USENIX Security '22 | Caring about Sharing: User Perceptions of Multiparty Data Sharing | Bailey Kacsmar, Kyle Tilbury, Miti Mazmudar, Florian Kerschbaum |
USENIX Security '22 | Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope | Raphael Hiesgen, Marcin Nawrocki, Alistair King, Alberto Dainotti, Thomas C. Schmidt, Matthias Wählisch |
USENIX Security '22 | Holistic Control-Flow Protection on Real-Time Embedded Systems with Kage | Yufei Du, Zhuojia Shen, Komail Dharsee, Jie Zhou, Robert J. Walls, John Criswell |
USENIX Security '22 | "I feel invaded, annoyed, anxious and I may protect myself": Individuals' Feelings about Online Tracking and their Protective Behaviour across Gender and Country | Kovila P.L. Coopamootoo, Maryam Mehrnezhad, Ehsan Toreini |
USENIX Security '22 | Mistrust Plugins You Must: A Large-Scale Study Of Malicious Plugins In WordPress Marketplaces | Ranjita Pai Kasturi, Jonathan Fuller, Yiting Sun, Omar Chabklo, Andres Rodriguez, Jeman Park, Brendan Saltaformaggio |
USENIX Security '22 | On the Security Risks of AutoML | Ren Pang, Zhaohan Xi, Shouling Ji, Xiapu Luo, Ting Wang |
USENIX Security '22 | Morphuzz: Bending (Input) Space to Fuzz Virtual Devices | Alexander Bulekov, Bandan Das, Stefan Hajnoczi, Manuel Egele |
USENIX Security '22 | Towards More Robust Keyword Spotting for Voice Assistants | Shimaa Ahmed, Ilia Shumailov, Nicolas Papernot, Kassem Fawaz |
USENIX Security '22 | Web Cache Deception Escalates! | Seyed Ali Mirheidari, Matteo Golinelli, Kaan Onarlioglu, Engin Kirda, Bruno Crispo |
USENIX Security '22 | Exploring the Unchartered Space of Container Registry Typosquatting | Guannan Liu, Xing Gao, Haining Wang, Kun Sun |
USENIX Security '22 | Can one hear the shape of a neural network?: Snooping the GPU via Magnetic Side Channel | |
USENIX Security '22 | Augmenting Decompiler Output with Learned Variable Names and Types | Qibin Chen, Jeremy Lacomis, Edward J. Schwartz, Claire Le Goues, Graham Neubig, Bogdan Vasilescu |
USENIX Security '22 | Inference Attacks Against Graph Neural Networks | Zhikun Zhang, Min Chen, Michael Backes, Yun Shen, Yang Zhang |
USENIX Security '22 | LinKRID: Vetting Imbalance Reference Counting in Linux kernel with Symbolic Execution | Jian Liu, Lin Yi, Weiteng Chen, Chengyu Song, Zhiyun Qian, Qiuping Yi |
USENIX Security '22 | Total Eclipse of the Heart – Disrupting the InterPlanetary File System | Bernd Prünster, Alexander Marsalek, Thomas Zefferer |
USENIX Security '22 | Post-Quantum Cryptography with Contemporary Co-Processors: Beyond Kronecker, Schönhage-Strassen & Nussbaumer | Joppe W. Bos, Joost Renes, Christine van Vredendaal |
USENIX Security '22 | MAGE: Mutual Attestation for a Group of Enclaves without Trusted Third Parties | Guoxing Chen, Yinqian Zhang |
USENIX Security '22 | Debloating Address Sanitizer | Yuchen Zhang, Chengbin Pang, Georgios Portokalidis, Nikos Triandopoulos, Jun Xu |
USENIX Security '22 | Synthetic Data – Anonymisation Groundhog Day | Theresa Stadler, Bristena Oprisanu, Carmela Troncoso |
USENIX Security '22 | FReD: Identifying File Re-Delegation in Android System Services | Sigmund Albert Gorski III, Seaver Thorn, William Enck, Haining Chen |
USENIX Security '22 | WebGraph: Capturing Advertising and Tracking Information Flows for Robust Blocking | Sandra Siby, Umar Iqbal, Steven Englehardt, Zubair Shafiq, Carmela Troncoso |
USENIX Security '22 | Adversarial Detection Avoidance Attacks: Evaluating the robustness of perceptual hashing-based client-side scanning | Shubham Jain, Ana-Maria Crețu, Yves-Alexandre de Montjoye |
USENIX Security '22 | Elasticlave: An Efficient Memory Model for Enclaves | Jason Zhijingcheng Yu, Shweta Shinde, Trevor E. Carlson, Prateek Saxena |
USENIX Security '22 | Practical Data Access Minimization in Trigger-Action Platforms | Yunang Chen, Mohannad Alhanahnah, Andrei Sabelfeld, Rahul Chatterjee, Earlence Fernandes |
USENIX Security '22 | Bedrock: Programmable Network Support for Secure RDMA Systems | Jiarong Xing, Kuo-Feng Hsu, Yiming Qiu, Ziyang Yang, Hongyi Liu, Ang Chen |