Media Summary: Rise of Inspectron: Automated Black-box Auditing of Cross-platform Electron Apps Mir Masood Ali, Mohammad Ghasemisharif, ... Practical Data-Only Attack Generation Brian Johannesmeyer, Asia Slowinska, Herbert Bos, and Cristiano Giuffrida, Vrije ... InSpectre Gadget: Inspecting the Residual Attack Surface of Cross-privilege Spectre v2 Sander Wiebing, Alvise de Faveri Tron, ...

Usenix Security 24 Endokernel A Thread Safe Monitor For Lightweight Subprocess Isolation - Detailed Analysis & Overview

Rise of Inspectron: Automated Black-box Auditing of Cross-platform Electron Apps Mir Masood Ali, Mohammad Ghasemisharif, ... Practical Data-Only Attack Generation Brian Johannesmeyer, Asia Slowinska, Herbert Bos, and Cristiano Giuffrida, Vrije ... InSpectre Gadget: Inspecting the Residual Attack Surface of Cross-privilege Spectre v2 Sander Wiebing, Alvise de Faveri Tron, ... Page-Oriented Programming: Subverting Control-Flow Integrity of Commodity Operating System Kernels with Non-Writable Code ... INSIGHT: Attacking Industry-Adopted Learning Resilient Logic Locking Techniques Using Explainable Graph Neural Network ... What IF Is Not Enough? Fixing Null Pointer Dereference With Contextual Check Yunlong Xing, Shu Wang, Shiyu Sun, Xu He, and ...

Bending microarchitectural weird machines towards practicality Ping-Lun Wang, Riccardo Paccagnella, Riad S. Wahby, and ... Inference of Error Specifications and Bug Detection Using Structural Similarities Niels Dossche and Bart Coppens, Ghent ... SoK: Neural Network Extraction Through Physical Side Channels Péter Horváth, Dirk Lauret, Zhuoran Liu, and Lejla Batina, ... A Linear Reconstruction Approach for Attribute Inference Attacks against Synthetic Data Meenatchi Sundaram Muthu Selva ...

Photo Gallery

USENIX Security '24 - Endokernel: A Thread Safe Monitor for Lightweight Subprocess Isolation
USENIX Security '24 - EL3XIR: Fuzzing COTS Secure Monitors
USENIX Security '24 - Rise of Inspectron: Automated Black-box Auditing of Cross-platform Electron...
USENIX Security '24 - Practical Data-Only Attack Generation
USENIX Security '24 - InSpectre Gadget: Inspecting the Residual Attack Surface of Cross-privilege...
USENIX Security '24 - Page-Oriented Programming: Subverting Control-Flow Integrity of Commodity..
USENIX Security '24 - INSIGHT: Attacking Industry-Adopted Learning Resilient Logic Locking...
USENIX Security '24 - What IF Is Not Enough? Fixing Null Pointer Dereference With Contextual Check
USENIX Security '24 - Bending microarchitectural weird machines towards practicality
USENIX Security '24 - Inference of Error Specifications and Bug Detection Using Structural...
USENIX Security '24 - SoK: Neural Network Extraction Through Physical Side Channels
USENIX Security '23 - SAFER: Efficient and Error-Tolerant Binary Instrumentation
Sponsored
Sponsored
View Detailed Profile
USENIX Security '24 - Endokernel: A Thread Safe Monitor for Lightweight Subprocess Isolation

USENIX Security '24 - Endokernel: A Thread Safe Monitor for Lightweight Subprocess Isolation

Endokernel

USENIX Security '24 - EL3XIR: Fuzzing COTS Secure Monitors

USENIX Security '24 - EL3XIR: Fuzzing COTS Secure Monitors

EL3XIR: Fuzzing COTS

Sponsored
USENIX Security '24 - Rise of Inspectron: Automated Black-box Auditing of Cross-platform Electron...

USENIX Security '24 - Rise of Inspectron: Automated Black-box Auditing of Cross-platform Electron...

Rise of Inspectron: Automated Black-box Auditing of Cross-platform Electron Apps Mir Masood Ali, Mohammad Ghasemisharif, ...

