Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '22Branch History Injection: On the Effectiveness of Hardware Mitigations Against Cross-Privilege Spectre-v2 AttacksEnrico Barberis, Pietro Frigo, Marius Muench, Herbert Bos, Cristiano Giuffrida
    USENIX Security '22Playing for K(H)eaps: Understanding and Improving Linux Kernel Exploit ReliabilityKyle Zeng, Yueqi Chen, Haehyun Cho, Xinyu Xing, Adam Doupé, Yan Shoshitaishvili, Tiffany Bao
    USENIX Security '22Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification ModelsShagufta Mehnaz, Sayanton V. Dibbo, Ehsanul Kabir, Ninghui Li, Elisa Bertino
    USENIX Security '22Stalloris: RPKI Downgrade AttackTomas Hlavacek, Philipp Jeitner, Donika Mirdita, Haya Shulman, Michael Waidner
    USENIX Security '22V'CER: Efficient Certificate Validation in Constrained NetworksDavid Koisser, Patrick Jauernig, Gene Tsudik, Ahmad-Reza Sadeghi
    USENIX Security '22Oops... Code Execution and Content Spoofing: The First Comprehensive Analysis of OpenDocument SignaturesSimon Rohlmann, Christian Mainka, Vladislav Mladenov, Jörg Schwenk
    USENIX Security '22How Machine Learning Is Solving the Binary Function Similarity ProblemAndrea Marcelli, Mariano Graziano, Xabier Ugarte-Pedrero, Yanick Fratantonio, Mohamad Mansouri, Davide Balzarotti
    USENIX Security '22FLAME: Taming Backdoors in Federated LearningThien Duc Nguyen, Phillip Rieger, Huili Chen, Hossein Yalame, Helen Möllering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Shaza Zeitouni, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider
    USENIX Security '22CamShield: Securing Smart Cameras through Physical Replication and IsolationZhiwei Wang, Yihui Yan, Yueli Yan, Huangxun Chen, Zhice Yang
    USENIX Security '22PatchCleanser: Certifiably Robust Defense against Adversarial Patches for Any Image ClassifierChong Xiang, Saeed Mahloujifar, Prateek Mittal
    USENIX Security '22Phish in Sheep's Clothing: Exploring the Authentication Pitfalls of Browser FingerprintingXu Lin, Panagiotis Ilia, Saumya Solanki, Jason Polakis
    USENIX Security '22FreeWill: Automatically Diagnosing Use-after-free Bugs via Reference Miscounting Detection on BinariesLiang He, Hong Hu, Purui Su, Yan Cai, Zhenkai Liang
    USENIX Security '22ReZone: Disarming TrustZone with TEE Privilege ReductionDavid Cerdeira, José Martins, Nuno Santos, Sandro Pinto
    USENIX Security '22Double Trouble: Combined Heterogeneous Attacks on Non-Inclusive Cache HierarchiesAntoon Purnal, Furkan Turan, Ingrid Verbauwhede
    USENIX Security '22The Dangers of Human Touch: Fingerprinting Browser Extensions through User ActionsKonstantinos Solomos, Panagiotis Ilia, Soroush Karami, Nick Nikiforakis, Jason Polakis
    USENIX Security '22MundoFuzz: Hypervisor Fuzzing with Statistical Coverage Testing and Grammar InferenceCheolwoo Myung, Gwangmu Lee, Byoungyoung Lee
    USENIX Security '22Exploring the Security Boundary of Data Reconstruction via Neuron Exclusivity AnalysisXudong Pan, Mi Zhang, Yifan Yan, Jiaming Zhu, Zhemin Yang
    USENIX Security '22SARA: Secure Android Remote AuthorizationAbdullah Imran, Habiba Farrukh, Muhammad Ibrahim, Z. Berkay Celik, Antonio Bianchi
    USENIX Security '22Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster DesignAlon Shakevsky, Eyal Ronen, Avishai Wool
    USENIX Security '22Counting in Regexes Considered Harmful: Exposing ReDoS Vulnerability of Nonbacktracking MatchersLenka Turoňová, Lukáš Holík, Ivan Homoliak, Ondřej Lengál, Margus Veanes, Tomáš Vojnar
    USENIX Security '22SCRAPS: Scalable Collective Remote Attestation for Pub-Sub IoT Networks with Untrusted Proxy VerifierLukas Petzi, Ala Eddine Ben Yahya, Alexandra Dmitrienko, Gene Tsudik, Thomas Prantl, Samuel Kounev
    USENIX Security '22Poisoning Attacks to Local Differential Privacy Protocols for Key-Value DataYongji Wu, Xiaoyu Cao, Jinyuan Jia, Neil Zhenqiang Gong
    USENIX Security '22Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary ProgramsJayakrishna Vadayath, Moritz Eckert, Kyle Zeng, Nicolaas Weideman, Gokulkrishna Praveen Menon, Yanick Fratantonio, Davide Balzarotti, Adam Doupé, Tiffany Bao, Ruoyu Wang, Christophe Hauser, Yan Shoshitaishvili
    USENIX Security '22Breaking Bridgefy, again: Adopting libsignal is not enoughMartin R. Albrecht, Raphael Eikenberg, Kenneth G. Paterson
    USENIX Security '22"The Same PIN, Just Longer": On the (In)Security of Upgrading PINs from 4 to 6 DigitsCollins W. Munyendo, Philipp Markert, Alexandra Nisenoff, Miles Grant, Elena Korkes, Blase Ur, Adam J. Aviv

Pages