Media Summary: Finding Traceability Attacks in the Bluetooth Low Energy Specification and Its Implementations Jianliang Wu, Purdue University ... SSOScan: Automated Testing of Web Applications for Single Sign-On Vulnerabilities Yuchen Zhou and David Evans, University of ...

Usenix Security 23 Eos Efficient - Detailed Analysis & Overview

Finding Traceability Attacks in the Bluetooth Low Energy Specification and Its Implementations Jianliang Wu, Purdue University ... SSOScan: Automated Testing of Web Applications for Single Sign-On Vulnerabilities Yuchen Zhou and David Evans, University of ...

Photo Gallery

USENIX Security '23 - Eos: Efficient Private Delegation of zkSNARK Provers
USENIX Security '23 - No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using...
USENIX Security '23 - Know Your Cybercriminal: Evaluating Attacker Preferences by Measuring...
USENIX Security '23 - Adversarial Training for Raw-Binary Malware Classifiers
USENIX Security '23 - A comprehensive, formal and automated analysis of the EDHOC protocol
USENIX Security '23 - Internet Service Providers' and Individuals' Attitudes, Barriers, and...
USENIX Security '23 - "Un-Equal Online Safety?" A Gender Analysis of Security and Privacy...
USENIX Security '23 - “To Do This Properly, You Need More Resources”: The Hidden Costs of...
USENIX Security '23 - "If I could do this, I feel anyone could:" The Design and Evaluation...
USENIX Security '23 - Going through the motions: AR/VR keylogging from user head motions
USENIX Security '23 - Unique Identification of 50,000+ Virtual Reality Users from Head & Hand...
USENIX Security '23 - “Millions of people are watching you”: Understanding the Digital-Safety...
View Detailed Profile
USENIX Security '23 - Eos: Efficient Private Delegation of zkSNARK Provers

USENIX Security '23 - Eos: Efficient Private Delegation of zkSNARK Provers

USENIX Security

USENIX Security '23 - No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using...

USENIX Security '23 - No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using...

USENIX Security

USENIX Security '23 - Know Your Cybercriminal: Evaluating Attacker Preferences by Measuring...

USENIX Security '23 - Know Your Cybercriminal: Evaluating Attacker Preferences by Measuring...

USENIX Security

USENIX Security '23 - Adversarial Training for Raw-Binary Malware Classifiers

USENIX Security '23 - Adversarial Training for Raw-Binary Malware Classifiers

USENIX Security

USENIX Security '23 - A comprehensive, formal and automated analysis of the EDHOC protocol

USENIX Security '23 - A comprehensive, formal and automated analysis of the EDHOC protocol

USENIX Security

USENIX Security '23 - Internet Service Providers' and Individuals' Attitudes, Barriers, and...

USENIX Security '23 - Internet Service Providers' and Individuals' Attitudes, Barriers, and...

USENIX Security

USENIX Security '23 - "Un-Equal Online Safety?" A Gender Analysis of Security and Privacy...

USENIX Security '23 - "Un-Equal Online Safety?" A Gender Analysis of Security and Privacy...

USENIX Security

USENIX Security '23 - “To Do This Properly, You Need More Resources”: The Hidden Costs of...

USENIX Security '23 - “To Do This Properly, You Need More Resources”: The Hidden Costs of...

USENIX Security

USENIX Security '23 - "If I could do this, I feel anyone could:" The Design and Evaluation...

USENIX Security '23 - "If I could do this, I feel anyone could:" The Design and Evaluation...

USENIX Security

USENIX Security '23 - Going through the motions: AR/VR keylogging from user head motions

USENIX Security '23 - Going through the motions: AR/VR keylogging from user head motions

USENIX Security

USENIX Security '23 - Unique Identification of 50,000+ Virtual Reality Users from Head & Hand...

USENIX Security '23 - Unique Identification of 50,000+ Virtual Reality Users from Head & Hand...

USENIX Security

USENIX Security '23 - “Millions of people are watching you”: Understanding the Digital-Safety...

USENIX Security '23 - “Millions of people are watching you”: Understanding the Digital-Safety...

USENIX Security

USENIX Security '23 - Fairness Properties of Face Recognition and Obfuscation Systems

USENIX Security '23 - Fairness Properties of Face Recognition and Obfuscation Systems

USENIX Security

USENIX Security '23 - Reusable Enclaves for Confidential Serverless Computing

USENIX Security '23 - Reusable Enclaves for Confidential Serverless Computing

USENIX Security

USENIX Security '24 - Finding Traceability Attacks in the Bluetooth Low Energy Specification...

USENIX Security '24 - Finding Traceability Attacks in the Bluetooth Low Energy Specification...

Finding Traceability Attacks in the Bluetooth Low Energy Specification and Its Implementations Jianliang Wu, Purdue University ...

USENIX Security '23 - Watch your Watch: Inferring Personality Traits from Wearable Activity Trackers

USENIX Security '23 - Watch your Watch: Inferring Personality Traits from Wearable Activity Trackers

USENIX Security

USENIX Security '14 - SSOScan: Automated Testing of Web Applications for Single Sign-On

USENIX Security '14 - SSOScan: Automated Testing of Web Applications for Single Sign-On

SSOScan: Automated Testing of Web Applications for Single Sign-On Vulnerabilities Yuchen Zhou and David Evans, University of ...

USENIX Security '23 - The Digital-Safety Risks of Financial Technologies for Survivors of...

USENIX Security '23 - The Digital-Safety Risks of Financial Technologies for Survivors of...

USENIX Security

USENIX Security '24 - I/O-Efficient Dynamic Searchable Encryption meets Forward & Backward Privacy

USENIX Security '24 - I/O-Efficient Dynamic Searchable Encryption meets Forward & Backward Privacy

I/O-