Reading view

There are new articles available, click to refresh the page.

USENIX Security ’23 – Catch You and I Can: Revealing Source Voiceprint Against Voice Conversion

Authors/Presenters:Jiangyi Deng, Yanjiao Chen, Yinan Zhong, Qianhao Miao, Xueluan Gong, Wenyuan Xu

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – Catch You and I Can: Revealing Source Voiceprint Against Voice Conversion appeared first on Security Boulevard.

USENIX Security ’23 – Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations

Distinguished Paper Award Winner

Authors/Presenters:Tadayoshi Kohno, Yasemin Acar, Wulf Loh

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations appeared first on Security Boulevard.

USENIX Security ’23 – A Two-Decade Retrospective Analysis of a University’s Vulnerability to Attacks Exploiting Reused Passwords

Distinguished Paper Award Winner

Authors/Presenters: Alexandra Nisenoff, Maximilian Golla, Miranda Wei, Juliette Hainline, Hayley Szymanek, Annika Braun, Annika Hildebrandt, Blair Christensen, David Langenberg

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – A Two-Decade Retrospective Analysis of a University’s Vulnerability to Attacks Exploiting Reused Passwords appeared first on Security Boulevard.

USENIX Security ’23 – No More Reviewer #2: Subverting Automatic Paper-Reviewer Assignment Using Adversarial Learning

Authors/Presenters:Thorsten Eisenhofer, Erwin Quiring, Jonas Möller, Doreen Riepel, Thorsten Holz, Konrad Rieck

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – No More Reviewer #2: Subverting Automatic Paper-Reviewer Assignment Using Adversarial Learning appeared first on Security Boulevard.

USENIX Security ’23 – Educators’ Perspectives of Using (or Not Using) Online Exam Proctoring

Authors/Presenters: David G. Balash, Elena Korkes, Miles Grant, Adam J. Aviv, Rahel A. Fainchtein, Micah Sherr

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – Educators’ Perspectives of Using (or Not Using) Online Exam Proctoring appeared first on Security Boulevard.

USENIX Security ’23 – “I’m Going To Trust This Until It Burns Me” Parents’ Privacy Concerns and Delegation of Trust in K-8 Educational Technology

Authors/Presenters: Victoria Zhong, Susan McGregor, Rachel Greenstadt

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – “I’m Going To Trust This Until It Burns Me” Parents’ Privacy Concerns and Delegation of Trust in K-8 Educational Technology appeared first on Security Boulevard.

USENIX Security ’23 – Uncontained: Uncovering Container Confusion in the Linux Kernel

Authors/Presenters: Jakob Koschel, Pietro Borrello, Daniele Cono D'Elia, Herbert Bos. Cristiano Giuffrida

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – Uncontained: Uncovering Container Confusion in the Linux Kernel appeared first on Security Boulevard.

USENIX Security ’23 – KextFuzz: Fuzzing macOS Kernel EXTensions on Apple Silicon via Exploiting Mitigations

Authors/Presenters: Tingting Yin, Zicong Gao, Zhenghang Xiao, Zheyu Ma, Min Zheng, Chao Zhang

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – KextFuzz: Fuzzing macOS Kernel EXTensions on Apple Silicon via Exploiting Mitigations appeared first on Security Boulevard.

USENIX Security ’23 – FirmSolo: Enabling Dynamic Analysis Of Binary Linux-Based IoT Kernel Modules

Authors/Presenters:Ioannis Angelakopoulos, Gianluca Stringhini, Manuel Egele

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – FirmSolo: Enabling Dynamic Analysis Of Binary Linux-Based IoT Kernel Modules appeared first on Security Boulevard.

USENIX Security ’23 – ACTOR: Action-Guided Kernel Fuzzing

Authors/Presenters:Marius Fleischer, Dipanjan Das, Priyanka Bose, Weiheng Bai, Kangjie Lu, Mathias Payer, Christopher Kruegel, Giovanni Vigna

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – ACTOR: Action-Guided Kernel Fuzzing appeared first on Security Boulevard.

