Multimedia

Search results

    TitleConferenceSpeaker(s)
    Let’s Hash: Helping Developers with Password SecuritySOUPS 2022Lisa Geierhaas, Anna-Marie Ortloff, Matthew Smith, Alena Naiakshina
    Not that Simple: Email Delivery in the 21st CenturyUSENIX ATC '22Florian Holzbauer, Johanna Ullrich, Martina Lindorfer, Tobias Fiebig
    SYMSAN: Time and Space Efficient Concolic Execution via Dynamic Data-flow AnalysisUSENIX Security '22Ju Chen, Wookhyun Han, Mingjun Yin, Haochen Zeng, Chengyu Song, Byoungyoung Lee, Heng Yin, Insik Shin
    ALASTOR: Reconstructing the Provenance of Serverless IntrusionsUSENIX Security '22Pubali Datta, Isaac Polinsky, Muhammad Adil Inam, Adam Bates, William Enck
    A Large-scale and Longitudinal Measurement Study of DKIM DeploymentUSENIX Security '22Chuhan Wang, Kaiwen Shen, Minglei Guo, Yuxuan Zhao, Mingming Zhang, Jianjun Chen, Baojun Liu, Xiaofeng Zheng, Haixin Duan, Yanzhong Lin, Qingfeng Pan
    Understanding and Improving Usability of Data Dashboards for Simplified Privacy Control of Voice Assistant DataUSENIX Security '22Vandit Sharma, Mainack Mondal
    Exploring the Unchartered Space of Container Registry TyposquattingUSENIX Security '22Guannan Liu, Xing Gao, Haining Wang, Kun Sun
    Primo: Practical Learning-Augmented Systems with Interpretable ModelsUSENIX ATC '22Qinghao Hu, Harsha Nori, Peng Sun, Yonggang Wen, Tianwei Zhang
    Detecting Logical Bugs of DBMS with Coverage-based GuidanceUSENIX Security '22Yu Liang, Song Liu, Hong Hu
    Rolling Colors: Adversarial Laser Exploits against Traffic Light RecognitionUSENIX Security '22Chen Yan, Zhijian Xu, Zhanyuan Yin, Xiaoyu Ji, Wenyuan Xu
    Mistrust Plugins You Must: A Large-Scale Study Of Malicious Plugins In WordPress MarketplacesUSENIX Security '22Ranjita Pai Kasturi, Jonathan Fuller, Yiting Sun, Omar Chabklo, Andres Rodriguez, Jeman Park, Brendan Saltaformaggio
    Elasticlave: An Efficient Memory Model for EnclavesUSENIX Security '22Jason Zhijingcheng Yu, Shweta Shinde, Trevor E. Carlson, Prateek Saxena
    Understanding and Reducing Online Misinformation Across 16 Countries on Six ContinentsSOUPS 2022David Rand
    Evaluating the Usability of Privacy Choice MechanismsSOUPS 2022Hana Habib, Lorrie Faith Cranor
    Understanding Non-Experts’ Security- and Privacy-Related Questions on a Q&A SiteSOUPS 2022Ayako A. Hasegawa, Naomi Yamashita, Tatsuya Mori, Daisuke Inoue, Mitsuaki Akiyama
    An Empirical Study of a Decentralized Identity Wallet: Usability, Security, and Perspectives on User ControlSOUPS 2022Maina Korir, Simon Parkin, Paul Dunphy
    Experimental Security Analysis of the App Model in Business Collaboration PlatformsUSENIX Security '22Yunang Chen, Yue Gao, Nick Ceccio, Rahul Chatterjee, Kassem Fawaz, Earlence Fernandes
    Loki: Hardening Code Obfuscation Against Automated AttacksUSENIX Security '22Moritz Schloegel, Tim Blazytko, Moritz Contag, Cornelius Aschermann, Julius Basler, Thorsten Holz, Ali Abbasi
    MundoFuzz: Hypervisor Fuzzing with Statistical Coverage Testing and Grammar InferenceUSENIX Security '22Cheolwoo Myung, Gwangmu Lee, Byoungyoung Lee
    Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among Experts and Non-Experts in a Corporate ContextUSENIX Security '22Veroniek Binkhorst, Tobias Fiebig, Katharina Krombholz, Wolter Pieters, Katsiaryna Labunets
    Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered HandUSENIX Security '22Matteo Cardaioli, Stefano Cecconello, Mauro Conti, Simone Milani, Stjepan Picek, Eugen Saraci
    LinKRID: Vetting Imbalance Reference Counting in Linux kernel with Symbolic ExecutionUSENIX Security '22Jian Liu, Lin Yi, Weiteng Chen, Chengyu Song, Zhiyun Qian, Qiuping Yi
    Jenny: Securing Syscalls for PKU-based Memory Isolation SystemsUSENIX Security '22David Schrammel, Samuel Weiser, Richard Sadek, Stefan Mangard
    Owl: Scale and Flexibility in Distribution of Hot ContentOSDI '22Jason Flinn, Xianzheng Dou, Arushi Aggarwal, Alex Boyko, Francois Richard, Eric Sun, Wendy Tobagus, Nick Wolchko, Fang Zhou
    Automatic Recovery of Fine-grained Compiler Artifacts at the Binary LevelUSENIX ATC '22Yufei Du, Ryan Court, Kevin Snow, Fabian Monrose

Pages