USENIX Security '22 | Towards Automatically Reverse Engineering Vehicle Diagnostic Protocols | Le Yu, Yangyang Liu, Pengfei Jing, Xiapu Luo, Lei Xue, Kaifa Zhao, Yajin Zhou, Ting Wang, Guofei Gu, Sen Nie, Shi Wu |
USENIX Security '22 | Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition | Chen Yan, Zhijian Xu, Zhanyuan Yin, Xiaoyu Ji, Wenyuan Xu |
USENIX Security '22 | GAROTA: Generalized Active Root-Of-Trust Architecture (for Tiny Embedded Devices) | Esmerald Aliaj, Ivan De Oliveira Nunes, Gene Tsudik |
USENIX Security '22 | Inferring Phishing Intention via Webpage Appearance and Dynamics: A Deep Vision Based Approach | Ruofan Liu, Yun Lin, Xianglin Yang, Siang Hwee Ng, Dinil Mon Divakaran, Jin Song Dong |
USENIX Security '22 | Phish in Sheep's Clothing: Exploring the Authentication Pitfalls of Browser Fingerprinting | Xu Lin, Panagiotis Ilia, Saumya Solanki, Jason Polakis |
USENIX Security '22 | ReZone: Disarming TrustZone with TEE Privilege Reduction | David Cerdeira, José Martins, Nuno Santos, Sandro Pinto |
USENIX Security '22 | SARA: Secure Android Remote Authorization | Abdullah Imran, Habiba Farrukh, Muhammad Ibrahim, Z. Berkay Celik, Antonio Bianchi |
USENIX Security '22 | Leaky Forms: A Study of Email and Password Exfiltration Before Form Submission | Asuman Senol, Gunes Acar, Mathias Humbert, Frederik Zuiderveen Borgesius |
USENIX Security '22 | Security Analysis of Camera-LiDAR Fusion Against Black-Box Attacks on Autonomous Vehicles | R. Spencer Hallyburton, Yupei Liu, Yulong Cao, Z. Morley Mao, Miroslav Pajic |
USENIX Security '22 | Automated Detection of Automated Traffic | Cormac Herley |
USENIX Security '22 | Backporting Security Patches of Web Applications: A Prototype Design and Implementation on Injection Vulnerability Patches | Youkun Shi, Yuan Zhang, Tianhan Luo, Xiangyu Mao, Yinzhi Cao, Ziwen Wang, Yudi Zhao, Zongan Huang, Min Yang |
USENIX Security '22 | How Machine Learning Is Solving the Binary Function Similarity Problem | Andrea Marcelli, Mariano Graziano, Xabier Ugarte-Pedrero, Yanick Fratantonio, Mohamad Mansouri, Davide Balzarotti |
USENIX Security '22 | Towards More Robust Keyword Spotting for Voice Assistants | Shimaa Ahmed, Ilia Shumailov, Nicolas Papernot, Kassem Fawaz |
USENIX Security '22 | VerLoc: Verifiable Localization in Decentralized Systems | Katharina Kohls, Claudia Diaz |
USENIX Security '22 | Omnes pro uno: Practical Multi-Writer Encrypted Database | Jiafan Wang, Sherman S. M. Chow |
USENIX Security '22 | 99% False Positives: A Qualitative Study of SOC Analysts' Perspectives on Security Alarms | Bushra A. Alahmadi, Louise Axon, Ivan Martinovic |
USENIX Security '22 | RE-Mind: a First Look Inside the Mind of a Reverse Engineer | Alessandro Mantovani, Simone Aonzo, Yanick Fratantonio, Davide Balzarotti |
USENIX Security '22 | FreeWill: Automatically Diagnosing Use-after-free Bugs via Reference Miscounting Detection on Binaries | Liang He, Hong Hu, Purui Su, Yan Cai, Zhenkai Liang |
USENIX Security '22 | ALASTOR: Reconstructing the Provenance of Serverless Intrusions | Pubali Datta, Isaac Polinsky, Muhammad Adil Inam, Adam Bates, William Enck |
USENIX Security '22 | Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era | Changjiang Li, Li Wang, Shouling Ji, Xuhong Zhang, Zhaohan Xi, Shanqing Guo, Ting Wang |
USENIX Security '22 | Who Are You (I Really Wanna Know)? Detecting Audio DeepFakes Through Vocal Tract Reconstruction | Logan Blue, Kevin Warren, Hadi Abdullah, Cassidy Gibson, Luis Vargas, Jessica O'Dell, Kevin Butler, Patrick Traynor |
USENIX Security '22 | Shuffle-based Private Set Union: Faster and More Secure | Yanxue Jia, Shi-Feng Sun, Hong-Sheng Zhou, Jiajun Du, Dawu Gu |
USENIX Security '22 | SAID: State-aware Defense Against Injection Attacks on In-vehicle Network | Lei Xue, Yangyang Liu, Tianqi Li, Kaifa Zhao, Jianfeng Li, Le Yu, Xiapu Luo, Yajin Zhou, Guofei Gu |
USENIX Security '22 | Understanding and Improving Usability of Data Dashboards for Simplified Privacy Control of Voice Assistant Data | Vandit Sharma, Mainack Mondal |
USENIX Security '22 | Rendering Contention Channel Made Practical in Web Browsers | Shujiang Wu, Jianjia Yu, Min Yang, Yinzhi Cao |