Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '22SGXLock: Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX
    USENIX Security '22Omnes pro uno: Practical Multi-Writer Encrypted Database
    USENIX Security '22Secure Poisson Regression
    USENIX Security '22Automating Cookie Consent and GDPR Violation Detection
    USENIX Security '22LTrack: Stealthy Tracking of Mobile Phones in LTE
    USENIX Security '22How to Abuse and Fix Authenticated Encryption Without Key Commitment
    USENIX Security '22How Long Do Vulnerabilities Live in the Code? A Large-Scale Empirical Measurement Study on FOSS Vulnerability Lifetimes
    USENIX Security '22When Sally Met Trackers: Web Tracking From the Users' Perspective
    USENIX Security '22Regulator: Dynamic Analysis to Detect ReDoS
    USENIX Security '22Incremental Offline/Online PIR
    USENIX Security '22Dos and Don'ts of Machine Learning in Computer Security
    USENIX Security '22Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits
    USENIX Security '22ProFactory: Improving IoT Security via Formalized Protocol Customization
    USENIX Security '22Debloating Address Sanitizer
    USENIX Security '22Synthetic Data – Anonymisation Groundhog Day
    USENIX Security '22FReD: Identifying File Re-Delegation in Android System Services
    USENIX Security '22WebGraph: Capturing Advertising and Tracking Information Flows for Robust Blocking
    USENIX Security '22Adversarial Detection Avoidance Attacks: Evaluating the robustness of perceptual hashing-based client-side scanning
    USENIX Security '22Elasticlave: An Efficient Memory Model for Enclaves
    USENIX Security '22Practical Data Access Minimization in Trigger-Action Platforms
    USENIX Security '22Bedrock: Programmable Network Support for Secure RDMA Systems
    USENIX Security '22VerLoc: Verifiable Localization in Decentralized Systems
    USENIX Security '22Lamphone: Passive Sound Recovery from a Desk Lamp's Light Bulb Vibrations
    USENIX Security '22Towards More Robust Keyword Spotting for Voice Assistants
    USENIX Security '22Web Cache Deception Escalates!

Pages