flip Attacks in Neural NetworksQi Liu, Jieming Yin, Wujie Wen, Chengmo Yang, Shi Sha
    USENIX Security '23Towards a General Video-based Keystroke Inference AttackZhuolin Yang, Yuxin Chen, Zain Sarwar, Hadleigh Schwartz, Ben Y. Zhao, Haitao Zheng
    USENIX Security '23URET: Universal Robustness Evaluation Toolkit (for Evasion)Kevin Eykholt, Taesung Lee, Douglas Schales, Jiyong Jang, Ian Molloy
    USENIX Security '23You Can't See Me: Physical Removal Attacks on LiDAR-based Autonomous Vehicles Driving FrameworksYulong Cao, S. Hrushikesh Bhupathiraju, Pirouz Naghavi, Takeshi Sugawara, Z. Morley Mao, Sara Rampazzi
    USENIX Security '23SMACK: Semantically Meaningful Adversarial Audio AttackZhiyuan Yu, Yuanhaur Chang, Ning Zhang, Chaowei Xiao
    USENIX Security '23Gradient Obfuscation Gives a False Sense of Security in Federated LearningKai Yue, Richeng Jin, Chau-Wai Wong, Dror Baron, Huaiyu Dai

Pages