USENIX logo
A whole new look is coming
Check back again soon!

Conferences

Search results

    TitleConferenceSpeaker(s)
    "I can say I'm John Travolta...but I'm not John Travolta": Investigating the Impact of Changes to Social Media Verification Policies on User Perceptions of Verified AccountsSOUPS 2024Carson Powers, Nickolas Gravel, Christopher Pellegrini, Micah Sherr, Michelle L. Mazurek, Daniel Votipka
    “I do (not) need that Feature!” – Understanding Users’ Awareness and Control of Privacy Permissions on Android SmartphonesSOUPS 2024Sarah Prange, Pascal Knierim, Gabriel Knoll, Felix Dietz, Alexander De Luca, Florian Alt
    Evaluating Privacy Perceptions, Experience, and Behavior of Software Development TeamsSOUPS 2024Maxwell Prybylo, Sara Haghighi, Sai Teja Peddinti, Sepideh Ghanavati
    Batman Hacked My Password: A Subtitle-Based Analysis of Password Depiction in MoviesSOUPS 2024Maike M. Raphael, Aikaterini Kanta, Rico Seebonn, Markus Dürmuth, Camille Cobb
    Navigating Autonomy: Unveiling Security Experts' Perspectives on Augmented Intelligence in CybersecuritySOUPS 2024Neele Roch, Hannah Sievers, Lorin Schöni, Verena Zimmermann
    What Drives SMiShing Susceptibility? A U.S. Interview Study of How and Why Mobile Phone Users Judge Text Messages to be Real or FakeSOUPS 2024Sarah Tabassum, Cori Faklaris, Heather Richter Lipford
    'Custodian of Online Communities': How Moderator Mutual Support in Communities Help Fight Hate and Harassment OnlineSOUPS 2024Madiha Tabassum, Alana Mackey, Ada Lerner
    Who is the IT Department Anyway: An Evaluative Case Study of Shadow IT Mindsets Among Corporate EmployeesSOUPS 2024Jan-Philip van Acken, Floris Jansen, Slinger Jansen, Katsiaryna Labunets
    Threat modeling state of practice in Dutch organizationsSOUPS 2024Stef Verreydt, Koen Yskout, Laurens Sion, Wouter Joosen
    Beyond Fear and Frustration - Towards a Holistic Understanding of Emotions in CybersecuritySOUPS 2024Alexandra von Preuschen, Monika C. Schuhmacher, Verena Zimmermann
    How Entertainment Journalists Manage Online Hate and HarassmentSOUPS 2024Noel Warford, Nicholas Farber, Michelle L. Mazurek
    Privacy Communication Patterns for Domestic RobotsSOUPS 2024Maximiliane Windl, Jan Leusmann, Albrecht Schmidt, Sebastian S. Feger, Sven Mayer
    Designing the Informing Process with Streamers and Bystanders in Live StreamingSOUPS 2024Yanlai Wu, Xinning Gui, Yuhan Luo, Yao Li
    Comparing Malware Evasion Theory with Practice: Results from Interviews with Expert AnalystsSOUPS 2024Miuyin Yong Wong, Matthew Landen, Frank Li, Fabian Monrose, Mustaque Ahamad
    Exploring Expandable-Grid Designs to Make iOS App Privacy Labels More UsableSOUPS 2024Shikun Zhang, Lily Klucinec, Kyerra Norton, Norman Sadeh, Lorrie Faith Cranor
    Inf2Guard: An Information-Theoretic Framework for Learning Privacy-Preserving Representations against Inference AttacksSOUPS 2016
    USENIX Security '24
    Sayedeh Leila Noorbakhsh, Binghui Zhang, Yuan Hong, Binghui Wang
    Breaking Espressif’s ESP32 V3: Program Counter Control with Computed Values using Fault InjectionWOOT '24Jeroen Delvaux, Cristofaro Mune, Mario Romero, Niek Timmers
    Introduction to Procedural Debugging through Binary LibificationWOOT '24Jonathan Brossard
    Reverse Engineering the Eufy Ecosystem: A Deep Dive into Security Vulnerabilities and Proprietary ProtocolsWOOT '24Victor Goeman, Dairo de Ruck, Tom Cordemans, Jorn Lapon, Vincent Naessens
    Attacking with Something That Does Not Exist: 'Proof of Non-Existence' Can Exhaust DNS Resolver CPUWOOT '24Olivia Gruza, Elias Heftrig, Oliver Jacobsen, Haya Schulmann, Niklas Vogel, Michael Waidner
    Not Quite Write: On the Effectiveness of Store-Only Bounds CheckingWOOT '24Adriaan Jacobs, Stijn Volckaert
    Basilisk: Remote Code Execution by Laser Excitation of P–N Junctions Without Insider AssistanceWOOT '24Joe Loughry, Kasper Rasmussen
    Exploiting Android’s Hardened Memory AllocatorWOOT '24Philipp Mao, Elias Valentin Boschung, Marcel Busch, Mathias Payer
    RIPencapsulation: Defeating IP Encapsulation on TI MSP DevicesWOOT '24Prakhar Sah, Matthew Hicks
    Oh No, My RAN! Breaking Into an O-RAN 5G Indoor Base StationWOOT '24Leon Janzen, Lucas Becker, Colin Wiesenäcker, Matthias Hollick

    Pages