Media Summary: Lessons Learned from Evaluating the Robustness of Defenses to Adversarial Examples Nicholas Carlini, Research Scientist, ... Baby Steps towards the Precipice: How the Web Became a Scary Place and How We Can Fix It Artur Janc, Staff Information ... SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice Tushar Nayan, ...

Usenix Security 22 Profactory Improving - Detailed Analysis & Overview

Lessons Learned from Evaluating the Robustness of Defenses to Adversarial Examples Nicholas Carlini, Research Scientist, ... Baby Steps towards the Precipice: How the Web Became a Scary Place and How We Can Fix It Artur Janc, Staff Information ... SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice Tushar Nayan, ... Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities Yuhao Wu, Jinwen Wang, Yujie Wang, Shixuan Zhai, and ... FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker Recognition Kun Wang, ... James Mickens, Harvard University Q: Why Do Keynote Speakers Keep Suggesting That

Formalizing and Benchmarking Prompt Injection Attacks and Defenses Yupei Liu, The Pennsylvania State University; Yuqi Jia, ...

Photo Gallery

USENIX Security '22 - ProFactory: Improving IoT Security via Formalized Protocol Customization
USENIX Security '22 - MOVERY: A Precise Approach for Modified Vulnerable Code Clone Discovery from
USENIX Security '22 - Oops... Code Execution and Content Spoofing: The First Comprehensive Analysis
USENIX Security '19 - Lessons Learned from Evaluating the Robustness of Defenses to
USENIX Security '22 - "They Look at Vulnerability and Use That to Abuse You''
USENIX Security '24 - Two Shuffles Make a RAM: Improved Constant Overhead Zero Knowledge RAM
USENIX Security '19 - Baby Steps towards the Precipice: How the Web Became a Scary
USENIX Security '22 - Helping hands: Measuring the impact of a large threat intelligence sharing...
USENIX Security '24 - SoK: All You Need to Know About On-Device ML Model Extraction - The Gap...
USENIX Security '24 - Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities
USENIX Security '23 - No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using...
USENIX Security '22 - Counting in Regexes Considered Harmful: Exposing ReDoS Vulnerability of
View Detailed Profile
USENIX Security '22 - ProFactory: Improving IoT Security via Formalized Protocol Customization

USENIX Security '22 - ProFactory: Improving IoT Security via Formalized Protocol Customization

USENIX Security

USENIX Security '22 - MOVERY: A Precise Approach for Modified Vulnerable Code Clone Discovery from

USENIX Security '22 - MOVERY: A Precise Approach for Modified Vulnerable Code Clone Discovery from

USENIX Security

USENIX Security '22 - Oops... Code Execution and Content Spoofing: The First Comprehensive Analysis

USENIX Security '22 - Oops... Code Execution and Content Spoofing: The First Comprehensive Analysis

USENIX Security

USENIX Security '19 - Lessons Learned from Evaluating the Robustness of Defenses to

USENIX Security '19 - Lessons Learned from Evaluating the Robustness of Defenses to

Lessons Learned from Evaluating the Robustness of Defenses to Adversarial Examples Nicholas Carlini, Research Scientist, ...

USENIX Security '22 - "They Look at Vulnerability and Use That to Abuse You''

USENIX Security '22 - "They Look at Vulnerability and Use That to Abuse You''

USENIX Security

USENIX Security '24 - Two Shuffles Make a RAM: Improved Constant Overhead Zero Knowledge RAM

USENIX Security '24 - Two Shuffles Make a RAM: Improved Constant Overhead Zero Knowledge RAM

Two Shuffles Make a RAM:

USENIX Security '19 - Baby Steps towards the Precipice: How the Web Became a Scary

USENIX Security '19 - Baby Steps towards the Precipice: How the Web Became a Scary

Baby Steps towards the Precipice: How the Web Became a Scary Place and How We Can Fix It Artur Janc, Staff Information ...

USENIX Security '22 - Helping hands: Measuring the impact of a large threat intelligence sharing...

USENIX Security '22 - Helping hands: Measuring the impact of a large threat intelligence sharing...

USENIX Security

USENIX Security '24 - SoK: All You Need to Know About On-Device ML Model Extraction - The Gap...

USENIX Security '24 - SoK: All You Need to Know About On-Device ML Model Extraction - The Gap...

SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice Tushar Nayan, ...

USENIX Security '24 - Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities

USENIX Security '24 - Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities

Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities Yuhao Wu, Jinwen Wang, Yujie Wang, Shixuan Zhai, and ...

USENIX Security '23 - No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using...

USENIX Security '23 - No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using...

USENIX Security

USENIX Security '22 - Counting in Regexes Considered Harmful: Exposing ReDoS Vulnerability of

USENIX Security '22 - Counting in Regexes Considered Harmful: Exposing ReDoS Vulnerability of

USENIX Security

USENIX Security '24 - FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example...

USENIX Security '24 - FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example...

FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker Recognition Kun Wang, ...

USENIX Security '18-Q: Why Do Keynote Speakers Keep Suggesting That Improving Security Is Possible?

USENIX Security '18-Q: Why Do Keynote Speakers Keep Suggesting That Improving Security Is Possible?

James Mickens, Harvard University Q: Why Do Keynote Speakers Keep Suggesting That

USENIX Security '22 - SCRAPS: Scalable Collective Remote Attestation for Pub-Sub IoT Networks with

USENIX Security '22 - SCRAPS: Scalable Collective Remote Attestation for Pub-Sub IoT Networks with

USENIX Security

USENIX Security '22 - Experimental Security Analysis of the App Model in Business Collaboration...

USENIX Security '22 - Experimental Security Analysis of the App Model in Business Collaboration...

USENIX Security

USENIX Security '25 - Sometimes Simpler is Better: A Comprehensive Analysis of State-of-the-Art...

USENIX Security '25 - Sometimes Simpler is Better: A Comprehensive Analysis of State-of-the-Art...

USENIX Security

USENIX Security '24 - Formalizing and Benchmarking Prompt Injection Attacks and Defenses

USENIX Security '24 - Formalizing and Benchmarking Prompt Injection Attacks and Defenses

Formalizing and Benchmarking Prompt Injection Attacks and Defenses Yupei Liu, The Pennsylvania State University; Yuqi Jia, ...

USENIX Security '22 - Under the Hood of DANE Mismanagement in SMTP

USENIX Security '22 - Under the Hood of DANE Mismanagement in SMTP

USENIX Security