USENIX Security '22 | Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX | Lukas Giner, Andreas Kogler, Claudio Canella, Michael Schwarz, Daniel Gruss |
USENIX Security '22 | Orca: Blocklisting in Sender-Anonymous Messaging | Nirvan Tyagi, Julia Len, Ian Miers, Thomas Ristenpart |
USENIX Security '22 | Rendering Contention Channel Made Practical in Web Browsers | Shujiang Wu, Jianjia Yu, Min Yang, Yinzhi Cao |
USENIX Security '22 | OpenSSLNTRU: Faster post-quantum TLS key exchange | Daniel J. Bernstein, Billy Bob Brumley, Ming-Shing Chen, Nicola Tuveri |
USENIX Security '22 | "OK, Siri" or "Hey, Google": Evaluating Voiceprint Distinctiveness via Content-based PROLE Score | Ruiwen He, Xiaoyu Ji, Xinfeng Li, Yushi Cheng, Wenyuan Xu |
USENIX Security '22 | PISTIS: Trusted Computing Architecture for Low-end Embedded Systems | Michele Grisafi, Mahmoud Ammar, Marco Roveri, Bruno Crispo |
USENIX Security '22 | Stick It to The Man: Correcting for Non-Cooperative Behavior of Subjects in Experiments on Social Networks | Kaleigh Clary, Emma Tosch, Jeremiah Onaolapo, David D. Jensen |
USENIX Security '22 | Mining Node.js Vulnerabilities via Object Dependence Graph and Query | Song Li, Mingqing Kang, Jianwei Hou, Yinzhi Cao |
USENIX Security '22 | Security and Privacy Perceptions of Third-Party Application Access for Google Accounts | David G. Balash, Xiaoyuan Wu, Miles Grant, Irwin Reyes, Adam J. Aviv |
USENIX Security '22 | Online Website Fingerprinting: Evaluating Website Fingerprinting Attacks on Tor in the Real World | Giovanni Cherubin, Rob Jansen, Carmela Troncoso |
USENIX Security '22 | Rapid Prototyping for Microarchitectural Attacks | Catherine Easdon, Michael Schwarz, Martin Schwarzl, Daniel Gruss |
USENIX Security '22 | Caring about Sharing: User Perceptions of Multiparty Data Sharing | Bailey Kacsmar, Kyle Tilbury, Miti Mazmudar, Florian Kerschbaum |
USENIX Security '22 | Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope | Raphael Hiesgen, Marcin Nawrocki, Alistair King, Alberto Dainotti, Thomas C. Schmidt, Matthias Wählisch |
USENIX Security '22 | Holistic Control-Flow Protection on Real-Time Embedded Systems with Kage | Yufei Du, Zhuojia Shen, Komail Dharsee, Jie Zhou, Robert J. Walls, John Criswell |
USENIX Security '22 | "I feel invaded, annoyed, anxious and I may protect myself": Individuals' Feelings about Online Tracking and their Protective Behaviour across Gender and Country | Kovila P.L. Coopamootoo, Maryam Mehrnezhad, Ehsan Toreini |
USENIX Security '22 | Mistrust Plugins You Must: A Large-Scale Study Of Malicious Plugins In WordPress Marketplaces | Ranjita Pai Kasturi, Jonathan Fuller, Yiting Sun, Omar Chabklo, Andres Rodriguez, Jeman Park, Brendan Saltaformaggio |
USENIX Security '22 | On the Security Risks of AutoML | Ren Pang, Zhaohan Xi, Shouling Ji, Xiapu Luo, Ting Wang |
USENIX Security '22 | Morphuzz: Bending (Input) Space to Fuzz Virtual Devices | Alexander Bulekov, Bandan Das, Stefan Hajnoczi, Manuel Egele |
USENIX Security '22 | Towards More Robust Keyword Spotting for Voice Assistants | Shimaa Ahmed, Ilia Shumailov, Nicolas Papernot, Kassem Fawaz |
USENIX Security '22 | Web Cache Deception Escalates! | Seyed Ali Mirheidari, Matteo Golinelli, Kaan Onarlioglu, Engin Kirda, Bruno Crispo |
USENIX Security '22 | Exploring the Unchartered Space of Container Registry Typosquatting | Guannan Liu, Xing Gao, Haining Wang, Kun Sun |
USENIX Security '22 | Can one hear the shape of a neural network?: Snooping the GPU via Magnetic Side Channel | |
USENIX Security '22 | Augmenting Decompiler Output with Learned Variable Names and Types | Qibin Chen, Jeremy Lacomis, Edward J. Schwartz, Claire Le Goues, Graham Neubig, Bogdan Vasilescu |
USENIX Security '22 | Inference Attacks Against Graph Neural Networks | Zhikun Zhang, Min Chen, Michael Backes, Yun Shen, Yang Zhang |
USENIX Security '22 | LinKRID: Vetting Imbalance Reference Counting in Linux kernel with Symbolic Execution | Jian Liu, Lin Yi, Weiteng Chen, Chengyu Song, Zhiyun Qian, Qiuping Yi |