Media Summary: What IF Is Not Enough? Fixing Null Pointer Dereference With Contextual Check Yunlong Xing, Shu Wang, Shiyu Sun, Xu He, and ... Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities Yuhao Wu, Jinwen Wang, Yujie Wang, Shixuan Zhai, and ... MetaSafe: Compiling for Protecting Smart Pointer Metadata to Ensure Safe Rust Integrity Martin Kayondo and Inyoung Bang, ...

Usenix Security 24 Voodoo Memory Tagging Authenticated Encryption And Error Correction - Detailed Analysis & Overview

What IF Is Not Enough? Fixing Null Pointer Dereference With Contextual Check Yunlong Xing, Shu Wang, Shiyu Sun, Xu He, and ... Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities Yuhao Wu, Jinwen Wang, Yujie Wang, Shixuan Zhai, and ... MetaSafe: Compiling for Protecting Smart Pointer Metadata to Ensure Safe Rust Integrity Martin Kayondo and Inyoung Bang, ... A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for Evading Learning-based Windows Malware Detection in ... Can Virtual Reality Protect Users from Keystroke Inference Attacks? Zhuolin Yang, Zain Sarwar, Iris Hwang, Ronik Bhaskar, Ben ... EVOKE: Efficient Revocation of Verifiable Credentials in IoT Networks Carlo Mazzocca, University of Bologna; Abbas Acar and ...

Neural Network Semantic Backdoor Detection and Mitigation: A Causality-Based Approach Bing Sun, Jun Sun, and Wayne Koh, ... Uncovering the Limits of Machine Learning for Automatic Vulnerability Detection Niklas Risse and Marcel Böhme, MPI-SP, ... A Linear Reconstruction Approach for Attribute Inference Attacks against Synthetic Data Meenatchi Sundaram Muthu Selva ...

Photo Gallery

USENIX Security '24 - Voodoo: Memory Tagging, Authenticated Encryption, and Error Correction...
USENIX Security '22 - How to Abuse and Fix Authenticated Encryption Without Key Commitment
USENIX Security '24 - Detecting Kernel Memory Bugs through Inconsistent Memory Management...
USENIX Security '24 - SLUBStick: Arbitrary Memory Writes through Practical Software Cross-Cache...
USENIX Security '24 - What IF Is Not Enough? Fixing Null Pointer Dereference With Contextual Check
USENIX Security '23 - FloatZone: Accelerating Memory Error Detection using the Floating Point Unit
USENIX Security '24 - Inference of Error Specifications and Bug Detection Using Structural...
USENIX Security '24 - SCAVY: Automated Discovery of Memory Corruption Targets in Linux Kernel for...
find memory errors quickly. (-fsanitize, addresssanitizer)
USENIX Security '24 - Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities
USENIX Security '24 - MetaSafe: Compiling for Protecting Smart Pointer Metadata to Ensure Safe...
USENIX Security '24 - A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for...
Sponsored
Sponsored
View Detailed Profile
USENIX Security '24 - Voodoo: Memory Tagging, Authenticated Encryption, and Error Correction...

USENIX Security '24 - Voodoo: Memory Tagging, Authenticated Encryption, and Error Correction...

Voodoo

USENIX Security '22 - How to Abuse and Fix Authenticated Encryption Without Key Commitment

USENIX Security '22 - How to Abuse and Fix Authenticated Encryption Without Key Commitment

USENIX Security

Sponsored
USENIX Security '24 - Detecting Kernel Memory Bugs through Inconsistent Memory Management...

USENIX Security '24 - Detecting Kernel Memory Bugs through Inconsistent Memory Management...

Detecting Kernel

USENIX Security '24 - SLUBStick: Arbitrary Memory Writes through Practical Software Cross-Cache...

USENIX Security '24 - SLUBStick: Arbitrary Memory Writes through Practical Software Cross-Cache...

SLUBStick: Arbitrary

USENIX Security '24 - What IF Is Not Enough? Fixing Null Pointer Dereference With Contextual Check

USENIX Security '24 - What IF Is Not Enough? Fixing Null Pointer Dereference With Contextual Check

What IF Is Not Enough? Fixing Null Pointer Dereference With Contextual Check Yunlong Xing, Shu Wang, Shiyu Sun, Xu He, and ...

