Media Summary: We also provided directions for future research in ML model extraction security. View the full Rollercoaster: An Efficient Group-Multicast Scheme for Mix Networks Daniel Hugenroth, Martin Kleppmann, and Alastair R.

Usenix Security 24 Two Shuffles - Detailed Analysis & Overview

We also provided directions for future research in ML model extraction security. View the full Rollercoaster: An Efficient Group-Multicast Scheme for Mix Networks Daniel Hugenroth, Martin Kleppmann, and Alastair R.

Photo Gallery

USENIX Security '24 - Two Shuffles Make a RAM: Improved Constant Overhead Zero Knowledge RAM
USENIX Security '24 - SoK: All You Need to Know About On-Device ML Model Extraction - The Gap...
USENIX Security '24 - ChainPatrol: Balancing Attack Detection and Classification with Performance...
USENIX Security '24 - SWOOSH: Efficient Lattice-Based Non-Interactive Key Exchange
USENIX Security '24 - Fast RS-IOP Multivariate Polynomial Commitments and Verifiable Secret Sharing
USENIX Security '24 - You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise Networks
USENIX Security '24 - Finding Traceability Attacks in the Bluetooth Low Energy Specification...
USENIX Security '24 - SoK: The Good, The Bad, and The Unbalanced: Measuring Structural Limitations..
USENIX Security '24 - SoK: Security of Programmable Logic Controllers
USENIX Security '24 - VOGUES: Validation of Object Guise using Estimated Components
USENIX Security '24 - Scalable Multi-Party Computation Protocols for Machine Learning in the...
USENIX Security '24 - SledgeHammer: Amplifying Rowhammer via Bank-level Parallelism
View Detailed Profile
USENIX Security '24 - Two Shuffles Make a RAM: Improved Constant Overhead Zero Knowledge RAM

USENIX Security '24 - Two Shuffles Make a RAM: Improved Constant Overhead Zero Knowledge RAM

Two Shuffles

USENIX Security '24 - SoK: All You Need to Know About On-Device ML Model Extraction - The Gap...

USENIX Security '24 - SoK: All You Need to Know About On-Device ML Model Extraction - The Gap...

We also provided directions for future research in ML model extraction security. View the full

USENIX Security '24 - ChainPatrol: Balancing Attack Detection and Classification with Performance...

USENIX Security '24 - ChainPatrol: Balancing Attack Detection and Classification with Performance...

View the full

USENIX Security '24 - SWOOSH: Efficient Lattice-Based Non-Interactive Key Exchange

USENIX Security '24 - SWOOSH: Efficient Lattice-Based Non-Interactive Key Exchange

View the full

USENIX Security '24 - Fast RS-IOP Multivariate Polynomial Commitments and Verifiable Secret Sharing

USENIX Security '24 - Fast RS-IOP Multivariate Polynomial Commitments and Verifiable Secret Sharing

View the full

USENIX Security '24 - You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise Networks

USENIX Security '24 - You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise Networks

View the full

USENIX Security '24 - Finding Traceability Attacks in the Bluetooth Low Energy Specification...

USENIX Security '24 - Finding Traceability Attacks in the Bluetooth Low Energy Specification...

View the full

USENIX Security '24 - SoK: The Good, The Bad, and The Unbalanced: Measuring Structural Limitations..

USENIX Security '24 - SoK: The Good, The Bad, and The Unbalanced: Measuring Structural Limitations..

View the full

USENIX Security '24 - SoK: Security of Programmable Logic Controllers

USENIX Security '24 - SoK: Security of Programmable Logic Controllers

View the full

USENIX Security '24 - VOGUES: Validation of Object Guise using Estimated Components

USENIX Security '24 - VOGUES: Validation of Object Guise using Estimated Components

View the full

USENIX Security '24 - Scalable Multi-Party Computation Protocols for Machine Learning in the...

USENIX Security '24 - Scalable Multi-Party Computation Protocols for Machine Learning in the...

View the full

USENIX Security '24 - SledgeHammer: Amplifying Rowhammer via Bank-level Parallelism

USENIX Security '24 - SledgeHammer: Amplifying Rowhammer via Bank-level Parallelism

View the full

USENIX Security '21 - Effect of Mood, Location, Trust, and Presence of Others on Video-Based...

USENIX Security '21 - Effect of Mood, Location, Trust, and Presence of Others on Video-Based...

USENIX Security

USENIX Security '24 - "What Keeps People Secure is That They Met The Security Team":...

USENIX Security '24 - "What Keeps People Secure is That They Met The Security Team":...

View the full

USENIX Security '24 - Adversarial Illusions in Multi-Modal Embeddings

USENIX Security '24 - Adversarial Illusions in Multi-Modal Embeddings

View the full

USENIX Security '21 - Rollercoaster: An Efficient Group-Multicast Scheme for Mix Networks

USENIX Security '21 - Rollercoaster: An Efficient Group-Multicast Scheme for Mix Networks

Rollercoaster: An Efficient Group-Multicast Scheme for Mix Networks Daniel Hugenroth, Martin Kleppmann, and Alastair R.

USENIX Security '24 - A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for...

USENIX Security '24 - A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for...

View the full

USENIX Security '23 - Machine-checking Multi-Round Proofs of Shuffle: Terelius-Wikstrom and...

USENIX Security '23 - Machine-checking Multi-Round Proofs of Shuffle: Terelius-Wikstrom and...

USENIX Security

USENIX Security '24 - SHiFT: Semi-hosted Fuzz Testing for Embedded Applications

USENIX Security '24 - SHiFT: Semi-hosted Fuzz Testing for Embedded Applications

View the full

USENIX Security '24 - Dancer in the Dark: Synthesizing and Evaluating Polyglots for Blind...

USENIX Security '24 - Dancer in the Dark: Synthesizing and Evaluating Polyglots for Blind...

View the full