One Size Does Not Fit All: Uncovering and Exploiting Cross Platform Discrepant {APIs} in {WeChat}

C Wang, Y Zhang, Z Lin - 32nd USENIX Security Symposium (USENIX …, 2023 - usenix.org
The past few years have witnessed a boom of mobile super apps, which are the apps
offering multiple services such as e-commerce, e-learning, and e-government via miniapps …

Graph collaborative signals denoising and augmentation for recommendation

Z Fan, K Xu, Z Dong, H Peng, J Zhang… - Proceedings of the 46th …, 2023 - dl.acm.org
Graph collaborative filtering (GCF) is a popular technique for capturing high-order
collaborative signals in recommendation systems. However, GCF's bipartite adjacency …

Escaping the confines of time: Continuous browser extension fingerprinting through ephemeral modifications

K Solomos, P Ilia, N Nikiforakis, J Polakis - Proceedings of the 2022 …, 2022 - dl.acm.org
Browser fingerprinting continues to proliferate across the web. Critically, popular
fingerprinting libraries have started incorporating extension-fingerprinting capabilities, thus …

A Study of {Multi-Factor} and {Risk-Based} Authentication Availability

A Gavazzi, R Williams, E Kirda, L Lu, A King… - 32nd USENIX Security …, 2023 - usenix.org
Password-based authentication (PBA) remains the most popular form of user authentication
on the web despite its long-understood insecurity. Given the deficiencies of PBA, many …

Mutual wasserstein discrepancy minimization for sequential recommendation

Z Fan, Z Liu, H Peng, PS Yu - Proceedings of the ACM Web Conference …, 2023 - dl.acm.org
Self-supervised sequential recommendation significantly improves recommendation
performance by maximizing mutual information with well-designed data augmentations …

Knowledge Expansion and Counterfactual Interaction for {Reference-Based} Phishing Detection

R Liu, Y Lin, Y Zhang, PH Lee, JS Dong - 32nd USENIX Security …, 2023 - usenix.org
Phishing attacks have been increasingly prevalent in recent years, significantly eroding
societal trust. As a state-of-the-art defense solution, reference-based phishing detection …

Fashion Faux Pas: Implicit Stylistic Fingerprints for Bypassing Browsers' Anti-Fingerprinting Defenses

X Lin, F Araujo, T Taylor, J Jang… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
Browser fingerprinting remains a topic of particular interest for both the research community
and the browser ecosystem, and various anti-fingerprinting countermeasures have been …

Account security interfaces: important, unintuitive, and untrustworthy

A Daffalla, M Bohuk, N Dell, R Bellini… - 32nd USENIX Security …, 2023 - usenix.org
Online services increasingly rely on user-facing interfaces to communicate important
security-related account information—for example, which devices are logged into a user's …

Understanding Users' Interaction with Login Notifications

P Markert, L Lassak, M Golla, M Dürmuth - Proceedings of the CHI …, 2024 - dl.acm.org
Login notifications intend to inform users about sign-ins and help them protect their accounts
from unauthorized access. Notifications are usually sent if a login deviates from previous …

The Double Edged Sword: Identifying Authentication Pages and their Fingerprinting Behavior

A Senol, A Ukani, D Cutler, I Bilogrevic - … of the ACM on Web Conference …, 2024 - dl.acm.org
Browser fingerprinting is often associated with cross-site user tracking, a practice that many
browsers (eg, Safari, Brave, Edge, Firefox, and Chrome) want to block. However, less is …