USENIX Security '24 - Practical Data-Only Attack Generation

USENIX Security '24 - Practical Data-Only Attack GenerationПодробнее

USENIX Security '24 - Practical Data-Only Attack Generation

USENIX Security '24 - GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data...Подробнее

USENIX Security '24 - GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data...

USENIX Security '24 - True Attacks, Attack Attempts, or Benign Triggers? An Empirical Measurement...Подробнее

USENIX Security '24 - True Attacks, Attack Attempts, or Benign Triggers? An Empirical Measurement...

USENIX Security '24 - Hijacking Attacks against Neural Network by Analyzing Training DataПодробнее

USENIX Security '24 - Hijacking Attacks against Neural Network by Analyzing Training Data

USENIX Security '24 - SnailLoad: Exploiting Remote Network Latency Measurements without JavaScriptПодробнее

USENIX Security '24 - SnailLoad: Exploiting Remote Network Latency Measurements without JavaScript

USENIX Security '24 - An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models:...Подробнее

USENIX Security '24 - An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models:...

USENIX Security '24 - MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation..Подробнее

USENIX Security '24 - MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation..

USENIX Security '24 - On Data Fabrication in Collaborative Vehicular Perception: Attacks and...Подробнее

USENIX Security '24 - On Data Fabrication in Collaborative Vehicular Perception: Attacks and...

USENIX Security '24 - RECORD: A RECeption-Only Region Determination Attack on LEO Satellite UsersПодробнее

USENIX Security '24 - RECORD: A RECeption-Only Region Determination Attack on LEO Satellite Users

USENIX Security '24 - EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability DetectionПодробнее

USENIX Security '24 - EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection

USENIX Security '24 - Closed-Form Bounds for DP-SGD against Record-level Inference AttacksПодробнее

USENIX Security '24 - Closed-Form Bounds for DP-SGD against Record-level Inference Attacks

USENIX Security '24 - Defending Against Data Reconstruction Attacks in Federated Learning: An...Подробнее

USENIX Security '24 - Defending Against Data Reconstruction Attacks in Federated Learning: An...

USENIX Security '24 - Unveiling the Secrets without Data: Can Graph Neural Networks Be Exploited...Подробнее

USENIX Security '24 - Unveiling the Secrets without Data: Can Graph Neural Networks Be Exploited...

USENIX Security '24 - InSpectre Gadget: Inspecting the Residual Attack Surface of Cross-privilege...Подробнее

USENIX Security '24 - InSpectre Gadget: Inspecting the Residual Attack Surface of Cross-privilege...

USENIX Security '24 - Can Virtual Reality Protect Users from Keystroke Inference Attacks?Подробнее

USENIX Security '24 - Can Virtual Reality Protect Users from Keystroke Inference Attacks?

USENIX Security '24 - GPU Memory Exploitation for Fun and ProfitПодробнее

USENIX Security '24 - GPU Memory Exploitation for Fun and Profit

USENIX Security '24 - UBA-Inf: Unlearning Activated Backdoor Attack with Influence-Driven CamouflageПодробнее

USENIX Security '24 - UBA-Inf: Unlearning Activated Backdoor Attack with Influence-Driven Camouflage

USENIX Security '24 - Enhancing Network Attack Detection with Distributed and In-Network Data...Подробнее

USENIX Security '24 - Enhancing Network Attack Detection with Distributed and In-Network Data...

USENIX Security '24 - A Linear Reconstruction Approach for Attribute Inference Attacks against...Подробнее

USENIX Security '24 - A Linear Reconstruction Approach for Attribute Inference Attacks against...

USENIX Security '24 - Prompt Stealing Attacks Against Text-to-Image Generation ModelsПодробнее

USENIX Security '24 - Prompt Stealing Attacks Against Text-to-Image Generation Models