USENIX logo
A whole new look is coming
Check back again soon!

Conferences

Search results

    TitleConferenceSpeaker(s)
    Privacy Side Channels in Machine Learning SystemsUSENIX Security '24Edoardo Debenedetti, Giorgio Severi, Nicholas Carlini, Christopher A. Choquette-Choo, Matthew Jagielski, Milad Nasr, Eric Wallace, Florian Tramèr
    Adversarial Illusions in Multi-Modal EmbeddingsUSENIX Security '24Eugene Bagdasaryan, Rishi Jha, Vitaly Shmatikov, Tingwei Zhang
    IoT Market Dynamics: An Analysis of Device Sales, Security and Privacy Signals, and their InteractionsUSENIX Security '24Swaathi Vetrivel, Brennen Bouwmeester, Michel van Eeten, Carlos H. Gañán
    Towards Privacy and Security in Private Clouds: A Representative Survey on the Prevalence of Private Hosting and Administrator CharacteristicsUSENIX Security '24Lea Gröber, Simon Lenau, Rebecca Weil, Elena Groben, Michael Schilling, Katharina Krombholz
    ElectionGuard: a Cryptographic Toolkit to Enable Verifiable ElectionsUSENIX Security '24Josh Benaloh, Michael Naehrig, Olivier Pereira, Dan S. Wallach
    Unveiling IoT Security in Reality: A Firmware-Centric JourneyUSENIX Security '24Nicolas Nino, Ruibo Lu, Wei Zhou, Kyu Hyung Lee, Ziming Zhao, Le Guan
    Exploiting Leakage in Password Managers via Injection AttacksUSENIX Security '24Andrés Fábrega, Armin Namavari, Rachit Agarwal, Ben Nassi, Thomas Ristenpart
    Rethinking the Invisible Protection against Unauthorized Image Usage in Stable DiffusionUSENIX Security '24Shengwei An, Lu Yan, Siyuan Cheng, Guangyu Shen, Kaiyuan Zhang, Qiuling Xu, Guanhong Tao, Xiangyu Zhang
    A Flushing Attack on the DNS CacheUSENIX Security '24Yehuda Afek, Anat Bremler-Barr, Shoham Danino, Yuval Shavitt
    Scalable Private Set Union, with Stronger SecurityUSENIX Security '24Yanxue Jia, Shi-Feng Sun, Hong-Sheng Zhou, Dawu Gu
    Verify your Labels! Trustworthy Predictions and Datasets via Confidence ScoresUSENIX Security '24Torsten Krauß, Jasper Stang, Alexandra Dmitrienko
    Orbital Trust and Privacy: SoK on PKI and Location Privacy Challenges in Space NetworksUSENIX Security '24David Koisser, Richard Mitev, Nikita Yadav, Franziska Vollmer, Ahmad-Reza Sadeghi
    What Was Your Prompt? A Remote Keylogging Attack on AI AssistantsUSENIX Security '24Roy Weiss, Daniel Ayzenshteyn, Yisroel Mirsky
    Detecting Kernel Memory Bugs through Inconsistent Memory Management Intention InferencesUSENIX Security '24Dinghao Liu, Zhipeng Lu, Shouling Ji, Kangjie Lu, Jianhai Chen, Zhenguang Liu, Dexin Liu, Renyi Cai, Qinming He
    DVSorder: Ballot Randomization Flaws Threaten Voter PrivacyUSENIX Security '24Braden L. Crimmins, Dhanya Y. Narayanan, Drew Springall, J. Alex Halderman
    Invisibility Cloak: Proactive Defense Against Visual Game CheatingUSENIX Security '24Chenxin Sun, Kai Ye, Liangcai Su, Jiayi Zhang, Chenxiong Qian
    From One Thousand Pages of Specification to Unveiling Hidden Bugs: Large Language Model Assisted Fuzzing of Matter IoT DevicesUSENIX Security '24Xiaoyue Ma, Lannan Luo, Qiang Zeng
    Navigating the Privacy Compliance Maze: Understanding Risks with Privacy-Configurable Mobile SDKsUSENIX Security '24Yifan Zhang, Zhaojie Hu, Xueqiang Wang, Yuhui Hong, Yuhong Nan, XiaoFeng Wang, Jiatao Cheng, Luyi Xing
    Endokernel: A Thread Safe Monitor for Lightweight Subprocess IsolationUSENIX Security '24Fangfei Yang, Bumjin Im, Weijie Huang, Kelly Kaoudis, Anjo Vahldiek-Oberwagner, Chia-Che Tsai, Nathan Dautenhahn
    INSIGHT: Attacking Industry-Adopted Learning Resilient Logic Locking Techniques Using Explainable Graph Neural NetworkUSENIX Security '24Lakshmi Likhitha Mankali, Ozgur Sinanoglu, Satwik Patnaik
    Cross the Zone: Toward a Covert Domain Hijacking via Shared DNS InfrastructureUSENIX Security '24Yunyi Zhang, Mingming Zhang, Baojun Liu, Zhan Liu, Jia Zhang, Haixin Duan, Min Zhang, Fan Shi, Chengxi Xu
    Enhancing Network Attack Detection with Distributed and In-Network Data Collection SystemUSENIX Security '24Seyed Mohammad Mehdi Mirnajafizadeh, Ashwin Raam Sethuram, David Mohaisen, DaeHun Nyang, Rhongho Jang
    An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong DetectionUSENIX Security '24Shenao Yan, Shen Wang, Yue Duan, Hanbin Hong, Kiho Lee, Doowon Kim, Yuan Hong
    A World Where We Trust Hard-Won Lessons in Security Research, Technology, and PeopleUSENIX Security '24David Brumley
    Evolving Landscape of Disinformation - Lessons Learned So Far!SOUPS 2024

    Pages