As voice communication becomes an essential part of modern life, the exposure of sensitive information through audio calls presents significant privacy risks. Malicious actors can gain access to this ...
NSDI '20 Tuesday Paper Archive (32MB ZIP, includes Proceedings front matter, errata, and attendee lists) NSDI '20 Wednesday Paper Archive (44 MB ZIP) NSDI '20 Thursday Paper Archive (59MB ZIP) ...
AI scaling laws reveal a consistent pattern: larger models and more compute often yield predictable accuracy gains and emergent capabilities [1]. These trends point toward a shared goal, pursuing ...
Diwen Xue, Reethika Ramesh, and Arham Jain, University of Michigan; Michalis Kallitsis, Merit Network, Inc.; J. Alex Halderman, University of Michigan; Jedidiah R. Crandall, Arizona State ...
National Cyber Security Strategies in the United States are largely influenced by the cybersecurity landscape of their time. Nevertheless, they often agree on broad areas of cyber that are important ...
Summary of main changes from previous editions USENIX Security '26 will no longer feature major revisions; papers will at most undergo a two-week shepherding process. Authors may submit at most seven ...
USENIX is committed to Open Access to the research presented at our events. Papers and proceedings are freely available to everyone once the event begins. Any video, audio, and/or slides that are ...
USENIX is committed to Open Access to the research presented at our events. Papers and proceedings are freely available to everyone once the event begins. Any video, audio, and/or slides that are ...
USENIX is committed to Open Access to the research presented at our events. Papers and proceedings are freely available to everyone once the event begins. Any video, audio, and/or slides that are ...
Figure 1: Flowchart for Exploiting Package Hallucinations. An attacker prompts an LLM for code (1) and the generated code contains a hallucinated package name (2). The attacker publishes a package ...
Philipp Moritz, Robert Nishihara, Stephanie Wang, Alexey Tumanov, Richard Liaw, Eric Liang, Melih Elibol, Zongheng Yang, William Paul, Michael I. Jordan, and Ion ...
Mostafa Elhemali, Niall Gallagher, Nicholas Gordon, Joseph Idziorek, Richard Krog, Colin Lazier, Erben Mo, Akhilesh Mritunjai, Somu Perianayagam ,Tim Rath, Swami ...