News
Phishing affects everyone, but certain groups are at a higher risk of being phished than others. Prior research has pointed to language skills impacting phishing detection. We conducted a survey with ...
Large language models (LLMs) are rapidly being integrated across industries. Early research shows that these models have the potential to provide support in cybersecurity tasks like malware detection, ...
Red team exercises evaluate an organization’s security by simulating attacks based on real-world adversary techniques. Red team exercises typically involve three stakeholders: the red team that ...
Deepfake fraud—the use of AI-generated media to fabricate events for malicious purposes—threatens digital security, relationships, and public trust. This paper investigates individuals’ experiences ...
Governments have enacted age assurance regulations to prevent minors from accessing age-restricted content online, potentially creating barriers for adult users. This preliminary study empirically ...
Fraudsters often use the promise of free goods as a lure for victims who are convinced to complete online tasks but ultimately receive nothing. Despite much work characterizing these "giveaway scams," ...
Upcoming USENIX conferences, as well as events that are being held in cooperation with USENIX, are listed below. View USENIX's conference policies and resources and how we put them into practice at ...
Driving a car is an important part of daily life for most people in the United States. However, people have a limited understanding of the privacy risks associated with data collected in an automotive ...
As online education continues to grow, students increasingly navigate digital platforms that collect and share large amounts of data about them with almost no privacy protections or consent. Learning ...
Internet-wide network scanning has numerous security applications, including exposing new vulnerabilities and tracking the adoption of defensive mechanisms, but probing the entire public address space ...
Many research works have recently experimented with GPU to accelerate packet processing in network applications. Most works have shown that GPU brings a significant performance boost when it is ...
Current formal approaches have been successfully used to find design flaws in many security protocols. However, it is still challenging to automatically analyze protocols due to their large or ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results