| Identity Confusion in WebView-based Mobile App-in-app Ecosystems | USENIX Security '22 | Lei Zhang, Zhibo Zhang, Ancong Liu, Yinzhi Cao, Xiaohan Zhang, Yanjun Chen, Yuan Zhang, Guangliang Yang, Min Yang |
| How Machine Learning Is Solving the Binary Function Similarity Problem | USENIX Security '22 | Andrea Marcelli, Mariano Graziano, Xabier Ugarte-Pedrero, Yanick Fratantonio, Mohamad Mansouri, Davide Balzarotti |
| Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box Attacks | USENIX Security '22 | Huiying Li, Shawn Shan, Emily Wenger, Jiayun Zhang, Haitao Zheng, Ben Y. Zhao |
| Birds of a Feather Flock Together: How Set Bias Helps to Deanonymize You via Revealed Intersection Sizes | USENIX Security '22 | Xiaojie Guo, Ye Han, Zheli Liu, Ding Wang, Yan Jia, Jin Li |
| Pre-hijacked accounts: An Empirical Study of Security Failures in User Account Creation on the Web | USENIX Security '22 | Avinash Sudhodanan, Andrew Paverd |
| Gossamer: Securely Measuring Password-based Logins | USENIX Security '22 | Marina Sanusi Bohuk, Mazharul Islam, Suleman Ahmad, Michael Swift, Thomas Ristenpart, Rahul Chatterjee |
| DnD: A Cross-Architecture Deep Neural Network Decompiler | USENIX Security '22 | Ruoyu Wu, Taegyu Kim, Dave (Jing) Tian, Antonio Bianchi, Dongyan Xu |
| How to Peel a Million: Validating and Expanding Bitcoin Clusters | USENIX Security '22 | George Kappos, Haaroon Yousaf, Rainer Stütz, Sofia Rollet, Bernhard Haslhofer, Sarah Meiklejohn |
| GPU-accelerated PIR with Client-Independent Preprocessing for Large-Scale Applications | USENIX Security '22 | Daniel Günther, Maurice Heymann, Benny Pinkas, Thomas Schneider |
| Towards More Robust Keyword Spotting for Voice Assistants | USENIX Security '22 | Shimaa Ahmed, Ilia Shumailov, Nicolas Papernot, Kassem Fawaz |
| VerLoc: Verifiable Localization in Decentralized Systems | USENIX Security '22 | Katharina Kohls, Claudia Diaz |
| Omnes pro uno: Practical Multi-Writer Encrypted Database | USENIX Security '22 | Jiafan Wang, Sherman S. M. Chow |
| 99% False Positives: A Qualitative Study of SOC Analysts' Perspectives on Security Alarms | USENIX Security '22 | Bushra A. Alahmadi, Louise Axon, Ivan Martinovic |
| RE-Mind: a First Look Inside the Mind of a Reverse Engineer | USENIX Security '22 | Alessandro Mantovani, Simone Aonzo, Yanick Fratantonio, Davide Balzarotti |
| FreeWill: Automatically Diagnosing Use-after-free Bugs via Reference Miscounting Detection on Binaries | USENIX Security '22 | Liang He, Hong Hu, Purui Su, Yan Cai, Zhenkai Liang |
| ALASTOR: Reconstructing the Provenance of Serverless Intrusions | USENIX Security '22 | Pubali Datta, Isaac Polinsky, Muhammad Adil Inam, Adam Bates, William Enck |
| Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era | USENIX Security '22 | Changjiang Li, Li Wang, Shouling Ji, Xuhong Zhang, Zhaohan Xi, Shanqing Guo, Ting Wang |
| Who Are You (I Really Wanna Know)? Detecting Audio DeepFakes Through Vocal Tract Reconstruction | USENIX Security '22 | Logan Blue, Kevin Warren, Hadi Abdullah, Cassidy Gibson, Luis Vargas, Jessica O'Dell, Kevin Butler, Patrick Traynor |
| Shuffle-based Private Set Union: Faster and More Secure | USENIX Security '22 | Yanxue Jia, Shi-Feng Sun, Hong-Sheng Zhou, Jiajun Du, Dawu Gu |
| IHOP: Improved Statistical Query Recovery against Searchable Symmetric Encryption through Quadratic Optimization | USENIX Security '22 | Simon Oya, Florian Kerschbaum |
| Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect Attacks | USENIX Security '22 | Xuewei Feng, Qi Li, Kun Sun, Zhiyun Qian, Gang Zhao, Xiaohui Kuang, Chuanpu Fu, Ke Xu |
| Characterizing the Security of Github CI Workflows | USENIX Security '22 | Igibek Koishybayev, Aleksandr Nahapetyan, Raima Zachariah, Siddharth Muralee, Bradley Reaves, Alexandros Kapravelos, Aravind Machiry |
| Hecate: Abuse Reporting in Secure Messengers with Sealed Sender | USENIX Security '22 | Rawane Issa, Nicolas Alhaddad, Mayank Varia |
| Decomperson: How Humans Decompile and What We Can Learn From It | USENIX Security '22 | Kevin Burk, Fabio Pagani, Christopher Kruegel, Giovanni Vigna |
| Dynamic Searchable Encryption with Optimal Search in the Presence of Deletions | USENIX Security '22 | Javad Ghareh Chamani, Dimitrios Papadopoulos, Mohammadamin Karbasforushan, Ioannis Demertzis |