USENIX Security '22 | Networks of Care: Tech Abuse Advocates' Digital Security Practices | Julia Slupska, Angelika Strohmayer |
USENIX Security '22 | Khaleesi: Breaker of Advertising and Tracking Request Chains | Umar Iqbal, Charlie Wolfe, Charles Nguyen, Steven Englehardt, Zubair Shafiq |
USENIX Security '22 | DeepPhish: Understanding User Trust Towards Artificially Generated Profiles in Online Social Networks | Jaron Mink, Licheng Luo, Natã M. Barbosa, Olivia Figueira, Yang Wang, Gang Wang |
USENIX Security '22 | TLB;DR: Enhancing TLB-based Attacks with TLB Desynchronized Reverse Engineering | Andrei Tatar, Daniël Trujillo, Cristiano Giuffrida, Herbert Bos |
USENIX Security '22 | Playing Without Paying: Detecting Vulnerable Payment Verification in Native Binaries of Unity Mobile Games | Chaoshun Zuo, Zhiqiang Lin |
USENIX Security '22 | Building an Open, Robust, and Stable Voting-Based Domain Top List | Qinge Xie, Shujun Tang, Xiaofeng Zheng, Qingran Lin, Baojun Liu, Haixin Duan, Frank Li |
USENIX Security '22 | Many Roads Lead To Rome: How Packet Headers Influence DNS Censorship Measurement | Abhishek Bhaskar, Paul Pearce |
USENIX Security '22 | Minefield: A Software-only Protection for SGX Enclaves against DVFS Attacks | Andreas Kogler, Daniel Gruss, Michael Schwarz |
USENIX Security '22 | Attacks on Deidentification's Defenses | Aloni Cohen |
USENIX Security '22 | In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer Authentication | Sungbae Yoo, Jinbum Park, Seolheui Kim, Yeji Kim, Taesoo Kim |
USENIX Security '22 | Unleash the Simulacrum: Shifting Browser Realities for Robust Extension-Fingerprinting Prevention | Soroush Karami, Faezeh Kalantari, Mehrnoosh Zaeifi, Xavier J. Maso, Erik Trickel, Panagiotis Ilia, Yan Shoshitaishvili, Adam Doupé, Jason Polakis |
USENIX Security '22 | Anycast Agility: Network Playbooks to Fight DDoS | A S M Rizvi, Leandro Bertholdo, João Ceron, John Heidemann |
USENIX Security '22 | PolyCruise: A Cross-Language Dynamic Information Flow Analysis | Wen Li, Jiang Ming, Xiapu Luo, Haipeng Cai |
USENIX Security '22 | Communication-Efficient Triangle Counting under Local Differential Privacy | Jacob Imola, Takao Murakami, Kamalika Chaudhuri |
USENIX Security '22 | Seeing the Forest for the Trees: Understanding Security Hazards in the 3GPP Ecosystem through Intelligent Analysis on Change Requests | Yi Chen, Di Tang, Yepeng Yao, Mingming Zha, XiaoFeng Wang, Xiaozhong Liu, Haixu Tang, Dongfang Zhao |
USENIX Security '22 | Hyperproofs: Aggregating and Maintaining Proofs in Vector Commitments | Shravan Srinivasan, Alexander Chepurnoy, Charalampos Papamanthou, Alin Tomescu, Yupeng Zhang |
USENIX Security '22 | Leaky Forms: A Study of Email and Password Exfiltration Before Form Submission | Asuman Senol, Gunes Acar, Mathias Humbert, Frederik Zuiderveen Borgesius |
USENIX Security '22 | Using Trātṛ to tame Adversarial Synchronization | Yuvraj Patel, Chenhao Ye, Akshat Sinha, Abigail Matthews, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, Michael M. Swift |
USENIX Security '22 | Security Analysis of Camera-LiDAR Fusion Against Black-Box Attacks on Autonomous Vehicles | R. Spencer Hallyburton, Yupei Liu, Yulong Cao, Z. Morley Mao, Miroslav Pajic |
USENIX Security '22 | Automated Detection of Automated Traffic | Cormac Herley |
USENIX Security '22 | Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging | Patrick Leu, Giovanni Camurati, Alexander Heinrich, Marc Roeschlin, Claudio Anliker, Matthias Hollick, Srdjan Capkun, Jiska Classen |
USENIX Security '22 | Transferring Adversarial Robustness Through Robust Representation Matching | Pratik Vaishnavi, Kevin Eykholt, Amir Rahmati |
USENIX Security '22 | Constant-weight PIR: Single-round Keyword PIR via Constant-weight Equality Operators | Rasoul Akhavan Mahdavi, Florian Kerschbaum |
USENIX Security '22 | Provably-Safe Multilingual Software Sandboxing using WebAssembly | Jay Bosamiya, Wen Shih Lim, Bryan Parno |
USENIX Security '22 | ALASTOR: Reconstructing the Provenance of Serverless Intrusions | Pubali Datta, Isaac Polinsky, Muhammad Adil Inam, Adam Bates, William Enck |