usenix

USENIX Security '23 - Demystifying Pointer Authentication on Apple M1

12:54

USENIX Security '23 - Demystifying Pointer Authentication on Apple M1
USENIX Security '23 - Automated Analysis of Protocols that use Authenticated Encryption: How...

11:19

USENIX Security '23 - Automated Analysis of Protocols that use Authenticated Encryption: How...
USENIX Security '23 - How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic

12:18

USENIX Security '23 - How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic
USENIX Security '23 - Evading Provenance-Based ML Detectors with Adversarial System Action

13:59

USENIX Security '23 - Evading Provenance-Based ML Detectors with Adversarial System Action
USENIX Security '23 - Glimpse: On-Demand PoW Light Client with Constant-Size Storage for DeFi

11:36

USENIX Security '23 - Glimpse: On-Demand PoW Light Client with Constant-Size Storage for DeFi
USENIX Security '23 - FISHFUZZ: Catch Deeper Bugs by Throwing Larger Nets

10:59

USENIX Security '23 - FISHFUZZ: Catch Deeper Bugs by Throwing Larger Nets
USENIX Security '23 - Three Lessons From Threema: Analysis of a Secure Messenger

13:30

USENIX Security '23 - Three Lessons From Threema: Analysis of a Secure Messenger
USENIX Security '23 - Eye-Shield: Real-Time Protection of Mobile Device Screen Information from...

11:31

USENIX Security '23 - Eye-Shield: Real-Time Protection of Mobile Device Screen Information from...
USENIX Security '23 - Near-Optimal Oblivious Key-Value Stores for Efficient PSI, PSU and Volume...

11:17

USENIX Security '23 - Near-Optimal Oblivious Key-Value Stores for Efficient PSI, PSU and Volume...
USENIX Security '23 - Discovering Adversarial Driving Maneuvers against Autonomous Vehicles

12:01

USENIX Security '23 - Discovering Adversarial Driving Maneuvers against Autonomous Vehicles
USENIX Security '23 - Towards A Proactive ML Approach for Detecting Backdoor Poison Samples

15:03

USENIX Security '23 - Towards A Proactive ML Approach for Detecting Backdoor Poison Samples
USENIX Security '23 - Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine...

15:22

USENIX Security '23 - Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine...
USENIX Security '23 - Duoram: A Bandwidth-Efficient Distributed ORAM for 2- and 3-Party Computation

15:16

USENIX Security '23 - Duoram: A Bandwidth-Efficient Distributed ORAM for 2- and 3-Party Computation
USENIX Security '23 - Capstone: A Capability-based Foundation for Trustless Secure Memory Access

12:41

USENIX Security '23 - Capstone: A Capability-based Foundation for Trustless Secure Memory Access
USENIX Security '23 - xNIDS: Explaining Deep Learning-based Network Intrusion Detection Systems...

11:48

USENIX Security '23 - xNIDS: Explaining Deep Learning-based Network Intrusion Detection Systems...
USENIX ATC '23 - Arbitor: A Numerically Accurate Hardware Emulation Tool for DNN Accelerators

18:03

USENIX ATC '23 - Arbitor: A Numerically Accurate Hardware Emulation Tool for DNN Accelerators
USENIX Security '23 - A Data-free Backdoor Injection Approach in Neural Networks

12:32

USENIX Security '23 - A Data-free Backdoor Injection Approach in Neural Networks
USENIX Security '23 - ACFA: Secure Runtime Auditing & Guaranteed Device Healing via Active...

12:27

USENIX Security '23 - ACFA: Secure Runtime Auditing & Guaranteed Device Healing via Active...
USENIX Security '23 - An Efficient Design of Intelligent Network Data Plane

11:12

USENIX Security '23 - An Efficient Design of Intelligent Network Data Plane
USENIX ATC '23 and OSDI '23 Joint Keynote Address - Sky Computing

52:20

USENIX ATC '23 and OSDI '23 Joint Keynote Address - Sky Computing
USENIX Security '23 - Greenhouse: Single-Service Rehosting of Linux-Based Firmware Binaries in...

