Media Summary: What Was Your Prompt? A Remote Keylogging

Usenix Security 23 Two In One A Model Hijacking Attack Against Text Generation Models - Detailed Analysis & Overview

What Was Your Prompt? A Remote Keylogging

Photo Gallery

USENIX Security '23 - Two-in-One: A Model Hijacking Attack Against Text Generation Models
USENIX Security '24 - Prompt Stealing Attacks Against Text-to-Image Generation Models
USENIX Security '23 - Jinn: Hijacking Safe Programs with Trojans
USENIX Security '23 - A Two-Decade Retrospective Analysis of a University's Vulnerability to...
USENIX Security '24 - Hijacking Attacks against Neural Network by Analyzing Training Data
USENIX Security '23 - Hard-label Black-box Universal Adversarial Patch Attack
USENIX Security '23 - Black-box Adversarial Example Attack towards FCG Based Android Malware...
USENIX Security '23 - Linear Private Set Union from Multi-Query Reverse Private Membership Test
USENIX Security '23 - Going through the motions: AR/VR keylogging from user head motions
USENIX Security '24 - What Was Your Prompt? A Remote Keylogging Attack on AI Assistants
USENIX Security '24 - EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection
USENIX Security '23 - Subverting Website Fingerprinting Defenses with Robust Traffic Representation
Sponsored
View Detailed Profile
USENIX Security '23 - Two-in-One: A Model Hijacking Attack Against Text Generation Models

USENIX Security '23 - Two-in-One: A Model Hijacking Attack Against Text Generation Models

USENIX Security

USENIX Security '24 - Prompt Stealing Attacks Against Text-to-Image Generation Models

USENIX Security '24 - Prompt Stealing Attacks Against Text-to-Image Generation Models

Prompt Stealing

USENIX Security '23 - Jinn: Hijacking Safe Programs with Trojans

USENIX Security '23 - Jinn: Hijacking Safe Programs with Trojans

USENIX Security

USENIX Security '23 - A Two-Decade Retrospective Analysis of a University's Vulnerability to...

USENIX Security '23 - A Two-Decade Retrospective Analysis of a University's Vulnerability to...

USENIX Security

USENIX Security '24 - Hijacking Attacks against Neural Network by Analyzing Training Data

USENIX Security '24 - Hijacking Attacks against Neural Network by Analyzing Training Data

Hijacking Attacks against

Sponsored
USENIX Security '23 - Hard-label Black-box Universal Adversarial Patch Attack

USENIX Security '23 - Hard-label Black-box Universal Adversarial Patch Attack

USENIX Security

USENIX Security '23 - Black-box Adversarial Example Attack towards FCG Based Android Malware...

USENIX Security '23 - Black-box Adversarial Example Attack towards FCG Based Android Malware...

USENIX Security

USENIX Security '23 - Linear Private Set Union from Multi-Query Reverse Private Membership Test

USENIX Security '23 - Linear Private Set Union from Multi-Query Reverse Private Membership Test

USENIX Security

USENIX Security '23 - Going through the motions: AR/VR keylogging from user head motions

USENIX Security '23 - Going through the motions: AR/VR keylogging from user head motions

USENIX Security

USENIX Security '24 - What Was Your Prompt? A Remote Keylogging Attack on AI Assistants

USENIX Security '24 - What Was Your Prompt? A Remote Keylogging Attack on AI Assistants

What Was Your Prompt? A Remote Keylogging

USENIX Security '24 - EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection

USENIX Security '24 - EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection

EaTVul: ChatGPT-based Evasion

USENIX Security '23 - Subverting Website Fingerprinting Defenses with Robust Traffic Representation

USENIX Security '23 - Subverting Website Fingerprinting Defenses with Robust Traffic Representation

USENIX Security

USENIX Security '23 - The Gates of Time: Improving Cache Attacks with Transient Execution

USENIX Security '23 - The Gates of Time: Improving Cache Attacks with Transient Execution

USENIX Security