Photo Gallery

USENIX Security '23 - The Case for Learned Provenance Graph Storage Systems
USENIX Security '23 - Automated Cookie Notice Analysis and Enforcement
USENIX Security '23 - Generative Intrusion Detection and Prevention on Data Stream
USENIX Security '23 - NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems
USENIX Security '23 - Examining Power Dynamics and User Privacy in Smart Technology Use Among...
USENIX Security '23 - No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using...
USENIX Security '23 - No Linux, No Problem: Fast and Correct Windows Binary Fuzzing via...
USENIX Security '23 - Long Live The Honey Badger: Robust Asynchronous DPSS and its Applications
USENIX Security '23 - A Two-Decade Retrospective Analysis of a University's Vulnerability to...
USENIX Security '23 - The Gates of Time: Improving Cache Attacks with Transient Execution
USENIX Security '23 - Towards a General Video-based Keystroke Inference Attack
USENIX Security '23 - How to Cover up Anomalous Accesses to Electronic Health Records