USENIX logo
A whole new look is coming
Check back again soon!

Conferences

Search results

    TitleConferenceSpeaker(s)
    GuideEnricher: Protecting the Anonymity of Ethereum Mixing Service Users with Deep Reinforcement LearningUSENIX Security '24Ravindu De Silva, Wenbo Guo, Nicola Ruaro, Ilya Grishchenko, Christopher Kruegel, Giovanni Vigna
    ChainReactor: Automated Privilege Escalation Chain Discovery via AI PlanningUSENIX Security '24Giulio De Pasquale, Ilya Grishchenko, Riccardo Iesari, Gabriel Pizarro, Lorenzo Cavallaro, Christopher Kruegel, Giovanni Vigna
    Max Attestation Matters: Making Honest Parties Lose Their Incentives in Ethereum PoSUSENIX Security '24Mingfei Zhang, Rujia Li, Sisi Duan
    Using My Functions Should Follow My Checks: Understanding and Detecting Insecure OpenZeppelin Code in Smart ContractsUSENIX Security '24Han Liu, Daoyuan Wu, Yuqiang Sun, Haijun Wang, Kaixuan Li, Yang Liu, Yixiang Chen
    Malla: Demystifying Real-world Large Language Model Integrated Malicious ServicesUSENIX Security '24Zilong Lin, Jian Cui, Xiaojing Liao, XiaoFeng Wang
    Peep With A Mirror: Breaking The Integrity of Android App Sandboxing via Unprivileged Cache Side ChannelUSENIX Security '24Yan Lin, Joshua Wong, Xiang Li, Haoyu Ma, Debin Gao
    Demystifying the Security Implications in IoT Device Rental ServicesUSENIX Security '24Yi He, Yunchao Guan, Ruoyu Lun, Shangru Song, Zhihao Guo, Jianwei Zhuge, Jianjun Chen, Qiang Wei, Zehui Wu, Miao Yu, Hetian Shi, Qi Li
    ChainPatrol: Balancing Attack Detection and Classification with Performance Overhead for Service Function Chains Using Virtual TrailersUSENIX Security '24Momen Oqaily, Hinddeep Purohit, Yosr Jarraya, Lingyu Wang, Boubakr Nour, Makan Pourzandi, Mourad Debbabi
    Detecting and Mitigating Sampling Bias in Cybersecurity with Unlabeled DataUSENIX Security '24Saravanan Thirumuruganathan, Fatih Deniz, Issa Khalil, Ting Yu, Mohamed Nabeel, Mourad Ouzzani
    Privacy-Preserving Data Aggregation with Public Verifiability Against Internal AdversariesUSENIX Security '24Marco Palazzo, Florine W. Dekker, Alessandro Brighente, Mauro Conti, Zekeriya Erkin
    ACE: A Model Poisoning Attack on Contribution Evaluation Methods in Federated LearningUSENIX Security '24Zhangchen Xu, Fengqing Jiang, Luyao Niu, Jinyuan Jia, Bo Li, Radha Poovendran
    Take a Step Further: Understanding Page Spray in Linux Kernel ExploitationUSENIX Security '24Ziyi Guo, Dang K Le, Zhenpeng Lin, Kyle Zeng, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Adam Doupé, Xinyu Xing
    InSpectre Gadget: Inspecting the Residual Attack Surface of Cross-privilege Spectre v2USENIX Security '24Sander Wiebing, Alvise de Faveri Tron, Herbert Bos, Cristiano Giuffrida
    SCAVY: Automated Discovery of Memory Corruption Targets in Linux Kernel for Privilege EscalationUSENIX Security '24Erin Avllazagaj, Yonghwi Kwon, Tudor Dumitraș
    CO3: Concolic Co-execution for FirmwareUSENIX Security '24Changming Liu, Alejandro Mera, Engin Kirda, Meng Xu, Long Lu
    Toward Unbiased Multiple-Target Fuzzing with Path DiversityUSENIX Security '24Huanyao Rong, Wei You, XiaoFeng Wang, Tianhao Mao
    LLM-Fuzzer: Scaling Assessment of Large Language Model JailbreaksUSENIX Security '24Jiahao Yu, Xingwei Lin, Zheng Yu, Xinyu Xing
    Into the Dark: Unveiling Internal Site Search Abused for Black Hat SEOUSENIX Security '24Yunyi Zhang, Mingxuan Liu, Baojun Liu, Yiming Zhang, Haixin Duan, Min Zhang, Hui Jiang, Yanzhe Li, Fan Shi
    Shesha: Multi-head Microarchitectural Leakage Discovery in new-generation Intel ProcessorsUSENIX Security '24Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyay
    Do You See How I Pose? Using Poses as an Implicit Authentication Factor for QR Code PaymentUSENIX Security '24Chuxiong Wu, Qiang Zeng
    PentestGPT: Evaluating and Harnessing Large Language Models for Automated Penetration TestingUSENIX Security '24Gelei Deng, Yi Liu, Víctor Mayoral-Vilches, Peng Liu, Yuekang Li, Yuan Xu, Tianwei Zhang, Yang Liu, Martin Pinzger, Stefan Rass
    Can I Hear Your Face? Pervasive Attack on Voice Authentication Systems with a Single Face ImageUSENIX Security '24Nan Jiang, Bangjie Sun, Terence Sim, Jun Han
    A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for Evading Learning-based Windows Malware Detection in the WildUSENIX Security '24Xiang Ling, Zhiyu Wu, Bin Wang, Wei Deng, Jingzheng Wu, Shouling Ji, Tianyue Luo, Yanjun Wu
    GridSE: Towards Practical Secure Geographic Search via Prefix Symmetric Searchable EncryptionUSENIX Security '24Ruoyang Guo, Jiarui Li, Shucheng Yu
    Improving Indirect-Call Analysis in LLVM with Type and Data-Flow Co-AnalysisUSENIX Security '24Dinghao Liu, Shouling Ji, Kangjie Lu, Qinming He

    Pages