USENIX Security '23 - Downfall: Exploiting Speculative Data Gathering

USENIX Security '23 - Downfall: Exploiting Speculative Data GatheringПодробнее

USENIX Security '23 - Downfall: Exploiting Speculative Data Gathering

USENIX Security '23 - Knowledge Expansion and Counterfactual Interaction for Reference-Based...Подробнее

USENIX Security '23 - Knowledge Expansion and Counterfactual Interaction for Reference-Based...

USENIX Security '23 - The Space of Adversarial StrategiesПодробнее

USENIX Security '23 - The Space of Adversarial Strategies

USENIX Security '24 - Practical Data-Only Attack GenerationПодробнее

USENIX Security '24 - Practical Data-Only Attack Generation

USENIX Security '23 - A Two-Decade Retrospective Analysis of a University's Vulnerability to...Подробнее

USENIX Security '23 - A Two-Decade Retrospective Analysis of a University's Vulnerability to...

USENIX Security '24 - GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data...Подробнее

USENIX Security '24 - GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data...

USENIX Security '24 - SpecLFB: Eliminating Cache Side Channels in Speculative ExecutionsПодробнее

USENIX Security '24 - SpecLFB: Eliminating Cache Side Channels in Speculative Executions

USENIX Security '23 - Generative Intrusion Detection and Prevention on Data StreamПодробнее

USENIX Security '23 - Generative Intrusion Detection and Prevention on Data Stream

USENIX Security '23 - PrivGraph: Differentially Private Graph Data Publication by Exploiting...Подробнее

USENIX Security '23 - PrivGraph: Differentially Private Graph Data Publication by Exploiting...

USENIX Security '24 - Inference of Error Specifications and Bug Detection Using Structural...Подробнее

USENIX Security '24 - Inference of Error Specifications and Bug Detection Using Structural...

USENIX Security '23 - VIPER: Spotting Syscall-Guard Variables for Data-Only AttacksПодробнее

USENIX Security '23 - VIPER: Spotting Syscall-Guard Variables for Data-Only Attacks

USENIX Security '24 - The Impact of Exposed Passwords on Honeyword EfficacyПодробнее

USENIX Security '24 - The Impact of Exposed Passwords on Honeyword Efficacy

USENIX Security '24 - HECKLER: Breaking Confidential VMs with Malicious InterruptsПодробнее

USENIX Security '24 - HECKLER: Breaking Confidential VMs with Malicious Interrupts

USENIX Security '15 - Automatic Generation of Data-Oriented ExploitsПодробнее

USENIX Security '15 - Automatic Generation of Data-Oriented Exploits

USENIX Security '24 - Unveiling the Secrets without Data: Can Graph Neural Networks Be Exploited...Подробнее

USENIX Security '24 - Unveiling the Secrets without Data: Can Graph Neural Networks Be Exploited...

USENIX Security '20 - An Ever-evolving Game: Evaluation of Real-world Attacks and DefensesПодробнее

USENIX Security '20 - An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses

USENIX Security '23 - On the Security Risks of Knowledge Graph ReasoningПодробнее

USENIX Security '23 - On the Security Risks of Knowledge Graph Reasoning