Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '22Caring about Sharing: User Perceptions of Multiparty Data SharingBailey Kacsmar, Kyle Tilbury, Miti Mazmudar, Florian Kerschbaum
    USENIX Security '22Spoki: Unveiling a New Wave of Scanners through a Reactive Network TelescopeRaphael Hiesgen, Marcin Nawrocki, Alistair King, Alberto Dainotti, Thomas C. Schmidt, Matthias Wählisch
    USENIX Security '22Holistic Control-Flow Protection on Real-Time Embedded Systems with KageYufei Du, Zhuojia Shen, Komail Dharsee, Jie Zhou, Robert J. Walls, John Criswell
    USENIX Security '22"I feel invaded, annoyed, anxious and I may protect myself": Individuals' Feelings about Online Tracking and their Protective Behaviour across Gender and CountryKovila P.L. Coopamootoo, Maryam Mehrnezhad, Ehsan Toreini
    USENIX Security '22Mistrust Plugins You Must: A Large-Scale Study Of Malicious Plugins In WordPress MarketplacesRanjita Pai Kasturi, Jonathan Fuller, Yiting Sun, Omar Chabklo, Andres Rodriguez, Jeman Park, Brendan Saltaformaggio
    USENIX Security '22On the Security Risks of AutoMLRen Pang, Zhaohan Xi, Shouling Ji, Xiapu Luo, Ting Wang
    USENIX Security '22Morphuzz: Bending (Input) Space to Fuzz Virtual DevicesAlexander Bulekov, Bandan Das, Stefan Hajnoczi, Manuel Egele
    USENIX Security '22Towards More Robust Keyword Spotting for Voice AssistantsShimaa Ahmed, Ilia Shumailov, Nicolas Papernot, Kassem Fawaz
    USENIX Security '22Web Cache Deception Escalates!Seyed Ali Mirheidari, Matteo Golinelli, Kaan Onarlioglu, Engin Kirda, Bruno Crispo
    USENIX Security '22Exploring the Unchartered Space of Container Registry TyposquattingGuannan Liu, Xing Gao, Haining Wang, Kun Sun
    USENIX Security '22Can one hear the shape of a neural network?: Snooping the GPU via Magnetic Side Channel
    USENIX Security '22Augmenting Decompiler Output with Learned Variable Names and TypesQibin Chen, Jeremy Lacomis, Edward J. Schwartz, Claire Le Goues, Graham Neubig, Bogdan Vasilescu
    USENIX Security '22Inference Attacks Against Graph Neural NetworksZhikun Zhang, Min Chen, Michael Backes, Yun Shen, Yang Zhang
    USENIX Security '22LinKRID: Vetting Imbalance Reference Counting in Linux kernel with Symbolic ExecutionJian Liu, Lin Yi, Weiteng Chen, Chengyu Song, Zhiyun Qian, Qiuping Yi
    USENIX Security '22Total Eclipse of the Heart – Disrupting the InterPlanetary File SystemBernd Prünster, Alexander Marsalek, Thomas Zefferer
    USENIX Security '22Post-Quantum Cryptography with Contemporary Co-Processors: Beyond Kronecker, Schönhage-Strassen & NussbaumerJoppe W. Bos, Joost Renes, Christine van Vredendaal
    USENIX Security '22MAGE: Mutual Attestation for a Group of Enclaves without Trusted Third PartiesGuoxing Chen, Yinqian Zhang
    USENIX Security '22Debloating Address SanitizerYuchen Zhang, Chengbin Pang, Georgios Portokalidis, Nikos Triandopoulos, Jun Xu
    USENIX Security '22Synthetic Data – Anonymisation Groundhog DayTheresa Stadler, Bristena Oprisanu, Carmela Troncoso
    USENIX Security '22FReD: Identifying File Re-Delegation in Android System ServicesSigmund Albert Gorski III, Seaver Thorn, William Enck, Haining Chen
    USENIX Security '22WebGraph: Capturing Advertising and Tracking Information Flows for Robust BlockingSandra Siby, Umar Iqbal, Steven Englehardt, Zubair Shafiq, Carmela Troncoso
    USENIX Security '22Adversarial Detection Avoidance Attacks: Evaluating the robustness of perceptual hashing-based client-side scanningShubham Jain, Ana-Maria Crețu, Yves-Alexandre de Montjoye
    USENIX Security '22Elasticlave: An Efficient Memory Model for EnclavesJason Zhijingcheng Yu, Shweta Shinde, Trevor E. Carlson, Prateek Saxena
    USENIX Security '22Practical Data Access Minimization in Trigger-Action PlatformsYunang Chen, Mohannad Alhanahnah, Andrei Sabelfeld, Rahul Chatterjee, Earlence Fernandes
    USENIX Security '22Bedrock: Programmable Network Support for Secure RDMA SystemsJiarong Xing, Kuo-Feng Hsu, Yiming Qiu, Ziyang Yang, Hongyi Liu, Ang Chen

Pages