USENIX Security '22 | "Like Lesbians Walking the Perimeter": Experiences of U.S. LGBTQ+ Folks With Online Security, Safety, and Privacy Advice | Christine Geeng, Mike Harris, Elissa Redmiles, Franziska Roesner |
USENIX Security '22 | Unleash the Simulacrum: Shifting Browser Realities for Robust Extension-Fingerprinting Prevention | Soroush Karami, Faezeh Kalantari, Mehrnoosh Zaeifi, Xavier J. Maso, Erik Trickel, Panagiotis Ilia, Yan Shoshitaishvili, Adam Doupé, Jason Polakis |
USENIX Security '22 | Helping hands: Measuring the impact of a large threat intelligence sharing community | Xander Bouwman, Victor Le Pochat, Pawel Foremski, Tom Van Goethem, Carlos H. Gañán, Giovane C. M. Moura, Samaneh Tajalizadehkhoob, Wouter Joosen, Michel van Eeten |
USENIX Security '22 | Your Microphone Array Retains Your Identity: A Robust Voice Liveness Detection System for Smart Speakers | Yan Meng, Jiachun Li, Matthew Pillari, Arjun Deopujari, Liam Brennan, Hafsah Shamsie, Haojin Zhu, Yuan Tian |
USENIX Security '22 | Lumos: Identifying and Localizing Diverse Hidden IoT Devices in an Unfamiliar Environment | Rahul Anand Sharma, Elahe Soltanaghaei, Anthony Rowe, Vyas Sekar |
USENIX Security '22 | A Large-scale Temporal Measurement of Android Malicious Apps: Persistence, Migration, and Lessons Learned | Yun Shen, Pierre-Antoine Vervier, Gianluca Stringhini |
USENIX Security '22 | "OK, Siri" or "Hey, Google": Evaluating Voiceprint Distinctiveness via Content-based PROLE Score | Ruiwen He, Xiaoyu Ji, Xinfeng Li, Yushi Cheng, Wenyuan Xu |
USENIX Security '22 | LTrack: Stealthy Tracking of Mobile Phones in LTE | Martin Kotuliak, Simon Erni, Patrick Leu, Marc Röschlin, Srdjan Čapkun |
USENIX Security '22 | Watching the Watchers: Practical Video Identification Attack in LTE Networks | Sangwook Bae, Mincheol Son, Dongkwan Kim, CheolJun Park, Jiho Lee, Sooel Son, Yongdae Kim |
USENIX Security '22 | Label Inference Attacks Against Vertical Federated Learning | Chong Fu, Xuhong Zhang, Shouling Ji, Jinyin Chen, Jingzheng Wu, Shanqing Guo, Jun Zhou, Alex X. Liu, Ting Wang |
USENIX Security '22 | DoLTEst: In-depth Downlink Negative Testing Framework for LTE Devices | CheolJun Park, Sangwook Bae, BeomSeok Oh, Jiho Lee, Eunkyu Lee, Insu Yun, Yongdae Kim |
USENIX Security '22 | A Large-scale and Longitudinal Measurement Study of DKIM Deployment | Chuhan Wang, Kaiwen Shen, Minglei Guo, Yuxuan Zhao, Mingming Zhang, Jianjun Chen, Baojun Liu, Xiaofeng Zheng, Haixin Duan, Yanzhong Lin, Qingfeng Pan |
USENIX Security '22 | Neither Access nor Control: A Longitudinal Investigation of the Efficacy of User Access-Control Solutions on Smartphones | Masoud Mehrabi Koushki, Yue Huang, Julia Rubin, Konstantin Beznosov |
USENIX Security '22 | MundoFuzz: Hypervisor Fuzzing with Statistical Coverage Testing and Grammar Inference | Cheolwoo Myung, Gwangmu Lee, Byoungyoung Lee |
USENIX Security '22 | Efficient Differentially Private Secure Aggregation for Federated Learning via Hardness of Learning with Errors | Timothy Stevens, Christian Skalka, Christelle Vincent, John Ring, Samuel Clark, Joseph Near |
USENIX Security '22 | Physical-Layer Attacks Against Pulse Width Modulation-Controlled Actuators | Gökçen Yılmaz Dayanıklı, Sourav Sinha, Devaprakash Muniraj, Ryan M. Gerdes, Mazen Farhood, Mani Mina |
USENIX Security '22 | FLAME: Taming Backdoors in Federated Learning | Thien Duc Nguyen, Phillip Rieger, Huili Chen, Hossein Yalame, Helen Möllering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Shaza Zeitouni, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider |
USENIX Security '22 | Increasing Adversarial Uncertainty to Scale Private Similarity Testing | Yiqing Hua, Armin Namavari, Kaishuo Cheng, Mor Naaman, Thomas Ristenpart |
USENIX Security '22 | DoubleStar: Long-Range Attack Towards Depth Estimation based Obstacle Avoidance in Autonomous Systems | Ce Zhou, Qiben Yan, Yan Shi, Lichao Sun |
USENIX Security '22 | FReD: Identifying File Re-Delegation in Android System Services | Sigmund Albert Gorski III, Seaver Thorn, William Enck, Haining Chen |
USENIX Security '22 | When Sally Met Trackers: Web Tracking From the Users' Perspective | Savino Dambra, Iskander Sanchez-Rola, Leyla Bilge, Davide Balzarotti |
USENIX Security '22 | FOAP: Fine-Grained Open-World Android App Fingerprinting | Jianfeng Li, Hao Zhou, Shuohan Wu, Xiapu Luo, Ting Wang, Xian Zhan, Xiaobo Ma |
USENIX Security '22 | Behind the Tube: Exploitative Monetization of Content on YouTube | Andrew Chu, Arjun Arunasalam, Muslum Ozgur Ozmen, Z. Berkay Celik |
USENIX Security '22 | Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand | Matteo Cardaioli, Stefano Cecconello, Mauro Conti, Simone Milani, Stjepan Picek, Eugen Saraci |
USENIX Security '22 | GhostTouch: Targeted Attacks on Touchscreens without Physical Touch | Kai Wang, Richard Mitev, Chen Yan, Xiaoyu Ji, Ahmad-Reza Sadeghi, Wenyuan Xu |