USENIX Security ’23 – BoKASAN: Binary-only Kernel Address Sanitizer for Effective Kernel Fuzzing

Authors/Presenters:Mingi Cho, Dohyeon An, Hoyong Jin, Taekyoung Kwon

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – BoKASAN: Binary-only Kernel Address Sanitizer for Effective Kernel Fuzzing appeared first on Security Boulevard.

USENIX Security ’23 – AIFORE: Smart Fuzzing Based on Automatic Input Format Reverse Engineering

Authors/Presenters:Ji Shi, Zhun Wang, Zhiyao Feng, Yang Lan, Shisong Qin, Wei You, Wei Zou, Mathias Payer, Chao Zhang

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

The post USENIX Security ’23 – AIFORE: Smart Fuzzing Based on Automatic Input Format Reverse Engineering appeared first on Security Boulevard.

USENIX Security ’23 – DynSQL: Stateful Fuzzing for Database Management Systems with Complex and Valid SQL Query Generation

Authors/Presenters:Zu-Ming Jiang, Jia-Ju Bai, Zhendong Su

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – DynSQL: Stateful Fuzzing for Database Management Systems with Complex and Valid SQL Query Generation appeared first on Security Boulevard.

USENIX Security ’23 – No Linux, No Problem: Fast and Correct Windows Binary Fuzzing via Target-embedded Snapshotting

Authors/Presenters:Leo Stone, Rishi Ranjan, Stefan Nagy, Matthew Hicks

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – No Linux, No Problem: Fast and Correct Windows Binary Fuzzing via Target-embedded Snapshotting appeared first on Security Boulevard.

USENIX Security ’23 – Extended Hell(o): A Comprehensive Large-Scale Study on Email Confidentiality and Integrity Mechanisms in the Wild

Authors/Presenters:Birk Blechschmidt, Ben Stock

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – Extended Hell(o): A Comprehensive Large-Scale Study on Email Confidentiality and Integrity Mechanisms in the Wild appeared first on Security Boulevard.

USENIX Security ’23 – We Really Need to Talk About Session Tickets: A Large-Scale Analysis of Cryptographic Dangers with TLS Session Tickets

Authors/Presenters:Sven Hebrok, Simon Nachtigall, Marcel Maehren, Nurullah Erinola, Robert Merget, Juraj Somorovsky, Jörg Schwenk

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – We Really Need to Talk About Session Tickets: A Large-Scale Analysis of Cryptographic Dangers with TLS Session Tickets appeared first on Security Boulevard.

USENIX Security ’23 – Exploring the Unknown DTLS Universe: Analysis of the DTLS Server Ecosystem on the Internet

Authors/Presenters:Nurullah Erinola, Marcel Maehren, Robert Merget, Juraj Somorovsky, Jörg Schwenk

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – Exploring the Unknown DTLS Universe: Analysis of the DTLS Server Ecosystem on the Internet appeared first on Security Boulevard.

USENIX Security ’23 – Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet

Authors/Presenters:Tomas Hlavacek, Haya Shulman, Niklas Vogel, Michael Waidner

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet appeared first on Security Boulevard.

USENIX Security ’23 – HOLMES: Efficient Distribution Testing for Secure Collaborative Learning

Authors/Presenters:Ian Chang, Katerina Sotiraki, Weikeng Chen, Murat Kantarcioglu, Raluca Popa

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – HOLMES: Efficient Distribution Testing for Secure Collaborative Learning appeared first on Security Boulevard.

USENIX Security ’23 – ACORN: Input Validation for Secure Aggregati

Authors/Presenters:James Bell, Adrià Gascón, Tancrède Lepoint, Baiyu Li, Sarah Meiklejohn, Mariana Raykova, Cathie Yun

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – ACORN: Input Validation for Secure Aggregati appeared first on Security Boulevard.

USENIX Security ’23 – DiffSmooth: Certifiably Robust Learning via Diffusion Models and Local Smoothing

Authors/Presenters:Jiawei Zhang, Zhongzhu Chen, Huan Zhang, Chaowei Xiao, Bo Li

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – DiffSmooth: Certifiably Robust Learning via Diffusion Models and Local Smoothing appeared first on Security Boulevard.