12:44

USENIX Security '23 - Greenhouse: Single-Service Rehosting of Linux-Based Firmware Binaries in...
USENIX Security '23 - ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks

12:26

USENIX Security '23 - ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks
USENIX Security '23 - Network Responses to Russia's Invasion of Ukraine in 2022: A Cautionary Tale..

12:08

USENIX Security '23 - Network Responses to Russia's Invasion of Ukraine in 2022: A Cautionary Tale..
USENIX ATC '23 - CXL-ANNS: Software-Hardware Collaborative Memory Disaggregation and Computation...

21:43

USENIX ATC '23 - CXL-ANNS: Software-Hardware Collaborative Memory Disaggregation and Computation...
USENIX Security '23 - Towards a General Video-based Keystroke Inference Attack

9:57

USENIX Security '23 - Towards a General Video-based Keystroke Inference Attack
USENIX Security '23 - The Gates of Time: Improving Cache Attacks with Transient Execution

13:07

USENIX Security '23 - The Gates of Time: Improving Cache Attacks with Transient Execution
USENIX Security '23 - Back to School: On the (In)Security of Academic VPNs

11:55

USENIX Security '23 - Back to School: On the (In)Security of Academic VPNs
USENIX Security '23 - Time for Change: How Clocks Break UWB Secure Ranging

12:40

USENIX Security '23 - Time for Change: How Clocks Break UWB Secure Ranging
USENIX Security '23 - Araña: Discovering and Characterizing Password Guessing Attacks in Practice

12:50

USENIX Security '23 - Araña: Discovering and Characterizing Password Guessing Attacks in Practice
USENIX Security '23 - Bug Hunters’ Perspectives on the Challenges and Benefits of the Bug Bounty...

12:15

USENIX Security '23 - Bug Hunters’ Perspectives on the Challenges and Benefits of the Bug Bounty...
USENIX Security '23 - HOMESPY: The Invisible Sniffer of Infrared Remote Control of Smart TVs

11:30

USENIX Security '23 - HOMESPY: The Invisible Sniffer of Infrared Remote Control of Smart TVs
USENIX Security '23 - A Mixed-Methods Study of Security Practices of Smart Contract Developers

13:16

USENIX Security '23 - A Mixed-Methods Study of Security Practices of Smart Contract Developers
USENIX Security '23 - Sneaky Spy Devices and Defective Detectors: The Ecosystem of Intimate...

12:55

USENIX Security '23 - Sneaky Spy Devices and Defective Detectors: The Ecosystem of Intimate...
USENIX Security '23 - Formal Analysis of SPDM: Security Protocol and Data Model version 1.2

12:00

USENIX Security '23 - Formal Analysis of SPDM: Security Protocol and Data Model version 1.2
USENIX Security '23 - PORE: Provably Robust Recommender Systems against Data Poisoning Attacks

13:15

USENIX Security '23 - PORE: Provably Robust Recommender Systems against Data Poisoning Attacks
USENIX Security '23 - Sparsity Brings Vulnerabilities: Exploring New Metrics in Backdoor Attacks

13:32

USENIX Security '23 - Sparsity Brings Vulnerabilities: Exploring New Metrics in Backdoor Attacks
USENIX Security '23 - Your Exploit is Mine: Instantly Synthesizing Counterattack Smart Contract

12:37

USENIX Security '23 - Your Exploit is Mine: Instantly Synthesizing Counterattack Smart Contract
USENIX Security '23 - Sherlock on Specs: Building LTE Conformance Tests through Automated Reasoning

11:45

USENIX Security '23 - Sherlock on Specs: Building LTE Conformance Tests through Automated Reasoning
USENIX Security '23 - Tight Auditing of Differentially Private Machine Learning

13:13

USENIX Security '23 - Tight Auditing of Differentially Private Machine Learning
USENIX Security '23 - Every Signature is Broken: On the Insecurity of Microsoft Office’s OOXML...

