USENIX Security '22 | Omnes pro uno: Practical Multi-Writer Encrypted Database | Jiafan Wang, Sherman S. M. Chow |
USENIX Security '22 | Secure Poisson Regression | Mahimna Kelkar, Phi Hung Le, Mariana Raykova, Karn Seth |
USENIX Security '22 | Watching the Watchers: Practical Video Identification Attack in LTE Networks | Sangwook Bae, Mincheol Son, Dongkwan Kim, CheolJun Park, Jiho Lee, Sooel Son, Yongdae Kim |
USENIX Security '22 | Automated Side Channel Analysis of Media Software with Manifold Learning | Yuanyuan Yuan, Qi Pang, Shuai Wang |
USENIX Security '22 | FOAP: Fine-Grained Open-World Android App Fingerprinting | Jianfeng Li, Hao Zhou, Shuohan Wu, Xiapu Luo, Ting Wang, Xian Zhan, Xiaobo Ma |
USENIX Security '22 | Behind the Tube: Exploitative Monetization of Content on YouTube | Andrew Chu, Arjun Arunasalam, Muslum Ozgur Ozmen, Z. Berkay Celik |
USENIX Security '22 | SkillDetective: Automated Policy-Violation Detection of Voice Assistant Applications in the Wild | Jeffrey Young, Song Liao, Long Cheng, Hongxin Hu, Huixing Deng |
USENIX Security '22 | Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand | Matteo Cardaioli, Stefano Cecconello, Mauro Conti, Simone Milani, Stjepan Picek, Eugen Saraci |
USENIX Security '22 | SyzScope: Revealing High-Risk Security Impacts of Fuzzer-Exposed Bugs in Linux kernel | Xiaochen Zou, Guoren Li, Weiteng Chen, Hang Zhang, Zhiyun Qian |
USENIX Security '22 | Label Inference Attacks Against Vertical Federated Learning | Chong Fu, Xuhong Zhang, Shouling Ji, Jinyin Chen, Jingzheng Wu, Shanqing Guo, Jun Zhou, Alex X. Liu, Ting Wang |
USENIX Security '22 | Under the Hood of DANE Mismanagement in SMTP | Hyeonmin Lee, Md. Ishtiaq Ashiq, Moritz Müller, Roland van Rijswijk-Deij, Taekyoung "Ted" Kwon, Taejoong Chung |
USENIX Security '22 | Lend Me Your Ear: Passive Remote Physical Side Channels on PCs | Daniel Genkin, Noam Nissan, Roei Schuster, Eran Tromer |
USENIX Security '22 | 99% False Positives: A Qualitative Study of SOC Analysts' Perspectives on Security Alarms | Bushra A. Alahmadi, Louise Axon, Ivan Martinovic |
USENIX Security '22 | Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing | Tobias Scharnowski, Nils Bars, Moritz Schloegel, Eric Gustafson, Marius Muench, Giovanni Vigna, Christopher Kruegel, Thorsten Holz, Ali Abbasi |
USENIX Security '22 | SIMC: ML Inference Secure Against Malicious Clients at Semi-Honest Cost | Nishanth Chandran, Divya Gupta, Sai Lakshmi Bhavana Obbattu, Akash Shah |
USENIX Security '22 | HyperDegrade: From GHz to MHz Effective CPU Frequencies | Alejandro Cabrera Aldaya, Billy Bob Brumley |
USENIX Security '22 | DoLTEst: In-depth Downlink Negative Testing Framework for LTE Devices | CheolJun Park, Sangwook Bae, BeomSeok Oh, Jiho Lee, Eunkyu Lee, Insu Yun, Yongdae Kim |
USENIX Security '22 | GhostTouch: Targeted Attacks on Touchscreens without Physical Touch | Kai Wang, Richard Mitev, Chen Yan, Xiaoyu Ji, Ahmad-Reza Sadeghi, Wenyuan Xu |
USENIX Security '22 | RE-Mind: a First Look Inside the Mind of a Reverse Engineer | Alessandro Mantovani, Simone Aonzo, Yanick Fratantonio, Davide Balzarotti |
USENIX Security '22 | RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices | Yi He, Zhenhua Zou, Kun Sun, Zhuotao Liu, Ke Xu, Qian Wang, Chao Shen, Zhi Wang, Qi Li |
USENIX Security '22 | Towards Automatically Reverse Engineering Vehicle Diagnostic Protocols | Le Yu, Yangyang Liu, Pengfei Jing, Xiapu Luo, Lei Xue, Kaifa Zhao, Yajin Zhou, Ting Wang, Guofei Gu, Sen Nie, Shi Wu |
USENIX Security '22 | Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition | Chen Yan, Zhijian Xu, Zhanyuan Yin, Xiaoyu Ji, Wenyuan Xu |
USENIX Security '22 | Understanding and Improving Usability of Data Dashboards for Simplified Privacy Control of Voice Assistant Data | Vandit Sharma, Mainack Mondal |
USENIX Security '22 | A Large-scale Temporal Measurement of Android Malicious Apps: Persistence, Migration, and Lessons Learned | Yun Shen, Pierre-Antoine Vervier, Gianluca Stringhini |
USENIX Security '22 | Midas: Systematic Kernel TOCTTOU Protection | Atri Bhattacharyya, Uros Tesic, Mathias Payer |