Menu
About
Open submenu
Conferences
Open submenu
Publications
Open submenu
Membership
Students
Open submenu
Search
Donate Today
Close submenu
About
USENIX Board
Staff
Newsroom
Good Works
Blog
Governance and Financials
USENIX Awards
USENIX Supporters
2024 Board Election
Board Meeting Minutes
Donate
Close submenu
Conferences
Upcoming
By Name
Calls for Papers
Grants
Sponsorship
Best Papers
Test of Time Awards
Multimedia
Conference FAQ
Conference Policies
Code of Conduct
Close submenu
Publications
Proceedings
Author Resources
;login: Online
Writing for ;login: Online
;login: Archive
Close submenu
Students
Conference Fees
Campus Representative Program
Student Grant Program
Skip to main content
About
Conferences
Publications
Proceedings
Author Resources
;login: Online
Writing for ;login: Online
;login: Archive
Membership
Students
Search
Donate Today
Sign In
Search
Proceedings
Author Resources
;login: Online
Writing for ;login: Online
;login: Archive
Papers
Donate Today
Enter terms
Retain current filters
Search results
Conference
Title
Author(s)
Conference
Title
Author(s)
USENIX Security '24
Lightweight Authentication of Web Data via Garble-Then-Prove
USENIX Security '24
VeriSimplePIR: Verifiability in SimplePIR at No Online Cost for Honest Servers
Leo de Castro, Keewoo Lee
USENIX Security '24
A Taxonomy of C Decompiler Fidelity Issues
Luke Dramko, Jeremy Lacomis, Edward J. Schwartz, Bogdan Vasilescu, Claire Le Goues
USENIX Security '24
SmartCookie: Blocking Large-Scale SYN Floods with a Split-Proxy Defense on Programmable Data Planes
Sophia Yoo, Xiaoqi Chen, Jennifer Rexford
USENIX Security '24
SpecLFB: Eliminating Cache Side Channels in Speculative Executions
Xiaoyu Cheng, Fei Tong, Hongyu Wang, Zhe Zhou, Fang Jiang, Yuxing Mao
USENIX Security '24
Vulnerability-oriented Testing for RESTful APIs
Wenlong Du, Jian Li, Yanhao Wang, Libo Chen, Ruijie Zhao, Junmin Zhu, Zhengguang Han, Yijun Wang, Zhi Xue
USENIX Security '24
K-Waay: Fast and Deniable Post-Quantum X3DH without Ring Signatures
Daniel Collins, Loïs Huguenin-Dumittan, Ngoc Khanh Nguyen, Nicolas Rolin, Serge Vaudenay
USENIX Security '24
SWOOSH: Efficient Lattice-Based Non-Interactive Key Exchange
Phillip Gajland, Bor de Kock, Miguel Quaresma, Giulio Malavolta, Peter Schwabe
USENIX Security '24
"I feel physically safe but not politically safe": Understanding the Digital Threats and Safety Practices of OnlyFans Creators
Ananta Soneji, Vaughn Hamilton, Adam Doupé, Allison McDonald, Elissa M. Redmiles
USENIX Security '24
Rise of Inspectron: Automated Black-box Auditing of Cross-platform Electron Apps
Mir Masood Ali, Mohammad Ghasemisharif, Chris Kanich, Jason Polakis
USENIX Security '24
DVa: Extracting Victims and Abuse Vectors from Android Accessibility Malware
Haichuan Xu, Mingxuan Yao, Runze Zhang, Mohamed Moustafa Dawoud, Jeman Park, Brendan Saltaformaggio
USENIX Security '24
SoK: State of the Krawlers – Evaluating the Effectiveness of Crawling Algorithms for Web Security Measurements
Aleksei Stafeev, Giancarlo Pellegrino
USENIX Security '24
Page-Oriented Programming: Subverting Control-Flow Integrity of Commodity Operating System Kernels with Non-Writable Code Pages
Seunghun Han, Seong-Joong Kim, Wook Shin, Byung Joon Kim, Jae-Cheol Ryou
USENIX Security '24
"I chose to fight, be brave, and to deal with it": Threat Experiences and Security Practices of Pakistani Content Creators
Lea Gröber, Waleed Arshad, Angelica Goetzen, Elissa M. Redmiles, Maryam Mustafa, Katharina Krombholz
USENIX Security '24
Towards Privacy-Preserving Social-Media SDKs on Android
Haoran Lu, Yichen Liu, Xiaojing Liao, Luyi Xing
USENIX Security '24
UIHash: Detecting Similar Android UIs through Grid-Based Visual Appearance Representation
Jiawei Li, Jian Mao, Jun Zeng, Qixiao Lin, Shaowen Feng, Zhenkai Liang
USENIX Security '24
Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach
Qi Tan, Qi Li, Yi Zhao, Zhuotao Liu, Xiaobing Guo, Ke Xu
USENIX Security '24
Lotto: Secure Participant Selection against Adversarial Servers in Federated Learning
Zhifeng Jiang, Peng Ye, Shiqi He, Wei Wang, Ruichuan Chen, Bo Li
USENIX Security '24
Loopy Hell(ow): Infinite Traffic Loops at the Application Layer
Yepeng Pan, Anna Ascheman, Christian Rossow
USENIX Security '24
Eye of Sauron: Long-Range Hidden Spy Camera Detection and Positioning with Inbuilt Memory EM Radiation
Qibo Zhang, Daibo Liu, Xinyu Zhang, Zhichao Cao, Fanzi Zeng, Hongbo Jiang, Wenqiang Jin
USENIX Security '24
Racing for TLS Certificate Validation: A Hijacker's Guide to the Android TLS Galaxy
Sajjad Pourali, Xiufen Yu, Lianying Zhao, Mohammad Mannan, Amr Youssef
USENIX Security '24
D-Helix: A Generic Decompiler Testing Framework Using Symbolic Differentiation
Muqi Zou, Arslan Khan, Ruoyu Wu, Han Gao, Antonio Bianchi, Dave (Jing) Tian
USENIX Security '24
Web Platform Threats: Automated Detection of Web Security Issues With WPT
Pedro Bernardo, Lorenzo Veronese, Valentino Dalla Valle, Stefano Calzavara, Marco Squarcina, Pedro Adão, Matteo Maffei
USENIX Security '24
The Impact of Exposed Passwords on Honeyword Efficacy
Zonghao Huang, Lujo Bauer, Michael K. Reiter
USENIX Security '24
AttackGNN: Red-Teaming GNNs in Hardware Security Using Reinforcement Learning
Vasudev Gohil, Satwik Patnaik, Dileep Kalathil, Jeyavijayan Rajendran
Pages
1
2
3
4
5
6
7
8
9
…
next ›
last »
Close menu