Conferences

Search results

    TitleConferenceSpeaker(s)
    A Taxonomy of C Decompiler Fidelity IssuesUSENIX Security '24Luke Dramko, Jeremy Lacomis, Edward J. Schwartz, Bogdan Vasilescu, Claire Le Goues
    SmartCookie: Blocking Large-Scale SYN Floods with a Split-Proxy Defense on Programmable Data PlanesUSENIX Security '24Sophia Yoo, Xiaoqi Chen, Jennifer Rexford
    SpecLFB: Eliminating Cache Side Channels in Speculative ExecutionsUSENIX Security '24Xiaoyu Cheng, Fei Tong, Hongyu Wang, Zhe Zhou, Fang Jiang, Yuxing Mao
    Vulnerability-oriented Testing for RESTful APIsUSENIX Security '24Wenlong Du, Jian Li, Yanhao Wang, Libo Chen, Ruijie Zhao, Junmin Zhu, Zhengguang Han, Yijun Wang, Zhi Xue
    K-Waay: Fast and Deniable Post-Quantum X3DH without Ring SignaturesUSENIX Security '24Daniel Collins, Loïs Huguenin-Dumittan, Ngoc Khanh Nguyen, Nicolas Rolin, Serge Vaudenay
    SWOOSH: Efficient Lattice-Based Non-Interactive Key ExchangeUSENIX Security '24Phillip Gajland, Bor de Kock, Miguel Quaresma, Giulio Malavolta, Peter Schwabe
    "I feel physically safe but not politically safe": Understanding the Digital Threats and Safety Practices of OnlyFans CreatorsUSENIX Security '24Ananta Soneji, Vaughn Hamilton, Adam Doupé, Allison McDonald, Elissa M. Redmiles
    Rise of Inspectron: Automated Black-box Auditing of Cross-platform Electron AppsUSENIX Security '24Mir Masood Ali, Mohammad Ghasemisharif, Chris Kanich, Jason Polakis
    DVa: Extracting Victims and Abuse Vectors from Android Accessibility MalwareUSENIX Security '24Haichuan Xu, Mingxuan Yao, Runze Zhang, Mohamed Moustafa Dawoud, Jeman Park, Brendan Saltaformaggio
    SoK: State of the Krawlers – Evaluating the Effectiveness of Crawling Algorithms for Web Security MeasurementsUSENIX Security '24Aleksei Stafeev, Giancarlo Pellegrino
    Page-Oriented Programming: Subverting Control-Flow Integrity of Commodity Operating System Kernels with Non-Writable Code PagesUSENIX Security '24Seunghun Han, Seong-Joong Kim, Wook Shin, Byung Joon Kim, Jae-Cheol Ryou
    "I chose to fight, be brave, and to deal with it": Threat Experiences and Security Practices of Pakistani Content CreatorsUSENIX Security '24Lea Gröber, Waleed Arshad, Shanza, Angelica Goetzen, Elissa M. Redmiles, Maryam Mustafa, Katharina Krombholz
    Towards Privacy-Preserving Social-Media SDKs on AndroidUSENIX Security '24Haoran Lu, Yichen Liu, Xiaojing Liao, Luyi Xing
    UIHash: Detecting Similar Android UIs through Grid-Based Visual Appearance RepresentationUSENIX Security '24Jiawei Li, Jian Mao, Jun Zeng, Qixiao Lin, Shaowen Feng, Zhenkai Liang
    Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory ApproachUSENIX Security '24Qi Tan, Qi Li, Yi Zhao, Zhuotao Liu, Xiaobing Guo, Ke Xu
    Lotto: Secure Participant Selection against Adversarial Servers in Federated LearningUSENIX Security '24Zhifeng Jiang, Peng Ye, Shiqi He, Wei Wang, Ruichuan Chen, Bo Li
    Loopy Hell(ow): Infinite Traffic Loops at the Application LayerUSENIX Security '24Yepeng Pan, Anna Ascheman, Christian Rossow
    Eye of Sauron: Long-Range Hidden Spy Camera Detection and Positioning with Inbuilt Memory EM RadiationUSENIX Security '24Qibo Zhang, Daibo Liu, Xinyu Zhang, Zhichao Cao, Fanzi Zeng, Hongbo Jiang, Wenqiang Jin
    In Wallet We Trust: Bypassing the Digital Wallets Payment Security for Free ShoppingUSENIX Security '24Raja Hasnain Anwar, Syed Rafiul Hussain, Muhammad Taqi Raza
    Racing for TLS Certificate Validation: A Hijacker's Guide to the Android TLS GalaxyUSENIX Security '24Sajjad Pourali, Xiufen Yu, Lianying Zhao, Mohammad Mannan, Amr Youssef
    D-Helix: A Generic Decompiler Testing Framework Using Symbolic DifferentiationUSENIX Security '24Muqi Zou, Arslan Khan, Ruoyu Wu, Han Gao, Antonio Bianchi, Dave (Jing) Tian
    Web Platform Threats: Automated Detection of Web Security Issues With WPTUSENIX Security '24Pedro Bernardo, Lorenzo Veronese, Valentino Dalla Valle, Stefano Calzavara, Marco Squarcina, Pedro Adão, Matteo Maffei
    The Impact of Exposed Passwords on Honeyword EfficacyUSENIX Security '24Zonghao Huang, Lujo Bauer, Michael K. Reiter
    AttackGNN: Red-Teaming GNNs in Hardware Security Using Reinforcement LearningUSENIX Security '24Vasudev Gohil, Satwik Patnaik, Dileep Kalathil, Jeyavijayan Rajendran
    PhishDecloaker: Detecting CAPTCHA-cloaked Phishing Websites via Hybrid Vision-based Interactive ModelsUSENIX Security '24Xiwen Teoh, Yun Lin, Ruofan Liu, Zhiyong Huang, Jin Song Dong

Pages