USENIX Security ’23 – Precise and Generalized Robustness Certification for Neural Networks

Authors/Presenters:Yuanyuan Yuan, Shuai Wang, Zhendong Su

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – Precise and Generalized Robustness Certification for Neural Networks appeared first on Security Boulevard.

USENIX Security ’23 – CSHER: A System For Compact Storage With HE-Retrieval

Authors/Presenters:Adi Akavia, Neta Oren, Boaz Sapir, Margarita Vald

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – CSHER: A System For Compact Storage With HE-Retrieval appeared first on Security Boulevard.

USENIX Security ’23 – A Verified Confidential Computing As A Service Framework For Privacy Preservation

Authors/Presenters:Hongbo Chen, Haobin Hiroki Chen, Mingshen Sun, Kang Li, Zhaofeng Chen, XiaoFeng Wang

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – A Verified Confidential Computing As A Service Framework For Privacy Preservation appeared first on Security Boulevard.

USENIX Security ’23 – HECO: Fully Homomorphic Encryption Compiler

Authors/Presenters:Alexander Viand, Patrick Jattke, Miro Haller, Anwar Hithnawi

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – HECO: Fully Homomorphic Encryption Compiler appeared first on Security Boulevard.

USENIX Security ’23 – ELASM: Error-Latency-Aware Scale Management for Fully Homomorphic Encryption

Authors/Presenters:Yongwoo Lee, Seonyoung Cheon, Dongkwan Kim, Dongyoon Lee, Hanjun Kim

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – ELASM: Error-Latency-Aware Scale Management for Fully Homomorphic Encryption appeared first on Security Boulevard.

USENIX Security ’23 – “If Sighted People Know, I Should Be Able To Know:” Privacy Perceptions Of Bystanders With Visual Impairments Around Camera-Based Technology

Authors/Presenters:Yuhang Zhao, Yaxing Yao, Jiaru Fu, Nihan Zhou

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – “If Sighted People Know, I Should Be Able To Know:” Privacy Perceptions Of Bystanders With Visual Impairments Around Camera-Based Technology appeared first on Security Boulevard.

USENIX Security ’23 – “If Sighted People Know, I Should Be Able To Know:” Privacy Perceptions Of Bystanders With Visual Impairments Around Camera-Based Technology

Authors/Presenters:Yuhang Zhao, Yaxing Yao, Jiaru Fu, Nihan Zhou

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – “If Sighted People Know, I Should Be Able To Know:” Privacy Perceptions Of Bystanders With Visual Impairments Around Camera-Based Technology appeared first on Security Boulevard.

Security and Human Behavior (SHB) 2024

This week, I hosted the seventeenth Workshop on Security and Human Behavior at the Harvard Kennedy School. This is the first workshop since our co-founder, Ross Anderson, died unexpectedly.

SHB is a small, annual, invitational workshop of people studying various aspects of the human side of security. The fifty or so attendees include psychologists, economists, computer security researchers, criminologists, sociologists, political scientists, designers, lawyers, philosophers, anthropologists, geographers, neuroscientists, business school professors, and a smattering of others. It’s not just an interdisciplinary event; most of the people here are individually interdisciplinary...

The post Security and Human Behavior (SHB) 2024 appeared first on Security Boulevard.

USENIX Security ’23 – Examining Power Dynamics And User Privacy In Smart Technology Use Among Jordanian Households

Authors/Presenters:Wael Albayaydh, Ivan Flechais
Distinguished Paper Award Winner

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – Examining Power Dynamics And User Privacy In Smart Technology Use Among Jordanian Households appeared first on Security Boulevard.

Security and Human Behavior (SHB) 2024

This week, I hosted the seventeenth Workshop on Security and Human Behavior at the Harvard Kennedy School. This is the first workshop since our co-founder, Ross Anderson, died unexpectedly.

SHB is a small, annual, invitational workshop of people studying various aspects of the human side of security. The fifty or so attendees include psychologists, economists, computer security researchers, criminologists, sociologists, political scientists, designers, lawyers, philosophers, anthropologists, geographers, neuroscientists, business school professors, and a smattering of others. It’s not just an interdisciplinary event; most of the people here are individually interdisciplinary.

