Search results

    USENIX Security '22Exploring the Unchartered Space of Container Registry Typosquatting
    USENIX Security '22Can one hear the shape of a neural network?: Snooping the GPU via Magnetic Side Channel
    USENIX Security '22Augmenting Decompiler Output with Learned Variable Names and Types
    USENIX Security '22Inference Attacks Against Graph Neural Networks
    USENIX Security '22LinKRID: Vetting Imbalance Reference Counting in Linux kernel with Symbolic Execution
    USENIX Security '22Total Eclipse of the Heart – Disrupting the InterPlanetary File System
    USENIX Security '22Post-Quantum Cryptography with Contemporary Co-Processors: Beyond Kronecker, Schönhage-Strassen & Nussbaumer
    USENIX Security '22MAGE: Mutual Attestation for a Group of Enclaves without Trusted Third Parties
    USENIX Security '22Security and Privacy Perceptions of Third-Party Application Access for Google Accounts
    USENIX Security '22Online Website Fingerprinting: Evaluating Website Fingerprinting Attacks on Tor in the Real World
    USENIX Security '22Rapid Prototyping for Microarchitectural Attacks
    USENIX Security '22Caring about Sharing: User Perceptions of Multiparty Data Sharing
    USENIX Security '22Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope
    USENIX Security '22Holistic Control-Flow Protection on Real-Time Embedded Systems with Kage
    USENIX Security '22"I feel invaded, annoyed, anxious and I may protect myself": Individuals' Feelings about Online Tracking and their Protective Behaviour across Gender and Country
    USENIX Security '22Mistrust Plugins You Must: A Large-Scale Study Of Malicious Plugins In WordPress Marketplaces
    USENIX Security '22On the Security Risks of AutoML
    USENIX Security '22Morphuzz: Bending (Input) Space to Fuzz Virtual Devices
    USENIX Security '22A Large-scale Temporal Measurement of Android Malicious Apps: Persistence, Migration, and Lessons Learned
    USENIX Security '22Midas: Systematic Kernel TOCTTOU Protection
    USENIX Security '22Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX
    USENIX Security '22Orca: Blocklisting in Sender-Anonymous Messaging
    USENIX Security '22OpenSSLNTRU: Faster post-quantum TLS key exchange
    USENIX Security '22"OK, Siri" or "Hey, Google": Evaluating Voiceprint Distinctiveness via Content-based PROLE Score
    USENIX Security '22PISTIS: Trusted Computing Architecture for Low-end Embedded Systems