USENIX Security '22 | SecSMT: Securing SMT Processors against Contention-Based Covert Channels | Mohammadkazem Taram, Xida Ren, Ashish Venkat, Dean Tullsen |
USENIX Security '22 | Increasing Adversarial Uncertainty to Scale Private Similarity Testing | Yiqing Hua, Armin Namavari, Kaishuo Cheng, Mor Naaman, Thomas Ristenpart |
USENIX Security '22 | "How Do You Not Lose Friends?": Synthesizing a Design Space of Social Controls for Securing Shared Digital Resources Via Participatory Design Jams | Eyitemi Moju-Igbene, Hanan Abdi, Alan Lu, Sauvik Das |
USENIX Security '22 | Your Microphone Array Retains Your Identity: A Robust Voice Liveness Detection System for Smart Speakers | Yan Meng, Jiachun Li, Matthew Pillari, Arjun Deopujari, Liam Brennan, Hafsah Shamsie, Haojin Zhu, Yuan Tian |
USENIX Security '22 | Aardvark: An Asynchronous Authenticated Dictionary with Applications to Account-based Cryptocurrencies | Derek Leung, Yossi Gilad, Sergey Gorbunov, Leonid Reyzin, Nickolai Zeldovich |
USENIX Security '22 | OVRseen: Auditing Network Traffic and Privacy Policies in Oculus VR | Rahmadi Trimananda, Hieu Le, Hao Cui, Janice Tran Ho, Anastasia Shuba, Athina Markopoulou |
USENIX Security '22 | Lumos: Identifying and Localizing Diverse Hidden IoT Devices in an Unfamiliar Environment | Rahul Anand Sharma, Elahe Soltanaghaei, Anthony Rowe, Vyas Sekar |
USENIX Security '22 | AMD Prefetch Attacks through Power and Time | Moritz Lipp, Daniel Gruss, Michael Schwarz |
USENIX Security '22 | ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models | Yugeng Liu, Rui Wen, Xinlei He, Ahmed Salem, Zhikun Zhang, Michael Backes, Emiliano De Cristofaro, Mario Fritz, Yang Zhang |
USENIX Security '22 | Jenny: Securing Syscalls for PKU-based Memory Isolation Systems | David Schrammel, Samuel Weiser, Richard Sadek, Stefan Mangard |
USENIX Security '22 | DoubleStar: Long-Range Attack Towards Depth Estimation based Obstacle Avoidance in Autonomous Systems | Ce Zhou, Qiben Yan, Yan Shi, Lichao Sun |
USENIX Security '22 | PrivGuard: Privacy Regulation Compliance Made Easier | Lun Wang, Usmann Khan, Joseph Near, Qi Pang, Jithendaraa Subramanian, Neel Somani, Peng Gao, Andrew Low, Dawn Song |
USENIX Security '22 | DeepDi: Learning a Relational Graph Convolutional Network Model on Instructions for Fast and Accurate Disassembly | Sheng Yu, Yu Qu, Xunchao Hu, Heng Yin |
USENIX Security '21 | Swiped: Analyzing Ground-truth Data of a Marketplace for Stolen Debit and Credit Cards | Maxwell Aliapoulios, Cameron Ballard, Rasika Bhalerao, Tobias Lauinger, Damon McCoy |
USENIX Security '21 | YARIX: Scalable YARA-based Malware Intelligence | Michael Brengel, Christian Rossow |
USENIX Security '21 | Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service | Zhibo Sun, Adam Oest, Penghui Zhang, Carlos Rubio-Medrano, Tiffany Bao, Ruoyu Wang, Ziming Zhao, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn |
USENIX Security '21 | Compromised or Attacker-Owned: A Large Scale Classification and Study of Hosting Domains of Malicious URLs | Ravindu De Silva, Mohamed Nabeel, Charith Elvitigala, Issa Khalil, Ting Yu, Chamath Keppitiyagama |
USENIX Security '21 | Helping Users Automatically Find and Manage Sensitive, Expendable Files in Cloud Storage | Mohammad Taha Khan, Christopher Tran, Shubham Singh, Dimitri Vasilkov, Chris Kanich, Blase Ur, Elena Zheleva |
USENIX Security '21 | The Circle Of Life: A Large-Scale Study of The IoT Malware Lifecycle | Omar Alrawi, Charles Lever, Kevin Valakuzhy, Ryan Court, Kevin Snow, Fabian Monrose, Manos Antonakakis |
USENIX Security '21 | Inexpensive Brainwave Authentication: New Techniques and Insights on User Acceptance | Patricia Arias-Cabarcos, Thilo Habrich, Karen Becker, Christian Becker, Thorsten Strufe |
USENIX Security '21 | MAZE: Towards Automated Heap Feng Shui | Yan Wang, Chao Zhang, Zixuan Zhao, Bolun Zhang, Xiaorui Gong, Wei Zou |
USENIX Security '21 | SelectiveTaint: Efficient Data Flow Tracking With Static Binary Rewriting | Sanchuan Chen, Zhiqiang Lin, Yinqian Zhang |
USENIX Security '21 | Experiences Deploying Multi-Vantage-Point Domain Validation at Let's Encrypt | Henry Birge-Lee, Liang Wang, Daniel McCarney, Roland Shoemaker, Jennifer Rexford, Prateek Mittal |
USENIX Security '21 | Coco: Co-Design and Co-Verification of Masked Software Implementations on CPUs | Barbara Gigerl, Vedad Hadzic, Robert Primas, Stefan Mangard, Roderick Bloem |
USENIX Security '21 | Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries | Dario Pasquini, Marco Cianfriglia, Giuseppe Ateniese, Massimo Bernaschi |