USENIX Security '22 | SGXLock: Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX | |
USENIX Security '22 | Omnes pro uno: Practical Multi-Writer Encrypted Database | |
USENIX Security '22 | Secure Poisson Regression | |
USENIX Security '22 | Automating Cookie Consent and GDPR Violation Detection | |
USENIX Security '22 | LTrack: Stealthy Tracking of Mobile Phones in LTE | |
USENIX Security '22 | How to Abuse and Fix Authenticated Encryption Without Key Commitment | |
USENIX Security '22 | How Long Do Vulnerabilities Live in the Code? A Large-Scale Empirical Measurement Study on FOSS Vulnerability Lifetimes | |
USENIX Security '22 | When Sally Met Trackers: Web Tracking From the Users' Perspective | |
USENIX Security '22 | Regulator: Dynamic Analysis to Detect ReDoS | |
USENIX Security '22 | Incremental Offline/Online PIR | |
USENIX Security '22 | Dos and Don'ts of Machine Learning in Computer Security | |
USENIX Security '22 | Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits | |
USENIX Security '22 | ProFactory: Improving IoT Security via Formalized Protocol Customization | |
USENIX Security '22 | Debloating Address Sanitizer | |
USENIX Security '22 | Synthetic Data – Anonymisation Groundhog Day | |
USENIX Security '22 | FReD: Identifying File Re-Delegation in Android System Services | |
USENIX Security '22 | WebGraph: Capturing Advertising and Tracking Information Flows for Robust Blocking | |
USENIX Security '22 | Adversarial Detection Avoidance Attacks: Evaluating the robustness of perceptual hashing-based client-side scanning | |
USENIX Security '22 | Elasticlave: An Efficient Memory Model for Enclaves | |
USENIX Security '22 | Practical Data Access Minimization in Trigger-Action Platforms | |
USENIX Security '22 | Bedrock: Programmable Network Support for Secure RDMA Systems | |
USENIX Security '22 | VerLoc: Verifiable Localization in Decentralized Systems | |
USENIX Security '22 | Lamphone: Passive Sound Recovery from a Desk Lamp's Light Bulb Vibrations | |
USENIX Security '22 | Towards More Robust Keyword Spotting for Voice Assistants | |
USENIX Security '22 | Web Cache Deception Escalates! | |