usenix
USENIX Security '23 - Demystifying Pointer Authentication on Apple M1
USENIX Security '23 - Automated Analysis of Protocols that use Authenticated Encryption: How...
USENIX Security '23 - How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic
USENIX Security '23 - Evading Provenance-Based ML Detectors with Adversarial System Action
USENIX Security '23 - Glimpse: On-Demand PoW Light Client with Constant-Size Storage for DeFi
USENIX Security '23 - FISHFUZZ: Catch Deeper Bugs by Throwing Larger Nets
USENIX Security '23 - Three Lessons From Threema: Analysis of a Secure Messenger
USENIX Security '23 - Eye-Shield: Real-Time Protection of Mobile Device Screen Information from...
USENIX Security '23 - Near-Optimal Oblivious Key-Value Stores for Efficient PSI, PSU and Volume...
USENIX Security '23 - Discovering Adversarial Driving Maneuvers against Autonomous Vehicles
USENIX Security '23 - Towards A Proactive ML Approach for Detecting Backdoor Poison Samples
USENIX Security '23 - Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine...
USENIX Security '23 - Duoram: A Bandwidth-Efficient Distributed ORAM for 2- and 3-Party Computation
USENIX Security '23 - Capstone: A Capability-based Foundation for Trustless Secure Memory Access
USENIX Security '23 - xNIDS: Explaining Deep Learning-based Network Intrusion Detection Systems...
USENIX ATC '23 - Arbitor: A Numerically Accurate Hardware Emulation Tool for DNN Accelerators
USENIX Security '23 - A Data-free Backdoor Injection Approach in Neural Networks
USENIX Security '23 - ACFA: Secure Runtime Auditing & Guaranteed Device Healing via Active...
USENIX Security '23 - An Efficient Design of Intelligent Network Data Plane
USENIX ATC '23 and OSDI '23 Joint Keynote Address - Sky Computing
USENIX Security '23 - Greenhouse: Single-Service Rehosting of Linux-Based Firmware Binaries in...
USENIX Security '23 - ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks
USENIX Security '23 - Network Responses to Russia's Invasion of Ukraine in 2022: A Cautionary Tale..
USENIX ATC '23 - CXL-ANNS: Software-Hardware Collaborative Memory Disaggregation and Computation...
USENIX Security '23 - Towards a General Video-based Keystroke Inference Attack
USENIX Security '23 - The Gates of Time: Improving Cache Attacks with Transient Execution
USENIX Security '23 - Back to School: On the (In)Security of Academic VPNs
USENIX Security '23 - Time for Change: How Clocks Break UWB Secure Ranging
USENIX Security '23 - Araña: Discovering and Characterizing Password Guessing Attacks in Practice
USENIX Security '23 - Bug Hunters’ Perspectives on the Challenges and Benefits of the Bug Bounty...
USENIX Security '23 - HOMESPY: The Invisible Sniffer of Infrared Remote Control of Smart TVs
USENIX Security '23 - A Mixed-Methods Study of Security Practices of Smart Contract Developers
USENIX Security '23 - Sneaky Spy Devices and Defective Detectors: The Ecosystem of Intimate...
USENIX Security '23 - Formal Analysis of SPDM: Security Protocol and Data Model version 1.2
USENIX Security '23 - PORE: Provably Robust Recommender Systems against Data Poisoning Attacks
USENIX Security '23 - Sparsity Brings Vulnerabilities: Exploring New Metrics in Backdoor Attacks
USENIX Security '23 - Your Exploit is Mine: Instantly Synthesizing Counterattack Smart Contract
USENIX Security '23 - Sherlock on Specs: Building LTE Conformance Tests through Automated Reasoning
USENIX Security '23 - Tight Auditing of Differentially Private Machine Learning
USENIX Security '23 - Every Signature is Broken: On the Insecurity of Microsoft Office’s OOXML...
USENIX Security '23 - Meta-Sift: How to Sift Out a Clean Subset in the Presence of Data Poisoning?
USENIX ATC '21/OSDI '21 Joint Keynote Address-It's Time for Operating Systems to Rediscover Hardware
USENIX Security '23 - SMACK: Semantically Meaningful Adversarial Audio Attack
USENIX Security '23 - PELICAN: Exploiting Backdoors of Naturally Trained Deep Learning Models In...
USENIX Security '23 - Remote Direct Memory Introspection
USENIX ATC '23 - Efficient Memory Overcommitment for I/O Passthrough Enabled VMs via Fine-grained...
USENIX ATC '23 - The Hitchhiker's Guide to Operating Systems
USENIX Security '16 - zxcvbn: Low-Budget Password Strength Estimation
USENIX ATC '23 - Decentralized Application-Level Adaptive Scheduling for Multi-Instance DNNs on...
USENIX Enigma 2016 - NSA TAO Chief on Disrupting Nation State Hackers
USENIX Security '23 - Understand Users' Privacy Perception and Decision of V2X Communication in...
USENIX Security '23 - HorusEye: A Realtime IoT Malicious Traffic Detection Framework using...
USENIX Security '23 - The Space of Adversarial Strategies
USENIX Security '23 - Hidden Reality: Caution, Your Hand Gesture Inputs in the Immersive Virtual...
USENIX Security '23 - Ultimate SLH: Taking Speculative Load Hardening to the Next Level
USENIX Security '23 - PUMM: Preventing Use-After-Free Using Execution Unit Partitioning
USENIX ATC '23 - LPNS: Scalable and Latency-Predictable Local Storage Virtualization for...
USENIX ATC '23 - GLogS: Interactive Graph Pattern Matching Query At Large Scale
USENIX Security '23 - NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems
USENIX Security '23 - A Large-Scale Measurement of Website Login Policies