Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '24Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory ApproachQi Tan, Qi Li, Yi Zhao, Zhuotao Liu, Xiaobing Guo, Ke Xu
    USENIX Security '24Eye of Sauron: Long-Range Hidden Spy Camera Detection and Positioning with Inbuilt Memory EM RadiationQibo Zhang, Daibo Liu, Xinyu Zhang, Zhichao Cao, Fanzi Zeng, Hongbo Jiang, Wenqiang Jin
    USENIX Security '24The Impact of Exposed Passwords on Honeyword EfficacyZonghao Huang, Lujo Bauer, Michael K. Reiter
    USENIX Security '24Yes, One-Bit-Flip Matters! Universal DNN Model Inference Depletion with Runtime Code Fault InjectionShaofeng Li, Xinyu Wang, Minhui Xue, Haojin Zhu, Zhi Zhang, Yansong Gao, Wen Wu, Xuemin (Sherman) Shen
    USENIX Security '24Tossing in the Dark: Practical Bit-Flipping on Gray-box Deep Neural Networks for Runtime Trojan InjectionZihao Wang, Di Tang, XiaoFeng Wang, Wei He, Zhaoyang Geng, Wenhao Wang
    USENIX Security '24Formalizing Soundness Proofs of Linear PCP SNARKsBolton Bailey, Andrew Miller
    USENIX Security '24DNN-GP: Diagnosing and Mitigating Model's Faults Using Latent ConceptsShuo Wang, Hongsheng Hu, Jiamin Chang, Benjamin Zi Hao Zhao, Qi Alfred Chen, Minhui Xue
    USENIX Security '24HYPERPILL: Fuzzing for Hypervisor-bugs by Leveraging the Hardware Virtualization InterfaceAlexander Bulekov, Qiang Liu, Manuel Egele, Mathias Payer
    USENIX Security '24DPAdapter: Improving Differentially Private Deep Learning through Noise Tolerance Pre-trainingZihao Wang, Rui Zhu, Dongruo Zhou, Zhikun Zhang, John Mitchell, Haixu Tang, XiaoFeng Wang
    USENIX Security '24DARKFLEECE: Probing the Dark Side of Android Subscription AppsChang Yue, Chen Zhong, Kai Chen, Zhiyu Zhang, Yeonjoon Lee
    USENIX Security '24Understanding How to Inform Blind and Low-Vision Users about Data Privacy through Privacy Question Answering AssistantsYuanyuan Feng, Abhilasha Ravichander, Yaxing Yao, Shikun Zhang, Rex Chen
    USENIX Security '24FEASE: Fast and Expressive Asymmetric Searchable EncryptionLong Meng, Liqun Chen, Yangguang Tian, Mark Manulis, Suhui Liu
    USENIX Security '24A Linear Reconstruction Approach for Attribute Inference Attacks against Synthetic DataMeenatchi Sundaram Muthu Selva Annamalai, Andrea Gadotti, Luc Rocher
    USENIX Security '24Fast and Private Inference of Deep Neural Networks by Co-designing Activation FunctionsAbdulrahman Diaa, Lucas Fenaux, Thomas Humphries, Marian Dietz, Faezeh Ebrahimianghazani, Bailey Kacsmar, Xinda Li, Nils Lukas, Rasoul Akhavan Mahdavi, Simon Oya, Ehsan Amjadian, Florian Kerschbaum
    USENIX Security '24An Interview Study on Third-Party Cyber Threat Hunting Processes in the U.S. Department of Homeland SecurityWilliam P. Maxam III, James C. Davis
    USENIX Security '24Lightweight Authentication of Web Data via Garble-Then-Prove
    USENIX Security '24Exploring digital security and privacy in relative poverty in Germany through qualitative interviewsAnastassija Kostan, Sara Olschar, Lucy Simko, Yasemin Acar
    USENIX Security '24Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS HandshakesDiwen Xue, Michalis Kallitsis, Amir Houmansadr, Roya Ensafi
    USENIX Security '24Mudjacking: Patching Backdoor Vulnerabilities in Foundation ModelsHongbin Liu, Michael K. Reiter, Neil Zhenqiang Gong
    USENIX Security '24Pixel Thief: Exploiting SVG Filter Leakage in Firefox and ChromeSioli O'Connell, Lishay Aben Sour, Ron Magen, Daniel Genkin, Yossi Oren, Hovav Shacham, Yuval Yarom
    USENIX Security '24Unpacking Privacy Labels: A Measurement and Developer Perspective on Google's Data Safety SectionRishabh Khandelwal, Asmit Nayak, Paul Chung, Kassem Fawaz
    USENIX Security '24On the Difficulty of Defending Contrastive Learning against Backdoor AttacksChangjiang Li, Ren Pang, Bochuan Cao, Zhaohan Xi, Jinghui Chen, Shouling Ji, Ting Wang
    USENIX Security '24More Simplicity for Trainers, More Opportunity for Attackers: Black-Box Attacks on Speaker Recognition Systems by Inferring Feature ExtractorYunjie Ge, Pinji Chen, Qian Wang, Lingchen Zhao, Ningping Mou, Peipei Jiang, Cong Wang, Qi Li, Chao Shen
    USENIX Security '24Transferability of White-box Perturbations: Query-Efficient Adversarial Attacks against Commercial DNN ServicesMeng Shen, Changyue Li, Qi Li, Hao Lu, Liehuang Zhu, Ke Xu
    USENIX Security '24Penetration Vision through Virtual Reality Headsets: Identifying 360-degree Videos from Head MovementsAnh Nguyen, Xiaokuan Zhang, Zhisheng Yan

Pages