Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '22Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGXLukas Giner, Andreas Kogler, Claudio Canella, Michael Schwarz, Daniel Gruss
    USENIX Security '22Orca: Blocklisting in Sender-Anonymous MessagingNirvan Tyagi, Julia Len, Ian Miers, Thomas Ristenpart
    USENIX Security '22Rendering Contention Channel Made Practical in Web BrowsersShujiang Wu, Jianjia Yu, Min Yang, Yinzhi Cao
    USENIX Security '22OpenSSLNTRU: Faster post-quantum TLS key exchangeDaniel J. Bernstein, Billy Bob Brumley, Ming-Shing Chen, Nicola Tuveri
    USENIX Security '22"OK, Siri" or "Hey, Google": Evaluating Voiceprint Distinctiveness via Content-based PROLE ScoreRuiwen He, Xiaoyu Ji, Xinfeng Li, Yushi Cheng, Wenyuan Xu
    USENIX Security '22PISTIS: Trusted Computing Architecture for Low-end Embedded SystemsMichele Grisafi, Mahmoud Ammar, Marco Roveri, Bruno Crispo
    USENIX Security '22Stick It to The Man: Correcting for Non-Cooperative Behavior of Subjects in Experiments on Social NetworksKaleigh Clary, Emma Tosch, Jeremiah Onaolapo, David D. Jensen
    USENIX Security '22Mining Node.js Vulnerabilities via Object Dependence Graph and QuerySong Li, Mingqing Kang, Jianwei Hou, Yinzhi Cao
    USENIX Security '22Security and Privacy Perceptions of Third-Party Application Access for Google AccountsDavid G. Balash, Xiaoyuan Wu, Miles Grant, Irwin Reyes, Adam J. Aviv
    USENIX Security '22Online Website Fingerprinting: Evaluating Website Fingerprinting Attacks on Tor in the Real WorldGiovanni Cherubin, Rob Jansen, Carmela Troncoso
    USENIX Security '22Rapid Prototyping for Microarchitectural AttacksCatherine Easdon, Michael Schwarz, Martin Schwarzl, Daniel Gruss
    USENIX Security '22Caring about Sharing: User Perceptions of Multiparty Data SharingBailey Kacsmar, Kyle Tilbury, Miti Mazmudar, Florian Kerschbaum
    USENIX Security '22Spoki: Unveiling a New Wave of Scanners through a Reactive Network TelescopeRaphael Hiesgen, Marcin Nawrocki, Alistair King, Alberto Dainotti, Thomas C. Schmidt, Matthias Wählisch
    USENIX Security '22Holistic Control-Flow Protection on Real-Time Embedded Systems with KageYufei Du, Zhuojia Shen, Komail Dharsee, Jie Zhou, Robert J. Walls, John Criswell
    USENIX Security '22"I feel invaded, annoyed, anxious and I may protect myself": Individuals' Feelings about Online Tracking and their Protective Behaviour across Gender and CountryKovila P.L. Coopamootoo, Maryam Mehrnezhad, Ehsan Toreini
    USENIX Security '22Mistrust Plugins You Must: A Large-Scale Study Of Malicious Plugins In WordPress MarketplacesRanjita Pai Kasturi, Jonathan Fuller, Yiting Sun, Omar Chabklo, Andres Rodriguez, Jeman Park, Brendan Saltaformaggio
    USENIX Security '22On the Security Risks of AutoMLRen Pang, Zhaohan Xi, Shouling Ji, Xiapu Luo, Ting Wang
    USENIX Security '22Morphuzz: Bending (Input) Space to Fuzz Virtual DevicesAlexander Bulekov, Bandan Das, Stefan Hajnoczi, Manuel Egele
    USENIX Security '22Towards More Robust Keyword Spotting for Voice AssistantsShimaa Ahmed, Ilia Shumailov, Nicolas Papernot, Kassem Fawaz
    USENIX Security '22Web Cache Deception Escalates!Seyed Ali Mirheidari, Matteo Golinelli, Kaan Onarlioglu, Engin Kirda, Bruno Crispo
    USENIX Security '22Exploring the Unchartered Space of Container Registry TyposquattingGuannan Liu, Xing Gao, Haining Wang, Kun Sun
    USENIX Security '22Can one hear the shape of a neural network?: Snooping the GPU via Magnetic Side Channel
    USENIX Security '22Augmenting Decompiler Output with Learned Variable Names and TypesQibin Chen, Jeremy Lacomis, Edward J. Schwartz, Claire Le Goues, Graham Neubig, Bogdan Vasilescu
    USENIX Security '22Inference Attacks Against Graph Neural NetworksZhikun Zhang, Min Chen, Michael Backes, Yun Shen, Yang Zhang
    USENIX Security '22LinKRID: Vetting Imbalance Reference Counting in Linux kernel with Symbolic ExecutionJian Liu, Lin Yi, Weiteng Chen, Chengyu Song, Zhiyun Qian, Qiuping Yi

Pages