USENIX logo
A whole new look is coming
Check back again soon!

Conferences

Search results

    TitleConferenceSpeaker(s)
    LaKey: Efficient Lattice-Based Distributed PRFs Enable Scalable Distributed Key ManagementUSENIX Security '24Matthias Geihs, Hart Montgomery
    dp-promise: Differentially Private Diffusion Probabilistic Models for Image SynthesisUSENIX Security '24Haichen Wang, Shuchao Pang, Zhigang Lu, Yihang Rao, Yongbin Zhou, Minhui Xue
    The Impact of Exposed Passwords on Honeyword EfficacyUSENIX Security '24Zonghao Huang, Lujo Bauer, Michael K. Reiter
    PIXELMOD: Improving Soft Moderation of Visual Misleading Information on TwitterUSENIX Security '24Pujan Paudel, Chen Ling, Jeremy Blackburn, Gianluca Stringhini
    Data Subjects' Reactions to Exercising Their Right of AccessUSENIX Security '24Arthur Borem, Elleen Pan, Olufunmilola Obielodan, Aurelie Roubinowitz, Luca Dovichi, Michelle L. Mazurek, Blase Ur
    GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent PrefetchersUSENIX Security '24Boru Chen, Yingchen Wang, Pradyumna Shome, Christopher Fletcher, David Kohlbrenner, Riccardo Paccagnella, Daniel Genkin
    SafeFetch: Practical Double-Fetch Protection with Kernel-Fetch CachingUSENIX Security '24Victor Duta, Mitchel Josephus Aloserij, Cristiano Giuffrida
    SoK: The Good, The Bad, and The Unbalanced: Measuring Structural Limitations of Deepfake Media DatasetsUSENIX Security '24Seth Layton, Tyler Tucker, Daniel Olszewski, Kevin Warren, Kevin Butler, Patrick Traynor
    Don't Listen To Me: Understanding and Exploring Jailbreak Prompts of Large Language ModelsUSENIX Security '24Zhiyuan Yu, Xiaogeng Liu, Shunning Liang, Zach Cameron, Chaowei Xiao, Ning Zhang
    SeaK: Rethinking the Design of a Secure Allocator for OS KernelUSENIX Security '24Zicheng Wang, Yicheng Guang, Yueqi Chen, Zhenpeng Lin, Michael Le, Dang K Le, Dan Williams, Xinyu Xing, Zhongshu Gu, Hani Jamjoom
    Operation Mango: Scalable Discovery of Taint-Style Vulnerabilities in Binary Firmware ServicesUSENIX Security '24Wil Gibbs, Arvind S Raj, Jayakrishna Menon Vadayath, Hui Jun Tay, Justin Miller, Akshay Ajayan, Zion Leonahenahe Basque, Audrey Dutcher, Fangzhou Dong, Xavier Maso, Giovanni Vigna, Christopher Kruegel, Adam Doupé, Yan Shoshitaishvili, Ruoyu Wang
    Security and Privacy Software Creators' Perspectives on Unintended ConsequencesUSENIX Security '24Harshini Sri Ramulu, Helen Schmitt, Dominik Wermke, Yasemin Acar
    Exploring digital security and privacy in relative poverty in Germany through qualitative interviewsUSENIX Security '24Anastassija Kostan, Sara Olschar, Lucy Simko, Yasemin Acar
    Enabling Contextual Soft Moderation on Social Media through Contrastive Textual DeviationUSENIX Security '24Pujan Paudel, Mohammad Hammas Saeed, Rebecca Auger, Chris Wells, Gianluca Stringhini
    HECKLER: Breaking Confidential VMs with Malicious InterruptsUSENIX Security '24Benedict Schlüter, Supraja Sridhara, Mark Kuhne, Andrin Bertschi, Shweta Shinde
    Snowflake, a censorship circumvention system using temporary WebRTC proxiesUSENIX Security '24Cecylia Bocovich, Arlo Breault, David Fifield, Serene, Xiaokang Wang
    MD-ML: Super Fast Privacy-Preserving Machine Learning for Malicious Security with a Dishonest MajorityUSENIX Security '24Boshi Yuan, Shixuan Yang, Yongxiang Zhang, Ning Ding, Dawu Gu, Shi-Feng Sun
    DeepEclipse: How to Break White-Box DNN-Watermarking SchemesUSENIX Security '24Alessandro Pegoraro, Carlotta Segna, Kavita Kumari, Ahmad-Reza Sadeghi
    Large Language Models for Code Analysis: Do LLMs Really Do Their Job?USENIX Security '24Chongzhou Fang, Ning Miao, Shaurya Srivastav, Jialin Liu, Ruoyu Zhang, Ruijie Fang, Asmita, Ryan Tsang, Najmeh Nazari, Han Wang, Houman Homayoun
    Scalable Zero-knowledge Proofs for Non-linear Functions in Machine LearningUSENIX Security '24Meng Hao, Hanxiao Chen, Hongwei Li, Chenkai Weng, Yuan Zhang, Haomiao Yang, Tianwei Zhang
    SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and PracticeUSENIX Security '24Tushar Nayan, Qiming Guo, Mohammed Al Duniawi, Marcus Botacin, Selcuk Uluagac, Ruimin Sun
    AttackGNN: Red-Teaming GNNs in Hardware Security Using Reinforcement LearningUSENIX Security '24Vasudev Gohil, Satwik Patnaik, Dileep Kalathil, Jeyavijayan Rajendran
    Being Transparent is Merely the Beginning: Enforcing Purpose Limitation with Polynomial ApproximationUSENIX Security '24Shuofeng Liu, Zihan Wang, Minhui Xue, Long Wang, Yuanchao Zhang, Guangdong Bai
    DARKFLEECE: Probing the Dark Side of Android Subscription AppsUSENIX Security '24Chang Yue, Chen Zhong, Kai Chen, Zhiyu Zhang, Yeonjoon Lee
    Property Existence Inference against Generative ModelsUSENIX Security '24Lijin Wang, Jingjing Wang, Jie Wan, Lin Long, Ziqi Yang, Zhan Qin

    Pages