View
Tube
search
Sign in
Sign up
Subscriptions
USENIX
USENIX Security '23
2,129 views
422 items
Last updated on Nov 30, 2023
public playlist
USENIX
13:57
USENIX Security '23 - PhyAuth: Physical-Layer Message Authentication for ZigBee Networks
USENIX
12:40
USENIX Security '23 - Time for Change: How Clocks Break UWB Secure Ranging
USENIX
12:34
USENIX Security '23 - Formal Analysis and Patching of BLE-SC Pairing
USENIX
13:55
USENIX Security '23 - Framing Frames: Bypassing Wi-Fi Encryption by Manipulating Transmit Queues
USENIX
11:28
USENIX Security '23 - Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse
USENIX
12:45
USENIX Security '23 - The Digital-Safety Risks of Financial Technologies for Survivors of...
USENIX
12:13
USENIX Security '23 - "It's the Equivalent of Feeling Like You're in Jail”: Lessons from Firsthand..
USENIX
12:55
USENIX Security '23 - Sneaky Spy Devices and Defective Detectors: The Ecosystem of Intimate...
USENIX
9:57
USENIX Security '23 - Towards a General Video-based Keystroke Inference Attack
USENIX
11:17
USENIX Security '23 - Going through the motions: AR/VR keylogging from user head motions
USENIX
12:44
USENIX Security '23 - Auditory Eyesight: Demystifying μs-Precision Keystroke Tracking Attacks on...
USENIX
11:02
USENIX Security '23 - Watch your Watch: Inferring Personality Traits from Wearable Activity Trackers
USENIX
15:22
USENIX Security '23 - Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine...
USENIX
12:13
USENIX Security '23 - How to Cover up Anomalous Accesses to Electronic Health Records
USENIX
13:45
USENIX Security '23 - KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against...
USENIX
10:47
USENIX Security '23 - Tubes Among Us: Analog Attack on Automatic Speaker Identification
USENIX
12:05
USENIX Security '23 - Efficient Unbalanced Private Set Intersection Cardinality and User-friendly...
USENIX
11:17
USENIX Security '23 - Near-Optimal Oblivious Key-Value Stores for Efficient PSI, PSU and Volume...
USENIX
12:49
USENIX Security '23 - Distance-Aware Private Set Intersection
USENIX
11:47
USENIX Security '23 - Linear Private Set Union from Multi-Query Reverse Private Membership Test
USENIX
10:41
USENIX Security '23 - Auditing Frameworks Need Resource Isolation: A Systematic Study on the...
USENIX
9:30
USENIX Security '23 - AIRTAG: Towards Automated Attack Investigation by Unsupervised Learning...
USENIX
10:33
USENIX Security '23 - Rethinking System Audit Architectures for High Event Coverage and...
USENIX
14:20
USENIX Security '23 - Improving Logging to Reduce Permission Over-Granting Mistakes
USENIX
14:07
USENIX Security '23 - Diving into Robocall Content with SnorCall
USENIX
12:12
USENIX Security '23 - UCBlocker: Unwanted Call Blocking Using Anonymous Authentication
USENIX
14:07
USENIX Security '23 - Combating Robocalls with Phone Virtual Assistant Mediated Interaction
USENIX
8:28
USENIX Security '23 - BotScreen: Trust Everybody, but Cut the Aimbots Yourself
USENIX
11:40
USENIX Security '23 - "If I could do this, I feel anyone could:" The Design and Evaluation...
USENIX
11:21
USENIX Security '23 - Exploring Privacy and Incentives Considerations in Adoption of COVID-19...
USENIX
11:57
USENIX Security '23 - Exploring Tenants' Preferences of Privacy Negotiation in Airbnb
USENIX
12:03
USENIX Security '23 - Know Your Cybercriminal: Evaluating Attacker Preferences by Measuring...
USENIX
11:48
USENIX Security '23 - HorusEye: A Realtime IoT Malicious Traffic Detection Framework using...
