Login / Signup
USENIX Security Symposium
1993
2003
2013
2024
1993
2024
Keyphrases
Publications
2024
David Koisser
,
Richard Mitev
,
Nikita Yadav
,
Franziska Vollmer
,
Ahmad-Reza Sadeghi
Orbital Trust and Privacy: SoK on PKI and Location Privacy Challenges in Space Networks.
USENIX Security Symposium
(2024)
Mingli Wu
,
Tsz Hon Yuen
,
Kwan Yin Chan
O-Ring and K-Star: Efficient Multi-party Private Set Intersection.
USENIX Security Symposium
(2024)
Chongqing Lei
,
Zhen Ling
,
Yue Zhang
,
Yan Yang
,
Junzhou Luo
,
Xinwen Fu
A Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers.
USENIX Security Symposium
(2024)
Kedong Xiu
,
Ding Wang
PointerGuess: Targeted Password Guessing Model Using Pointer Mechanism.
USENIX Security Symposium
(2024)
Giuseppe Calderonio
,
Mir Masood Ali
,
Jason Polakis
Fledging Will Continue Until Privacy Improves: Empirical Analysis of Google's Privacy-Preserving Targeted Advertising.
USENIX Security Symposium
(2024)
Dongli Liu
,
Wei Wang
,
Peng Xu
,
Laurence T. Yang
,
Bo Luo
,
Kaitai Liang
d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases.
USENIX Security Symposium
(2024)
Momen Oqaily
,
Hinddeep Purohit
,
Yosr Jarraya
,
Lingyu Wang
,
Boubakr Nour
,
Makan Pourzandi
,
Mourad Debbabi
ChainPatrol: Balancing Attack Detection and Classification with Performance Overhead for Service Function Chains Using Virtual Trailers.
USENIX Security Symposium
(2024)
Zirui Huang
,
Yunlong Mao
,
Sheng Zhong
UBA-Inf: Unlearning Activated Backdoor Attack with Influence-Driven Camouflage.
USENIX Security Symposium
(2024)
Anh Nguyen
,
Xiaokuan Zhang
,
Zhisheng Yan
Penetration Vision through Virtual Reality Headsets: Identifying 360-degree Videos from Head Movements.
USENIX Security Symposium
(2024)
Hidde Lycklama
,
Alexander Viand
,
Nicolas Küchler
,
Christian Knabenhans
,
Anwar Hithnawi
Holding Secrets Accountable: Auditing Privacy-Preserving Machine Learning.
USENIX Security Symposium
(2024)
Tushar Nayan
,
Qiming Guo
,
Mohammed Alduniawi
,
Marcus Botacin
,
A. Selcuk Uluagac
,
Ruimin Sun
SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice.
USENIX Security Symposium
(2024)
Ruofan Liu
,
Yun Lin
,
Xiwen Teoh
,
Gongshen Liu
,
Zhiyong Huang
,
Jin Song Dong
Less Defined Knowledge and More True Alarms: Reference-based Phishing Detection without a Pre-defined Reference List.
USENIX Security Symposium
(2024)
Seonyoung Cheon
,
Yongwoo Lee
,
Dongkwan Kim
,
Ju Min Lee
,
Sunchul Jung
,
Taekyung Kim
,
Dongyoon Lee
,
Hanjun Kim
DaCapo: Automatic Bootstrapping Management for Efficient Fully Homomorphic Encryption.
USENIX Security Symposium
(2024)
Shuofeng Liu
,
Zihan Wang
,
Minhui Xue
,
Long Wang
,
Yuanchao Zhang
,
Guangdong Bai
Being Transparent is Merely the Beginning: Enforcing Purpose Limitation with Polynomial Approximation.
USENIX Security Symposium
(2024)
Seth Layton
,
Tyler Tucker
,
Daniel Olszewski
,
Kevin Warren
,
Kevin R. B. Butler
,
Patrick Traynor
SoK: The Good, The Bad, and The Unbalanced: Measuring Structural Limitations of Deepfake Media Datasets.
USENIX Security Symposium
(2024)
Ryan Little
,
Lucy Qin
,
Mayank Varia
Secure Account Recovery for a Privacy-Preserving Web Service.
USENIX Security Symposium
(2024)
Cecylia Bocovich
,
Arlo Breault
,
David Fifield
,
Serene
,
Xiaokang Wang
Snowflake, a censorship circumvention system using temporary WebRTC proxies.