Our goal is always to maximize discussion and interaction. We do that by putting everyone on panels, and limiting talks to six to eight minutes, with the rest of the time for open discussion. Short talks limit presenters’ ability to get into the boring details of their work, and the interdisciplinary audience discourages jargon.

Since the beginning, this workshop has been the most intellectually stimulating two days of my professional year. It influences my thinking in different and sometimes surprising ways—and has resulted in some new friendships and unexpected collaborations. This is why some of us have been coming back every year for over a decade.

This year’s schedule is here. This page lists the participants and includes links to some of their work. Kami Vaniea liveblogged both days.

Here are my posts on the first, second, third, fourth, fifth, sixth, seventh, eighth, ninth, tenth, eleventh, twelfth, thirteenth, fourteenth, fifteenth and sixteenth SHB workshops. Follow those links to find summaries, papers, and occasionally audio/video recordings of the sessions. Ross maintained a good webpage of psychology and security resources—it’s still up for now.

Next year we will be in Cambridge, UK, hosted by Frank Stajano.

USENIX Security ’23 – Othered, Silenced and Scapegoated: Understanding the Situated Security of Marginalised Populations in Lebanon

Authors/Presenters:Jessica McClearn and Rikke Bjerg Jensen, Royal Holloway, Reem Talhouk

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – Othered, Silenced and Scapegoated: Understanding the Situated Security of Marginalised Populations in Lebanon appeared first on Security Boulevard.

USENIX Security ’23 – Medusa Attack: Exploring Security Hazards of In-App QR Code Scanning

Authors/Presenters:Xing Han, Yuheng Zhang, Xue Zhang, Zeyuan Chen, Mingzhe Wang, Yiwei Zhang, Siqi Ma, Yu Yu, Elisa Bertino, Juanru Li

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – Medusa Attack: Exploring Security Hazards of In-App QR Code Scanning appeared first on Security Boulevard.

USENIX Security ’23 – Near-Ultrasound Inaudible Trojan (Nuit): Exploiting Your Speaker to Attack Your Microphone

Authors/Presenters:Qi Xia, Qian Chen, Shouhuai Xu

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – Near-Ultrasound Inaudible Trojan (Nuit): Exploiting Your Speaker to Attack Your Microphone appeared first on Security Boulevard.

USENIX Security ’23 – Remote Attacks on Speech Recognition Systems Using Sound from Power Supply

Authors/Presenters:Lanqing Yang, Xinqi Chen, Xiangyong Jian, Leping Yang, Yijie Li, Qianfei Ren, Yi-Chao Chen, Guangtao Xue, Xiaoyu Ji

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – Remote Attacks on Speech Recognition Systems Using Sound from Power Supply appeared first on Security Boulevard.

USENIX Security ’23 – HOMESPY: The Invisible Sniffer of Infrared Remote Control of Smart TVs

Authors/Presenters:Kong Huang, YuTong Zhou, Ke Zhang, Jiacen Xu, Jiongyi Chen, Di Tang, Kehuan Zhang

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – HOMESPY: The Invisible Sniffer of Infrared Remote Control of Smart TVs appeared first on Security Boulevard.

USENIX Security ’23 – Systematic Assessment of Fuzzers using Mutation Analysis

Authors/Presenters: Philipp Görz, Björn Mathis, Keno Hassler, Emre Güler, Thorsten Holz, Andreas Zeller, Rahul Gopinath

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – Systematic Assessment of Fuzzers using Mutation Analysis appeared first on Security Boulevard.

USENIX Security ’23 – MINER: A Hybrid Data-Driven Approach for REST API Fuzzing

Authors/Presenters:Chenyang Lyu, Jiacheng Xu, Shouling Ji, Xuhong Zhang, Qinying Wang, Binbin Zhao, Gaoning Pan, Wei Cao, Peng Chen, Raheem Beyah

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – MINER: A Hybrid Data-Driven Approach for REST API Fuzzing appeared first on Security Boulevard.

USENIX Security ’23 – Automated Exploitable Heap Layout Generation for Heap Overflows Through Manipulation Distance-Guided Fuzzing

Authors/Presenters: Bin Zhang, Jiongyi Chen, Runhao Li, Chao Feng, Ruilin Li, Chaojing Tang

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – Automated Exploitable Heap Layout Generation for Heap Overflows Through Manipulation Distance-Guided Fuzzing appeared first on Security Boulevard.

