USENIX logo
A whole new look is coming
Check back again soon!

Conferences

Search results

    TitleConferenceSpeaker(s)
    The Power of Words: Generating PowerShell Attacks from Natural LanguageWOOT '24Pietro Liguori, Christian Marescalco, Roberto Natella, Vittorio Orbinato, Luciano Pianese
    WhatsApp with privacy? Privacy issues with IM E2EE in the Multi-device settingWOOT '24Tal A. Be'ery
    MakeShift: Security Analysis of Shimano Di2 Wireless Gear Shifting in BicyclesWOOT '24Maryam Motallebighomi, Earlence Fernandes, Aanjhan Ranganathan
    SoK: Where’s the “up”?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M SystemsWOOT '24Xi Tan, Zheyuan Ma, Sandro Pinto, Le Guan, Ning Zhang, Jun Xu, Zhiqiang Lin, Hongxin Hu, Ziming Zhao
    Engineering a backdoored bitcoin walletWOOT '24Adam Scott, Sean Andersen
    SOK: 3D Printer Firmware Attacks on Fused Filament FabricationWOOT '24Muhammad Haris Rais, Muhammad Ahsan, Irfan Ahmed
    SoK: On the Effectiveness of Control-Flow Integrity in PracticeWOOT '24Lucas Becker, Matthias Hollick, Jiska Classen
    Amplifying Threats: The Role of Multi-Sender Coordination in SMS-Timing-Based Location Inference AttacksWOOT '24Evangelos Bitsikas, Theodor Schnitzler, Christina Pöpper, Aanjhan Ranganathan
    Achilles Heel in Secure Boot: Breaking RSA Authentication and Bitstream Recovery from Zynq-7000 SoCWOOT '24Prasanna Ravi, Arpan Jati, Shivam Bhasin
    Reflecting on Twenty Years of Usable Privacy and SecuritySOUPS 2024Lorrie Faith Cranor, Simson Garfinkel, Robert Biddle, Mary Ellen Zurko
    SymBisect: Accurate Bisection for Fuzzer-Exposed VulnerabilitiesUSENIX Security '24Zheng Zhang, Yu Hao, Weiteng Chen, Xiaochen Zou, Xingyu Li, Haonan Li, Yizhuo Zhai, Billy Lau
    SLUBStick: Arbitrary Memory Writes through Practical Software Cross-Cache Attacks within the Linux KernelUSENIX Security '24Lukas Maar, Stefan Gast, Martin Unterguggenberger, Mathias Oberhuber, Stefan Mangard
    PrivImage: Differentially Private Synthetic Image Generation using Diffusion Models with Semantic-Aware PretrainingUSENIX Security '24Kecen Li, Chen Gong, Zhixiang Li, Yuzhong Zhao, Xinwen Hou, Tianhao Wang
    00SEVen – Re-enabling Virtual Machine Forensics: Introspecting Confidential VMs Using Privileged in-VM AgentsUSENIX Security '24Fabian Schwarz, Christian Rossow
    ShadowBound: Efficient Heap Memory Protection Through Advanced Metadata Management and Customized Compiler OptimizationUSENIX Security '24Zheng Yu, Ganxiang Yang, Xinyu Xing
    GraphGuard: Private Time-Constrained Pattern Detection Over Streaming Graphs in the CloudUSENIX Security '24Songlei Wang, Yifeng Zheng, Xiaohua Jia
    Adversary is on the Road: Attacks on Visual SLAM using Unnoticeable Adversarial PatchUSENIX Security '24Baodong Chen, Wei Wang, Pascal Sikorski, Ting Zhu
    PhishDecloaker: Detecting CAPTCHA-cloaked Phishing Websites via Hybrid Vision-based Interactive ModelsUSENIX Security '24Xiwen Teoh, Yun Lin, Ruofan Liu, Zhiyong Huang, Jin Song Dong
    zkCross: A Novel Architecture for Cross-Chain Privacy-Preserving AuditingUSENIX Security '24Yihao Guo, Minghui Xu, Xiuzhen Cheng, Dongxiao Yu, Wangjie Qiu, Gang Qu, Weibing Wang, Mingming Song
    MicGuard: A Comprehensive Detection System against Out-of-band Injection Attacks for Different Level Microphone-based DevicesUSENIX Security '24Tiantian Liu, Feng Lin, Zhongjie Ba, Li Lu, Zhan Qin, Kui Ren
    Simulated Stress: A Case Study of the Effects of a Simulated Phishing Campaign on Employees' Perception, Stress and Self-EfficacyUSENIX Security '24Markus Schöps, Marco Gutfleisch, Eric Wolter, M. Angela Sasse
    Exploring ChatGPT's Capabilities on Vulnerability ManagementUSENIX Security '24Peiyu Liu, Junming Liu, Lirong Fu, Kangjie Lu, Yifan Xia, Xuhong Zhang, Wenzhi Chen, Haiqin Weng, Shouling Ji, Wenhai Wang
    Gradients Look Alike: Sensitivity is Often Overestimated in DP-SGDUSENIX Security '24Anvith Thudi, Hengrui Jia, Casey Meehan, Ilia Shumailov, Nicolas Papernot
    SAIN: Improving ICS Attack Detection Sensitivity via State-Aware InvariantsUSENIX Security '24Syed Ghazanfar Abbas, Muslum Ozgur Ozmen, Abdulellah Alsaheel, Arslan Khan, Z. Berkay Celik, Dongyan Xu
    Voodoo: Memory Tagging, Authenticated Encryption, and Error Correction through MAGICUSENIX Security '24Lukas Lamster, Martin Unterguggenberger, David Schrammel, Stefan Mangard

    Pages