USENIX Security '22 | Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era | Changjiang Li, Li Wang, Shouling Ji, Xuhong Zhang, Zhaohan Xi, Shanqing Guo, Ting Wang |
USENIX Security '22 | On the Necessity of Auditable Algorithmic Definitions for Machine Unlearning | Anvith Thudi, Hengrui Jia, Ilia Shumailov, Nicolas Papernot |
USENIX Security '22 | Might I Get Pwned: A Second Generation Compromised Credential Checking Service | Bijeeta Pal, Mazharul Islam, Marina Sanusi Bohuk, Nick Sullivan, Luke Valenta, Tara Whalen, Christopher Wood, Thomas Ristenpart, Rahul Chatterjee |
USENIX Security '22 | Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture | Xinyu Tang, Saeed Mahloujifar, Liwei Song, Virat Shejwalkar, Milad Nasr, Amir Houmansadr, Prateek Mittal |
USENIX Security '22 | OS-Aware Vulnerability Prioritization via Differential Severity Analysis | Qiushi Wu, Yue Xiao, Xiaojing Liao, Kangjie Lu |
USENIX Security '22 | Efficient Representation of Numerical Optimization Problems for SNARKs | Sebastian Angel, Andrew J. Blumberg, Eleftherios Ioannidis, Jess Woods |
USENIX Security '22 | Experimenting with Collaborative zk-SNARKs: Zero-Knowledge Proofs for Distributed Secrets | Alex Ozdemir, Dan Boneh |
USENIX Security '22 | Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among Experts and Non-Experts in a Corporate Context | Veroniek Binkhorst, Tobias Fiebig, Katharina Krombholz, Wolter Pieters, Katsiaryna Labunets |
USENIX Security '22 | GAROTA: Generalized Active Root-Of-Trust Architecture (for Tiny Embedded Devices) | Esmerald Aliaj, Ivan De Oliveira Nunes, Gene Tsudik |
USENIX Security '22 | A Large-scale and Longitudinal Measurement Study of DKIM Deployment | Chuhan Wang, Kaiwen Shen, Minglei Guo, Yuxuan Zhao, Mingming Zhang, Jianjun Chen, Baojun Liu, Xiaofeng Zheng, Haixin Duan, Yanzhong Lin, Qingfeng Pan |
USENIX Security '22 | Neither Access nor Control: A Longitudinal Investigation of the Efficacy of User Access-Control Solutions on Smartphones | Masoud Mehrabi Koushki, Yue Huang, Julia Rubin, Konstantin Beznosov |
USENIX Security '22 | Cheetah: Lean and Fast Secure Two-Party Deep Neural Network Inference | Zhicong Huang, Wen-jie Lu, Cheng Hong, Jiansheng Ding |
USENIX Security '22 | Inferring Phishing Intention via Webpage Appearance and Dynamics: A Deep Vision Based Approach | Ruofan Liu, Yun Lin, Xianglin Yang, Siang Hwee Ng, Dinil Mon Divakaran, Jin Song Dong |
USENIX Security '22 | Electronic Monitoring Smartphone Apps: An Analysis of Risks from Technical, Human-Centered, and Legal Perspectives | Kentrell Owens, Anita Alem, Franziska Roesner, Tadayoshi Kohno |
USENIX Security '22 | ppSAT: Towards Two-Party Private SAT Solving | Ning Luo, Samuel Judson, Timos Antonopoulos, Ruzica Piskac, Xiao Wang |
USENIX Security '22 | "Like Lesbians Walking the Perimeter": Experiences of U.S. LGBTQ+ Folks With Online Security, Safety, and Privacy Advice | Christine Geeng, Mike Harris, Elissa Redmiles, Franziska Roesner |
USENIX Security '22 | ProFactory: Improving IoT Security via Formalized Protocol Customization | Fei Wang, Jianliang Wu, Yuhong Nan, Yousra Aafer, Xiangyu Zhang, Dongyan Xu, Mathias Payer |
USENIX Security '22 | Empirical Understanding of Deletion Privacy: Experiences, Expectations, and Measures | Mohsen Minaei, Mainack Mondal, Aniket Kate |
USENIX Security '22 | Hiding in Plain Sight? On the Efficacy of Power Side Channel-Based Control Flow Monitoring | Yi Han, Matthew Chan, Zahra Aref, Nils Ole Tippenhauer, Saman Zonouz |
USENIX Security '22 | FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities | Sunnyeo Park, Daejun Kim, Suman Jana, Sooel Son |
USENIX Security '22 | SAID: State-aware Defense Against Injection Attacks on In-vehicle Network | Lei Xue, Yangyang Liu, Tianqi Li, Kaifa Zhao, Jianfeng Li, Le Yu, Xiapu Luo, Yajin Zhou, Guofei Gu |
USENIX Security '22 | A Large-scale Investigation into Geodifferences in Mobile Apps | Renuka Kumar, Apurva Virkud, Ram Sundara Raman, Atul Prakash, Roya Ensafi |
USENIX Security '22 | Ferry: State-Aware Symbolic Execution for Exploring State-Dependent Program Paths | Shunfan Zhou, Zhemin Yang, Dan Qiao, Peng Liu, Min Yang, Zhe Wang, Chenggang Wu |
USENIX Security '22 | Polynomial Commitment with a One-to-Many Prover and Applications | Jiaheng Zhang, Tiancheng Xie, Thang Hoang, Elaine Shi, Yupeng Zhang |
USENIX Security '22 | SGXLock: Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX | Yuan Chen, Jiaqi Li, Guorui Xu, Yajin Zhou, Zhi Wang, Cong Wang, Kui Ren |