Media Summary: Defending Against Data Reconstruction Attacks in Federated Exploring ChatGPT's Capabilities on Vulnerability Management Peiyu Liu and Junming Liu, Zhejiang University NGICS Platform; ... EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection Shigang Liu, CSIRO's Data61 and Swinburne ...

Usenix Security 24 Inf2guard An Information Theoretic Framework For Learning - Detailed Analysis & Overview

Defending Against Data Reconstruction Attacks in Federated Exploring ChatGPT's Capabilities on Vulnerability Management Peiyu Liu and Junming Liu, Zhejiang University NGICS Platform; ... EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection Shigang Liu, CSIRO's Data61 and Swinburne ... A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for Evading On Data Fabrication in Collaborative Vehicular Perception: Attacks and Countermeasures Qingzhao Zhang, Shuowei Jin, ... On Bridging the Gap between Control Flow Integrity and Attestation Schemes Mahmoud Ammar, Ahmed Abdelraoof, and Silviu ...

Rethinking the Invisible Protection against Unauthorized Image Usage in Stable Diffusion Shengwei An, Lu Yan, Siyuan Cheng, ... Page-Oriented Programming: Subverting Control-Flow Integrity of Commodity Operating System Kernels with Non-Writable Code ... A Linear Reconstruction Approach for Attribute Inference Attacks against Synthetic Data Meenatchi Sundaram Muthu Selva ... Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities Yuhao Wu, Jinwen Wang, Yujie Wang, Shixuan Zhai, and ... SAIN: Improving ICS Attack Detection Sensitivity via State-Aware Invariants Syed Ghazanfar Abbas, Muslum Ozgur Ozmen, ... Can Virtual Reality Protect Users from Keystroke Inference Attacks? Zhuolin Yang, Zain Sarwar, Iris Hwang, Ronik Bhaskar, Ben ...

Practical Data-Only Attack Generation Brian Johannesmeyer, Asia Slowinska, Herbert Bos, and Cristiano Giuffrida, Vrije ...

Photo Gallery

USENIX Security '24 - Inf2Guard: An Information-Theoretic Framework for Learning...
USENIX Security '24 - FaceObfuscator: Defending Deep Learning-based Privacy Attacks with Gradient...
USENIX Security '24 - SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models
USENIX Security '24 - Defending Against Data Reconstruction Attacks in Federated Learning: An...
USENIX Security '24 - INSIGHT: Attacking Industry-Adopted Learning Resilient Logic Locking...
USENIX Security '24 - Exploring ChatGPT's Capabilities on Vulnerability Management
USENIX Security '24 - EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection
USENIX Security '24 - A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for...
USENIX Security '24 - On Data Fabrication in Collaborative Vehicular Perception: Attacks and...
USENIX Security '24 - On Bridging the Gap between Control Flow Integrity and Attestation Schemes
USENIX Security '24 - Rethinking the Invisible Protection against Unauthorized Image Usage in...
USENIX Security '23 - An Input-Agnostic Hierarchical Deep Learning Framework for Traffic...
Sponsored
Sponsored
View Detailed Profile
USENIX Security '24 - Inf2Guard: An Information-Theoretic Framework for Learning...

USENIX Security '24 - Inf2Guard: An Information-Theoretic Framework for Learning...

Inf2Guard: An Information

USENIX Security '24 - FaceObfuscator: Defending Deep Learning-based Privacy Attacks with Gradient...

USENIX Security '24 - FaceObfuscator: Defending Deep Learning-based Privacy Attacks with Gradient...

FaceObfuscator: Defending Deep

Sponsored
USENIX Security '24 - SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models

USENIX Security '24 - SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models

SecurityNet: Assessing Machine

USENIX Security '24 - Defending Against Data Reconstruction Attacks in Federated Learning: An...

USENIX Security '24 - Defending Against Data Reconstruction Attacks in Federated Learning: An...

Defending Against Data Reconstruction Attacks in Federated

USENIX Security '24 - INSIGHT: Attacking Industry-Adopted Learning Resilient Logic Locking...

USENIX Security '24 - INSIGHT: Attacking Industry-Adopted Learning Resilient Logic Locking...

