Conferences

Search results

    TitleConferenceSpeaker(s)
    An Audit of Facebook's Political Ad Policy EnforcementUSENIX Security '22Victor Le Pochat, Laura Edelson, Tom Van Goethem, Wouter Joosen, Damon McCoy, Tobias Lauinger
    "How Do You Not Lose Friends?": Synthesizing a Design Space of Social Controls for Securing Shared Digital Resources Via Participatory Design JamsUSENIX Security '22Eyitemi Moju-Igbene, Hanan Abdi, Alan Lu, Sauvik Das
    AMD Prefetch Attacks through Power and TimeUSENIX Security '22Moritz Lipp, Daniel Gruss, Michael Schwarz
    Online Website Fingerprinting: Evaluating Website Fingerprinting Attacks on Tor in the Real WorldUSENIX Security '22Giovanni Cherubin, Rob Jansen, Carmela Troncoso
    "I feel invaded, annoyed, anxious and I may protect myself": Individuals' Feelings about Online Tracking and their Protective Behaviour across Gender and CountryUSENIX Security '22Kovila P.L. Coopamootoo, Maryam Mehrnezhad, Ehsan Toreini
    Mistrust Plugins You Must: A Large-Scale Study Of Malicious Plugins In WordPress MarketplacesUSENIX Security '22Ranjita Pai Kasturi, Jonathan Fuller, Yiting Sun, Omar Chabklo, Andres Rodriguez, Jeman Park, Brendan Saltaformaggio
    Web Cache Deception Escalates!USENIX Security '22Seyed Ali Mirheidari, Matteo Golinelli, Kaan Onarlioglu, Engin Kirda, Bruno Crispo
    Exploring the Unchartered Space of Container Registry TyposquattingUSENIX Security '22Guannan Liu, Xing Gao, Haining Wang, Kun Sun
    LinKRID: Vetting Imbalance Reference Counting in Linux kernel with Symbolic ExecutionUSENIX Security '22Jian Liu, Lin Yi, Weiteng Chen, Chengyu Song, Zhiyun Qian, Qiuping Yi
    Hiding in Plain Sight? On the Efficacy of Power Side Channel-Based Control Flow MonitoringUSENIX Security '22Yi Han, Matthew Chan, Zahra Aref, Nils Ole Tippenhauer, Saman Zonouz
    Secure Poisson RegressionUSENIX Security '22Mahimna Kelkar, Phi Hung Le, Mariana Raykova, Karn Seth
    Under the Hood of DANE Mismanagement in SMTPUSENIX Security '22Hyeonmin Lee, Md. Ishtiaq Ashiq, Moritz Müller, Roland van Rijswijk-Deij, Taekyoung "Ted" Kwon, Taejoong Chung
    The Dangers of Human Touch: Fingerprinting Browser Extensions through User ActionsUSENIX Security '22Konstantinos Solomos, Panagiotis Ilia, Soroush Karami, Nick Nikiforakis, Jason Polakis
    Poisoning Attacks to Local Differential Privacy Protocols for Key-Value DataUSENIX Security '22Yongji Wu, Xiaoyu Cao, Jinyuan Jia, Neil Zhenqiang Gong
    Breaking Bridgefy, again: Adopting libsignal is not enoughUSENIX Security '22Martin R. Albrecht, Raphael Eikenberg, Kenneth G. Paterson
    Many Roads Lead To Rome: How Packet Headers Influence DNS Censorship MeasurementUSENIX Security '22Abhishek Bhaskar, Paul Pearce
    Communication-Efficient Triangle Counting under Local Differential PrivacyUSENIX Security '22Jacob Imola, Takao Murakami, Kamalika Chaudhuri
    Seeing the Forest for the Trees: Understanding Security Hazards in the 3GPP Ecosystem through Intelligent Analysis on Change RequestsUSENIX Security '22Yi Chen, Di Tang, Yepeng Yao, Mingming Zha, XiaoFeng Wang, Xiaozhong Liu, Haixu Tang, Dongfang Zhao
    OS-Aware Vulnerability Prioritization via Differential Severity AnalysisUSENIX Security '22Qiushi Wu, Yue Xiao, Xiaojing Liao, Kangjie Lu
    OpenVPN is Open to VPN FingerprintingUSENIX Security '22Diwen Xue, Reethika Ramesh, Arham Jain, Michalis Kallitsis, J. Alex Halderman, Jedidiah R. Crandall, Roya Ensafi
    Binoculars: Contention-Based Side-Channel Attacks Exploiting the Page WalkerUSENIX Security '22Zirui Neil Zhao, Adam Morrison, Christopher W. Fletcher, Josep Torrellas
    Watching the watchers: bias and vulnerability in remote proctoring softwareUSENIX Security '22Ben Burgess, Avi Ginsberg, Edward W. Felten, Shaanan Cohney
    Pool Inference Attacks on Local Differential Privacy: Quantifying the Privacy Guarantees of Apple's Count Mean Sketch in PracticeUSENIX Security '22Andrea Gadotti, Florimond Houssiau, Meenatchi Sundaram Muthu Selva Annamalai, Yves-Alexandre de Montjoye
    The Antrim County 2020 Election Incident: An Independent Forensic InvestigationUSENIX Security '22J. Alex Halderman
    How Are Your Zombie Accounts? Understanding Users' Practices and Expectations on Mobile App Account DeletionUSENIX Security '22Yijing Liu, Yan Jia, Qingyin Tan, Zheli Liu, Luyi Xing

Pages