Location via proxy:
[ UP ]
[Report a bug]
[Manage cookies]
No cookies
No scripts
No ads
No referrer
Show this form
Skip to main content
USENIX supports diversity, equity, and inclusion and condemns hate and discrimination
.
About
Conferences
Publications
Proceedings
Author Resources
;login: Online
Writing for ;login: Online
;login: Archive
Membership
Students
Search
Donate Today
Sign In
Search
About
USENIX Board
Staff
Newsroom
Good Works
Blog
Governance and Financials
USENIX Awards
USENIX Supporters
2024 Board Election
Board Meeting Minutes
Annual Fund
Conferences
Upcoming
By Name
Calls for Papers
Grants
Sponsorship
Best Papers
Test of Time Awards
Multimedia
Conference FAQ
Conference Policies
Code of Conduct
Publications
Proceedings
Author Resources
;login: Online
Writing for ;login: Online
;login: Archive
Membership
Students
Conference Fees
Campus Representative Program
Student Grant Program
Search
Donate Today
Papers
Donate Today
Enter terms
Retain current filters
Search results
Conference
Title
Author(s)
USENIX Security '24
A High Coverage Cybersecurity Scale Predictive of User Behavior
USENIX Security '24
NetShaper: A Differentially Private Network Side-Channel Mitigation System
USENIX Security '24
Splitting the Difference on Adversarial Training
USENIX Security '24
Quantifying Privacy Risks of Prompts in Visual Prompt Learning
USENIX Security '24
Understanding How to Inform Blind and Low-Vision Users about Data Privacy through Privacy Question Answering Assistants
USENIX Security '24
Two Shuffles Make a RAM: Improved Constant Overhead Zero Knowledge RAM
USENIX Security '24
Dissecting Privacy Perspectives of Websites Around the World: "Aceptar Todo, Alle Akzeptieren, Accept All..."
USENIX Security '24
Voice App Developer Experiences with Alexa and Google Assistant: Juggling Risks, Liability, and Security
USENIX Security '24
Scalable Multi-Party Computation Protocols for Machine Learning in the Honest-Majority Setting
USENIX Security '24
Cascade: CPU Fuzzing via Intricate Program Generation
USENIX Security '24
Spider-Scents: Grey-box Database-aware Web Scanning for Stored XSS
USENIX Security '24
Less is More: Revisiting the Gaussian Mechanism for Differential Privacy
USENIX Security '24
DaCapo: Automatic Bootstrapping Management for Efficient Fully Homomorphic Encryption
USENIX Security '24
Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation for Binary Code Similarity Detection
USENIX Security '24
Is It a Trap? A Large-scale Empirical Study And Comprehensive Assessment of Online Automated Privacy Policy Generators for Mobile Apps
USENIX Security '24
ModelGuard: Information-Theoretic Defense Against Model Extraction Attacks
USENIX Security '24
The Unpatchables: Why Municipalities Persist in Running Vulnerable Hosts
USENIX Security '24
Exploring Covert Third-party Identifiers through External Storage in the Android New Era
USENIX Security '24
Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS Handshakes
USENIX Security '24
VeriSimplePIR: Verifiability in SimplePIR at No Online Cost for Honest Servers
USENIX Security '24
SledgeHammer: Amplifying Rowhammer via Bank-level Parallelism
USENIX Security '24
The Challenges of Bringing Cryptography from Research Papers to Products: Results from an Interview Study with Experts
USENIX Security '24
SpecLFB: Eliminating Cache Side Channels in Speculative Executions
USENIX Security '24
Vulnerability-oriented Testing for RESTful APIs
USENIX Security '24
Hijacking Attacks against Neural Network by Analyzing Training Data
Pages
1
2
3
4
5
6
7
8
9
…
next ›
last »