USENIX Security Symposium
(2024)
Huayi Duan
,
Marco Bearzi
,
Jodok Vieli
,
David A. Basin
,
Adrian Perrig
,
Si Liu
,
Bernhard Tellenbach
CAMP: Compositional Amplification Attacks against DNS.
USENIX Security Symposium
(2024)
Jannik Dreier
,
Pascal Lafourcade
,
Dhekra Mahmoud
Shaken, not Stirred - Automated Discovery of Subtle Attacks on Protocols using Mix-Nets.
USENIX Security Symposium
(2024)
Leona Lassak
,
Elleen Pan
,
Blase Ur
,
Maximilian Golla
Why Aren't We Using Passkeys? Obstacles Companies Face Deploying FIDO2 Passwordless Authentication.
USENIX Security Symposium
(2024)
Peiyu Liu
,
Junming Liu
,
Lirong Fu
,
Kangjie Lu
,
Yifan Xia
,
Xuhong Zhang
,
Wenzhi Chen
,
Haiqin Weng
,
Shouling Ji
,
Wenhai Wang
Exploring ChatGPT's Capabilities on Vulnerability Management.
USENIX Security Symposium
(2024)
Giulio De Pasquale
,
Ilya Grishchenko
,
Riccardo Iesari
,
Gabriel Pizarro
,
Lorenzo Cavallaro
,
Christopher Kruegel
,
Giovanni Vigna
ChainReactor: Automated Privilege Escalation Chain Discovery via AI Planning.
USENIX Security Symposium
(2024)
Matthew Joslin
,
Xian Wang
,
Shuang Hao
Double Face: Leveraging User Intelligence to Characterize and Recognize AI-synthesized Faces.
USENIX Security Symposium
(2024)
Sander Wiebing
,
Alvise de Faveri Tron
,
Herbert Bos
,
Cristiano Giuffrida
InSpectre Gadget: Inspecting the Residual Attack Surface of Cross-privilege Spectre v2.
USENIX Security Symposium
(2024)
Qian Guo
,
Denis Nabokov
,
Elias Suvanto
,
Thomas Johansson
Key Recovery Attacks on Approximate Homomorphic Encryption with Non-Worst-Case Noise Flooding Countermeasures.
USENIX Security Symposium
(2024)
Priyanka Mondal
,
Javad Ghareh Chamani
,
Ioannis Demertzis
,
Dimitrios Papadopoulos
I/O-Efficient Dynamic Searchable Encryption meets Forward & Backward Privacy.
USENIX Security Symposium
(2024)
Roy Weiss
,
Daniel Ayzenshteyn
,
Guy Amit
,
Yisroel Mirsky
What Was Your Prompt? A Remote Keylogging Attack on AI Assistants.
USENIX Security Symposium
(2024)
Raphael Serafini
,
Stefan Albert Horstmann
,
Alena Naiakshina
Engaging Company Developers in Security Research Studies: A Comprehensive Literature Review and Quantitative Survey.
USENIX Security Symposium
(2024)
Raja Hasnain Anwar
,
Syed Rafiul Hussain
,
Muhammad Taqi Raza
In Wallet We Trust: Bypassing the Digital Wallets Payment Security for Free Shopping.
USENIX Security Symposium
(2024)
Zonghao Huang
,
Lujo Bauer
,
Michael K. Reiter
The Impact of Exposed Passwords on Honeyword Efficacy.
USENIX Security Symposium
(2024)
Boyang Zhang
,
Zheng Li
,
Ziqing Yang
,
Xinlei He
,
Michael Backes
,
Mario Fritz
,
Yang Zhang
SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models.
USENIX Security Symposium
(2024)
Shenchen Zhu
,
Yue Zhao
,
Kai Chen
,
Bo Wang
,
Hualong Ma
,
Cheng'an Wei
AE-Morpher: Improve Physical Robustness of Adversarial Objects against LiDAR-based Detectors via Object Reconstruction.
USENIX Security Symposium
(2024)
Patrick Tser Jern Kon
,
Sina Kamali
,
Jinyu Pei
,
Diogo Barradas
,
Ang Chen
,
Micah Sherr
,
Moti Yung
SpotProxy: Rediscovering the Cloud for Censorship Circumvention.