USENIX
12:15
USENIX Security '23 - An Input-Agnostic Hierarchical Deep Learning Framework for Traffic...
USENIX
11:55
USENIX Security '23 - Subverting Website Fingerprinting Defenses with Robust Traffic Representation
USENIX
11:57
USENIX Security '23 - Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse...
USENIX
10:29
USENIX Security '23 - Towards Targeted Obfuscation of Adversarial Unsafe Images using...
USENIX
11:36
USENIX Security '23 - TPatch: A Triggered Physical Adversarial Patch
USENIX
12:07
USENIX Security '23 - CAPatch: Physical Adversarial Patch against Image Captioning Systems
USENIX
12:50
USENIX Security '23 - Hard-label Black-box Universal Adversarial Patch Attack
USENIX
13:11
USENIX Security '23 - Anatomy of a High-Profile Data Breach: Dissecting the Aftermath of a Crypto...
USENIX
11:36
USENIX Security '23 - Glimpse: On-Demand PoW Light Client with Constant-Size Storage for DeFi
USENIX
12:20
USENIX Security '23 - Mixed Signals: Analyzing Ground-Truth Data on the Users and Economics...
USENIX
11:20
USENIX Security '23 - Is Your Wallet Snitching On You? An Analysis on the Privacy Implications...
USENIX
12:41
USENIX Security '23 - Capstone: A Capability-based Foundation for Trustless Secure Memory Access
USENIX
10:10
USENIX Security '23 - FloatZone: Accelerating Memory Error Detection using the Floating Point Unit
USENIX
9:20
USENIX Security '23 - PUMM: Preventing Use-After-Free Using Execution Unit Partitioning
USENIX
14:13
USENIX Security '23 - MTSan: A Feasible and Practical Memory Sanitizer for Fuzzing COTS Binaries
USENIX
12:54
USENIX Security '23 - Hidden Reality: Caution, Your Hand Gesture Inputs in the Immersive Virtual...
USENIX
13:38
USENIX Security '23 - LocIn: Inferring Semantic Location from Spatial Maps in Mixed Reality
USENIX
9:29
USENIX Security '23 - Unique Identification of 50,000+ Virtual Reality Users from Head & Hand...
USENIX
10:27
USENIX Security '23 - Exploring User Reactions and Mental Models Towards Perceptual Manipulation...
USENIX
12:53
USENIX Security '23 - Erebus: Access Control for Augmented Reality Systems
USENIX
11:42
USENIX Security '23 - No Single Silver Bullet: Measuring the Accuracy of Password Strength Meters
USENIX
10:59
USENIX Security '23 - Password Guessing Using Random Forest
USENIX
11:19
USENIX Security '23 - Pass2Edit: A Multi-Step Generative Model for Guessing Edited Passwords
USENIX
11:15
USENIX Security '23 - Improving Real-world Password Guessing Attacks via Bi-directional Transformers
USENIX
12:50
USENIX Security '23 - Araña: Discovering and Characterizing Password Guessing Attacks in Practice
USENIX
12:31
USENIX Security '23 - PoliGraph: Automated Privacy Policy Analysis using Knowledge Graphs
USENIX
15:09
USENIX Security '23 - Calpric: Inclusive and Fine-grain Labeling of Privacy Policies with...
USENIX
12:24
USENIX Security '23 - POLICYCOMP: Counterpart Comparison of Privacy Policies Uncovers...
USENIX
11:33
USENIX Security '23 - Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy Labels
USENIX
11:44
USENIX Security '23 - Automated Cookie Notice Analysis and Enforcement
USENIX
14:13
USENIX Security '23 - Continuous Learning for Android Malware Detection
USENIX
15:26
USENIX Security '23 - Humans vs. Machines in Malware Classification
USENIX
12:29
USENIX Security '23 - Adversarial Training for Raw-Binary Malware Classifiers
USENIX
11:16
USENIX Security '23 - Black-box Adversarial Example Attack towards FCG Based Android Malware...
