Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '22VerLoc: Verifiable Localization in Decentralized SystemsKatharina Kohls, Claudia Diaz
    USENIX Security '22Lamphone: Passive Sound Recovery from a Desk Lamp's Light Bulb VibrationsBen Nassi, Yaron Pirutin, Raz Swisa, Adi Shamir, Yuval Elovici, Boris Zadov
    USENIX Security '22Automating Cookie Consent and GDPR Violation DetectionDino Bollinger, Karel Kubicek, Carlos Cotrini, David Basin
    USENIX Security '22LTrack: Stealthy Tracking of Mobile Phones in LTEMartin Kotuliak, Simon Erni, Patrick Leu, Marc Röschlin, Srdjan Čapkun
    USENIX Security '22How to Abuse and Fix Authenticated Encryption Without Key CommitmentAnge Albertini, Thai Duong, Shay Gueron, Stefan Kölbl, Atul Luykx, Sophie Schmieg
    USENIX Security '22How Long Do Vulnerabilities Live in the Code? A Large-Scale Empirical Measurement Study on FOSS Vulnerability LifetimesNikolaos Alexopoulos, Manuel Brack, Jan Philipp Wagner, Tim Grube, Max Mühlhäuser
    USENIX Security '22When Sally Met Trackers: Web Tracking From the Users' PerspectiveSavino Dambra, Iskander Sanchez-Rola, Leyla Bilge, Davide Balzarotti
    USENIX Security '22Regulator: Dynamic Analysis to Detect ReDoSRobert McLaughlin, Fabio Pagani, Noah Spahn, Christopher Kruegel, Giovanni Vigna
    USENIX Security '22Incremental Offline/Online PIRYiping Ma, Ke Zhong, Tal Rabin, Sebastian Angel
    USENIX Security '22Dos and Don'ts of Machine Learning in Computer SecurityDaniel Arp, Erwin Quiring, Feargus Pendlebury, Alexander Warnecke, Fabio Pierazzi, Christian Wressnegger, Lorenzo Cavallaro, Konrad Rieck
    USENIX Security '22Expected Exploitability: Predicting the Development of Functional Vulnerability ExploitsOctavian Suciu, Connor Nelson, Zhuoer Lyu, Tiffany Bao, Tudor Dumitraș
    USENIX Security '22An Audit of Facebook's Political Ad Policy EnforcementVictor Le Pochat, Laura Edelson, Tom Van Goethem, Wouter Joosen, Damon McCoy, Tobias Lauinger
    USENIX Security '22Helping hands: Measuring the impact of a large threat intelligence sharing communityXander Bouwman, Victor Le Pochat, Pawel Foremski, Tom Van Goethem, Carlos H. Gañán, Giovane C. M. Moura, Samaneh Tajalizadehkhoob, Wouter Joosen, Michel van Eeten
    USENIX Security '22Back-Propagating System Dependency Impact for Attack InvestigationPengcheng Fang, Peng Gao, Changlin Liu, Erman Ayday, Kangkook Jee, Ting Wang, Yanfang (Fanny) Ye, Zhuotao Liu, Xusheng Xiao
    USENIX Security '22SecSMT: Securing SMT Processors against Contention-Based Covert ChannelsMohammadkazem Taram, Xida Ren, Ashish Venkat, Dean Tullsen
    USENIX Security '22Increasing Adversarial Uncertainty to Scale Private Similarity TestingYiqing Hua, Armin Namavari, Kaishuo Cheng, Mor Naaman, Thomas Ristenpart
    USENIX Security '22"How Do You Not Lose Friends?": Synthesizing a Design Space of Social Controls for Securing Shared Digital Resources Via Participatory Design JamsEyitemi Moju-Igbene, Hanan Abdi, Alan Lu, Sauvik Das
    USENIX Security '22Your Microphone Array Retains Your Identity: A Robust Voice Liveness Detection System for Smart SpeakersYan Meng, Jiachun Li, Matthew Pillari, Arjun Deopujari, Liam Brennan, Hafsah Shamsie, Haojin Zhu, Yuan Tian
    USENIX Security '22Aardvark: An Asynchronous Authenticated Dictionary with Applications to Account-based CryptocurrenciesDerek Leung, Yossi Gilad, Sergey Gorbunov, Leonid Reyzin, Nickolai Zeldovich
    USENIX Security '22OVRseen: Auditing Network Traffic and Privacy Policies in Oculus VRRahmadi Trimananda, Hieu Le, Hao Cui, Janice Tran Ho, Anastasia Shuba, Athina Markopoulou
    USENIX Security '22Lumos: Identifying and Localizing Diverse Hidden IoT Devices in an Unfamiliar EnvironmentRahul Anand Sharma, Elahe Soltanaghaei, Anthony Rowe, Vyas Sekar
    USENIX Security '22AMD Prefetch Attacks through Power and TimeMoritz Lipp, Daniel Gruss, Michael Schwarz
    USENIX Security '22ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning ModelsYugeng Liu, Rui Wen, Xinlei He, Ahmed Salem, Zhikun Zhang, Michael Backes, Emiliano De Cristofaro, Mario Fritz, Yang Zhang
    USENIX Security '22Jenny: Securing Syscalls for PKU-based Memory Isolation SystemsDavid Schrammel, Samuel Weiser, Richard Sadek, Stefan Mangard
    USENIX Security '22DoubleStar: Long-Range Attack Towards Depth Estimation based Obstacle Avoidance in Autonomous SystemsCe Zhou, Qiben Yan, Yan Shi, Lichao Sun

Pages