USENIX logo
A whole new look is coming
Check back again soon!

Conferences

Search results

    TitleConferenceSpeaker(s)
    PURL: Safe and Effective Sanitization of Link DecorationUSENIX Security '24Shaoor Munir, Patrick Lee, Umar Iqbal, Zubair Shafiq, Sandra Siby
    Understanding Help-Seeking and Help-Giving on Social Media for Image-Based Sexual AbuseUSENIX Security '24Miranda Wei, Sunny Consolvo, Patrick Gage Kelley, Tadayoshi Kohno, Tara Matthews, Sarah Meiklejohn, Franziska Roesner, Renee Shelby, Kurt Thomas, Rebecca Umbach
    Holding Secrets Accountable: Auditing Privacy-Preserving Machine LearningUSENIX Security '24
    "I really just leaned on my community for support": Barriers, Challenges, and Coping Mechanisms Used by Survivors of Technology-Facilitated Abuse to Seek Social SupportUSENIX Security '24Naman Gupta, Kate Walsh, Sanchari Das, Rahul Chatterjee
    Information Flow Control in Machine Learning through Modular Model ArchitectureUSENIX Security '24Trishita Tiwari, Suchin Gururangan, Chuan Guo, Weizhe Hua, Sanjay Kariyappa, Udit Gupta, Wenjie Xiong, Kiwan Maeng, Hsien-Hsin S. Lee, G. Edward Suh
    SpotProxy: Rediscovering the Cloud for Censorship CircumventionUSENIX Security '24Patrick Tser Jern Kon, Sina Kamali, Jinyu Pei, Diogo Barradas, Ang Chen, Micah Sherr, Moti Yung
    LanDscAPe: Exploring LDAP Weaknesses and Data Leaks at Internet ScaleUSENIX Security '24Jonas Kaspereit, Gurur Öndarö, Gustavo Luvizotto Cesar, Simon Ebbers, Fabian Ising, Christoph Saatjohann, Mattijs Jonker, Ralph Holz, Sebastian Schinzel
    UBA-Inf: Unlearning Activated Backdoor Attack with Influence-Driven CamouflageUSENIX Security '24Zirui Huang, Yunlong Mao, Sheng Zhong
    SIMurai: Slicing Through the Complexity of SIM Card Security ResearchUSENIX Security '24Tomasz Piotr Lisowski, Merlin Chlosta, Jinjin Wang, Marius Muench
    SoK: Neural Network Extraction Through Physical Side ChannelsUSENIX Security '24
    Zero-setup Intermediate-rate Communication Guarantees in a Global InternetUSENIX Security '24Marc Wyss, Adrian Perrig
    Making Them Ask and Answer: Jailbreaking Large Language Models in Few Queries via Disguise and ReconstructionUSENIX Security '24Tong Liu, Yingjie Zhang, Zhe Zhao, Yinpeng Dong, Guozhu Meng, Kai Chen
    Bending microarchitectural weird machines towards practicalityUSENIX Security '24Ping-Lun Wang, Riccardo Paccagnella, Riad S. Wahby, Fraser Brown
    Diffie-Hellman Picture Show: Key Exchange Stories from Commercial VoWiFi DeploymentsUSENIX Security '24Gabriel K. Gegenhuber, Florian Holzbauer, Philipp É. Frenzel, Edgar Weippl, Adrian Dabrowski
    Data Coverage for Guided FuzzingUSENIX Security '24Mingzhe Wang, Jie Liang, Chijin Zhou, Zhiyong Wu, Jingzhou Fu, Zhuo Su, Qing Liao, Bin Gu, Bodong Wu, Yu Jiang
    Unveiling the Hunter-Gatherers: Exploring Threat Hunting Practices and Challenges in Cyber DefenseUSENIX Security '24Priyanka Badva, Kopo M. Ramokapane, Eleonora Pantano, Awais Rashid
    The Decisive Power of Indecision: Low-Variance Risk-Limiting Audits and Election Contestation via Marginal Mark RecordingUSENIX Security '24Benjamin Fuller, Rashmi Pai, Alexander Russell
    Navigating Traumatic Stress Reactions During Computer Security InterventionsUSENIX Security '24Lana Ramjit, Natalie Dolci, Francesca Rossi, Ryan Garcia, Thomas Ristenpart, Dana Cuomo
    Formal verification of the PQXDH Post-Quantum key agreement protocol for end-to-end secure messagingUSENIX Security '24Karthikeyan Bhargavan, Charlie Jacomme, Franziskus Kiefer, Rolfe Schmidt
    SnailLoad: Exploiting Remote Network Latency Measurements without JavaScriptUSENIX Security '24Stefan Gast, Roland Czerny, Jonas Juffinger, Fabian Rauscher, Simone Franza, Daniel Gruss
    ORANalyst: Systematic Testing Framework for Open RAN ImplementationsUSENIX Security '24Tianchang Yang, Syed Md Mukit Rashid, Ali Ranjbar, Gang Tan, Syed Rafiul Hussain
    FVD-DPM: Fine-grained Vulnerability Detection via Conditional Diffusion Probabilistic ModelsUSENIX Security '24Miaomiao Shao, Yuxin Ding
    Shaken, not Stirred - Automated Discovery of Subtle Attacks on Protocols using Mix-NetsUSENIX Security '24Jannik Dreier, Pascal Lafourcade, Dhekra Mahmoud
    Digital Discrimination of Users in Sanctioned States: The Case of the Cuba EmbargoUSENIX Security '24Anna Ablove, Shreyas Chandrashekaran, Hieu Le, Ram Sundara Raman, Reethika Ramesh, Harry Oppenheimer, Roya Ensafi
    The Imitation Game: Exploring Brand Impersonation Attacks on Social Media PlatformsUSENIX Security '24Bhupendra Acharya, Dario Lazzaro, Efrén López-Morales, Adam Oest, Muhammad Saad, Antonio Emanuele Cinà, Lea Schönherr, Thorsten Holz

    Pages