Quick Overview: SoK: Understanding zk-SNARKs: The Gap Between Research and Practice Junkai Liang and Daqi Hu, Peking University; Pengfei ... Gotta Detect 'Em All: Fake Base Station and Multi-Step Attack Detection in Cellular Networks Kazi Samin Mubasshir, Imtiaz Karim, ... Surviving in Dark Forest: Towards Evading the Attacks from Front-Running Bots in Application Layer Zuchao Ma, Muhui Jiang, ...
Usenix Security 25 A First - Detailed Overview & Context
SoK: Understanding zk-SNARKs: The Gap Between Research and Practice Junkai Liang and Daqi Hu, Peking University; Pengfei ... Gotta Detect 'Em All: Fake Base Station and Multi-Step Attack Detection in Cellular Networks Kazi Samin Mubasshir, Imtiaz Karim, ... Surviving in Dark Forest: Towards Evading the Attacks from Front-Running Bots in Application Layer Zuchao Ma, Muhui Jiang, ... Everything Old Is New Again: Legal Restrictions on Vulnerability Disclosure on Bug Bounty Platforms Kendra Albert, Albert Sellars ... ENG25519: Faster TLS 1.3 handshake using optimized X25519 and Ed25519 Jipeng Zhang, CCST, Nanjing University of ... Digital Product Safety: Rejecting Software as Magic Lisa LeVasseur The digital age is well underway, yet many still behave as if ...
An Industry Interview Study of Software Signing for Supply Chain BulletCT: Towards More Scalable Ring Confidential Transactions With Transparent Setup Nan Wang, CSIRO's Data61, Australia; ... Tracking You from a Thousand Miles Away! Turning a Bluetooth Device into an Apple AirTag Without Root Privileges Junming ... Securing Meta's Production PKI Credentials Ross Smith IV, Meta Platforms Meta's production infrastructure, which safeguards ... TORCHLIGHT: Shedding LIGHT on Real-World Attacks on Cloudless IoT Devices Concealed within the Tor Network Yumingzhi ... SelfDefend: LLMs Can Defend Themselves against Jailbreaking in a Practical Manner Xunguang Wang, Daoyuan Wu, Zhenlan Ji ...