Search results

    USENIX Security '23That Person Moves Like A Car: Misclassification Attack Detection for Autonomous Systems Using Spatiotemporal Consistency
    USENIX Security '23Strategies and Vulnerabilities of Participants in Venezuelan Influence Operations
    USENIX Security '23Investigating Verification Behavior and Perceptions of Visual Digital Certificates
    USENIX Security '23HOMESPY: The Invisible Sniffer of Infrared Remote Control of Smart TVs
    USENIX Security '23TPatch: A Triggered Physical Adversarial Patch
    USENIX Security '23Assessing Anonymity Techniques Employed in German Court Decisions: A De-Anonymization Experiment
    USENIX Security '23GLeeFuzz: Fuzzing WebGL Through Error Message Guided Mutation
    USENIX Security '23Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps
    USENIX Security '23The Space of Adversarial Strategies
    USENIX Security '23Automated Security Analysis of Exposure Notification Systems
    USENIX Security '23Every Signature is Broken: On the Insecurity of Microsoft Office’s OOXML Signatures
    USENIX Security '23Humans vs. Machines in Malware Classification
    USENIX Security '23How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment
    USENIX Security '23Person Re-identification in 3D Space: A WiFi Vision-based Approach
    USENIX Security '23Fourteen Years in the Life: A Root Server’s Perspective on DNS Resolver Security
    USENIX Security '23ClepsydraCache -- Preventing Cache Attacks with Time-Based Evictions
    USENIX Security '23Guarding Serverless Applications with Kalium
    USENIX Security '23Security and Privacy Failures in Popular 2FA Apps
    USENIX Security '23Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses
    USENIX Security '23Combating Robocalls with Phone Virtual Assistant Mediated Interaction
    USENIX Security '23Examining Consumer Reviews to Understand Security and Privacy Issues in the Market of Smart Home Devices
    USENIX Security '23A Study of Multi-Factor and Risk-Based Authentication Availability
    USENIX Security '23Isolated and Exhausted: Attacking Operating Systems via Site Isolation in the Browser
    USENIX Security '23Internet Service Providers' and Individuals' Attitudes, Barriers, and Incentives to Secure IoT
    USENIX Security '23Access Denied: Assessing Physical Risks to Internet Access Networks