USENIX Security '18 - Precise and Accurate Patch Presence Test for Binaries

USENIX Security '18 - Precise and Accurate Patch Presence Test for BinariesПодробнее

USENIX Security '18 - Precise and Accurate Patch Presence Test for Binaries

USENIX Security '18 - The Broken Shield: Measuring Revocation Effectiveness...Подробнее

USENIX Security '18 - The Broken Shield: Measuring Revocation Effectiveness...

USENIX Security '18 - From Patching Delays to Infection Symptoms...Подробнее

USENIX Security '18 - From Patching Delays to Infection Symptoms...

USENIX Security '18 - Understanding the Reproducibility of Crowd-reported Security VulnerabilitiesПодробнее

USENIX Security '18 - Understanding the Reproducibility of Crowd-reported Security Vulnerabilities

USENIX Security '18 - ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands...Подробнее

USENIX Security '18 - ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands...

USENIX Security '20 - BScout: Direct Whole Patch Presence Test for Java ExecutablesПодробнее

USENIX Security '20 - BScout: Direct Whole Patch Presence Test for Java Executables

USENIX Security '14 - Blanket Execution: Dynamic Similarity Testing for Program BinariesПодробнее

USENIX Security '14 - Blanket Execution: Dynamic Similarity Testing for Program Binaries

USENIX Security '18 - A4NT: Author Attribute Anonymity by Adversarial Training...Подробнее

USENIX Security '18 - A4NT: Author Attribute Anonymity by Adversarial Training...

USENIX Security '18 - Formal Security Analysis of Neural Networks using Symbolic IntervalsПодробнее

USENIX Security '18 - Formal Security Analysis of Neural Networks using Symbolic Intervals

USENIX Security '18 - Dependence-Preserving Data Compaction for Scalable Forensic AnalysisПодробнее

USENIX Security '18 - Dependence-Preserving Data Compaction for Scalable Forensic Analysis

USENIX Security '24 - Mudjacking: Patching Backdoor Vulnerabilities in Foundation ModelsПодробнее

USENIX Security '24 - Mudjacking: Patching Backdoor Vulnerabilities in Foundation Models

USENIX Security '14 - A Large-Scale Analysis of the Security of Embedded FirmwaresПодробнее

USENIX Security '14 - A Large-Scale Analysis of the Security of Embedded Firmwares

USENIX Security '18 - IMIX: In-Process Memory Isolation EXtensionПодробнее

USENIX Security '18 - IMIX: In-Process Memory Isolation EXtension

USENIX Security '18 - Dependence-Preserving Data Compaction for Scalable Forensic AnalysisПодробнее

USENIX Security '18 - Dependence-Preserving Data Compaction for Scalable Forensic Analysis

USENIX Security '20 - MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability SignaturesПодробнее

USENIX Security '20 - MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures

USENIX Security '21 - PatchGuard: A Provably Robust Defense against Adversarial Patches via SmallПодробнее

USENIX Security '21 - PatchGuard: A Provably Robust Defense against Adversarial Patches via Small

USENIX Security '22 - GPU-accelerated PIR with Client-Independent Preprocessing for Large-ScaleПодробнее

USENIX Security '22 - GPU-accelerated PIR with Client-Independent Preprocessing for Large-Scale

USENIX Security '20 - High Accuracy and High Fidelity Extraction of Neural NetworksПодробнее

USENIX Security '20 - High Accuracy and High Fidelity Extraction of Neural Networks