USENIX Security '22 | 99% False Positives: A Qualitative Study of SOC Analysts' Perspectives on Security Alarms | |
USENIX Security '22 | Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing | |
USENIX Security '22 | SIMC: ML Inference Secure Against Malicious Clients at Semi-Honest Cost | |
USENIX Security '22 | HyperDegrade: From GHz to MHz Effective CPU Frequencies | |
USENIX Security '22 | DoLTEst: In-depth Downlink Negative Testing Framework for LTE Devices | |
USENIX Security '22 | GhostTouch: Targeted Attacks on Touchscreens without Physical Touch | |
USENIX Security '22 | RE-Mind: a First Look Inside the Mind of a Reverse Engineer | |
USENIX Security '22 | RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices | |
USENIX Security '22 | Towards Automatically Reverse Engineering Vehicle Diagnostic Protocols | |
USENIX Security '22 | Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition | |
USENIX Security '22 | Watching the Watchers: Practical Video Identification Attack in LTE Networks | |
USENIX Security '22 | FOAP: Fine-Grained Open-World Android App Fingerprinting | |
USENIX Security '22 | Behind the Tube: Exploitative Monetization of Content on YouTube | |
USENIX Security '22 | SkillDetective: Automated Policy-Violation Detection of Voice Assistant Applications in the Wild | |
USENIX Security '22 | Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand | |
USENIX Security '22 | SyzScope: Revealing High-Risk Security Impacts of Fuzzer-Exposed Bugs in Linux kernel | |
USENIX Security '22 | Under the Hood of DANE Mismanagement in SMTP | |
USENIX Security '22 | Lend Me Your Ear: Passive Remote Physical Side Channels on PCs | |
USENIX Security '22 | Empirical Understanding of Deletion Privacy: Experiences, Expectations, and Measures | |
USENIX Security '22 | Hiding in Plain Sight? On the Efficacy of Power Side Channel-Based Control Flow Monitoring | |
USENIX Security '22 | FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities | |
USENIX Security '22 | A Large-scale Investigation into Geodifferences in Mobile Apps | |
USENIX Security '22 | Ferry: State-Aware Symbolic Execution for Exploring State-Dependent Program Paths | |
USENIX Security '22 | Polynomial Commitment with a One-to-Many Prover and Applications | |
USENIX Security '22 | SGXLock: Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX | |