researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
[-]
OR
AND
NOT
1
1993
1995
1996
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
Filter by Tag
[+]
OR
AND
NOT
1
C++
JavaScript
Meta-Environment
access control
analysis
architecture
context-aware
control systems
data-flow
deployment
design
e-science
meta-model
modeling
protocol
rule-based
security
systematic-approach
testing
web applications
Filter by Author
[+]
OR
AND
NOT
1
Ahmad-Reza Sadeghi
Christopher Kruegel
Damon McCoy
Dan Boneh
David Wagner
Dawn Song
Dongyan Xu
Giovanni Vigna
J. Alex Halderman
Mathias Payer
Michael Backes 0001
Prateek Mittal
Stefan Savage
Taesoo Kim
Thomas Ristenpart
Thorsten Holz
Vern Paxson
Wenke Lee
Xiapu Luo
Zhiqiang Lin
Filter by Top terms
[+]
OR
AND
NOT
1
analysis
attack
attacks
august
control
data
detection
learning
network
privacy
secure
security
software
study
system
systems
using
via
vulnerabilities
web
EVT (uss)
Editions
Publications
Viewing Publication 1 - 100 from 2715
2023
Continuous Learning for Android Malware Detection
Yizheng Chen 0001
,
Zhoujie Ding
,
David A. Wagner 0001
.
uss 2023
:
1127-1144
[doi]
Password Guessing Using Random Forest
Ding Wang 0002
,
Yunkai Zou
,
Zijian Zhang 0003
,
Kedong Xiu
.
uss 2023
:
965-982
[doi]
2023 Cyber Security Experimentation and Test Workshop, CSET 2023, Marina del Rey, CA, USA, August 7-8, 2023
ACM,
2023.
[doi]
Smart Learning to Find Dumb Contracts
Tamer Abdelaziz
,
Aquinas Hobor
.
uss 2023
:
1775-1792
[doi]
NRDelegationAttack: Complexity DDoS attack on DNS Recursive Resolvers
Yehuda Afek
,
Anat Bremler-Barr
,
Shani Stajnrod
.
uss 2023
:
3187-3204
[doi]
Spying through Your Voice Assistants: Realistic Voice Command Fingerprinting
Dilawer Ahmed
,
Aafaq Sabir
,
Anupam Das 0001
.
uss 2023
:
2419-2436
[doi]
CSHER: A System for Compact Storage with HE-Retrieval
Adi Akavia
,
Neta Oren
,
Boaz Sapir
,
Margarita Vald
.
uss 2023
:
4751-4768
[doi]
SandDriller: A Fully-Automated Approach for Testing Language-Based JavaScript Sandboxes
Abdullah AlHamdan
,
Cristian-Alexandru Staicu
.
uss 2023
:
3457-3474
[doi]
DeResistor: Toward Detection-Resistant Probing for Evasion of Internet Censorship
Abderrahmen Amich
,
Birhanu Eshete
,
Vinod Yegneswaran
,
Nguyen Phong Hoang
.
uss 2023
:
2617-2633
[doi]
Time for Change: How Clocks Break UWB Secure Ranging
Claudio Anliker
,
Giovanni Camurati
,
Srdjan Capkun
.
uss 2023
:
19-36
[doi]
You've Got Report: Measurement and Security Implications of DMARC Reporting
Md. Ishtiaq Ashiq
,
Weitong Li
,
Tobias Fiebig
,
Taejoong Chung
.
uss 2023
:
4123-4137
[doi]
Beyond The Gates: An Empirical Analysis of HTTP-Managed Password Stealers and Operators
Athanasios Avgetidis
,
Omar Alrawi
,
Kevin Valakuzhy
,
Charles Lever
,
Paul Burbage
,
Angelos D. Keromytis
,
Fabian Monrose
,
Manos Antonakakis
.
uss 2023
:
5307-5324
[doi]
ARMore: Pushing Love Back Into Binaries
Luca Di Bartolomeo
,
Hossein Moghaddas
,
Mathias Payer
.
uss 2023
:
6311-6328
[doi]
Inducing Authentication Failures to Bypass Credit Card PINs
David A. Basin
,
Patrick Schaller
,
Jorge Toro-Pozo
.
uss 2023
:
3065-3079
[doi]
How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment
Olivier Blazy
,
Ioana Boureanu
,
Pascal Lafourcade 0001
,
Cristina Onete
,
Léo Robert
.
