USENIX logo
A whole new look is coming
Check back again soon!

Conferences

Search results

    TitleConferenceSpeaker(s)
    LaserAdv: Laser Adversarial Attacks on Speech Recognition SystemsUSENIX Security '24Guoming Zhang, Xiaohui Ma, Huiting Zhang, Zhijie Xiang, Xiaoyu Ji, Yanni Yang, Xiuzhen Cheng, Pengfei Hu
    O-Ring and K-Star: Efficient Multi-party Private Set IntersectionUSENIX Security '24Mingli Wu, Tsz Hon Yuen, Kwan Yin Chan
    Correction-based Defense Against Adversarial Video Attacks via Discretization-Enhanced Video Compressive SensingUSENIX Security '24Wei Song, Cong Cong, Haonan Zhong, Jingling Xue
    TYGR: Type Inference on Stripped Binaries using Graph Neural NetworksUSENIX Security '24Chang Zhu, Ziyang Li, Anton Xue, Ati Priya Bajaj, Wil Gibbs, Yibo Liu, Rajeev Alur, Tiffany Bao, Hanjun Dai, Adam Doupé, Mayur Naik, Yan Shoshitaishvili, Ruoyu Wang, Aravind Machiry
    BUDAlloc: Defeating Use-After-Free Bugs by Decoupling Virtual Address Management from KernelUSENIX Security '24Junho Ahn, Jaehyeon Lee, Kanghyuk Lee, Wooseok Gwak, Minseong Hwang, Youngjin Kwon
    LR-Miner: Static Race Detection in OS Kernels by Mining Locking RulesUSENIX Security '24Tuo Li, Jia-Ju Bai, Gui-Dong Han, Shi-Min Hu
    Towards an Effective Method of ReDoS Detection for Non-backtracking EnginesUSENIX Security '24Weihao Su, Hong Huang, Rongchen Li, Haiming Chen, Tingjian Ge
    Guardians of the Galaxy: Content Moderation in the InterPlanetary File SystemUSENIX Security '24Saidu Sokoto, Leonhard Balduf, Dennis Trautwein, Yiluo Wei, Gareth Tyson, Ignacio Castro, Onur Ascigil, George Pavlou, Maciej Korczyński, Björn Scheuermann, Michał Król
    Co-Designing a Mobile App for Bystander Privacy Protection in Jordanian Smart Homes: A Step Towards Addressing a Complex Privacy LandscapeUSENIX Security '24Wael Albayaydh, Ivan Flechais
    "Did They F***ing Consent to That?": Safer Digital Intimacy via Proactive Protection Against Image-Based Sexual AbuseUSENIX Security '24Lucy Qin, Vaughn Hamilton, Sharon Wang, Yigit Aydinalp, Marin Scarlett, Elissa M. Redmiles
    Improving the Ability of Thermal Radiation Based Hardware Trojan DetectionUSENIX Security '24Ting Su, Yaohua Wang, Shi Xu, Lusi Zhang, Simin Feng, Jialong Song, Yiming Liu, Yongkang Tang, Yang Zhang, Shaoqing Li, Yang Guo, Hengzhu Liu
    VulSim: Leveraging Similarity of Multi-Dimensional Neighbor Embeddings for Vulnerability DetectionUSENIX Security '24Samiha Shimmi, Ashiqur Rahman, Mohan Gadde, Hamed Okhravi, Mona Rahimi
    Defects-in-Depth: Analyzing the Integration of Effective Defenses against One-Day Exploits in Android KernelsUSENIX Security '24Lukas Maar, Florian Draschbacher, Lukas Lamster, Stefan Mangard
    On a Collision Course: Unveiling Wireless Attacks to the Aircraft Traffic Collision Avoidance System (TCAS)USENIX Security '24Giacomo Longo, Martin Strohmeier, Enrico Russo, Alessio Merlo, Vincent Lenders
    KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-Based Phishing DetectionUSENIX Security '24Yuexin Li, Chengyu Huang, Shumin Deng, Mei Lin Lock, Tri Cao, Nay Oo, Hoon Wei Lim, Bryan Hooi
    Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch PredictorUSENIX Security '24Luyi Li, Hosein Yavarzadeh, Dean Tullsen
    GHunter: Universal Prototype Pollution Gadgets in JavaScript RuntimesUSENIX Security '24Eric Cornelissen, Mikhail Shcherbakov, Musard Balliu
    Landscape More Secure Than Portrait? Zooming Into the Directionality of Digital Images With Security ImplicationsUSENIX Security '24Benedikt Lorch, Rainer Böhme
    HIVE: A Hardware-assisted Isolated Execution Environment for eBPF on AArch64USENIX Security '24Peihua Zhang, Chenggang Wu, Xiangyu Meng, Yinqian Zhang, Mingfan Peng, Shiyang Zhang, Bing Hu, Mengyao Xie, Yuanming Lai, Yan Kang, Zhe Wang
    "What do you want from theory alone?" Experimenting with Tight Auditing of Differentially Private Synthetic Data GenerationUSENIX Security '24Meenatchi Sundaram Muthu Selva Annamalai, Georgi Ganev, Emiliano De Cristofaro
    On the Criticality of Integrity Protection in 5G Fronthaul NetworksUSENIX Security '24Jiarong Xing, Sophia Yoo, Xenofon Foukas, Daehyeok Kim, Michael K. Reiter
    Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery AttacksUSENIX Security '24Robin Leander Schröder, Stefan Gast, Qian Guo
    Xplain: Analyzing Invisible Correlations in Model ExplanationUSENIX Security '24Kavita Kumari, Alessandro Pegoraro, Hossein Fereidooni, Ahmad-Reza Sadeghi
    A First Physical-World Trajectory Prediction Attack via LiDAR-induced Deceptions in Autonomous DrivingUSENIX Security '24Yang Lou, Yi Zhu, Qun Song, Rui Tan, Chunming Qiao, Wei-Bin Lee, Jianping Wang
    OptFuzz: Optimization Path Guided Fuzzing for JavaScript JIT CompilersUSENIX Security '24Jiming Wang, Yan Kang, Chenggang Wu, Yuhao Hu, Yue Sun, Jikai Ren, Yuanming Lai, Mengyao Xie, Charles Zhang, Tao Li, Zhe Wang

    Pages