Search results

    USENIX Security '23FuzzJIT: Oracle-Enhanced Fuzzing for JavaScript Engine JIT Compiler
    USENIX Security '23Credit Karma: Understanding Security Implications of Exposed Cloud Services through Automated Capability Inference
    USENIX Security '23That Person Moves Like A Car: Misclassification Attack Detection for Autonomous Systems Using Spatiotemporal Consistency
    USENIX Security '23Pspray: Timing Side-Channel based Linux Kernel Heap Exploitation Technique
    USENIX Security '23Strategies and Vulnerabilities of Participants in Venezuelan Influence Operations
    USENIX Security '23Investigating Verification Behavior and Perceptions of Visual Digital Certificates
    USENIX Security '23Remote Attacks on Speech Recognition Systems Using Sound from Power Supply
    USENIX Security '23HOMESPY: The Invisible Sniffer of Infrared Remote Control of Smart TVs
    USENIX Security '23TPatch: A Triggered Physical Adversarial Patch
    USENIX Security '23Assessing Anonymity Techniques Employed in German Court Decisions: A De-Anonymization Experiment
    USENIX Security '23GLeeFuzz: Fuzzing WebGL Through Error Message Guided Mutation
    USENIX Security '23Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps
    USENIX Security '23The Space of Adversarial Strategies
    USENIX Security '23Side-Channel Attacks on Optane Persistent Memory
    USENIX Security '23Automated Security Analysis of Exposure Notification Systems
    USENIX Security '23xNIDS: Explaining Deep Learning-based Network Intrusion Detection Systems for Active Intrusion Responses
    USENIX Security '23Glowing in the Dark: Uncovering IPv6 Address Discovery and Scanning Strategies in the Wild
    USENIX Security '23Every Signature is Broken: On the Insecurity of Microsoft Office’s OOXML Signatures
    USENIX Security '23Humans vs. Machines in Malware Classification
    USENIX Security '23How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment
    USENIX Security '23Distance-Aware Private Set Intersection
    USENIX Security '23PhyAuth: Physical-Layer Message Authentication for ZigBee Networks
    USENIX Security '23Person Re-identification in 3D Space: A WiFi Vision-based Approach
    USENIX Security '23Fourteen Years in the Life: A Root Server’s Perspective on DNS Resolver Security
    USENIX Security '23ClepsydraCache -- Preventing Cache Attacks with Time-Based Evictions