uss 2023
:
5917-5934
[doi]
Extended Hell(o): A Comprehensive Large-Scale Study on Email Confidentiality and Integrity Mechanisms in the Wild
Birk Blechschmidt
,
Ben Stock
.
uss 2023
:
4895-4912
[doi]
Trojan Source: Invisible Vulnerabilities
Nicholas Boucher
,
Ross Anderson 0001
.
uss 2023
:
6507-6524
[doi]
"To Do This Properly, You Need More Resources": The Hidden Costs of Introducing Simulated Phishing Campaigns
Lina Brunken
,
Annalina Buckmann
,
Jonas Hielscher
,
M. Angela Sasse
.
uss 2023
:
4105-4122
[doi]
Know Your Cybercriminal: Evaluating Attacker Preferences by Measuring Profile Sales on an Active, Leading Criminal Market for User Impersonation at Scale
Michele Campobasso
,
Luca Allodi
.
uss 2023
:
553-570
[doi]
ACFA: Secure Runtime Auditing & Guaranteed Device Healing via Active Control Flow Attestation
Adam Caulfield
,
Norrathep Rattanavipanon
,
Ivan De Oliveira Nunes
.
uss 2023
:
5827-5844
[doi]
Sneaky Spy Devices and Defective Detectors: The Ecosystem of Intimate Partner Surveillance with Covert Devices
Rose Ceccio
,
Sophie Stephenson
,
Varun Chadha
,
Danny Yuxing Huang
,
Rahul Chatterjee 0001
.
uss 2023
:
123-140
[doi]
Wink: Deniable Secure Messaging
Anrin Chakraborti
,
Darius Suciu
,
Radu Sion
.
uss 2023
:
1271-1288
[doi]
Exploring User Reactions and Mental Models Towards Perceptual Manipulation Attacks in Mixed Reality
Kaiming Cheng
,
Jeffery F. Tian
,
Tadayoshi Kohno
,
Franziska Roesner
.
uss 2023
:
911-928
[doi]
"Un-Equal Online Safety?" A Gender Analysis of Security and Privacy Protection Advice and Behaviour Patterns
Kovila P. L. Coopamootoo
,
Magdalene Ng
.
uss 2023
:
5611-5628
[doi]
Formal Analysis of SPDM: Security Protocol and Data Model version 1.2
Cas Cremers
,
Alexander Dax
,
Aurora Naska
.
uss 2023
:
6611-6628
[doi]
Automated Analysis of Protocols that use Authenticated Encryption: How Subtle AEAD Differences can impact Protocol Security
Cas Cremers
,
Alexander Dax
,
Charlie Jacomme
,
Mang Zhao
.
uss 2023
:
5935-5952
[doi]
Formal Analysis of Session-Handling in Secure Messaging: Lifting Security from Sessions to Conversations
Cas Cremers
,
Charlie Jacomme
,
Aurora Naska
.
uss 2023
:
1235-1252
[doi]
Account Security Interfaces: Important, Unintuitive, and Untrustworthy
Alaa Daffalla
,
Marina Sanusi Bohuk
,
Nicola Dell
,
Rosanna Bellini
,
Thomas Ristenpart
.
uss 2023
:
3601-3618
[doi]
Timeless Timing Attacks and Preload Defenses in Tor's DNS Cache
Rasmus Dahlberg
,
Tobias Pulls
.
uss 2023
:
2635-2652
[doi]
Jinn: Hijacking Safe Programs with Trojans
Komail Dharsee
,
John Criswell
.
uss 2023
:
6965-6982
[doi]
Dubhe: Succinct Zero-Knowledge Proofs for Standard AES and related Applications
Changchang Ding
,
Yan Huang 0001
.
uss 2023
:
4373-4390
[doi]
UCBlocker: Unwanted Call Blocking Using Anonymous Authentication
Changlai Du
,
Hexuan Yu
,
Yang Xiao 0010
,
Y. Thomas Hou 0001
,
Angelos D. Keromytis
,
Wenjing Lou
.
uss 2023
:
445-462
[doi]
LocIn: Inferring Semantic Location from Spatial Maps in Mixed Reality
Habiba Farrukh
,
Reham Mohamed 0004
,
Aniket Nare
,
Antonio Bianchi
,
Z. Berkay Celik
.
uss 2023
:
877-894
[doi]
A Study of China's Censorship and Its Evasion Through the Lens of Online Gaming
Yuzhou Feng
,
Ruyu Zhai
,
Radu Sion
,
Bogdan Carbunar
.