USENIX Security Symposium
(2024)
Veena Krish
,
Nicola Paoletti
,
Milad Kazemi
,
Scott A. Smolka
,
Amir Rahmati
Biosignal Authentication Considered Harmful Today.
USENIX Security Symposium
(2024)
Torsten Krauß
,
Jasper Stang
,
Alexandra Dmitrienko
Verify your Labels! Trustworthy Predictions and Datasets via Confidence Scores.
USENIX Security Symposium
(2024)
Xiwen Teoh
,
Yun Lin
,
Ruofan Liu
,
Zhiyong Huang
,
Jin Song Dong
PhishDecloaker: Detecting CAPTCHA-cloaked Phishing Websites via Hybrid Vision-based Interactive Models.
USENIX Security Symposium
(2024)
Karthikeyan Bhargavan
,
Charlie Jacomme
,
Franziskus Kiefer
,
Rolfe Schmidt
Formal verification of the PQXDH Post-Quantum key agreement protocol for end-to-end secure messaging.
USENIX Security Symposium
(2024)
Kun Wang
,
Xiangyu Xu
,
Li Lu
,
Zhongjie Ba
,
Feng Lin
,
Kui Ren
FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker Recognition.
USENIX Security Symposium
(2024)
Weihao Su
,
Hong Huang
,
Rongchen Li
,
Haiming Chen
,
Tingjian Ge
Towards an Effective Method of ReDoS Detection for Non-backtracking Engines.
USENIX Security Symposium
(2024)
Wei Ao
,
Vishnu Naresh Boddeti
AutoFHE: Automated Adaption of CNNs for Efficient Evaluation over FHE.
USENIX Security Symposium
(2024)
Qingying Hao
,
Nirav Diwan
,
Ying Yuan
,
Giovanni Apruzzese
,
Mauro Conti
,
Gang Wang
It Doesn't Look Like Anything to Me: Using Diffusion Model to Subvert Visual Phishing Detectors.
USENIX Security Symposium
(2024)
Supraja Sridhara
,
Andrin Bertschi
,
Benedict Schlüter
,
Mark Kuhne
,
Fabio Aliberti
,
Shweta Shinde
ACAI: Protecting Accelerator Execution with Arm Confidential Computing Architecture.
USENIX Security Symposium
(2024)
Erin Avllazagaj
,
Yonghwi Kwon
,
Tudor Dumitras
SCAVY: Automated Discovery of Memory Corruption Targets in Linux Kernel for Privilege Escalation.
USENIX Security Symposium
(2024)
Aviv Yaish
,
Kaihua Qin
,
Liyi Zhou
,
Aviv Zohar
,
Arthur Gervais
Speculative Denial-of-Service Attacks In Ethereum.
USENIX Security Symposium
(2024)
Tingfeng Yu
,
James Henderson
,
Alwen Tiu
,
Thomas Haines
Security and Privacy Analysis of Samsung's Crowd-Sourced Bluetooth Location Tracking System.
USENIX Security Symposium
(2024)
Yunlong Xing
,
Shu Wang
,
Shiyu Sun
,
Xu He
,
Kun Sun
,
Qi Li
What IF Is Not Enough? Fixing Null Pointer Dereference With Contextual Check.
USENIX Security Symposium
(2024)
Arka Rai Choudhuri
,
Sanjam Garg
,
Julien Piet
,
Guru-Vamsi Policharla
Mempool Privacy via Batched Threshold Encryption: Attacks and Defenses.
USENIX Security Symposium
(2024)
Changming Liu
,
Alejandro Mera
,
Engin Kirda
,
Meng Xu
,
Long Lu
CO3: Concolic Co-execution for Firmware.
USENIX Security Symposium
(2024)
Sajjad Pourali
,
Xiufen Yu
,
Lianying Zhao
,
Mohammad Mannan
,
Amr M. Youssef
Racing for TLS Certificate Validation: A Hijacker's Guide to the Android TLS Galaxy.
USENIX Security Symposium
(2024)
Kaiming Cheng
,
Arkaprabha Bhattacharya
,
Michelle Lin
,
Jaewook Lee
,
Aroosh Kumar
,
Jeffery F. Tian
,
Tadayoshi Kohno
,
Franziska Roesner
When the User Is Inside the User Interface: An Empirical Study of UI Security Properties in Augmented Reality.
USENIX Security Symposium
(2024)