| Let’s Hash: Helping Developers with Password Security | SOUPS 2022 | Lisa Geierhaas, Anna-Marie Ortloff, Matthew Smith, Alena Naiakshina |
| Not that Simple: Email Delivery in the 21st Century | USENIX ATC '22 | Florian Holzbauer, Johanna Ullrich, Martina Lindorfer, Tobias Fiebig |
| SYMSAN: Time and Space Efficient Concolic Execution via Dynamic Data-flow Analysis | USENIX Security '22 | Ju Chen, Wookhyun Han, Mingjun Yin, Haochen Zeng, Chengyu Song, Byoungyoung Lee, Heng Yin, Insik Shin |
| ALASTOR: Reconstructing the Provenance of Serverless Intrusions | USENIX Security '22 | Pubali Datta, Isaac Polinsky, Muhammad Adil Inam, Adam Bates, William Enck |
| A Large-scale and Longitudinal Measurement Study of DKIM Deployment | USENIX Security '22 | Chuhan Wang, Kaiwen Shen, Minglei Guo, Yuxuan Zhao, Mingming Zhang, Jianjun Chen, Baojun Liu, Xiaofeng Zheng, Haixin Duan, Yanzhong Lin, Qingfeng Pan |
| Understanding and Improving Usability of Data Dashboards for Simplified Privacy Control of Voice Assistant Data | USENIX Security '22 | Vandit Sharma, Mainack Mondal |
| Exploring the Unchartered Space of Container Registry Typosquatting | USENIX Security '22 | Guannan Liu, Xing Gao, Haining Wang, Kun Sun |
| Primo: Practical Learning-Augmented Systems with Interpretable Models | USENIX ATC '22 | Qinghao Hu, Harsha Nori, Peng Sun, Yonggang Wen, Tianwei Zhang |
| Detecting Logical Bugs of DBMS with Coverage-based Guidance | USENIX Security '22 | Yu Liang, Song Liu, Hong Hu |
| Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition | USENIX Security '22 | Chen Yan, Zhijian Xu, Zhanyuan Yin, Xiaoyu Ji, Wenyuan Xu |
| Mistrust Plugins You Must: A Large-Scale Study Of Malicious Plugins In WordPress Marketplaces | USENIX Security '22 | Ranjita Pai Kasturi, Jonathan Fuller, Yiting Sun, Omar Chabklo, Andres Rodriguez, Jeman Park, Brendan Saltaformaggio |
| Elasticlave: An Efficient Memory Model for Enclaves | USENIX Security '22 | Jason Zhijingcheng Yu, Shweta Shinde, Trevor E. Carlson, Prateek Saxena |
| Understanding and Reducing Online Misinformation Across 16 Countries on Six Continents | SOUPS 2022 | David Rand |
| Evaluating the Usability of Privacy Choice Mechanisms | SOUPS 2022 | Hana Habib, Lorrie Faith Cranor |
| Understanding Non-Experts’ Security- and Privacy-Related Questions on a Q&A Site | SOUPS 2022 | Ayako A. Hasegawa, Naomi Yamashita, Tatsuya Mori, Daisuke Inoue, Mitsuaki Akiyama |
| An Empirical Study of a Decentralized Identity Wallet: Usability, Security, and Perspectives on User Control | SOUPS 2022 | Maina Korir, Simon Parkin, Paul Dunphy |
| Experimental Security Analysis of the App Model in Business Collaboration Platforms | USENIX Security '22 | Yunang Chen, Yue Gao, Nick Ceccio, Rahul Chatterjee, Kassem Fawaz, Earlence Fernandes |
| Loki: Hardening Code Obfuscation Against Automated Attacks | USENIX Security '22 | Moritz Schloegel, Tim Blazytko, Moritz Contag, Cornelius Aschermann, Julius Basler, Thorsten Holz, Ali Abbasi |
| MundoFuzz: Hypervisor Fuzzing with Statistical Coverage Testing and Grammar Inference | USENIX Security '22 | Cheolwoo Myung, Gwangmu Lee, Byoungyoung Lee |
| Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among Experts and Non-Experts in a Corporate Context | USENIX Security '22 | Veroniek Binkhorst, Tobias Fiebig, Katharina Krombholz, Wolter Pieters, Katsiaryna Labunets |
| Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand | USENIX Security '22 | Matteo Cardaioli, Stefano Cecconello, Mauro Conti, Simone Milani, Stjepan Picek, Eugen Saraci |
| LinKRID: Vetting Imbalance Reference Counting in Linux kernel with Symbolic Execution | USENIX Security '22 | Jian Liu, Lin Yi, Weiteng Chen, Chengyu Song, Zhiyun Qian, Qiuping Yi |
| Jenny: Securing Syscalls for PKU-based Memory Isolation Systems | USENIX Security '22 | David Schrammel, Samuel Weiser, Richard Sadek, Stefan Mangard |
| Owl: Scale and Flexibility in Distribution of Hot Content | OSDI '22 | Jason Flinn, Xianzheng Dou, Arushi Aggarwal, Alex Boyko, Francois Richard, Eric Sun, Wendy Tobagus, Nick Wolchko, Fang Zhou |
| Automatic Recovery of Fine-grained Compiler Artifacts at the Binary Level | USENIX ATC '22 | Yufei Du, Ryan Court, Kevin Snow, Fabian Monrose |