uss 2023
:
2599-2616
[doi]
ACTOR: Action-Guided Kernel Fuzzing
Marius Fleischer
,
Dipanjan Das 0002
,
Priyanka Bose
,
Weiheng Bai
,
Kangjie Lu
,
Mathias Payer
,
Christopher Kruegel
,
Giovanni Vigna
.
uss 2023
:
5003-5020
[doi]
BGPy: The BGP Python Security Simulator
Justin Furuness
,
Cameron Morris
,
Reynaldo Morillo
,
Amir Herzberg
,
Bing Wang 0001
.
uss 2023
:
41-56
[doi]
Rethinking System Audit Architectures for High Event Coverage and Synchronous Log Availability
Varun Gandhi
,
Sarbartha Banerjee
,
Aniket Agrawal
,
Adil Ahmad
,
Sangho Lee 0001
,
Marcus Peinado
.
uss 2023
:
391-408
[doi]
A Study of Multi-Factor and Risk-Based Authentication Availability
Anthony Gavazzi
,
Ryan Williams
,
Engin Kirda
,
Long Lu
,
Andre King
,
Andy Davis
,
Tim Leek
.
uss 2023
:
2043-2060
[doi]
Isolated and Exhausted: Attacking Operating Systems via Site Isolation in the Browser
Matthias Gierlings
,
Marcus Brinkmann
,
Jörg Schwenk
.
uss 2023
:
7037-7054
[doi]
Security and Privacy Failures in Popular 2FA Apps
Conor Gilsenan
,
Fuzail Shakir
,
Noura Alomar
,
Serge Egelman
.
uss 2023
:
2079-2096
[doi]
FloatZone: Accelerating Memory Error Detection using the Floating Point Unit
Floris Gorter
,
Enrico Barberis
,
Raphael Isemann
,
Erik van der Kouwe
,
Cristiano Giuffrida
,
Herbert Bos
.
uss 2023
:
805-822
[doi]
Confusum Contractum: Confused Deputy Vulnerabilities in Ethereum Smart Contracts
Fabio Gritti
,
Nicola Ruaro
,
Robert McLaughlin
,
Priyanka Bose
,
Dipanjan Das 0002
,
Ilya Grishchenko
,
Christopher Kruegel
,
Giovanni Vigna
.
uss 2023
:
1793-1810
[doi]
Fourteen Years in the Life: A Root Server's Perspective on DNS Resolver Security
Alden Hilton
,
Casey T. Deccio
,
Jacob Davis
.
uss 2023
:
3171-3186
[doi]
Speculation at Fault: Modeling and Testing Microarchitectural Leakage of CPU Exceptions
Jana Hofmann
,
Emanuele Vannacci
,
Cédric Fournet
,
Boris Köpf
,
Oleksii Oleksenko
.
uss 2023
:
7143-7160
[doi]
Powering Privacy: On the Energy Demand and Feasibility of Anonymity Networks on Smartphones
Daniel Hugenroth
,
Alastair R. Beresford
.
uss 2023
:
5431-5448
[doi]
Towards Reproducible Ransomware Analysis
Shozab Hussain
,
Muhammad Musa
,
Turyal Neeshat
,
Rja Batool
,
Omer Ahmed
,
Fareed Zaffar
,
Ashish Gehani
,
Andy Poggio
,
Maneesh K. Yadav
.
uss 2023
:
1-9
[doi]
Content-Type: multipart/oracle - Tapping into Format Oracles in Email End-to-End Encryption
Fabian Ising
,
Damian Poddebniak
,
Tobias Kappert
,
Christoph Saatjohann
,
Sebastian Schinzel
.
uss 2023
:
4175-4192
[doi]
ReUSB: Replay-Guided USB Driver Fuzzing
Jisoo Jang
,
Minsuk Kang
,
Dokyung Song
.
uss 2023
:
2921-2938
[doi]
WHIP: Improving Static Vulnerability Detection in Web Application by Forcing tools to Collaborate
Feras Al Kassar
,
Luca Compagna
,
Davide Balzarotti
.
uss 2023
:
6079-6096
[doi]
The Gates of Time: Improving Cache Attacks with Transient Execution
Daniel Katzman
,
William Kosasih
,
Chitchanok Chuengsatiansup
,
Eyal Ronen
,
Yuval Yarom
.
uss 2023
:
1955-1972
[doi]
Extending a Hand to Attackers: Browser Privilege Escalation Attacks via Extensions
Young-Min Kim
,
Byoungyoung Lee
.
