USENIX Security '22 | FreeWill: Automatically Diagnosing Use-after-free Bugs via Reference Miscounting Detection on Binaries | Liang He, Hong Hu, Purui Su, Yan Cai, Zhenkai Liang |
USENIX Security '22 | ReZone: Disarming TrustZone with TEE Privilege Reduction | David Cerdeira, José Martins, Nuno Santos, Sandro Pinto |
USENIX Security '22 | Double Trouble: Combined Heterogeneous Attacks on Non-Inclusive Cache Hierarchies | Antoon Purnal, Furkan Turan, Ingrid Verbauwhede |
USENIX Security '22 | The Dangers of Human Touch: Fingerprinting Browser Extensions through User Actions | Konstantinos Solomos, Panagiotis Ilia, Soroush Karami, Nick Nikiforakis, Jason Polakis |
USENIX Security '22 | MundoFuzz: Hypervisor Fuzzing with Statistical Coverage Testing and Grammar Inference | Cheolwoo Myung, Gwangmu Lee, Byoungyoung Lee |
USENIX Security '22 | Exploring the Security Boundary of Data Reconstruction via Neuron Exclusivity Analysis | Xudong Pan, Mi Zhang, Yifan Yan, Jiaming Zhu, Zhemin Yang |
USENIX Security '22 | SARA: Secure Android Remote Authorization | Abdullah Imran, Habiba Farrukh, Muhammad Ibrahim, Z. Berkay Celik, Antonio Bianchi |
USENIX Security '22 | Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster Design | Alon Shakevsky, Eyal Ronen, Avishai Wool |
USENIX Security '22 | Counting in Regexes Considered Harmful: Exposing ReDoS Vulnerability of Nonbacktracking Matchers | Lenka Turoňová, Lukáš Holík, Ivan Homoliak, Ondřej Lengál, Margus Veanes, Tomáš Vojnar |
USENIX Security '22 | SCRAPS: Scalable Collective Remote Attestation for Pub-Sub IoT Networks with Untrusted Proxy Verifier | Lukas Petzi, Ala Eddine Ben Yahya, Alexandra Dmitrienko, Gene Tsudik, Thomas Prantl, Samuel Kounev |
USENIX Security '22 | Poisoning Attacks to Local Differential Privacy Protocols for Key-Value Data | Yongji Wu, Xiaoyu Cao, Jinyuan Jia, Neil Zhenqiang Gong |
USENIX Security '22 | Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs | Jayakrishna Vadayath, Moritz Eckert, Kyle Zeng, Nicolaas Weideman, Gokulkrishna Praveen Menon, Yanick Fratantonio, Davide Balzarotti, Adam Doupé, Tiffany Bao, Ruoyu Wang, Christophe Hauser, Yan Shoshitaishvili |
USENIX Security '22 | Breaking Bridgefy, again: Adopting libsignal is not enough | Martin R. Albrecht, Raphael Eikenberg, Kenneth G. Paterson |
USENIX Security '22 | "The Same PIN, Just Longer": On the (In)Security of Upgrading PINs from 4 to 6 Digits | Collins W. Munyendo, Philipp Markert, Alexandra Nisenoff, Miles Grant, Elena Korkes, Blase Ur, Adam J. Aviv |
USENIX Security '22 | Networks of Care: Tech Abuse Advocates' Digital Security Practices | Julia Slupska, Angelika Strohmayer |
USENIX Security '22 | Khaleesi: Breaker of Advertising and Tracking Request Chains | Umar Iqbal, Charlie Wolfe, Charles Nguyen, Steven Englehardt, Zubair Shafiq |
USENIX Security '22 | DeepPhish: Understanding User Trust Towards Artificially Generated Profiles in Online Social Networks | Jaron Mink, Licheng Luo, Natã M. Barbosa, Olivia Figueira, Yang Wang, Gang Wang |
USENIX Security '22 | TLB;DR: Enhancing TLB-based Attacks with TLB Desynchronized Reverse Engineering | Andrei Tatar, Daniël Trujillo, Cristiano Giuffrida, Herbert Bos |
USENIX Security '22 | Playing Without Paying: Detecting Vulnerable Payment Verification in Native Binaries of Unity Mobile Games | Chaoshun Zuo, Zhiqiang Lin |
USENIX Security '22 | Building an Open, Robust, and Stable Voting-Based Domain Top List | Qinge Xie, Shujun Tang, Xiaofeng Zheng, Qingran Lin, Baojun Liu, Haixin Duan, Frank Li |
USENIX Security '22 | Many Roads Lead To Rome: How Packet Headers Influence DNS Censorship Measurement | Abhishek Bhaskar, Paul Pearce |
USENIX Security '22 | Minefield: A Software-only Protection for SGX Enclaves against DVFS Attacks | Andreas Kogler, Daniel Gruss, Michael Schwarz |
USENIX Security '22 | Attacks on Deidentification's Defenses | Aloni Cohen |
USENIX Security '22 | In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer Authentication | Sungbae Yoo, Jinbum Park, Seolheui Kim, Yeji Kim, Taesoo Kim |
USENIX Security '22 | Unleash the Simulacrum: Shifting Browser Realities for Robust Extension-Fingerprinting Prevention | Soroush Karami, Faezeh Kalantari, Mehrnoosh Zaeifi, Xavier J. Maso, Erik Trickel, Panagiotis Ilia, Yan Shoshitaishvili, Adam Doupé, Jason Polakis |