USENIX Security ’23 – Bleem: Packet Sequence Oriented Fuzzing for Protocol Implementations

Authors/Presenters:Zhengxiong Luo, Junze Yu, Feilong Zuo, Jianzhong Liu, Yu Jiang, Ting Chen, Abhik Roychoudhury, Jiaguang Suny

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – Bleem: Packet Sequence Oriented Fuzzing for Protocol Implementations appeared first on Security Boulevard.

USENIX Security ’23 – Intender: Fuzzing Intent-Based Networking with Intent-State Transition Guidance

Authors/Presenters: Jiwon Kim, Benjamin E. Ujcich, Dave (Jing) Tian

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – Intender: Fuzzing Intent-Based Networking with Intent-State Transition Guidance appeared first on Security Boulevard.

USENIX Security ’23 – VeriZexe: Decentralized Private Computation with Universal Setup

Authors/Presenters:Alex Luoyuan Xiong, Binyi Chen, Zhenfei Zhang, Benedikt Bünz, Ben Fisch, Fernando Krell, Philippe Camacho

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – VeriZexe: Decentralized Private Computation with Universal Setup appeared first on Security Boulevard.

Ross Anderson

Ross Anderson unexpectedly passed away Thursday night in, I believe, his home in Cambridge.

I can’t remember when I first met Ross. Of course it was before 2008, when we created the Security and Human Behavior workshop. It was well before 2001, when we created the Workshop on Economics and Information Security. (Okay, he created both—I helped.) It was before 1998, when we wrote about the problems with key escrow systems. I was one of the people he brought to the Newton Institute, at Cambridge University, for the six-month cryptography residency program he ran (I mistakenly didn’t stay the whole time)—that was in 1996.

I know I was at the first Fast Software Encryption workshop in December 1993, another conference he created. There I presented the Blowfish encryption algorithm. Pulling an old first-edition of Applied Cryptography (the one with the blue cover) down from the shelf, I see his name in the acknowledgments. Which means that sometime in early 1993—probably at Eurocrypt in Lofthus, Norway—I, as an unpublished book author who had only written a couple of crypto articles for Dr. Dobb’s Journal, asked him to read and comment on my book manuscript. And he said yes. Which means I mailed him a paper copy. And he read it. And mailed his handwritten comments back to me. In an envelope with stamps. Because that’s how we did it back then.

I have known Ross for over thirty years, as both a colleague and a friend. He was enthusiastic, brilliant, opinionated, articulate, curmudgeonly, and kind. Pick up any of his academic papers—there are many—and odds are that you will find a least one unexpected insight. He was a cryptographer and security engineer, but also very much a generalist. He published on block cipher cryptanalysis in the 1990s, and the security of large-language models last year. He started conferences like nobody’s business. His masterwork book, Security Engineering—now in its third edition—is as comprehensive a tome on cybersecurity and related topics as you could imagine. (Also note his fifteen-lecture video series on that same page. If you have never heard Ross lecture, you’re in for a treat.) He was the first person to understand that security problems are often actually economic problems. He was the first person to make a lot of those sorts of connections. He fought against surveillance and backdoors, and for academic freedom. He didn’t suffer fools in either government or the corporate world.

He’s listed in the acknowledgments as a reader of every one of my books from Beyond Fear on. Recently, we’d see each other a couple of times a year: at this or that workshop or event. The last time I saw him was last June, at SHB 2023, in Pittsburgh. We were having dinner on Alessandro Acquisti‘s rooftop patio, celebrating another successful workshop. He was going to attend my Workshop on Reimagining Democracy in December, but he had to cancel at the last minute. (He sent me the talk he was going to give. I will see about posting it.) The day before he died, we were discussing how to accommodate everyone who registered for this year’s SHB workshop. I learned something from him every single time we talked. And I am not the only one.

My heart goes out to his wife Shireen and his family. We lost him much too soon.

EDITED TO ADD (4/10): I wrote a longer version for Communications of the ACM.

❌