uss 2023
:
7055-7071
[doi]
PatchVerif: Discovering Faulty Patches in Robotic Vehicles
Hyungsub Kim
,
Muslum Ozgur Ozmen
,
Z. Berkay Celik
,
Antonio Bianchi
,
Dongyan Xu
.
uss 2023
:
3011-3028
[doi]
BASECOMP: A Comparative Analysis for Integrity Protection in Cellular Baseband Software
Eunsoo Kim
,
Min Woo Baek
,
CheolJun Park
,
Dongkwan Kim
,
Yongdae Kim
,
Insu Yun
.
uss 2023
:
3547-3563
[doi]
Intender: Fuzzing Intent-Based Networking with Intent-State Transition Guidance
Jiwon Kim
,
Benjamin E. Ujcich
,
Dave Tian
.
uss 2023
:
4463-4480
[doi]
Instructions Unclear: Undefined Behaviour in Cellular Network Specifications
Daniel Klischies
,
Moritz Schloegel
,
Tobias Scharnowski
,
Mikhail Bogodukhov
,
David Rupprecht
,
Veelasha Moonsamy
.
uss 2023
:
3475-3492
[doi]
The OK Is Not Enough: A Large Scale Study of Consent Dialogs in Smartphone Applications
Simon Koch
,
Benjamin Altpeter
,
Martin Johns
.
uss 2023
:
5467-5484
[doi]
Device Tracking via Linux's New TCP Source Port Selection Algorithm
Moshe Kol
,
Amit Klein 0001
,
Yossi Gilad
.
uss 2023
:
6167-6183
[doi]
Uncontained: Uncovering Container Confusion in the Linux Kernel
Jakob Koschel
,
Pietro Borrello
,
Daniele Cono D'Elia
,
Herbert Bos
,
Cristiano Giuffrida
.
uss 2023
:
5055-5072
[doi]
A Research Framework and Initial Study of Browser Security for the Visually Impaired
Elaine Lau
,
Zachary Peterson
.
uss 2023
:
4679-4696
[doi]
Pspray: Timing Side-Channel based Linux Kernel Heap Exploitation Technique
Yoochan Lee
,
Jinhan Kwak
,
Junesoo Kang
,
Yuseok Jeon
,
Byoungyoung Lee
.
uss 2023
:
6825-6842
[doi]
PTW: Pivotal Tuning Watermarking for Pre-Trained Image Generators
Nils Lukas
,
Florian Kerschbaum
.
uss 2023
:
2241-2258
[doi]
Log: It's Big, It's Heavy, It's Filled with Personal Data! Measuring the Logging of Sensitive Information in the Android Ecosystem
Allan Lyons
,
Julien Gamba
,
Austin Shawaga
,
Joel Reardon
,
Juan Tapiador
,
Serge Egelman
,
Narseo Vallina-Rodriguez
.
uss 2023
:
2115-2132
[doi]
The Writing on the Wall and 3D Digital Twins: Personal Information in (not so) Private Real Estate
Rachel McAmis
,
Tadayoshi Kohno
.
uss 2023
:
2169-2186
[doi]
Othered, Silenced and Scapegoated: Understanding the Situated Security of Marginalised Populations in Lebanon
Jessica McClearn
,
Rikke Bjerg Jensen
,
Reem Talhouk
.
uss 2023
:
4625-4642
[doi]
A Large Scale Study of the Ethereum Arbitrage Ecosystem
Robert McLaughlin
,
Christopher Kruegel
,
Giovanni Vigna
.
uss 2023
:
3295-3312
[doi]
Design of Access Control Mechanisms in Systems-on-Chip with Formal Integrity Guarantees
Dino Mehmedagic
,
Mohammad Rahmani Fadiheh
,
Johannes Müller
,
Anna Lena Duque Antón
,
Dominik Stoffel
,
Wolfgang Kunz
.
uss 2023
:
2779-2796
[doi]
All cops are broadcasting: TETRA under scrutiny
Carlo Meijer
,
Wouter Bokslag
,
Jos Wetzels
.
uss 2023
:
7463-7479
[doi]
Mixed Signals: Analyzing Ground-Truth Data on the Users and Economics of a Bitcoin Mixing Service
Fieke Miedema
,
Kelvin Lubbertsen
,
Verena Schrama
,
Rolf van Wegberg
.