INSIGHT: Attacking Industry-Adopted

Sponsored
USENIX Security '24 - Exploring ChatGPT's Capabilities on Vulnerability Management

USENIX Security '24 - Exploring ChatGPT's Capabilities on Vulnerability Management

Exploring ChatGPT's Capabilities on Vulnerability Management Peiyu Liu and Junming Liu, Zhejiang University NGICS Platform; ...

USENIX Security '24 - EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection

USENIX Security '24 - EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection

EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection Shigang Liu, CSIRO's Data61 and Swinburne ...

USENIX Security '24 - A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for...

USENIX Security '24 - A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for...

A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for Evading

USENIX Security '24 - On Data Fabrication in Collaborative Vehicular Perception: Attacks and...

USENIX Security '24 - On Data Fabrication in Collaborative Vehicular Perception: Attacks and...

On Data Fabrication in Collaborative Vehicular Perception: Attacks and Countermeasures Qingzhao Zhang, Shuowei Jin, ...

USENIX Security '24 - On Bridging the Gap between Control Flow Integrity and Attestation Schemes

USENIX Security '24 - On Bridging the Gap between Control Flow Integrity and Attestation Schemes

On Bridging the Gap between Control Flow Integrity and Attestation Schemes Mahmoud Ammar, Ahmed Abdelraoof, and Silviu ...

USENIX Security '24 - Rethinking the Invisible Protection against Unauthorized Image Usage in...

USENIX Security '24 - Rethinking the Invisible Protection against Unauthorized Image Usage in...

Rethinking the Invisible Protection against Unauthorized Image Usage in Stable Diffusion Shengwei An, Lu Yan, Siyuan Cheng, ...

USENIX Security '23 - An Input-Agnostic Hierarchical Deep Learning Framework for Traffic...

USENIX Security '23 - An Input-Agnostic Hierarchical Deep Learning Framework for Traffic...

USENIX Security

USENIX Security '24 - Page-Oriented Programming: Subverting Control-Flow Integrity of Commodity..

USENIX Security '24 - Page-Oriented Programming: Subverting Control-Flow Integrity of Commodity..

Page-Oriented Programming: Subverting Control-Flow Integrity of Commodity Operating System Kernels with Non-Writable Code ...

USENIX Security '24 - A Linear Reconstruction Approach for Attribute Inference Attacks against...

USENIX Security '24 - A Linear Reconstruction Approach for Attribute Inference Attacks against...

A Linear Reconstruction Approach for Attribute Inference Attacks against Synthetic Data Meenatchi Sundaram Muthu Selva ...

USENIX Security '24 - Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities

USENIX Security '24 - Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities

Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities Yuhao Wu, Jinwen Wang, Yujie Wang, Shixuan Zhai, and ...

USENIX Security '24 - SAIN: Improving ICS Attack Detection Sensitivity via State-Aware Invariants

USENIX Security '24 - SAIN: Improving ICS Attack Detection Sensitivity via State-Aware Invariants

SAIN: Improving ICS Attack Detection Sensitivity via State-Aware Invariants Syed Ghazanfar Abbas, Muslum Ozgur Ozmen, ...

USENIX Security '24 - Can Virtual Reality Protect Users from Keystroke Inference Attacks?

USENIX Security '24 - Can Virtual Reality Protect Users from Keystroke Inference Attacks?

Can Virtual Reality Protect Users from Keystroke Inference Attacks? Zhuolin Yang, Zain Sarwar, Iris Hwang, Ronik Bhaskar, Ben ...

USENIX Security '24 - AttackGNN: Red-Teaming GNNs in Hardware Security Using Reinforcement Learning

USENIX Security '24 - AttackGNN: Red-Teaming GNNs in Hardware Security Using Reinforcement Learning

AttackGNN: Red-Teaming GNNs in Hardware

USENIX Security '24 - Practical Data-Only Attack Generation

USENIX Security '24 - Practical Data-Only Attack Generation

Practical Data-Only Attack Generation Brian Johannesmeyer, Asia Slowinska, Herbert Bos, and Cristiano Giuffrida, Vrije ...