USENIX Security '22 | Exploring the Unchartered Space of Container Registry Typosquatting | |
USENIX Security '22 | Can one hear the shape of a neural network?: Snooping the GPU via Magnetic Side Channel | |
USENIX Security '22 | Augmenting Decompiler Output with Learned Variable Names and Types | |
USENIX Security '22 | Inference Attacks Against Graph Neural Networks | |
USENIX Security '22 | LinKRID: Vetting Imbalance Reference Counting in Linux kernel with Symbolic Execution | |
USENIX Security '22 | Total Eclipse of the Heart – Disrupting the InterPlanetary File System | |
USENIX Security '22 | Post-Quantum Cryptography with Contemporary Co-Processors: Beyond Kronecker, Schönhage-Strassen & Nussbaumer | |
USENIX Security '22 | MAGE: Mutual Attestation for a Group of Enclaves without Trusted Third Parties | |
USENIX Security '22 | Security and Privacy Perceptions of Third-Party Application Access for Google Accounts | |
USENIX Security '22 | Online Website Fingerprinting: Evaluating Website Fingerprinting Attacks on Tor in the Real World | |
USENIX Security '22 | Rapid Prototyping for Microarchitectural Attacks | |
USENIX Security '22 | Caring about Sharing: User Perceptions of Multiparty Data Sharing | |
USENIX Security '22 | Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope | |
USENIX Security '22 | Holistic Control-Flow Protection on Real-Time Embedded Systems with Kage | |
USENIX Security '22 | "I feel invaded, annoyed, anxious and I may protect myself": Individuals' Feelings about Online Tracking and their Protective Behaviour across Gender and Country | |
USENIX Security '22 | Mistrust Plugins You Must: A Large-Scale Study Of Malicious Plugins In WordPress Marketplaces | |
USENIX Security '22 | On the Security Risks of AutoML | |
USENIX Security '22 | Morphuzz: Bending (Input) Space to Fuzz Virtual Devices | |
USENIX Security '22 | A Large-scale Temporal Measurement of Android Malicious Apps: Persistence, Migration, and Lessons Learned | |
USENIX Security '22 | Midas: Systematic Kernel TOCTTOU Protection | |
USENIX Security '22 | Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX | |
USENIX Security '22 | Orca: Blocklisting in Sender-Anonymous Messaging | |
USENIX Security '22 | OpenSSLNTRU: Faster post-quantum TLS key exchange | |
USENIX Security '22 | "OK, Siri" or "Hey, Google": Evaluating Voiceprint Distinctiveness via Content-based PROLE Score | |
USENIX Security '22 | PISTIS: Trusted Computing Architecture for Low-end Embedded Systems | |