uss 2023
:
751-768
[doi]
In the Line of Fire: Risks of DPI-triggered Data Collection
Ariana Mirian
,
Alisha Ukani
,
Ian D. Foster
,
Gautam Akiwate
,
Taner Halicioglu
,
Cynthia T. Moore
,
Alex C. Snoeren
,
Geoffrey M. Voelker
,
Stefan Savage
.
uss 2023
:
57-63
[doi]
Automated Security Analysis of Exposure Notification Systems
Kevin Morio
,
Ilkan Esiyok
,
Dennis Jackson
,
Robert Künnemann
.
uss 2023
:
6593-6610
[doi]
ARGUS: A Framework for Staged Static Taint Analysis of GitHub Workflows and Actions
Siddharth Muralee
,
Igibek Koishybayev
,
Aleksandr Nahapetyan
,
Greg Tystahl
,
Bradley Reaves
,
Antonio Bianchi
,
William Enck
,
Alexandros Kapravelos
,
Aravind Machiry
.
uss 2023
:
6983-7000
[doi]
A Two-Decade Retrospective Analysis of a University's Vulnerability to Attacks Exploiting Reused Passwords
Alexandra Nisenoff
,
Maximilian Golla
,
Miranda Wei
,
Juliette Hainline
,
Hayley Szymanek
,
Annika Braun
,
Annika Hildebrandt
,
Blair Christensen
,
David Langenberg
,
Blase Ur
.
uss 2023
:
5127-5144
[doi]
Defining "Broken": User Experiences and Remediation Tactics When Ad-Blocking or Tracking-Protection Tools Break a Website's User Experience
Alexandra Nisenoff
,
Arthur Borem
,
Madison Pickering
,
Grant Nakanishi
,
Maya Thumpasery
,
Blase Ur
.
uss 2023
:
3619-3636
[doi]
Diving into Robocall Content with SnorCall
Sathvik Prasad
,
Trevor Dunlap
,
Alexander J. Ross
,
Bradley Reaves
.
uss 2023
:
427-444
[doi]
SAFER: Efficient and Error-Tolerant Binary Instrumentation
Soumyakant Priyadarshan
,
Huan Nguyen 0004
,
Rohit Chouhan
,
R. Sekar 0001
.
uss 2023
:
1451-1468
[doi]
"All of them claim to be the best": Multi-perspective study of VPN users and VPN providers
Reethika Ramesh
,
Anjali Vyas
,
Roya Ensafi
.
uss 2023
:
5773-5789
[doi]
Network Responses to Russia's Invasion of Ukraine in 2022: A Cautionary Tale for Internet Freedom
Reethika Ramesh
,
Ram Sundara Raman
,
Apurva Virkud
,
Alexandra Dirksen
,
Armin Huremagic
,
David Fifield
,
Dirk Rodenburg
,
Rod Hynes
,
Douglas Madory
,
Roya Ensafi
.
uss 2023
:
2581-2598
[doi]
Strategies and Vulnerabilities of Participants in Venezuelan Influence Operations
Ruben Recabarren
,
Bogdan Carbunar
,
Nestor Hernandez
,
Ashfaq Ali Shafin
.
uss 2023
:
6683-6700
[doi]
ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks
Phillip Rieger
,
Marco Chilese
,
Reham Mohamed 0002
,
Markus Miettinen
,
Hossein Fereidooni
,
Ahmad-Reza Sadeghi
.
uss 2023
:
4301-4318
[doi]
"Millions of people are watching you": Understanding the Digital-Safety Needs and Practices of Creators
Patrawat Samermit
,
Anna Turner
,
Patrick Gage Kelley
,
Tara Matthews
,
Vanessia Wu
,
Sunny Consolvo
,
Kurt Thomas
.
uss 2023
:
5629-5645
[doi]
Battle Ground: Data Collection and Labeling of CTF Games to Understand Human Cyber Operators
Georgel M. Savin
,
Ammar Asseri
,
Josiah Dykstra
,
Jonathan Goohs
,
Anthony Melaragno
,
William Casey
.
uss 2023
:
32-40
[doi]
Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-M
Xhani Marvin Saß
,
Richard Mitev
,
Ahmad-Reza Sadeghi
.
uss 2023
:
6239-6256
[doi]
Generative Intrusion Detection and Prevention on Data Stream
HyungBin Seo
,
MyungKeun Yoon
.
uss 2023
:
4319-4335
[doi]
Designing and Conducting Usability Research on Social Media Misinformation with Low Vision or Blind Users
Filipo Sharevski
,
Aziz Zeidieh
.