USENIX Security '24 - Practical Data-Only Attack Generation

USENIX Security '24 - Practical Data-Only Attack Generation

Practical Data-Only Attack Generation Brian Johannesmeyer, Asia Slowinska, Herbert Bos, and Cristiano Giuffrida, Vrije ...

USENIX Security '24 - InSpectre Gadget: Inspecting the Residual Attack Surface of Cross-privilege...

USENIX Security '24 - InSpectre Gadget: Inspecting the Residual Attack Surface of Cross-privilege...

InSpectre Gadget: Inspecting the Residual Attack Surface of Cross-privilege Spectre v2 Sander Wiebing, Alvise de Faveri Tron, ...

Sponsored
USENIX Security '24 - Page-Oriented Programming: Subverting Control-Flow Integrity of Commodity..

USENIX Security '24 - Page-Oriented Programming: Subverting Control-Flow Integrity of Commodity..

Page-Oriented Programming: Subverting Control-Flow Integrity of Commodity Operating System Kernels with Non-Writable Code ...

USENIX Security '24 - INSIGHT: Attacking Industry-Adopted Learning Resilient Logic Locking...

USENIX Security '24 - INSIGHT: Attacking Industry-Adopted Learning Resilient Logic Locking...

INSIGHT: Attacking Industry-Adopted Learning Resilient Logic Locking Techniques Using Explainable Graph Neural Network ...

USENIX Security '24 - What IF Is Not Enough? Fixing Null Pointer Dereference With Contextual Check

USENIX Security '24 - What IF Is Not Enough? Fixing Null Pointer Dereference With Contextual Check

What IF Is Not Enough? Fixing Null Pointer Dereference With Contextual Check Yunlong Xing, Shu Wang, Shiyu Sun, Xu He, and ...

USENIX Security '24 - Bending microarchitectural weird machines towards practicality

USENIX Security '24 - Bending microarchitectural weird machines towards practicality

Bending microarchitectural weird machines towards practicality Ping-Lun Wang, Riccardo Paccagnella, Riad S. Wahby, and ...

USENIX Security '24 - Inference of Error Specifications and Bug Detection Using Structural...

USENIX Security '24 - Inference of Error Specifications and Bug Detection Using Structural...

Inference of Error Specifications and Bug Detection Using Structural Similarities Niels Dossche and Bart Coppens, Ghent ...

USENIX Security '24 - SoK: Neural Network Extraction Through Physical Side Channels

USENIX Security '24 - SoK: Neural Network Extraction Through Physical Side Channels

SoK: Neural Network Extraction Through Physical Side Channels Péter Horváth, Dirk Lauret, Zhuoran Liu, and Lejla Batina, ...

USENIX Security '23 - SAFER: Efficient and Error-Tolerant Binary Instrumentation

USENIX Security '23 - SAFER: Efficient and Error-Tolerant Binary Instrumentation

USENIX Security

USENIX Security '23 - TRust: A Compilation Framework for In-process Isolation to Protect Safe...

USENIX Security '23 - TRust: A Compilation Framework for In-process Isolation to Protect Safe...

USENIX Security

USENIX Security '23 - Eye-Shield: Real-Time Protection of Mobile Device Screen Information from...

USENIX Security '23 - Eye-Shield: Real-Time Protection of Mobile Device Screen Information from...

USENIX Security

USENIX Security '24 - A Linear Reconstruction Approach for Attribute Inference Attacks against...

USENIX Security '24 - A Linear Reconstruction Approach for Attribute Inference Attacks against...

A Linear Reconstruction Approach for Attribute Inference Attacks against Synthetic Data Meenatchi Sundaram Muthu Selva ...

USENIX Security '20 - Zero-delay Lightweight Defenses against Website Fingerprinting

USENIX Security '20 - Zero-delay Lightweight Defenses against Website Fingerprinting

Zero-delay

USENIX Security '22 - Holistic Control-Flow Protection on Real-Time Embedded Systems with Kage

USENIX Security '22 - Holistic Control-Flow Protection on Real-Time Embedded Systems with Kage

USENIX Security