Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '22An Audit of Facebook's Political Ad Policy EnforcementVictor Le Pochat, Laura Edelson, Tom Van Goethem, Wouter Joosen, Damon McCoy, Tobias Lauinger
    USENIX Security '22"How Do You Not Lose Friends?": Synthesizing a Design Space of Social Controls for Securing Shared Digital Resources Via Participatory Design JamsEyitemi Moju-Igbene, Hanan Abdi, Alan Lu, Sauvik Das
    USENIX Security '22AMD Prefetch Attacks through Power and TimeMoritz Lipp, Daniel Gruss, Michael Schwarz
    USENIX Security '22Online Website Fingerprinting: Evaluating Website Fingerprinting Attacks on Tor in the Real WorldGiovanni Cherubin, Rob Jansen, Carmela Troncoso
    USENIX Security '22"I feel invaded, annoyed, anxious and I may protect myself": Individuals' Feelings about Online Tracking and their Protective Behaviour across Gender and CountryKovila P.L. Coopamootoo, Maryam Mehrnezhad, Ehsan Toreini
    USENIX Security '22Mistrust Plugins You Must: A Large-Scale Study Of Malicious Plugins In WordPress MarketplacesRanjita Pai Kasturi, Jonathan Fuller, Yiting Sun, Omar Chabklo, Andres Rodriguez, Jeman Park, Brendan Saltaformaggio
    USENIX Security '22Web Cache Deception Escalates!Seyed Ali Mirheidari, Matteo Golinelli, Kaan Onarlioglu, Engin Kirda, Bruno Crispo
    USENIX Security '22Exploring the Unchartered Space of Container Registry TyposquattingGuannan Liu, Xing Gao, Haining Wang, Kun Sun
    USENIX Security '22LinKRID: Vetting Imbalance Reference Counting in Linux kernel with Symbolic ExecutionJian Liu, Lin Yi, Weiteng Chen, Chengyu Song, Zhiyun Qian, Qiuping Yi
    USENIX Security '22Hiding in Plain Sight? On the Efficacy of Power Side Channel-Based Control Flow MonitoringYi Han, Matthew Chan, Zahra Aref, Nils Ole Tippenhauer, Saman Zonouz
    USENIX Security '22Secure Poisson RegressionMahimna Kelkar, Phi Hung Le, Mariana Raykova, Karn Seth
    USENIX Security '22Under the Hood of DANE Mismanagement in SMTPHyeonmin Lee, Md. Ishtiaq Ashiq, Moritz Müller, Roland van Rijswijk-Deij, Taekyoung "Ted" Kwon, Taejoong Chung
    USENIX Security '22The Dangers of Human Touch: Fingerprinting Browser Extensions through User ActionsKonstantinos Solomos, Panagiotis Ilia, Soroush Karami, Nick Nikiforakis, Jason Polakis
    USENIX Security '22Poisoning Attacks to Local Differential Privacy Protocols for Key-Value DataYongji Wu, Xiaoyu Cao, Jinyuan Jia, Neil Zhenqiang Gong
    USENIX Security '22Breaking Bridgefy, again: Adopting libsignal is not enoughMartin R. Albrecht, Raphael Eikenberg, Kenneth G. Paterson
    USENIX Security '22Many Roads Lead To Rome: How Packet Headers Influence DNS Censorship MeasurementAbhishek Bhaskar, Paul Pearce
    USENIX Security '22Communication-Efficient Triangle Counting under Local Differential PrivacyJacob Imola, Takao Murakami, Kamalika Chaudhuri
    USENIX Security '22Seeing the Forest for the Trees: Understanding Security Hazards in the 3GPP Ecosystem through Intelligent Analysis on Change RequestsYi Chen, Di Tang, Yepeng Yao, Mingming Zha, XiaoFeng Wang, Xiaozhong Liu, Haixu Tang, Dongfang Zhao
    USENIX Security '22OS-Aware Vulnerability Prioritization via Differential Severity AnalysisQiushi Wu, Yue Xiao, Xiaojing Liao, Kangjie Lu
    USENIX Security '22OpenVPN is Open to VPN FingerprintingDiwen Xue, Reethika Ramesh, Arham Jain, Michalis Kallitsis, J. Alex Halderman, Jedidiah R. Crandall, Roya Ensafi
    USENIX Security '22"Like Lesbians Walking the Perimeter": Experiences of U.S. LGBTQ+ Folks With Online Security, Safety, and Privacy AdviceChristine Geeng, Mike Harris, Elissa Redmiles, Franziska Roesner
    USENIX Security '22Networks of Care: Tech Abuse Advocates' Digital Security PracticesJulia Slupska, Angelika Strohmayer
    USENIX Security '22Unleash the Simulacrum: Shifting Browser Realities for Robust Extension-Fingerprinting PreventionSoroush Karami, Faezeh Kalantari, Mehrnoosh Zaeifi, Xavier J. Maso, Erik Trickel, Panagiotis Ilia, Yan Shoshitaishvili, Adam Doupé, Jason Polakis
    USENIX Security '22Helping hands: Measuring the impact of a large threat intelligence sharing communityXander Bouwman, Victor Le Pochat, Pawel Foremski, Tom Van Goethem, Carlos H. Gañán, Giovane C. M. Moura, Samaneh Tajalizadehkhoob, Wouter Joosen, Michel van Eeten
    USENIX Security '22Your Microphone Array Retains Your Identity: A Robust Voice Liveness Detection System for Smart SpeakersYan Meng, Jiachun Li, Matthew Pillari, Arjun Deopujari, Liam Brennan, Hafsah Shamsie, Haojin Zhu, Yuan Tian

Pages