uss 2023
:
75-81
[doi]
Silent Spring: Prototype Pollution Leads to Remote Code Execution in Node.js
Mikhail Shcherbakov
,
Musard Balliu
,
Cristian-Alexandru Staicu
.
uss 2023
:
5521-5538
[doi]
Detecting Multi-Step IAM Attacks in AWS Environments via Model Checking
Ilia Shevrin
,
Oded Margalit
.
uss 2023
:
6025-6042
[doi]
Internet Service Providers' and Individuals' Attitudes, Barriers, and Incentives to Secure IoT
Nissy Sombatruang
,
Tristan Caulfield
,
Ingolf Becker
,
Akira Fujita
,
Takahiro Kasama
,
Koji Nakao
,
Daisuke Inoue
.
uss 2023
:
1541-1558
[doi]
Discovering Adversarial Driving Maneuvers against Autonomous Vehicles
Ruoyu Song
,
Muslum Ozgur Ozmen
,
Hyungsub Kim
,
Raymond Muller
,
Z. Berkay Celik
,
Antonio Bianchi
.
uss 2023
:
2957-2974
[doi]
Rods with Laser Beams: Understanding Browser Fingerprinting on Phishing Pages
Iskander Sánchez-Rola
,
Leyla Bilge
,
Davide Balzarotti
,
Armin Buescher
,
Petros Efstathopoulos
.
uss 2023
:
4157-4173
[doi]
Inception: Exposing New Attack Surfaces with Training in Transient Execution
Daniël Trujillo
,
Johannes Wikner
,
Kaveh Razavi
.
uss 2023
:
7303-7320
[doi]
The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 Decoders
Willy R. Vasquez
,
Stephen Checkoway
,
Hovav Shacham
.
uss 2023
:
6647-6664
[doi]
Examining Consumer Reviews to Understand Security and Privacy Issues in the Market of Smart Home Devices
Swaathi Vetrivel
,
Veerle van Harten
,
Carlos Hernandez Gañán
,
Michel van Eeten
,
Simon Parkin
.
uss 2023
:
1523-1540
[doi]
Auditing Framework APIs via Inferred App-side Security Specifications
Parjanya Vyas
,
Asim Waheed
,
Yousra Aafer
,
N. Asokan
.
uss 2023
:
6061-6077
[doi]
TreeSync: Authenticated Group Management for Messaging Layer Security
Théophile Wallez
,
Jonathan Protzenko
,
Benjamin Beurdouche
,
Karthikeyan Bhargavan
.
uss 2023
:
1217-1233
[doi]
V1SCAN: Discovering 1-day Vulnerabilities in Reused C/C++ Open-source Software Components Using Code Classification Techniques
Seunghoon Woo
,
Eunjin Choi
,
Heejo Lee
,
Hakjoo Oh
.
uss 2023
:
6541-6556
[doi]
Back to School: On the (In)Security of Academic VPNs
Ka Lok Wu
,
Man Hong Hue
,
Ngai Man Poon
,
Kin Man Leung
,
Wai Yin Po
,
Kin Ting Wong
,
Sze Ho Hui
,
Sze Yiu Chau
.
uss 2023
:
5737-5754
[doi]
Silent Bugs Matter: A Study of Compiler-Introduced Security Bugs
Jianhao Xu
,
Kangjie Lu
,
Zhengjie Du
,
Zhu Ding
,
Linke Li
,
Qiushi Wu
,
Mathias Payer
,
Bing Mao
.
uss 2023
:
3655-3672
[doi]
PUMM: Preventing Use-After-Free Using Execution Unit Partitioning
Carter Yagemann
,
Simon P. Chung
,
Brendan Saltaformaggio
,
Wenke Lee
.
uss 2023
:
823-840
[doi]
Hiding in Plain Sight: An Empirical Study of Web Application Abuse in Malware
Mingxuan Yao
,
Jonathan Fuller
,
Ranjita Pai Kasturi
,
Saumya Agarwal
,
Amit Kumar Sikder
,
Brendan Saltaformaggio
.
uss 2023
:
6115-6132
[doi]
"I'm going to trust this until it burns me" Parents' Privacy Concerns and Delegation of Trust in K-8 Educational Technology
Victoria Zhong
,
Susan McGregor
,
Rachel Greenstadt
.
uss 2023
:
5073-5090
[doi]
Sign in
or
sign up
to see more results.