Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '22Lumos: Identifying and Localizing Diverse Hidden IoT Devices in an Unfamiliar EnvironmentRahul Anand Sharma, Elahe Soltanaghaei, Anthony Rowe, Vyas Sekar
    USENIX Security '22A Large-scale Temporal Measurement of Android Malicious Apps: Persistence, Migration, and Lessons LearnedYun Shen, Pierre-Antoine Vervier, Gianluca Stringhini
    USENIX Security '22"OK, Siri" or "Hey, Google": Evaluating Voiceprint Distinctiveness via Content-based PROLE ScoreRuiwen He, Xiaoyu Ji, Xinfeng Li, Yushi Cheng, Wenyuan Xu
    USENIX Security '22LTrack: Stealthy Tracking of Mobile Phones in LTEMartin Kotuliak, Simon Erni, Patrick Leu, Marc Röschlin, Srdjan Čapkun
    USENIX Security '22Watching the Watchers: Practical Video Identification Attack in LTE NetworksSangwook Bae, Mincheol Son, Dongkwan Kim, CheolJun Park, Jiho Lee, Sooel Son, Yongdae Kim
    USENIX Security '22Label Inference Attacks Against Vertical Federated LearningChong Fu, Xuhong Zhang, Shouling Ji, Jinyin Chen, Jingzheng Wu, Shanqing Guo, Jun Zhou, Alex X. Liu, Ting Wang
    USENIX Security '22DoLTEst: In-depth Downlink Negative Testing Framework for LTE DevicesCheolJun Park, Sangwook Bae, BeomSeok Oh, Jiho Lee, Eunkyu Lee, Insu Yun, Yongdae Kim
    USENIX Security '22A Large-scale and Longitudinal Measurement Study of DKIM DeploymentChuhan Wang, Kaiwen Shen, Minglei Guo, Yuxuan Zhao, Mingming Zhang, Jianjun Chen, Baojun Liu, Xiaofeng Zheng, Haixin Duan, Yanzhong Lin, Qingfeng Pan
    USENIX Security '22Neither Access nor Control: A Longitudinal Investigation of the Efficacy of User Access-Control Solutions on SmartphonesMasoud Mehrabi Koushki, Yue Huang, Julia Rubin, Konstantin Beznosov
    USENIX Security '22MundoFuzz: Hypervisor Fuzzing with Statistical Coverage Testing and Grammar InferenceCheolwoo Myung, Gwangmu Lee, Byoungyoung Lee
    USENIX Security '22Efficient Differentially Private Secure Aggregation for Federated Learning via Hardness of Learning with ErrorsTimothy Stevens, Christian Skalka, Christelle Vincent, John Ring, Samuel Clark, Joseph Near
    USENIX Security '22Physical-Layer Attacks Against Pulse Width Modulation-Controlled ActuatorsGökçen Yılmaz Dayanıklı, Sourav Sinha, Devaprakash Muniraj, Ryan M. Gerdes, Mazen Farhood, Mani Mina
    USENIX Security '22FLAME: Taming Backdoors in Federated LearningThien Duc Nguyen, Phillip Rieger, Huili Chen, Hossein Yalame, Helen Möllering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Shaza Zeitouni, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider
    USENIX Security '22Increasing Adversarial Uncertainty to Scale Private Similarity TestingYiqing Hua, Armin Namavari, Kaishuo Cheng, Mor Naaman, Thomas Ristenpart
    USENIX Security '22DoubleStar: Long-Range Attack Towards Depth Estimation based Obstacle Avoidance in Autonomous SystemsCe Zhou, Qiben Yan, Yan Shi, Lichao Sun
    USENIX Security '22FReD: Identifying File Re-Delegation in Android System ServicesSigmund Albert Gorski III, Seaver Thorn, William Enck, Haining Chen
    USENIX Security '22When Sally Met Trackers: Web Tracking From the Users' PerspectiveSavino Dambra, Iskander Sanchez-Rola, Leyla Bilge, Davide Balzarotti
    USENIX Security '22FOAP: Fine-Grained Open-World Android App FingerprintingJianfeng Li, Hao Zhou, Shuohan Wu, Xiapu Luo, Ting Wang, Xian Zhan, Xiaobo Ma
    USENIX Security '22Behind the Tube: Exploitative Monetization of Content on YouTubeAndrew Chu, Arjun Arunasalam, Muslum Ozgur Ozmen, Z. Berkay Celik
    USENIX Security '22Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered HandMatteo Cardaioli, Stefano Cecconello, Mauro Conti, Simone Milani, Stjepan Picek, Eugen Saraci
    USENIX Security '22GhostTouch: Targeted Attacks on Touchscreens without Physical TouchKai Wang, Richard Mitev, Chen Yan, Xiaoyu Ji, Ahmad-Reza Sadeghi, Wenyuan Xu
    USENIX Security '22Towards Automatically Reverse Engineering Vehicle Diagnostic ProtocolsLe Yu, Yangyang Liu, Pengfei Jing, Xiapu Luo, Lei Xue, Kaifa Zhao, Yajin Zhou, Ting Wang, Guofei Gu, Sen Nie, Shi Wu
    USENIX Security '22Rolling Colors: Adversarial Laser Exploits against Traffic Light RecognitionChen Yan, Zhijian Xu, Zhanyuan Yin, Xiaoyu Ji, Wenyuan Xu
    USENIX Security '22GAROTA: Generalized Active Root-Of-Trust Architecture (for Tiny Embedded Devices)Esmerald Aliaj, Ivan De Oliveira Nunes, Gene Tsudik
    USENIX Security '22Inferring Phishing Intention via Webpage Appearance and Dynamics: A Deep Vision Based ApproachRuofan Liu, Yun Lin, Xianglin Yang, Siang Hwee Ng, Dinil Mon Divakaran, Jin Song Dong

Pages