USENIX logo
A whole new look is coming
Check back again soon!

Conferences

Search results

    TitleConferenceSpeaker(s)
    Sprints: Intermittent Blockchain PoW MiningUSENIX Security '24Michael Mirkin, Lulu Zhou, Ittay Eyal, Fan Zhang
    TAPFixer: Automatic Detection and Repair of Home Automation Vulnerabilities based on Negated-property ReasoningUSENIX Security '24Yinbo Yu, Yuanqi Xu, Kepu Huang, Jiajia Liu
    Tickets or Privacy? Understand the Ecosystem of Chinese Ticket Grabbing AppsUSENIX Security '24Yijing Liu, Yiming Zhang, Baojun Liu, Haixin Duan, Qiang Li, Mingxuan Liu, Ruixuan Li, Jia Yao
    Secure Account Recovery for a Privacy-Preserving Web ServiceUSENIX Security '24
    REMARK-LLM: A Robust and Efficient Watermarking Framework for Generative Large Language ModelsUSENIX Security '24Ruisi Zhang, Shehzeen Samarah Hussain, Paarth Neekhara, Farinaz Koushanfar
    MIST: Defending Against Membership Inference Attacks Through Membership-Invariant Subspace TrainingUSENIX Security '24Jiacheng Li, Ninghui Li, Bruno Ribeiro
    π-Jack: Physical-World Adversarial Attack on Monocular Depth Estimation with Perspective HijackingUSENIX Security '24Tianyue Zheng, Jingzhi Hu, Rui Tan, Yinqian Zhang, Ying He, Jun Luo
    Lurking in the shadows: Unveiling Stealthy Backdoor Attacks against Personalized Federated LearningUSENIX Security '24Xiaoting Lyu, Yufei Han, Wei Wang, Jingkai Liu, Yongsheng Zhu, Guangquan Xu, Jiqiang Liu, Xiangliang Zhang
    Pandawan: Quantifying Progress in Linux-based Firmware RehostingUSENIX Security '24Ioannis Angelakopoulos, Gianluca Stringhini, Manuel Egele
    Reconstructing training data from document understanding modelsUSENIX Security '24Jérémie Dentan, Arnaud Paran, Aymen Shabou
    Leveraging Semantic Relations in Code and Data to Enhance Taint Analysis of Embedded SystemsUSENIX Security '24Jiaxu Zhao, Yuekang Li, Yanyan Zou, Zhaohui Liang, Yang Xiao, Yeting Li, Bingwei Peng, Nanyu Zhong, Xinyi Wang, Wei Wang, Wei Huo
    Near-Optimal Constrained Padding for Object Retrievals with DependenciesUSENIX Security '24Pranay Jain, Andrew C. Reed, Michael K. Reiter
    MUSES: Efficient Multi-User Searchable Encrypted DatabaseUSENIX Security '24Tung Le, Rouzbeh Behnia, Jorge Guajardo, Thang Hoang
    Remote Keylogging Attacks in Multi-user VR ApplicationsUSENIX Security '24Zihao Su, Kunlin Cai, Reuben Beeler, Lukas Dresel, Allan Garcia, Ilya Grishchenko, Yuan Tian, Christopher Kruegel, Giovanni Vigna
    GPU Memory Exploitation for Fun and ProfitUSENIX Security '24Yanan Guo, Zhenkai Zhang, Jun Yang
    You Can Obfuscate, but You Cannot Hide: CrossPoint Attacks against Network Topology ObfuscationUSENIX Security '24Xuanbo Huang, Kaiping Xue, Lutong Chen, Mingrui Ai, Huancheng Zhou, Bo Luo, Guofei Gu, Qibin Sun
    SymFit: Making the Common (Concrete) Case Fast for Binary-Code Concolic ExecutionUSENIX Security '24Zhenxiao Qi, Jie Hu, Zhaoqi Xiao, Heng Yin
    Improving ML-based Binary Function Similarity Detection by Assessing and Deprioritizing Control Flow Graph FeaturesUSENIX Security '24Jialai Wang, Chao Zhang, Longfei Chen, Yi Rong, Yuxiao Wu, Hao Wang, Wende Tan, Qi Li, Zongpeng Li
    Biosignal Authentication Considered Harmful TodayUSENIX Security '24Veena Krish, Nicola Paoletti, Milad Kazemi, Scott Smolka, Amir Rahmati
    All Your Tokens are Belong to Us: Demystifying Address Verification Vulnerabilities in Solidity Smart ContractsUSENIX Security '24Tianle Sun, Ningyu He, Jiang Xiao, Yinliang Yue, Xiapu Luo, Haoyu Wang
    Mempool Privacy via Batched Threshold Encryption: Attacks and DefensesUSENIX Security '24Arka Rai Choudhuri, Sanjam Garg, Julien Piet, Guru-Vamsi Policharla
    SPF Beyond the Standard: Management and Operational Challenges in Practice and Practical RecommendationsUSENIX Security '24Md. Ishtiaq Ashiq, Weitong Li, Tobias Fiebig, Taejoong Chung
    Investigating Moderation Challenges to Combating Hate and Harassment: The Case of Mod-Admin Power Dynamics and Feature Misuse on RedditUSENIX Security '24Madiha Tabassum, Alana Mackey, Ashley Schuett, Ada Lerner
    Understanding Ethereum Mempool Security under Asymmetric DoS by Symbolized Stateful FuzzingUSENIX Security '24Yibo Wang, Yuzhe Tang, Kai Li, Wanning Ding, Zhihua Yang
    Efficient Privacy Auditing in Federated LearningUSENIX Security '24Hongyan Chang, Brandon Edwards, Anindya S. Paul, Reza Shokri

    Pages