Sponsored
USENIX Security '23 - FloatZone: Accelerating Memory Error Detection using the Floating Point Unit

USENIX Security '23 - FloatZone: Accelerating Memory Error Detection using the Floating Point Unit

USENIX Security

USENIX Security '24 - Inference of Error Specifications and Bug Detection Using Structural...

USENIX Security '24 - Inference of Error Specifications and Bug Detection Using Structural...

Inference of

USENIX Security '24 - SCAVY: Automated Discovery of Memory Corruption Targets in Linux Kernel for...

USENIX Security '24 - SCAVY: Automated Discovery of Memory Corruption Targets in Linux Kernel for...

SCAVY: Automated Discovery of

find memory errors quickly. (-fsanitize, addresssanitizer)

find memory errors quickly. (-fsanitize, addresssanitizer)

Patreon ➤ https://www.patreon.com/jacobsorber Courses ➤ https://jacobsorber.thinkific.com Website ...

USENIX Security '24 - Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities

USENIX Security '24 - Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities

Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities Yuhao Wu, Jinwen Wang, Yujie Wang, Shixuan Zhai, and ...

USENIX Security '24 - MetaSafe: Compiling for Protecting Smart Pointer Metadata to Ensure Safe...

USENIX Security '24 - MetaSafe: Compiling for Protecting Smart Pointer Metadata to Ensure Safe...

MetaSafe: Compiling for Protecting Smart Pointer Metadata to Ensure Safe Rust Integrity Martin Kayondo and Inyoung Bang, ...

USENIX Security '24 - A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for...

USENIX Security '24 - A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for...

A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for Evading Learning-based Windows Malware Detection in ...

USENIX Security '23 - Inducing Authentication Failures to Bypass Credit Card PINs

USENIX Security '23 - Inducing Authentication Failures to Bypass Credit Card PINs

USENIX Security

USENIX Security '24 - Can Virtual Reality Protect Users from Keystroke Inference Attacks?

USENIX Security '24 - Can Virtual Reality Protect Users from Keystroke Inference Attacks?

Can Virtual Reality Protect Users from Keystroke Inference Attacks? Zhuolin Yang, Zain Sarwar, Iris Hwang, Ronik Bhaskar, Ben ...

USENIX Security '24 - EVOKE: Efficient Revocation of Verifiable Credentials in IoT Networks

USENIX Security '24 - EVOKE: Efficient Revocation of Verifiable Credentials in IoT Networks

EVOKE: Efficient Revocation of Verifiable Credentials in IoT Networks Carlo Mazzocca, University of Bologna; Abbas Acar and ...

USENIX Security '24 - Neural Network Semantic Backdoor Detection and Mitigation: A Causality-Based..

USENIX Security '24 - Neural Network Semantic Backdoor Detection and Mitigation: A Causality-Based..

Neural Network Semantic Backdoor Detection and Mitigation: A Causality-Based Approach Bing Sun, Jun Sun, and Wayne Koh, ...

USENIX Security '24 - Uncovering the Limits of Machine Learning for Automatic Vulnerability...

USENIX Security '24 - Uncovering the Limits of Machine Learning for Automatic Vulnerability...

Uncovering the Limits of Machine Learning for Automatic Vulnerability Detection Niklas Risse and Marcel Böhme, MPI-SP, ...

USENIX Security '24 - Understanding Ethereum Mempool Security under Asymmetric DoS by Symbolized ...

USENIX Security '24 - Understanding Ethereum Mempool Security under Asymmetric DoS by Symbolized ...

Understanding Ethereum Mempool

USENIX Security '24 - A Linear Reconstruction Approach for Attribute Inference Attacks against...

USENIX Security '24 - A Linear Reconstruction Approach for Attribute Inference Attacks against...

A Linear Reconstruction Approach for Attribute Inference Attacks against Synthetic Data Meenatchi Sundaram Muthu Selva ...

USENIX Security '23 - ICSPatch: Automated Vulnerability Localization and Non-Intrusive...

USENIX Security '23 - ICSPatch: Automated Vulnerability Localization and Non-Intrusive...

USENIX Security