Media Summary: SSOScan: Automated Testing of Web Applications for Single Sign-On Vulnerabilities Yuchen Zhou and David Evans, University of ... SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice Tushar Nayan, ... Devils in the Guidance: Predicting Logic Vulnerabilities in Payment Syndication Services through Automated Documentation ...

Usenix Security 22 Oops Code - Detailed Analysis & Overview

SSOScan: Automated Testing of Web Applications for Single Sign-On Vulnerabilities Yuchen Zhou and David Evans, University of ... SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice Tushar Nayan, ... Devils in the Guidance: Predicting Logic Vulnerabilities in Payment Syndication Services through Automated Documentation ... PAC it up: Towards Pointer Integrity using ARM Pointer Authentication Hans Liljestrand, Aalto University, Huawei Technologies ...

Photo Gallery

USENIX Security '22 - Oops... Code Execution and Content Spoofing: The First Comprehensive Analysis
USENIX Security '22 - FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities
USENIX Security '22 - "They Look at Vulnerability and Use That to Abuse You''
USENIX Security '22 - SWAPP: A New Programmable Playground for Web Application Security
USENIX Security '22 - MOVERY: A Precise Approach for Modified Vulnerable Code Clone Discovery from
USENIX Security '22 - Counting in Regexes Considered Harmful: Exposing ReDoS Vulnerability of
USENIX Security '22 - Bedrock: Programmable Network Support for Secure RDMA Systems
USENIX Security '22 - Drifuzz: Harvesting Bugs in Device Drivers from Golden Seeds
USENIX Security '21 - You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion
USENIX Security '22 - ProFactory: Improving IoT Security via Formalized Protocol Customization
USENIX Security '22 - OS-Aware Vulnerability Prioritization via Differential Severity Analysis
USENIX Security '14 - SSOScan: Automated Testing of Web Applications for Single Sign-On
View Detailed Profile
USENIX Security '22 - Oops... Code Execution and Content Spoofing: The First Comprehensive Analysis

USENIX Security '22 - Oops... Code Execution and Content Spoofing: The First Comprehensive Analysis

USENIX Security

USENIX Security '22 - FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities

USENIX Security '22 - FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities

USENIX Security

USENIX Security '22 - "They Look at Vulnerability and Use That to Abuse You''

USENIX Security '22 - "They Look at Vulnerability and Use That to Abuse You''

USENIX Security

USENIX Security '22 - SWAPP: A New Programmable Playground for Web Application Security

USENIX Security '22 - SWAPP: A New Programmable Playground for Web Application Security

USENIX Security

USENIX Security '22 - MOVERY: A Precise Approach for Modified Vulnerable Code Clone Discovery from

USENIX Security '22 - MOVERY: A Precise Approach for Modified Vulnerable Code Clone Discovery from

USENIX Security

USENIX Security '22 - Counting in Regexes Considered Harmful: Exposing ReDoS Vulnerability of

USENIX Security '22 - Counting in Regexes Considered Harmful: Exposing ReDoS Vulnerability of

USENIX Security

USENIX Security '22 - Bedrock: Programmable Network Support for Secure RDMA Systems

USENIX Security '22 - Bedrock: Programmable Network Support for Secure RDMA Systems

USENIX Security

USENIX Security '22 - Drifuzz: Harvesting Bugs in Device Drivers from Golden Seeds

USENIX Security '22 - Drifuzz: Harvesting Bugs in Device Drivers from Golden Seeds

USENIX Security

USENIX Security '21 - You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion

USENIX Security '21 - You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion

USENIX Security

USENIX Security '22 - ProFactory: Improving IoT Security via Formalized Protocol Customization

USENIX Security '22 - ProFactory: Improving IoT Security via Formalized Protocol Customization

USENIX Security

USENIX Security '22 - OS-Aware Vulnerability Prioritization via Differential Severity Analysis

USENIX Security '22 - OS-Aware Vulnerability Prioritization via Differential Severity Analysis

USENIX Security

USENIX Security '14 - SSOScan: Automated Testing of Web Applications for Single Sign-On

USENIX Security '14 - SSOScan: Automated Testing of Web Applications for Single Sign-On

SSOScan: Automated Testing of Web Applications for Single Sign-On Vulnerabilities Yuchen Zhou and David Evans, University of ...

USENIX Security '24 - SoK: All You Need to Know About On-Device ML Model Extraction - The Gap...

USENIX Security '24 - SoK: All You Need to Know About On-Device ML Model Extraction - The Gap...

SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice Tushar Nayan, ...

USENIX Security '19 - Devils in the Guidance: Predicting Logic Vulnerabilities in Payment

USENIX Security '19 - Devils in the Guidance: Predicting Logic Vulnerabilities in Payment

Devils in the Guidance: Predicting Logic Vulnerabilities in Payment Syndication Services through Automated Documentation ...

USENIX Security '19 - PAC it up: Towards Pointer Integrity using ARM Pointer Authentication

USENIX Security '19 - PAC it up: Towards Pointer Integrity using ARM Pointer Authentication

PAC it up: Towards Pointer Integrity using ARM Pointer Authentication Hans Liljestrand, Aalto University, Huawei Technologies ...

USENIX Security '23 - A Two-Decade Retrospective Analysis of a University's Vulnerability to...

USENIX Security '23 - A Two-Decade Retrospective Analysis of a University's Vulnerability to...

USENIX Security

USENIX Security '22 - Experimental Security Analysis of the App Model in Business Collaboration...

USENIX Security '22 - Experimental Security Analysis of the App Model in Business Collaboration...

USENIX Security

USENIX Security '23 - No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using...

USENIX Security '23 - No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using...

USENIX Security