Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '24Lightweight Authentication of Web Data via Garble-Then-Prove
    USENIX Security '24VeriSimplePIR: Verifiability in SimplePIR at No Online Cost for Honest ServersLeo de Castro, Keewoo Lee
    USENIX Security '24A Taxonomy of C Decompiler Fidelity IssuesLuke Dramko, Jeremy Lacomis, Edward J. Schwartz, Bogdan Vasilescu, Claire Le Goues
    USENIX Security '24SmartCookie: Blocking Large-Scale SYN Floods with a Split-Proxy Defense on Programmable Data PlanesSophia Yoo, Xiaoqi Chen, Jennifer Rexford
    USENIX Security '24SpecLFB: Eliminating Cache Side Channels in Speculative ExecutionsXiaoyu Cheng, Fei Tong, Hongyu Wang, Zhe Zhou, Fang Jiang, Yuxing Mao
    USENIX Security '24Vulnerability-oriented Testing for RESTful APIsWenlong Du, Jian Li, Yanhao Wang, Libo Chen, Ruijie Zhao, Junmin Zhu, Zhengguang Han, Yijun Wang, Zhi Xue
    USENIX Security '24K-Waay: Fast and Deniable Post-Quantum X3DH without Ring SignaturesDaniel Collins, Loïs Huguenin-Dumittan, Ngoc Khanh Nguyen, Nicolas Rolin, Serge Vaudenay
    USENIX Security '24SWOOSH: Efficient Lattice-Based Non-Interactive Key ExchangePhillip Gajland, Bor de Kock, Miguel Quaresma, Giulio Malavolta, Peter Schwabe
    USENIX Security '24"I feel physically safe but not politically safe": Understanding the Digital Threats and Safety Practices of OnlyFans CreatorsAnanta Soneji, Vaughn Hamilton, Adam Doupé, Allison McDonald, Elissa M. Redmiles
    USENIX Security '24Rise of Inspectron: Automated Black-box Auditing of Cross-platform Electron AppsMir Masood Ali, Mohammad Ghasemisharif, Chris Kanich, Jason Polakis
    USENIX Security '24DVa: Extracting Victims and Abuse Vectors from Android Accessibility MalwareHaichuan Xu, Mingxuan Yao, Runze Zhang, Mohamed Moustafa Dawoud, Jeman Park, Brendan Saltaformaggio
    USENIX Security '24SoK: State of the Krawlers – Evaluating the Effectiveness of Crawling Algorithms for Web Security MeasurementsAleksei Stafeev, Giancarlo Pellegrino
    USENIX Security '24Page-Oriented Programming: Subverting Control-Flow Integrity of Commodity Operating System Kernels with Non-Writable Code PagesSeunghun Han, Seong-Joong Kim, Wook Shin, Byung Joon Kim, Jae-Cheol Ryou
    USENIX Security '24"I chose to fight, be brave, and to deal with it": Threat Experiences and Security Practices of Pakistani Content CreatorsLea Gröber, Waleed Arshad, Angelica Goetzen, Elissa M. Redmiles, Maryam Mustafa, Katharina Krombholz
    USENIX Security '24Towards Privacy-Preserving Social-Media SDKs on AndroidHaoran Lu, Yichen Liu, Xiaojing Liao, Luyi Xing
    USENIX Security '24UIHash: Detecting Similar Android UIs through Grid-Based Visual Appearance RepresentationJiawei Li, Jian Mao, Jun Zeng, Qixiao Lin, Shaowen Feng, Zhenkai Liang
    USENIX Security '24Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory ApproachQi Tan, Qi Li, Yi Zhao, Zhuotao Liu, Xiaobing Guo, Ke Xu
    USENIX Security '24Lotto: Secure Participant Selection against Adversarial Servers in Federated LearningZhifeng Jiang, Peng Ye, Shiqi He, Wei Wang, Ruichuan Chen, Bo Li
    USENIX Security '24Loopy Hell(ow): Infinite Traffic Loops at the Application LayerYepeng Pan, Anna Ascheman, Christian Rossow
    USENIX Security '24Eye of Sauron: Long-Range Hidden Spy Camera Detection and Positioning with Inbuilt Memory EM RadiationQibo Zhang, Daibo Liu, Xinyu Zhang, Zhichao Cao, Fanzi Zeng, Hongbo Jiang, Wenqiang Jin
    USENIX Security '24Racing for TLS Certificate Validation: A Hijacker's Guide to the Android TLS GalaxySajjad Pourali, Xiufen Yu, Lianying Zhao, Mohammad Mannan, Amr Youssef
    USENIX Security '24D-Helix: A Generic Decompiler Testing Framework Using Symbolic DifferentiationMuqi Zou, Arslan Khan, Ruoyu Wu, Han Gao, Antonio Bianchi, Dave (Jing) Tian
    USENIX Security '24Web Platform Threats: Automated Detection of Web Security Issues With WPTPedro Bernardo, Lorenzo Veronese, Valentino Dalla Valle, Stefano Calzavara, Marco Squarcina, Pedro Adão, Matteo Maffei
    USENIX Security '24The Impact of Exposed Passwords on Honeyword EfficacyZonghao Huang, Lujo Bauer, Michael K. Reiter
    USENIX Security '24AttackGNN: Red-Teaming GNNs in Hardware Security Using Reinforcement LearningVasudev Gohil, Satwik Patnaik, Dileep Kalathil, Jeyavijayan Rajendran

Pages