USENIX Security '22 | Anycast Agility: Network Playbooks to Fight DDoS | A S M Rizvi, Leandro Bertholdo, João Ceron, John Heidemann |
USENIX Security '22 | PolyCruise: A Cross-Language Dynamic Information Flow Analysis | Wen Li, Jiang Ming, Xiapu Luo, Haipeng Cai |
USENIX Security '22 | Communication-Efficient Triangle Counting under Local Differential Privacy | Jacob Imola, Takao Murakami, Kamalika Chaudhuri |
USENIX Security '22 | Seeing the Forest for the Trees: Understanding Security Hazards in the 3GPP Ecosystem through Intelligent Analysis on Change Requests | Yi Chen, Di Tang, Yepeng Yao, Mingming Zha, XiaoFeng Wang, Xiaozhong Liu, Haixu Tang, Dongfang Zhao |
USENIX Security '22 | Hyperproofs: Aggregating and Maintaining Proofs in Vector Commitments | Shravan Srinivasan, Alexander Chepurnoy, Charalampos Papamanthou, Alin Tomescu, Yupeng Zhang |
USENIX Security '22 | Leaky Forms: A Study of Email and Password Exfiltration Before Form Submission | Asuman Senol, Gunes Acar, Mathias Humbert, Frederik Zuiderveen Borgesius |
USENIX Security '22 | Using Trātṛ to tame Adversarial Synchronization | Yuvraj Patel, Chenhao Ye, Akshat Sinha, Abigail Matthews, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, Michael M. Swift |
USENIX Security '22 | Security Analysis of Camera-LiDAR Fusion Against Black-Box Attacks on Autonomous Vehicles | R. Spencer Hallyburton, Yupei Liu, Yulong Cao, Z. Morley Mao, Miroslav Pajic |
USENIX Security '22 | Automated Detection of Automated Traffic | Cormac Herley |
USENIX Security '22 | Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging | Patrick Leu, Giovanni Camurati, Alexander Heinrich, Marc Roeschlin, Claudio Anliker, Matthias Hollick, Srdjan Capkun, Jiska Classen |
USENIX Security '22 | Transferring Adversarial Robustness Through Robust Representation Matching | Pratik Vaishnavi, Kevin Eykholt, Amir Rahmati |
USENIX Security '22 | Constant-weight PIR: Single-round Keyword PIR via Constant-weight Equality Operators | Rasoul Akhavan Mahdavi, Florian Kerschbaum |
USENIX Security '22 | Provably-Safe Multilingual Software Sandboxing using WebAssembly | Jay Bosamiya, Wen Shih Lim, Bryan Parno |
USENIX Security '22 | ALASTOR: Reconstructing the Provenance of Serverless Intrusions | Pubali Datta, Isaac Polinsky, Muhammad Adil Inam, Adam Bates, William Enck |
USENIX Security '22 | Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era | Changjiang Li, Li Wang, Shouling Ji, Xuhong Zhang, Zhaohan Xi, Shanqing Guo, Ting Wang |
USENIX Security '22 | On the Necessity of Auditable Algorithmic Definitions for Machine Unlearning | Anvith Thudi, Hengrui Jia, Ilia Shumailov, Nicolas Papernot |
USENIX Security '22 | Might I Get Pwned: A Second Generation Compromised Credential Checking Service | Bijeeta Pal, Mazharul Islam, Marina Sanusi Bohuk, Nick Sullivan, Luke Valenta, Tara Whalen, Christopher Wood, Thomas Ristenpart, Rahul Chatterjee |
USENIX Security '22 | Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture | Xinyu Tang, Saeed Mahloujifar, Liwei Song, Virat Shejwalkar, Milad Nasr, Amir Houmansadr, Prateek Mittal |
USENIX Security '22 | OS-Aware Vulnerability Prioritization via Differential Severity Analysis | Qiushi Wu, Yue Xiao, Xiaojing Liao, Kangjie Lu |
USENIX Security '22 | Efficient Representation of Numerical Optimization Problems for SNARKs | Sebastian Angel, Andrew J. Blumberg, Eleftherios Ioannidis, Jess Woods |
USENIX Security '22 | Experimenting with Collaborative zk-SNARKs: Zero-Knowledge Proofs for Distributed Secrets | Alex Ozdemir, Dan Boneh |
USENIX Security '22 | Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among Experts and Non-Experts in a Corporate Context | Veroniek Binkhorst, Tobias Fiebig, Katharina Krombholz, Wolter Pieters, Katsiaryna Labunets |
USENIX Security '22 | GAROTA: Generalized Active Root-Of-Trust Architecture (for Tiny Embedded Devices) | Esmerald Aliaj, Ivan De Oliveira Nunes, Gene Tsudik |
USENIX Security '22 | A Large-scale and Longitudinal Measurement Study of DKIM Deployment | Chuhan Wang, Kaiwen Shen, Minglei Guo, Yuxuan Zhao, Mingming Zhang, Jianjun Chen, Baojun Liu, Xiaofeng Zheng, Haixin Duan, Yanzhong Lin, Qingfeng Pan |
USENIX Security '22 | Neither Access nor Control: A Longitudinal Investigation of the Efficacy of User Access-Control Solutions on Smartphones | Masoud Mehrabi Koushki, Yue Huang, Julia Rubin, Konstantin Beznosov |