USENIX
13:59
USENIX Security '23 - Evading Provenance-Based ML Detectors with Adversarial System Action
USENIX
13:00
USENIX Security '23 - TreeSync: Authenticated Group Management for Messaging Layer Security
USENIX
11:28
USENIX Security '23 - Formal Analysis of Session-Handling in Secure Messaging: Lifting Security...
USENIX
10:59
USENIX Security '23 - Cryptographic Administration for Secure Group Messaging
USENIX
13:21
USENIX Security '23 - Wink: Deniable Secure Messaging
USENIX
13:30
USENIX Security '23 - Three Lessons From Threema: Analysis of a Secure Messenger
USENIX
10:01
USENIX Security '23 - MorFuzz: Fuzzing Processor via Runtime Instruction Morphing enhanced...
USENIX
11:11
USENIX Security '23 - µFUZZ: Redesign of Parallel Fuzzing using Microservice Architecture
USENIX
10:59
USENIX Security '23 - FISHFUZZ: Catch Deeper Bugs by Throwing Larger Nets
USENIX
12:11
USENIX Security '23 - HyPFuzz: Formal-Assisted Processor Fuzzing
USENIX
11:14
USENIX Security '23 - PolyFuzz: Holistic Greybox Fuzzing of Multi-Language Systems
USENIX
11:11
USENIX Security '23 - VIPER: Spotting Syscall-Guard Variables for Data-Only Attacks
USENIX
10:51
USENIX Security '23 - AURC: Detecting Errors in Program Code and Documentation
USENIX
12:04
USENIX Security '23 - Not All Data are Created Equal: Data and Pointer Prioritization for Scalable..
USENIX
11:08
USENIX Security '23 - SAFER: Efficient and Error-Tolerant Binary Instrumentation
USENIX
12:43
USENIX Security '23 - Reassembly is Hard: A Reflection on Challenges and Strategies
USENIX
10:39
USENIX Security '23 - Measuring Up to (Reasonable) Consumer Expectations: Providing an Empirical...
USENIX
13:50
USENIX Security '23 - Are Consumers Willing to Pay for Security and Privacy of IoT Devices?
USENIX
12:38
USENIX Security '23 - Examining Consumer Reviews to Understand Security and Privacy Issues in the...
USENIX
10:25
USENIX Security '23 - Internet Service Providers' and Individuals' Attitudes, Barriers, and...
USENIX
17:53
USENIX Security '23 - Detecting and Handling IoT Interaction Threats in Multi-Platform Multi...
USENIX
13:08
USENIX Security '23 - Private Proof-of-Stake Blockchains using Differentially-Private Stake...
USENIX
13:13
USENIX Security '23 - PrivateFL: Accurate, Differentially Private Federated Learning via...
USENIX
12:31
USENIX Security '23 - What Are the Chances? Explaining the Epsilon Parameter in Differential Privacy
USENIX
13:13
USENIX Security '23 - Tight Auditing of Differentially Private Machine Learning
USENIX
10:35
USENIX Security '23 - PrivTrace: Differentially Private Trajectory Synthesis by Adaptive Markov...
USENIX
10:52
USENIX Security '23 - Meta-Sift: How to Sift Out a Clean Subset in the Presence of Data Poisoning?
USENIX
15:03
USENIX Security '23 - Towards A Proactive ML Approach for Detecting Backdoor Poison Samples
USENIX
13:15
USENIX Security '23 - PORE: Provably Robust Recommender Systems against Data Poisoning Attacks
USENIX
12:06
USENIX Security '23 - Every Vote Counts: Ranking-Based Training of Federated Learning to Resist...
USENIX
19:30
USENIX Security '23 - Fine-grained Poisoning Attack to Local Differential Privacy Protocols for...
USENIX
12:37
USENIX Security '23 - Your Exploit is Mine: Instantly Synthesizing Counterattack Smart Contract
USENIX
14:00
USENIX Security '23 - Smart Learning to Find Dumb Contracts