Search results

    USENIX Security '22Phish in Sheep's Clothing: Exploring the Authentication Pitfalls of Browser FingerprintingXu Lin, Panagiotis Ilia, Saumya Solanki, Jason Polakis
    USENIX Security '22ReZone: Disarming TrustZone with TEE Privilege ReductionDavid Cerdeira, José Martins, Nuno Santos, Sandro Pinto
    USENIX Security '22SARA: Secure Android Remote AuthorizationAbdullah Imran, Habiba Farrukh, Muhammad Ibrahim, Z. Berkay Celik, Antonio Bianchi
    USENIX Security '22Attacks on Deidentification's DefensesAloni Cohen
    USENIX Security '22Leaky Forms: A Study of Email and Password Exfiltration Before Form SubmissionAsuman Senol, Gunes Acar, Mathias Humbert, Frederik Zuiderveen Borgesius
    USENIX Security '22Security Analysis of Camera-LiDAR Fusion Against Black-Box Attacks on Autonomous VehiclesR. Spencer Hallyburton, Yupei Liu, Yulong Cao, Z. Morley Mao, Miroslav Pajic
    USENIX Security '22Automated Detection of Automated TrafficCormac Herley
    USENIX Security '22Backporting Security Patches of Web Applications: A Prototype Design and Implementation on Injection Vulnerability PatchesYoukun Shi, Yuan Zhang, Tianhan Luo, Xiangyu Mao, Yinzhi Cao, Ziwen Wang, Yudi Zhao, Zongan Huang, Min Yang
    USENIX Security '22How Machine Learning Is Solving the Binary Function Similarity ProblemAndrea Marcelli, Mariano Graziano, Xabier Ugarte-Pedrero, Yanick Fratantonio, Mohamad Mansouri, Davide Balzarotti
    USENIX Security '22Towards More Robust Keyword Spotting for Voice AssistantsShimaa Ahmed, Ilia Shumailov, Nicolas Papernot, Kassem Fawaz
    USENIX Security '22VerLoc: Verifiable Localization in Decentralized SystemsKatharina Kohls, Claudia Diaz
    USENIX Security '22Omnes pro uno: Practical Multi-Writer Encrypted DatabaseJiafan Wang, Sherman S. M. Chow
    USENIX Security '2299% False Positives: A Qualitative Study of SOC Analysts' Perspectives on Security AlarmsBushra A. Alahmadi, Louise Axon, Ivan Martinovic
    USENIX Security '22RE-Mind: a First Look Inside the Mind of a Reverse EngineerAlessandro Mantovani, Simone Aonzo, Yanick Fratantonio, Davide Balzarotti
    USENIX Security '22FreeWill: Automatically Diagnosing Use-after-free Bugs via Reference Miscounting Detection on BinariesLiang He, Hong Hu, Purui Su, Yan Cai, Zhenkai Liang
    USENIX Security '22ALASTOR: Reconstructing the Provenance of Serverless IntrusionsPubali Datta, Isaac Polinsky, Muhammad Adil Inam, Adam Bates, William Enck
    USENIX Security '22Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake EraChangjiang Li, Li Wang, Shouling Ji, Xuhong Zhang, Zhaohan Xi, Shanqing Guo, Ting Wang
    USENIX Security '22Who Are You (I Really Wanna Know)? Detecting Audio DeepFakes Through Vocal Tract ReconstructionLogan Blue, Kevin Warren, Hadi Abdullah, Cassidy Gibson, Luis Vargas, Jessica O'Dell, Kevin Butler, Patrick Traynor
    USENIX Security '22Shuffle-based Private Set Union: Faster and More SecureYanxue Jia, Shi-Feng Sun, Hong-Sheng Zhou, Jiajun Du, Dawu Gu
    USENIX Security '22SAID: State-aware Defense Against Injection Attacks on In-vehicle NetworkLei Xue, Yangyang Liu, Tianqi Li, Kaifa Zhao, Jianfeng Li, Le Yu, Xiapu Luo, Yajin Zhou, Guofei Gu
    USENIX Security '22Understanding and Improving Usability of Data Dashboards for Simplified Privacy Control of Voice Assistant DataVandit Sharma, Mainack Mondal
    USENIX Security '22Rendering Contention Channel Made Practical in Web BrowsersShujiang Wu, Jianjia Yu, Min Yang, Yinzhi Cao
    USENIX Security '22Stick It to The Man: Correcting for Non-Cooperative Behavior of Subjects in Experiments on Social NetworksKaleigh Clary, Emma Tosch, Jeremiah Onaolapo, David D. Jensen
    USENIX Security '22Total Eclipse of the Heart – Disrupting the InterPlanetary File SystemBernd Prünster, Alexander Marsalek, Thomas Zefferer
    USENIX Security '22Post-Quantum Cryptography with Contemporary Co-Processors: Beyond Kronecker, Schönhage-Strassen & NussbaumerJoppe W. Bos, Joost Renes, Christine van Vredendaal