USENIX Security '24 | A High Coverage Cybersecurity Scale Predictive of User Behavior | |
USENIX Security '24 | NetShaper: A Differentially Private Network Side-Channel Mitigation System | |
USENIX Security '24 | Splitting the Difference on Adversarial Training | |
USENIX Security '24 | Quantifying Privacy Risks of Prompts in Visual Prompt Learning | |
USENIX Security '24 | Understanding How to Inform Blind and Low-Vision Users about Data Privacy through Privacy Question Answering Assistants | |
USENIX Security '24 | Two Shuffles Make a RAM: Improved Constant Overhead Zero Knowledge RAM | |
USENIX Security '24 | Dissecting Privacy Perspectives of Websites Around the World: "Aceptar Todo, Alle Akzeptieren, Accept All..." | |
USENIX Security '24 | Voice App Developer Experiences with Alexa and Google Assistant: Juggling Risks, Liability, and Security | |
USENIX Security '24 | Scalable Multi-Party Computation Protocols for Machine Learning in the Honest-Majority Setting | |
USENIX Security '24 | Cascade: CPU Fuzzing via Intricate Program Generation | |
USENIX Security '24 | Spider-Scents: Grey-box Database-aware Web Scanning for Stored XSS | |
USENIX Security '24 | Less is More: Revisiting the Gaussian Mechanism for Differential Privacy | |
USENIX Security '24 | DaCapo: Automatic Bootstrapping Management for Efficient Fully Homomorphic Encryption | |
USENIX Security '24 | Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation for Binary Code Similarity Detection | |
USENIX Security '24 | Is It a Trap? A Large-scale Empirical Study And Comprehensive Assessment of Online Automated Privacy Policy Generators for Mobile Apps | |
USENIX Security '24 | ModelGuard: Information-Theoretic Defense Against Model Extraction Attacks | |
USENIX Security '24 | The Unpatchables: Why Municipalities Persist in Running Vulnerable Hosts | |
USENIX Security '24 | Exploring Covert Third-party Identifiers through External Storage in the Android New Era | |
USENIX Security '24 | Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS Handshakes | |
USENIX Security '24 | VeriSimplePIR: Verifiability in SimplePIR at No Online Cost for Honest Servers | |
USENIX Security '24 | SledgeHammer: Amplifying Rowhammer via Bank-level Parallelism | |
USENIX Security '24 | The Challenges of Bringing Cryptography from Research Papers to Products: Results from an Interview Study with Experts | |
USENIX Security '24 | SpecLFB: Eliminating Cache Side Channels in Speculative Executions | |
USENIX Security '24 | Vulnerability-oriented Testing for RESTful APIs | |
USENIX Security '24 | Hijacking Attacks against Neural Network by Analyzing Training Data | |