| On the Necessity of Auditable Algorithmic Definitions for Machine Unlearning | USENIX Security '22 | Anvith Thudi, Hengrui Jia, Ilia Shumailov, Nicolas Papernot |
| Stalloris: RPKI Downgrade Attack | USENIX Security '22 | Tomas Hlavacek, Philipp Jeitner, Donika Mirdita, Haya Shulman, Michael Waidner |
| V'CER: Efficient Certificate Validation in Constrained Networks | USENIX Security '22 | David Koisser, Patrick Jauernig, Gene Tsudik, Ahmad-Reza Sadeghi |
| Themis: Accelerating the Detection of Route Origin Hijacking by Distinguishing Legitimate and Illegitimate MOAS | USENIX Security '22 | Lancheng Qin, Dan Li, Ruifeng Li, Kang Wang |
| ÆPIC Leak: Architecturally Leaking Uninitialized Data from the Microarchitecture | USENIX Security '22 | Pietro Borrello, Andreas Kogler, Martin Schwarzl, Moritz Lipp, Daniel Gruss, Michael Schwarz |
| XDRI Attacks - and - How to Enhance Resilience of Residential Routers | USENIX Security '22 | Philipp Jeitner, Haya Shulman, Lucas Teichmann, Michael Waidner |
| Investigating State-of-the-Art Practices for Fostering Subjective Trust in Online Voting through Interviews | USENIX Security '22 | Karola Marky, Paul Gerber, Sebastian Günther, Mohamed Khamis, Maximilian Fries, Max Mühlhäuser |
| RegexScalpel: Regular Expression Denial of Service (ReDoS) Defense by Localize-and-Fix | USENIX Security '22 | Yeting Li, Yecheng Sun, Zhiwu Xu, Jialun Cao, Yuekang Li, Rongchen Li, Haiming Chen, Shing-Chi Cheung, Yang Liu, Yang Xiao |
| MaDIoT 2.0: Modern High-Wattage IoT Botnet Attacks and Defenses | USENIX Security '22 | Tohid Shekari, Alvaro A. Cardenas, Raheem Beyah |
| Inference Attacks Against Graph Neural Networks | USENIX Security '22 | Zhikun Zhang, Min Chen, Michael Backes, Yun Shen, Yang Zhang |
| Uninvited Guests: Analyzing the Identity and Behavior of Certificate Transparency Bots | USENIX Security '22 | Brian Kondracki, Johnny So, Nick Nikiforakis |
| Midas: Systematic Kernel TOCTTOU Protection | USENIX Security '22 | Atri Bhattacharyya, Uros Tesic, Mathias Payer |
| Playing for K(H)eaps: Understanding and Improving Linux Kernel Exploit Reliability | USENIX Security '22 | Kyle Zeng, Yueqi Chen, Haehyun Cho, Xinyu Xing, Adam Doupé, Yan Shoshitaishvili, Tiffany Bao |
| In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer Authentication | USENIX Security '22 | Sungbae Yoo, Jinbum Park, Seolheui Kim, Yeji Kim, Taesoo Kim |
| Mining Node.js Vulnerabilities via Object Dependence Graph and Query | USENIX Security '22 | Song Li, Mingqing Kang, Jianwei Hou, Yinzhi Cao |
| FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities | USENIX Security '22 | Sunnyeo Park, Daejun Kim, Suman Jana, Sooel Son |
| TLS-Anvil: Adapting Combinatorial Testing for TLS Libraries | USENIX Security '22 | Marcel Maehren, Philipp Nieting, Sven Hebrok, Robert Merget, Juraj Somorovsky, Jörg Schwenk |
| Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster Design | USENIX Security '22 | Alon Shakevsky, Eyal Ronen, Avishai Wool |
| How Long Do Vulnerabilities Live in the Code? A Large-Scale Empirical Measurement Study on FOSS Vulnerability Lifetimes | USENIX Security '22 | Nikolaos Alexopoulos, Manuel Brack, Jan Philipp Wagner, Tim Grube, Max Mühlhäuser |
| Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits | USENIX Security '22 | Octavian Suciu, Connor Nelson, Zhuoer Lyu, Tiffany Bao, Tudor Dumitraș |
| Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs | USENIX Security '22 | Jayakrishna Vadayath, Moritz Eckert, Kyle Zeng, Nicolaas Weideman, Gokulkrishna Praveen Menon, Yanick Fratantonio, Davide Balzarotti, Adam Doupé, Tiffany Bao, Ruoyu Wang, Christophe Hauser, Yan Shoshitaishvili |
| Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope | USENIX Security '22 | Raphael Hiesgen, Marcin Nawrocki, Alistair King, Alberto Dainotti, Thomas C. Schmidt, Matthias Wählisch |
| GET /out: Automated Discovery of Application-Layer Censorship Evasion Strategies | USENIX Security '22 | Michael Harrity, Kevin Bock, Frederick Sell, Dave Levin |
| Twilight: A Differentially Private Payment Channel Network | USENIX Security '22 | Maya Dotan, Saar Tochner, Aviv Zohar, Yossi Gilad |
| Building an Open, Robust, and Stable Voting-Based Domain Top List | USENIX Security '22 | Qinge Xie, Shujun Tang, Xiaofeng Zheng, Qingran Lin, Baojun Liu, Haixin Duan, Frank Li |