| Towards Automatically Reverse Engineering Vehicle Diagnostic Protocols | USENIX Security '22 | Le Yu, Yangyang Liu, Pengfei Jing, Xiapu Luo, Lei Xue, Kaifa Zhao, Yajin Zhou, Ting Wang, Guofei Gu, Sen Nie, Shi Wu |
| Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition | USENIX Security '22 | Chen Yan, Zhijian Xu, Zhanyuan Yin, Xiaoyu Ji, Wenyuan Xu |
| GAROTA: Generalized Active Root-Of-Trust Architecture (for Tiny Embedded Devices) | USENIX Security '22 | Esmerald Aliaj, Ivan De Oliveira Nunes, Gene Tsudik |
| Inferring Phishing Intention via Webpage Appearance and Dynamics: A Deep Vision Based Approach | USENIX Security '22 | Ruofan Liu, Yun Lin, Xianglin Yang, Siang Hwee Ng, Dinil Mon Divakaran, Jin Song Dong |
| Phish in Sheep's Clothing: Exploring the Authentication Pitfalls of Browser Fingerprinting | USENIX Security '22 | Xu Lin, Panagiotis Ilia, Saumya Solanki, Jason Polakis |
| ReZone: Disarming TrustZone with TEE Privilege Reduction | USENIX Security '22 | David Cerdeira, José Martins, Nuno Santos, Sandro Pinto |
| SARA: Secure Android Remote Authorization | USENIX Security '22 | Abdullah Imran, Habiba Farrukh, Muhammad Ibrahim, Z. Berkay Celik, Antonio Bianchi |
| Attacks on Deidentification's Defenses | USENIX Security '22 | Aloni Cohen |
| Leaky Forms: A Study of Email and Password Exfiltration Before Form Submission | USENIX Security '22 | Asuman Senol, Gunes Acar, Mathias Humbert, Frederik Zuiderveen Borgesius |
| Security Analysis of Camera-LiDAR Fusion Against Black-Box Attacks on Autonomous Vehicles | USENIX Security '22 | R. Spencer Hallyburton, Yupei Liu, Yulong Cao, Z. Morley Mao, Miroslav Pajic |
| Automated Detection of Automated Traffic | USENIX Security '22 | Cormac Herley |
| Backporting Security Patches of Web Applications: A Prototype Design and Implementation on Injection Vulnerability Patches | USENIX Security '22 | Youkun Shi, Yuan Zhang, Tianhan Luo, Xiangyu Mao, Yinzhi Cao, Ziwen Wang, Yudi Zhao, Zongan Huang, Min Yang |
| Identity Confusion in WebView-based Mobile App-in-app Ecosystems | USENIX Security '22 | Lei Zhang, Zhibo Zhang, Ancong Liu, Yinzhi Cao, Xiaohan Zhang, Yanjun Chen, Yuan Zhang, Guangliang Yang, Min Yang |
| How Machine Learning Is Solving the Binary Function Similarity Problem | USENIX Security '22 | Andrea Marcelli, Mariano Graziano, Xabier Ugarte-Pedrero, Yanick Fratantonio, Mohamad Mansouri, Davide Balzarotti |
| Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box Attacks | USENIX Security '22 | Huiying Li, Shawn Shan, Emily Wenger, Jiayun Zhang, Haitao Zheng, Ben Y. Zhao |
| Birds of a Feather Flock Together: How Set Bias Helps to Deanonymize You via Revealed Intersection Sizes | USENIX Security '22 | Xiaojie Guo, Ye Han, Zheli Liu, Ding Wang, Yan Jia, Jin Li |
| Pre-hijacked accounts: An Empirical Study of Security Failures in User Account Creation on the Web | USENIX Security '22 | Avinash Sudhodanan, Andrew Paverd |
| Gossamer: Securely Measuring Password-based Logins | USENIX Security '22 | Marina Sanusi Bohuk, Mazharul Islam, Suleman Ahmad, Michael Swift, Thomas Ristenpart, Rahul Chatterjee |
| DnD: A Cross-Architecture Deep Neural Network Decompiler | USENIX Security '22 | Ruoyu Wu, Taegyu Kim, Dave (Jing) Tian, Antonio Bianchi, Dongyan Xu |
| How to Peel a Million: Validating and Expanding Bitcoin Clusters | USENIX Security '22 | George Kappos, Haaroon Yousaf, Rainer Stütz, Sofia Rollet, Bernhard Haslhofer, Sarah Meiklejohn |
| GPU-accelerated PIR with Client-Independent Preprocessing for Large-Scale Applications | USENIX Security '22 | Daniel Günther, Maurice Heymann, Benny Pinkas, Thomas Schneider |
| Towards More Robust Keyword Spotting for Voice Assistants | USENIX Security '22 | Shimaa Ahmed, Ilia Shumailov, Nicolas Papernot, Kassem Fawaz |
| VerLoc: Verifiable Localization in Decentralized Systems | USENIX Security '22 | Katharina Kohls, Claudia Diaz |
| Omnes pro uno: Practical Multi-Writer Encrypted Database | USENIX Security '22 | Jiafan Wang, Sherman S. M. Chow |
| 99% False Positives: A Qualitative Study of SOC Analysts' Perspectives on Security Alarms | USENIX Security '22 | Bushra A. Alahmadi, Louise Axon, Ivan Martinovic |