USENIX Security '23 | FuzzJIT: Oracle-Enhanced Fuzzing for JavaScript Engine JIT Compiler | Junjie Wang, Zhiyi Zhang, Shuang Liu, Xiaoning Du, Junjie Chen |
USENIX Security '23 | TPatch: A Triggered Physical Adversarial Patch | Wenjun Zhu, Xiaoyu Ji, Yushi Cheng, Shibo Zhang, Wenyuan Xu |
USENIX Security '23 | TAP: Transparent and Privacy-Preserving Data Services | Daniel Reijsbergen, Aung Maw, Zheng Yang, Tien Tuan Anh Dinh, Jianying Zhou |
USENIX Security '23 | UnGANable: Defending Against GAN-based Face Manipulation | Zheng Li, Ning Yu, Ahmed Salem, Michael Backes, Mario Fritz, Yang Zhang |
USENIX Security '23 | Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine Learning | Jonathan Prokos, Neil Fendley, Matthew Green, Roei Schuster, Eran Tromer, Tushar Jois, Yinzhi Cao |
USENIX Security '23 | "All of them claim to be the best": Multi-perspective study of VPN users and VPN providers | Reethika Ramesh, Anjali Vyas, Roya Ensafi |
USENIX Security '23 | GlitchHiker: Uncovering Vulnerabilities of Image Signal Transmission with IEMI | Qinhong Jiang, Xiaoyu Ji, Chen Yan, Zhixin Xie, Haina Lou, Wenyuan Xu |
USENIX Security '23 | Device Tracking via Linux’s New TCP Source Port Selection Algorithm | Moshe Kol, Amit Klein, Yossi Gilad |
USENIX Security '23 | The Writing on the Wall and 3D Digital Twins: Personal Information in (not so) Private Real Estate | Rachel McAmis, Tadayoshi Kohno |
USENIX Security '23 | PrivTrace: Differentially Private Trajectory Synthesis by Adaptive Markov Models | Haiming Wang, Zhikun Zhang, Tianhao Wang, Shibo He, Michael Backes, Jiming Chen, Yang Zhang |
USENIX Security '23 | Egg Hunt in Tesla Infotainment: A First Look at Reverse Engineering of Qt Binaries | Haohuang Wen, Zhiqiang Lin |
USENIX Security '23 | Learning Normality is Enough: A Software-based Mitigation against Inaudible Voice Attacks | Xinfeng Li, Xiaoyu Ji, Chen Yan, Chaohao Li, Yichen Li, Zhenning Zhang, Wenyuan Xu |
USENIX Security '23 | FirmSolo: Enabling dynamic analysis of binary Linux-based IoT kernel modules | Ioannis Angelakopoulos, Gianluca Stringhini, Manuel Egele |
USENIX Security '22 | Membership Inference Attacks and Defenses in Neural Network Pruning | Xiaoyong Yuan, Lan Zhang |
USENIX Security '22 | Efficient Differentially Private Secure Aggregation for Federated Learning via Hardness of Learning with Errors | Timothy Stevens, Christian Skalka, Christelle Vincent, John Ring, Samuel Clark, Joseph Near |
USENIX Security '22 | OpenVPN is Open to VPN Fingerprinting | Diwen Xue, Reethika Ramesh, Arham Jain, Michalis Kallitsis, J. Alex Halderman, Jedidiah R. Crandall, Roya Ensafi |
USENIX Security '22 | Backporting Security Patches of Web Applications: A Prototype Design and Implementation on Injection Vulnerability Patches | Youkun Shi, Yuan Zhang, Tianhan Luo, Xiangyu Mao, Yinzhi Cao, Ziwen Wang, Yudi Zhao, Zongan Huang, Min Yang |
USENIX Security '22 | MaDIoT 2.0: Modern High-Wattage IoT Botnet Attacks and Defenses | Tohid Shekari, Alvaro A. Cardenas, Raheem Beyah |
USENIX Security '22 | Physical-Layer Attacks Against Pulse Width Modulation-Controlled Actuators | Gökçen Yılmaz Dayanıklı, Sourav Sinha, Devaprakash Muniraj, Ryan M. Gerdes, Mazen Farhood, Mani Mina |
USENIX Security '22 | Who Are You (I Really Wanna Know)? Detecting Audio DeepFakes Through Vocal Tract Reconstruction | Logan Blue, Kevin Warren, Hadi Abdullah, Cassidy Gibson, Luis Vargas, Jessica O'Dell, Kevin Butler, Patrick Traynor |
USENIX Security '22 | Shuffle-based Private Set Union: Faster and More Secure | Yanxue Jia, Shi-Feng Sun, Hong-Sheng Zhou, Jiajun Du, Dawu Gu |
USENIX Security '22 | Pacer: Comprehensive Network Side-Channel Mitigation in the Cloud | Aastha Mehta, Mohamed Alzayat, Roberta De Viti, Björn B. Brandenburg, Peter Druschel, Deepak Garg |
USENIX Security '22 | Zero-Knowledge Middleboxes | Paul Grubbs, Arasu Arun, Ye Zhang, Joseph Bonneau, Michael Walfish |
USENIX Security '22 | TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable Vulnerabilities | Rahul Kande, Addison Crump, Garrett Persyn, Patrick Jauernig, Ahmad-Reza Sadeghi, Aakash Tyagi, Jeyavijayan Rajendran |
USENIX Security '22 | Private Signaling | Varun Madathil, Alessandra Scafuro, István András Seres, Omer Shlomovits, Denis Varlakov |