USENIX Security ’23 - Soumyakant Priyadarshan, Huan Nguyen, Rohit Chouhan, and R. Sekar - SAFER: Efficient and Error-Tolerant Binary Instrumentation
Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.
USENIX Security ’23 - Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against Data-Oriented Attacks
Authors/Presenters: Salman Ahmed, Hans Liljestrand, Hani Jamjoom, Matthew Hicks, N. Asokan, Danfeng (Daphne) Yao
Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.
USENIX Security ’23 - Peiwei Hu, Ruigang Liang, Ying Cao, Kai Chen, Runze Zhang - AURC: Detecting Errors in Program Code and Documentation
Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.
USENIX Security ’23 - Hengkai Ye, Song Liu, Zhechang Zhang, and Hong Hu - VIPER: Spotting Syscall-Guard Variables for Data-Only Attacks
Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.
USENIX Security ’23 - Hengkai Ye, Song Liu, Zhechang Zhang, and Hong Hu - VIPER: Spotting Syscall-Guard Variables for Data-Only Attacks
Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.
USENIX Security ’23 - Wen Li, Jinyang Ruan, Guangbei Yi, Long Cheng, Xiapu Luo, Haipeng Cai - PolyFuzz: Holistic Greybox Fuzzing of Multi-Language Systems
Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.
USENIX Security ’23 - Chen Chen, Rahul Kande, Nathan Nguyen, Flemming Andersen, and Aakash Tyagi, Ahmad-Reza Sadeghi, Jeyavijayan Rajendran - HyPFuzz: Formal-Assisted Processor Fuzzing
Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.
USENIX Security ’23 - FISHFUZZ: Catch Deeper Bugs by Throwing Larger Nets
Authors/Presenters: Han Zheng, Jiayuan Zhang, Yuhang Huang, Zezhong Ren, He Wang, Chunjie Cao, Yuqing Zhang, Flavio Toffalini, Mathias Payer
Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.
USENIX Security ’23 - Yongheng Chen, Rui Zhong, Yupeng Yang, Hong Hu, Dinghao Wu, Wenke Lee - µFUZZ: Redesign Of Parallel Fuzzing Using Microservice Architecture
Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.
USENIX Security ’23 - MorFuzz: Fuzzing Processor Via Runtime Instruction Morphing enhanced Synchronizable Co-simulation
Authors/Presenters: Jinyan Xu, Yiyuan Liu, Sirui He, Haoran Lin, Yajin Zhou, Cong Wang
Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.
USENIX Security ’23 - Kenneth G. Paterson, Matteo Scarlata, Kien Tuong Truong - Three Lessons From Threema: Analysis of a Secure Messenger →
Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.
USENIX Security ’23 - Anrin Chakraborti, Duke University; Darius Suciu, Radu Sion - Wink: Deniable Secure Messaging →
Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.
USENIX Security ’23 - David Balbás, Daniel Collins, Serge Vaudenay - Cryptographic Administration for Secure Group Messaging →
Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.