USENIX Security '23 | Multi-Factor Key Derivation Function (MFKDF) for Fast, Flexible, Secure, & Practical Key Management | Vivek Nair, Dawn Song |
USENIX Security '23 | We Really Need to Talk About Session Tickets: A Large-Scale Analysis of Cryptographic Dangers with TLS Session Tickets | Sven Hebrok, Simon Nachtigall, Marcel Maehren, Nurullah Erinola, Robert Merget, Juraj Somorovsky, Jörg Schwenk |
USENIX Security '22 | Membership Inference Attacks and Defenses in Neural Network Pruning | Xiaoyong Yuan, Lan Zhang |
USENIX Security '22 | Efficient Differentially Private Secure Aggregation for Federated Learning via Hardness of Learning with Errors | Timothy Stevens, Christian Skalka, Christelle Vincent, John Ring, Samuel Clark, Joseph Near |
USENIX Security '22 | OpenVPN is Open to VPN Fingerprinting | Diwen Xue, Reethika Ramesh, Arham Jain, Michalis Kallitsis, J. Alex Halderman, Jedidiah R. Crandall, Roya Ensafi |
USENIX Security '22 | Backporting Security Patches of Web Applications: A Prototype Design and Implementation on Injection Vulnerability Patches | Youkun Shi, Yuan Zhang, Tianhan Luo, Xiangyu Mao, Yinzhi Cao, Ziwen Wang, Yudi Zhao, Zongan Huang, Min Yang |
USENIX Security '22 | MaDIoT 2.0: Modern High-Wattage IoT Botnet Attacks and Defenses | Tohid Shekari, Alvaro A. Cardenas, Raheem Beyah |
USENIX Security '22 | Physical-Layer Attacks Against Pulse Width Modulation-Controlled Actuators | Gökçen Yılmaz Dayanıklı, Sourav Sinha, Devaprakash Muniraj, Ryan M. Gerdes, Mazen Farhood, Mani Mina |
USENIX Security '22 | Who Are You (I Really Wanna Know)? Detecting Audio DeepFakes Through Vocal Tract Reconstruction | Logan Blue, Kevin Warren, Hadi Abdullah, Cassidy Gibson, Luis Vargas, Jessica O'Dell, Kevin Butler, Patrick Traynor |
USENIX Security '22 | Shuffle-based Private Set Union: Faster and More Secure | Yanxue Jia, Shi-Feng Sun, Hong-Sheng Zhou, Jiajun Du, Dawu Gu |
USENIX Security '22 | Pacer: Comprehensive Network Side-Channel Mitigation in the Cloud | Aastha Mehta, Mohamed Alzayat, Roberta De Viti, Björn B. Brandenburg, Peter Druschel, Deepak Garg |
USENIX Security '22 | Zero-Knowledge Middleboxes | Paul Grubbs, Arasu Arun, Ye Zhang, Joseph Bonneau, Michael Walfish |
USENIX Security '22 | TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable Vulnerabilities | Rahul Kande, Addison Crump, Garrett Persyn, Patrick Jauernig, Ahmad-Reza Sadeghi, Aakash Tyagi, Jeyavijayan Rajendran |
USENIX Security '22 | Private Signaling | Varun Madathil, Alessandra Scafuro, István András Seres, Omer Shlomovits, Denis Varlakov |
USENIX Security '22 | Branch History Injection: On the Effectiveness of Hardware Mitigations Against Cross-Privilege Spectre-v2 Attacks | Enrico Barberis, Pietro Frigo, Marius Muench, Herbert Bos, Cristiano Giuffrida |
USENIX Security '22 | Playing for K(H)eaps: Understanding and Improving Linux Kernel Exploit Reliability | Kyle Zeng, Yueqi Chen, Haehyun Cho, Xinyu Xing, Adam Doupé, Yan Shoshitaishvili, Tiffany Bao |
USENIX Security '22 | Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models | Shagufta Mehnaz, Sayanton V. Dibbo, Ehsanul Kabir, Ninghui Li, Elisa Bertino |
USENIX Security '22 | Stalloris: RPKI Downgrade Attack | Tomas Hlavacek, Philipp Jeitner, Donika Mirdita, Haya Shulman, Michael Waidner |
USENIX Security '22 | V'CER: Efficient Certificate Validation in Constrained Networks | David Koisser, Patrick Jauernig, Gene Tsudik, Ahmad-Reza Sadeghi |
USENIX Security '22 | Oops... Code Execution and Content Spoofing: The First Comprehensive Analysis of OpenDocument Signatures | Simon Rohlmann, Christian Mainka, Vladislav Mladenov, Jörg Schwenk |
USENIX Security '22 | How Machine Learning Is Solving the Binary Function Similarity Problem | Andrea Marcelli, Mariano Graziano, Xabier Ugarte-Pedrero, Yanick Fratantonio, Mohamad Mansouri, Davide Balzarotti |
USENIX Security '22 | FLAME: Taming Backdoors in Federated Learning | Thien Duc Nguyen, Phillip Rieger, Huili Chen, Hossein Yalame, Helen Möllering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Shaza Zeitouni, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider |
USENIX Security '22 | CamShield: Securing Smart Cameras through Physical Replication and Isolation | Zhiwei Wang, Yihui Yan, Yueli Yan, Huangxun Chen, Zhice Yang |
USENIX Security '22 | PatchCleanser: Certifiably Robust Defense against Adversarial Patches for Any Image Classifier | Chong Xiang, Saeed Mahloujifar, Prateek Mittal |
USENIX Security '22 | Phish in Sheep's Clothing: Exploring the Authentication Pitfalls of Browser Fingerprinting | Xu Lin, Panagiotis Ilia, Saumya Solanki, Jason Polakis |