Conferences

Search results

    TitleConferenceSpeaker(s)
    Towards More Robust Keyword Spotting for Voice AssistantsUSENIX Security '22Shimaa Ahmed, Ilia Shumailov, Nicolas Papernot, Kassem Fawaz
    VerLoc: Verifiable Localization in Decentralized SystemsUSENIX Security '22Katharina Kohls, Claudia Diaz
    Omnes pro uno: Practical Multi-Writer Encrypted DatabaseUSENIX Security '22Jiafan Wang, Sherman S. M. Chow
    99% False Positives: A Qualitative Study of SOC Analysts' Perspectives on Security AlarmsUSENIX Security '22Bushra A. Alahmadi, Louise Axon, Ivan Martinovic
    RE-Mind: a First Look Inside the Mind of a Reverse EngineerUSENIX Security '22Alessandro Mantovani, Simone Aonzo, Yanick Fratantonio, Davide Balzarotti
    FreeWill: Automatically Diagnosing Use-after-free Bugs via Reference Miscounting Detection on BinariesUSENIX Security '22Liang He, Hong Hu, Purui Su, Yan Cai, Zhenkai Liang
    ALASTOR: Reconstructing the Provenance of Serverless IntrusionsUSENIX Security '22Pubali Datta, Isaac Polinsky, Muhammad Adil Inam, Adam Bates, William Enck
    Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake EraUSENIX Security '22Changjiang Li, Li Wang, Shouling Ji, Xuhong Zhang, Zhaohan Xi, Shanqing Guo, Ting Wang
    Who Are You (I Really Wanna Know)? Detecting Audio DeepFakes Through Vocal Tract ReconstructionUSENIX Security '22Logan Blue, Kevin Warren, Hadi Abdullah, Cassidy Gibson, Luis Vargas, Jessica O'Dell, Kevin Butler, Patrick Traynor
    Shuffle-based Private Set Union: Faster and More SecureUSENIX Security '22Yanxue Jia, Shi-Feng Sun, Hong-Sheng Zhou, Jiajun Du, Dawu Gu
    IHOP: Improved Statistical Query Recovery against Searchable Symmetric Encryption through Quadratic OptimizationUSENIX Security '22Simon Oya, Florian Kerschbaum
    Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect AttacksUSENIX Security '22Xuewei Feng, Qi Li, Kun Sun, Zhiyun Qian, Gang Zhao, Xiaohui Kuang, Chuanpu Fu, Ke Xu
    Characterizing the Security of Github CI WorkflowsUSENIX Security '22Igibek Koishybayev, Aleksandr Nahapetyan, Raima Zachariah, Siddharth Muralee, Bradley Reaves, Alexandros Kapravelos, Aravind Machiry
    Hecate: Abuse Reporting in Secure Messengers with Sealed SenderUSENIX Security '22Rawane Issa, Nicolas Alhaddad, Mayank Varia
    Decomperson: How Humans Decompile and What We Can Learn From ItUSENIX Security '22Kevin Burk, Fabio Pagani, Christopher Kruegel, Giovanni Vigna
    Dynamic Searchable Encryption with Optimal Search in the Presence of DeletionsUSENIX Security '22Javad Ghareh Chamani, Dimitrios Papadopoulos, Mohammadamin Karbasforushan, Ioannis Demertzis
    SAID: State-aware Defense Against Injection Attacks on In-vehicle NetworkUSENIX Security '22Lei Xue, Yangyang Liu, Tianqi Li, Kaifa Zhao, Jianfeng Li, Le Yu, Xiapu Luo, Yajin Zhou, Guofei Gu
    Understanding and Improving Usability of Data Dashboards for Simplified Privacy Control of Voice Assistant DataUSENIX Security '22Vandit Sharma, Mainack Mondal
    Rendering Contention Channel Made Practical in Web BrowsersUSENIX Security '22Shujiang Wu, Jianjia Yu, Min Yang, Yinzhi Cao
    Stick It to The Man: Correcting for Non-Cooperative Behavior of Subjects in Experiments on Social NetworksUSENIX Security '22Kaleigh Clary, Emma Tosch, Jeremiah Onaolapo, David D. Jensen
    Total Eclipse of the Heart – Disrupting the InterPlanetary File SystemUSENIX Security '22Bernd Prünster, Alexander Marsalek, Thomas Zefferer
    Post-Quantum Cryptography with Contemporary Co-Processors: Beyond Kronecker, Schönhage-Strassen & NussbaumerUSENIX Security '22Joppe W. Bos, Joost Renes, Christine van Vredendaal
    Empirical Understanding of Deletion Privacy: Experiences, Expectations, and MeasuresUSENIX Security '22Mohsen Minaei, Mainack Mondal, Aniket Kate
    Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among Experts and Non-Experts in a Corporate ContextUSENIX Security '22Veroniek Binkhorst, Tobias Fiebig, Katharina Krombholz, Wolter Pieters, Katsiaryna Labunets
    CamShield: Securing Smart Cameras through Physical Replication and IsolationUSENIX Security '22Zhiwei Wang, Yihui Yan, Yueli Yan, Huangxun Chen, Zhice Yang

Pages