USENIX logo
A whole new look is coming
Check back again soon!

Conferences

Search results

    TitleConferenceSpeaker(s)
    Uncovering the Limits of Machine Learning for Automatic Vulnerability DetectionUSENIX Security '24Niklas Risse, Marcel Böhme
    SSRF vs. Developers: A Study of SSRF-Defenses in PHP ApplicationsUSENIX Security '24Malte Wessels, Simon Koch, Giancarlo Pellegrino, Martin Johns
    Deciphering Textual Authenticity: A Generalized Strategy through the Lens of Large Language Semantics for Detecting Human vs. Machine-Generated TextUSENIX Security '24Mazal Bethany, Brandon Wherry, Emet Bethany, Nishant Vishwamitra, Anthony Rios, Peyman Najafirad
    Formalizing and Benchmarking Prompt Injection Attacks and DefensesUSENIX Security '24Yupei Liu, Yuqi Jia, Runpeng Geng, Jinyuan Jia, Neil Zhenqiang Gong
    Leakage-Abuse Attacks Against Structured Encryption for SQLUSENIX Security '24Alexander Hoover, Ruth Ng, Daren Khu, Yao'An Li, Joelle Lim, Derrick Ng, Jed Lim, Yiyang Song
    OPTISAN: Using Multiple Spatial Error Defenses to Optimize Stack Memory Protection within a BudgetUSENIX Security '24Rahul George, Mingming Chen, Kaiming Huang, Zhiyun Qian, Thomas La Porta, Trent Jaeger
    Cost-effective Attack Forensics by Recording and Correlating File System ChangesUSENIX Security '24Le Yu, Yapeng Ye, Zhuo Zhang, Xiangyu Zhang
    Moderating Illicit Online Image Promotion for Unsafe User Generated Content Games Using Large Vision-Language ModelsUSENIX Security '24Keyan Guo, Ayush Utkarsh, Wenbo Ding, Isabelle Ondracek, Ziming Zhao, Guo Freeman, Nishant Vishwamitra, Hongxin Hu
    Did the Neurons Read your Book? Document-level Membership Inference for Large Language ModelsUSENIX Security '24Matthieu Meeus, Shubham Jain, Marek Rei, Yves-Alexandre de Montjoye
    Engaging Company Developers in Security Research Studies: A Comprehensive Literature Review and Quantitative SurveyUSENIX Security '24Raphael Serafini, Stefan Albert Horstmann, Alena Naiakshina
    A Broad Comparative Evaluation of Software Debloating ToolsUSENIX Security '24Michael D. Brown, Adam Meily, Brian Fairservice, Akshay Sood, Jonathan Dorn, Eric Kilmer, Ronald Eytchison
    BeeBox: Hardening BPF against Transient Execution AttacksUSENIX Security '24Di Jin, Alexander J. Gaidis, Vasileios P. Kemerlis
    FAMOS: Robust Privacy-Preserving Authentication on Payment Apps via Federated Multi-Modal Contrastive LearningUSENIX Security '24Yifeng Cai, Ziqi Zhang, Jiaping Gui, Bingyan Liu, Xiaoke Zhao, Ruoyu Li, Zhe Li, Ding Li
    OblivGNN: Oblivious Inference on Transductive and Inductive Graph Neural NetworkUSENIX Security '24Zhibo Xu, Shangqi Lai, Xiaoning Liu, Alsharif Abuadbba, Xingliang Yuan, Xun Yi
    FV8: A Forced Execution JavaScript Engine for Detecting Evasive TechniquesUSENIX Security '24Nikolaos Pantelaios, Alexandros Kapravelos
    DEEPTYPE: Refining Indirect Call Targets with Strong Multi-layer Type AnalysisUSENIX Security '24Tianrou Xia, Hong Hu, Dinghao Wu
    Argus: All your (PHP) Injection-sinks are belong to us.USENIX Security '24Rasoul Jahanshahi, Manuel Egele
    MOAT: Towards Safe BPF Kernel ExtensionUSENIX Security '24Hongyi Lu, Shuai Wang, Yechang Wu, Wanning He, Fengwei Zhang
    Invalidate+Compare: A Timer-Free GPU Cache Attack PrimitiveUSENIX Security '24Zhenkai Zhang, Kunbei Cai, Yanan Guo, Fan Yao, Xing Gao
    It Doesn't Look Like Anything to Me: Using Diffusion Model to Subvert Visual Phishing DetectorsUSENIX Security '24Qingying Hao, Nirav Diwan, Ying Yuan, Giovanni Apruzzese, Mauro Conti, Gang Wang
    DMAAUTH: A Lightweight Pointer Integrity-based Secure Architecture to Defeat DMA AttacksUSENIX Security '24Xingkai Wang, Wenbo Shen, Yujie Bu, Jinmeng Zhou, Yajin Zhou
    PEPSI: Practically Efficient Private Set Intersection in the Unbalanced SettingUSENIX Security '24Rasoul Akhavan Mahdavi, Nils Lukas, Faezeh Ebrahimianghazani, Thomas Humphries, Bailey Kacsmar, John Premkumar, Xinda Li, Simon Oya, Ehsan Amjadian, Florian Kerschbaum
    True Attacks, Attack Attempts, or Benign Triggers? An Empirical Measurement of Network Alerts in a Security Operations CenterUSENIX Security '24Limin Yang, Zhi Chen, Chenkai Wang, Zhenning Zhang, Sushruth Booma, Phuong Cao, Constantin Adam, Alexander Withers, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Gang Wang
    Double Face: Leveraging User Intelligence to Characterize and Recognize AI-synthesized FacesUSENIX Security '24Matthew Joslin, Xian Wang, Shuang Hao
    Athena: Analyzing and Quantifying Side Channels of Transport Layer ProtocolsUSENIX Security '24Feiyang Yu, Quan Zhou, Syed Rafiul Hussain, Danfeng Zhang

    Pages