12:42

USENIX Security '23 - Every Signature is Broken: On the Insecurity of Microsoft Office’s OOXML...
USENIX Security '23 - Meta-Sift: How to Sift Out a Clean Subset in the Presence of Data Poisoning?

10:52

USENIX Security '23 - Meta-Sift: How to Sift Out a Clean Subset in the Presence of Data Poisoning?
USENIX ATC '21/OSDI '21 Joint Keynote Address-It's Time for Operating Systems to Rediscover Hardware

1:06:20

USENIX ATC '21/OSDI '21 Joint Keynote Address-It's Time for Operating Systems to Rediscover Hardware
USENIX Security '23 - SMACK: Semantically Meaningful Adversarial Audio Attack

11:34

USENIX Security '23 - SMACK: Semantically Meaningful Adversarial Audio Attack
USENIX Security '23 - PELICAN: Exploiting Backdoors of Naturally Trained Deep Learning Models In...

11:57

USENIX Security '23 - PELICAN: Exploiting Backdoors of Naturally Trained Deep Learning Models In...
USENIX Security '23 - Remote Direct Memory Introspection

10:49

USENIX Security '23 - Remote Direct Memory Introspection
USENIX ATC '23 - Efficient Memory Overcommitment for I/O Passthrough Enabled VMs via Fine-grained...

24:31

USENIX ATC '23 - Efficient Memory Overcommitment for I/O Passthrough Enabled VMs via Fine-grained...
USENIX ATC '23 - The Hitchhiker's Guide to Operating Systems

18:27

USENIX ATC '23 - The Hitchhiker's Guide to Operating Systems
USENIX Security '16 - zxcvbn: Low-Budget Password Strength Estimation

31:48

USENIX Security '16 - zxcvbn: Low-Budget Password Strength Estimation
USENIX ATC '23 - Decentralized Application-Level Adaptive Scheduling for Multi-Instance DNNs on...

23:11

USENIX ATC '23 - Decentralized Application-Level Adaptive Scheduling for Multi-Instance DNNs on...
USENIX Enigma 2016 - NSA TAO Chief on Disrupting Nation State Hackers

34:56

USENIX Enigma 2016 - NSA TAO Chief on Disrupting Nation State Hackers
USENIX Security '23 - Understand Users' Privacy Perception and Decision of V2X Communication in...

12:18

USENIX Security '23 - Understand Users' Privacy Perception and Decision of V2X Communication in...
USENIX Security '23 - HorusEye: A Realtime IoT Malicious Traffic Detection Framework using...

11:48

USENIX Security '23 - HorusEye: A Realtime IoT Malicious Traffic Detection Framework using...
USENIX Security '23 - The Space of Adversarial Strategies

11:48

USENIX Security '23 - The Space of Adversarial Strategies
USENIX Security '23 - Hidden Reality: Caution, Your Hand Gesture Inputs in the Immersive Virtual...

12:54

USENIX Security '23 - Hidden Reality: Caution, Your Hand Gesture Inputs in the Immersive Virtual...
USENIX Security '23 - Ultimate SLH: Taking Speculative Load Hardening to the Next Level

12:18

USENIX Security '23 - Ultimate SLH: Taking Speculative Load Hardening to the Next Level
USENIX Security '23 - PUMM: Preventing Use-After-Free Using Execution Unit Partitioning

9:20

USENIX Security '23 - PUMM: Preventing Use-After-Free Using Execution Unit Partitioning
USENIX ATC '23 - LPNS: Scalable and Latency-Predictable Local Storage Virtualization for...

23:21

USENIX ATC '23 - LPNS: Scalable and Latency-Predictable Local Storage Virtualization for...
USENIX ATC '23 - GLogS: Interactive Graph Pattern Matching Query At Large Scale

24:22

USENIX ATC '23 - GLogS: Interactive Graph Pattern Matching Query At Large Scale
USENIX Security '23 - NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems

10:36

USENIX Security '23 - NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems
USENIX Security '23 - A Large-Scale Measurement of Website Login Policies

13:44

USENIX Security '23 - A Large-Scale Measurement of Website Login Policies