USENIX logo
A whole new look is coming
Check back again soon!

Conferences

Search results

    TitleConferenceSpeaker(s)
    Bridging Barriers: A Survey of Challenges and Priorities in the Censorship Circumvention LandscapeUSENIX Security '24Diwen Xue, Anna Ablove, Reethika Ramesh, Grace Kwak Danciu, Roya Ensafi
    Length Leakage in Oblivious Data Access MechanismsUSENIX Security '24Grace Jia, Rachit Agarwal, Anurag Khandelwal
    Stateful Least Privilege Authorization for the CloudUSENIX Security '24Leo Cao, Luoxi Meng, Deian Stefan, Earlence Fernandes
    Formal Security Analysis of Widevine through the W3C EME StandardUSENIX Security '24Stéphanie Delaune, Joseph Lallemand, Gwendal Patat, Florian Roudot, Mohamed Sabt
    FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability DetectionUSENIX Security '24Siyue Feng, Yueming Wu, Wenjie Xue, Sikui Pan, Deqing Zou, Yang Liu, Hai Jin
    BackdoorIndicator: Leveraging OOD Data for Proactive Backdoor Detection in Federated LearningUSENIX Security '24Songze Li, Yanbo Dai
    GlobalConfusion: TrustZone Trusted Application 0-Days by DesignUSENIX Security '24Marcel Busch, Philipp Mao, Mathias Payer
    YPIR: High-Throughput Single-Server PIR with Silent PreprocessingUSENIX Security '24Samir Jordan Menon, David J. Wu
    Abuse-Resistant Location Tracking: Balancing Privacy and Safety in the Offline Finding EcosystemUSENIX Security '24Harry Eldridge, Gabrielle Beck, Matthew Green, Nadia Heninger, Abhishek Jain
    I Experienced More than 10 DeFi Scams: On DeFi Users' Perception of Security Breaches and CountermeasuresUSENIX Security '24Mingyi Liu, Jun Ho Huh, HyungSeok Han, Jaehyuk Lee, Jihae Ahn, Frank Li, Hyoungshick Kim, Taesoo Kim
    POPSTAR: Lightweight Threshold Reporting with Reduced LeakageUSENIX Security '24Hanjun Li, Sela Navot, Stefano Tessaro
    CARDSHARK: Understanding and Stablizing Linux Kernel Concurrency Bugs Against the OddsUSENIX Security '24Tianshuo Han, Xiaorui Gong, Jian Liu
    Less Defined Knowledge and More True Alarms: Reference-based Phishing Detection without a Pre-defined Reference ListUSENIX Security '24Ruofan Liu, Yun Lin, Xiwen Teoh, Gongshen Liu, Zhiyong Huang, Jin Song Dong
    RADIUS/UDP Considered HarmfulUSENIX Security '24Sharon Goldberg, Miro Haller, Nadia Heninger, Mike Milano, Dan Shumow, Marc Stevens, Adam Suhl
    Cryptographic Analysis of Delta ChatUSENIX Security '24Yuanming Song, Lenka Mareková, Kenneth G. Paterson
    Instruction Backdoor Attacks Against Customized LLMsUSENIX Security '24Rui Zhang, Hongwei Li, Rui Wen, Wenbo Jiang, Yuan Zhang, Michael Backes, Yun Shen, Yang Zhang
    "You have to read 50 different RFCs that contradict each other": An Interview Study on the Experiences of Implementing Cryptographic StandardsUSENIX Security '24Nicolas Huaman, Jacques Suray, Jan H. Klemmer, Marcel Fourné, Sabrina Klivan, Ivana Trummová, Yasemin Acar, Sascha Fahl
    SoK: What Don't We Know? Understanding Security Vulnerabilities in SNARKsUSENIX Security '24Stefanos Chaliasos, Jens Ernstberger, David Theodore, David Wong, Mohammad Jahanara, Benjamin Livshits
    On Bridging the Gap between Control Flow Integrity and Attestation SchemesUSENIX Security '24Mahmoud Ammar, Ahmed Abdelraoof, Silviu Vlasceanu
    How does Endpoint Detection use the MITRE ATT&CK Framework?USENIX Security '24Apurva Virkud, Muhammad Adil Inam, Andy Riddle, Jason Liu, Gang Wang, Adam Bates
    FakeBehalf: Imperceptible Email Spoofing Attacks against the Delegation Mechanism in Email SystemsUSENIX Security '24Jinrui Ma, Lutong Chen, Kaiping Xue, Bo Luo, Xuanbo Huang, Mingrui Ai, Huanjie Zhang, David S.L. Wei, Yan Zhuang
    Windows into the Past: Exploiting Legacy Crypto in Modern OS's Kerberos ImplementationUSENIX Security '24Michal Shagam, Eyal Ronen
    MFKDF: Multiple Factors Knocked Down FlatUSENIX Security '24Matteo Scarlata, Matilda Backendal, Miro Haller
    Election Eligibility with OpenID: Turning Authentication into Transferable Proof of EligibilityUSENIX Security '24Véronique Cortier, Alexandre Debant, Anselme Goetschmann, Lucca Hirschi
    Forget and Rewire: Enhancing the Resilience of Transformer-based Models against Bit-Flip AttacksUSENIX Security '24Najmeh Nazari, Hosein Mohammadi Makrani, Chongzhou Fang, Hossein Sayadi, Setareh Rafatirad, Khaled N. Khasawneh, Houman Homayoun

    Pages