Media Summary: Inference of Error Specifications and Bug Detection Using Structural What IF Is Not Enough? Fixing Null Pointer Dereference A Linear Reconstruction Approach for Attribute

Usenix Security 24 Inference Of Error Specifications And Bug Detection Using Structural - Detailed Analysis & Overview

Inference of Error Specifications and Bug Detection Using Structural What IF Is Not Enough? Fixing Null Pointer Dereference A Linear Reconstruction Approach for Attribute Closed-Form Bounds for DP-SGD against Record-level SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models Boyang Zhang, Zheng Li, Ziqing Yang, Xinlei He, ... AutoFHE: Automated Adaption of CNNs for Efficient Evaluation over FHE Wei Ao and Vishnu Naresh Boddeti, Michigan State ...

Voodoo: Memory Tagging, Authenticated Encryption, and "What do you want from theory alone?" Experimenting

Photo Gallery

USENIX Security '24 - Inference of Error Specifications and Bug Detection Using Structural...
USENIX Security '24 - Detecting Kernel Memory Bugs through Inconsistent Memory Management...
USENIX Security '24 - What IF Is Not Enough? Fixing Null Pointer Dereference With Contextual Check
USENIX Security '24 - A Linear Reconstruction Approach for Attribute Inference Attacks against...
USENIX Security '16 - Automatically Detecting Error Handling Bugs Using Error Specifications
USENIX Security '23 - Generative Intrusion Detection and Prevention on Data Stream
USENIX Security '24 - Fast and Private Inference of Deep Neural Networks by Co-designing...
USENIX Security '24 - OblivGNN: Oblivious Inference on Transductive and Inductive Graph Neural...
USENIX Security '21 - Understanding and Detecting Disordered Error Handling with Precise Function
USENIX Security '24 - Property Existence Inference against Generative Models
USENIX Security '24 - Closed-Form Bounds for DP-SGD against Record-level Inference Attacks
USENIX Security '22 - Inference Attacks Against Graph Neural Networks
Sponsored
Sponsored
View Detailed Profile
USENIX Security '24 - Inference of Error Specifications and Bug Detection Using Structural...

USENIX Security '24 - Inference of Error Specifications and Bug Detection Using Structural...

Inference of Error Specifications and Bug Detection Using Structural

USENIX Security '24 - Detecting Kernel Memory Bugs through Inconsistent Memory Management...

USENIX Security '24 - Detecting Kernel Memory Bugs through Inconsistent Memory Management...

Detecting

Sponsored
USENIX Security '24 - What IF Is Not Enough? Fixing Null Pointer Dereference With Contextual Check

USENIX Security '24 - What IF Is Not Enough? Fixing Null Pointer Dereference With Contextual Check

What IF Is Not Enough? Fixing Null Pointer Dereference

USENIX Security '24 - A Linear Reconstruction Approach for Attribute Inference Attacks against...

USENIX Security '24 - A Linear Reconstruction Approach for Attribute Inference Attacks against...

A Linear Reconstruction Approach for Attribute

USENIX Security '16 - Automatically Detecting Error Handling Bugs Using Error Specifications

USENIX Security '16 - Automatically Detecting Error Handling Bugs Using Error Specifications

Automatically

Sponsored
USENIX Security '23 - Generative Intrusion Detection and Prevention on Data Stream

USENIX Security '23 - Generative Intrusion Detection and Prevention on Data Stream

USENIX Security

USENIX Security '24 - Fast and Private Inference of Deep Neural Networks by Co-designing...

USENIX Security '24 - Fast and Private Inference of Deep Neural Networks by Co-designing...

Fast and Private

USENIX Security '24 - OblivGNN: Oblivious Inference on Transductive and Inductive Graph Neural...

USENIX Security '24 - OblivGNN: Oblivious Inference on Transductive and Inductive Graph Neural...

OblivGNN: Oblivious

USENIX Security '21 - Understanding and Detecting Disordered Error Handling with Precise Function

USENIX Security '21 - Understanding and Detecting Disordered Error Handling with Precise Function

USENIX Security

USENIX Security '24 - Property Existence Inference against Generative Models

USENIX Security '24 - Property Existence Inference against Generative Models

Property Existence

USENIX Security '24 - Closed-Form Bounds for DP-SGD against Record-level Inference Attacks

USENIX Security '24 - Closed-Form Bounds for DP-SGD against Record-level Inference Attacks

Closed-Form Bounds for DP-SGD against Record-level

USENIX Security '22 - Inference Attacks Against Graph Neural Networks

USENIX Security '22 - Inference Attacks Against Graph Neural Networks

USENIX Security

USENIX Security '24 - SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models

USENIX Security '24 - SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models

SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models Boyang Zhang, Zheng Li, Ziqing Yang, Xinlei He, ...

USENIX Security '24 - AutoFHE: Automated Adaption of CNNs for Efficient Evaluation over FHE

USENIX Security '24 - AutoFHE: Automated Adaption of CNNs for Efficient Evaluation over FHE

AutoFHE: Automated Adaption of CNNs for Efficient Evaluation over FHE Wei Ao and Vishnu Naresh Boddeti, Michigan State ...

USENIX Security '24 - Leakage-Abuse Attacks Against Structured Encryption for SQL

USENIX Security '24 - Leakage-Abuse Attacks Against Structured Encryption for SQL

Leakage-Abuse Attacks Against

USENIX Security '24 - MIST: Defending Against Membership Inference Attacks Through...

USENIX Security '24 - MIST: Defending Against Membership Inference Attacks Through...

MIST: Defending Against Membership

USENIX Security '24 - Voodoo: Memory Tagging, Authenticated Encryption, and Error Correction...

USENIX Security '24 - Voodoo: Memory Tagging, Authenticated Encryption, and Error Correction...

Voodoo: Memory Tagging, Authenticated Encryption, and

USENIX Security '24 - "What do you want from theory alone?" Experimenting with Tight Auditing of...

USENIX Security '24 - "What do you want from theory alone?" Experimenting with Tight Auditing of...

"What do you want from theory alone?" Experimenting

USENIX Security '24 - From One Thousand Pages of Specification to Unveiling Hidden Bugs: Large...

USENIX Security '24 - From One Thousand Pages of Specification to Unveiling Hidden Bugs: Large...

From One Thousand Pages of

USENIX Security '23 - ZBCAN: A Zero-Byte CAN Defense System

USENIX Security '23 - ZBCAN: A Zero-Byte CAN Defense System

USENIX Security