Quick Overview: SoK: Understanding zk-SNARKs: The Gap Between Research and Practice Junkai Liang and Daqi Hu, Peking University; Pengfei ... Gotta Detect 'Em All: Fake Base Station and Multi-Step Attack Detection in Cellular Networks Kazi Samin Mubasshir, Imtiaz Karim, ... Surviving in Dark Forest: Towards Evading the Attacks from Front-Running Bots in Application Layer Zuchao Ma, Muhui Jiang, ...

Usenix Security 25 A First - Detailed Overview & Context

SoK: Understanding zk-SNARKs: The Gap Between Research and Practice Junkai Liang and Daqi Hu, Peking University; Pengfei ... Gotta Detect 'Em All: Fake Base Station and Multi-Step Attack Detection in Cellular Networks Kazi Samin Mubasshir, Imtiaz Karim, ... Surviving in Dark Forest: Towards Evading the Attacks from Front-Running Bots in Application Layer Zuchao Ma, Muhui Jiang, ... Everything Old Is New Again: Legal Restrictions on Vulnerability Disclosure on Bug Bounty Platforms Kendra Albert, Albert Sellars ... ENG25519: Faster TLS 1.3 handshake using optimized X25519 and Ed25519 Jipeng Zhang, CCST, Nanjing University of ... Digital Product Safety: Rejecting Software as Magic Lisa LeVasseur The digital age is well underway, yet many still behave as if ...

An Industry Interview Study of Software Signing for Supply Chain BulletCT: Towards More Scalable Ring Confidential Transactions With Transparent Setup Nan Wang, CSIRO's Data61, Australia; ... Tracking You from a Thousand Miles Away! Turning a Bluetooth Device into an Apple AirTag Without Root Privileges Junming ... Securing Meta's Production PKI Credentials Ross Smith IV, Meta Platforms Meta's production infrastructure, which safeguards ... TORCHLIGHT: Shedding LIGHT on Real-World Attacks on Cloudless IoT Devices Concealed within the Tor Network Yumingzhi ... SelfDefend: LLMs Can Defend Themselves against Jailbreaking in a Practical Manner Xunguang Wang, Daoyuan Wu, Zhenlan Ji ...

Photo Gallery

USENIX Security '25 - A First Look at Governments' Enterprise Security Guidance
USENIX Security '25 - Sometimes Simpler is Better: A Comprehensive Analysis of State-of-the-Art...
USENIX Security '25 - SoK: Understanding zk-SNARKs: The Gap Between Research and Practice
USENIX Security '25 - Gotta Detect 'Em All: Fake Base Station and Multi-Step Attack Detection...
USENIX Security '25 - Rowhammer-Based Trojan Injection: One Bit Flip Is Sufficient...
USENIX Security '25 - Surviving in Dark Forest: Towards Evading the Attacks from Front-Running Bots
USENIX Security '25 - Unsafe LLM-Based Search: Quantitative Analysis and Mitigation of Safety...
USENIX Security '25 - OwlC: Compiling Security Protocols to Verified, Secure...
USENIX Security '25 (Enigma Track) - Everything Old Is New Again: Legal Restrictions on...
USENIX Security '24 - ENG25519: Faster TLS 1.3 handshake using optimized X25519 and Ed25519
USENIX Security '25 - Demystifying the (In)Security of QR Code-based Login in Real-world Deployments
USENIX Security '25 (Enigma Track) - Digital Product Safety: Rejecting Software as Magic
Sponsored
Sponsored
View Main Result
Sponsored
Sponsored