USENIX Security '22 | VerLoc: Verifiable Localization in Decentralized Systems | Katharina Kohls, Claudia Diaz |
USENIX Security '22 | Lamphone: Passive Sound Recovery from a Desk Lamp's Light Bulb Vibrations | Ben Nassi, Yaron Pirutin, Raz Swisa, Adi Shamir, Yuval Elovici, Boris Zadov |
USENIX Security '22 | Automating Cookie Consent and GDPR Violation Detection | Dino Bollinger, Karel Kubicek, Carlos Cotrini, David Basin |
USENIX Security '22 | LTrack: Stealthy Tracking of Mobile Phones in LTE | Martin Kotuliak, Simon Erni, Patrick Leu, Marc Röschlin, Srdjan Čapkun |
USENIX Security '22 | How to Abuse and Fix Authenticated Encryption Without Key Commitment | Ange Albertini, Thai Duong, Shay Gueron, Stefan Kölbl, Atul Luykx, Sophie Schmieg |
USENIX Security '22 | How Long Do Vulnerabilities Live in the Code? A Large-Scale Empirical Measurement Study on FOSS Vulnerability Lifetimes | Nikolaos Alexopoulos, Manuel Brack, Jan Philipp Wagner, Tim Grube, Max Mühlhäuser |
USENIX Security '22 | When Sally Met Trackers: Web Tracking From the Users' Perspective | Savino Dambra, Iskander Sanchez-Rola, Leyla Bilge, Davide Balzarotti |
USENIX Security '22 | Regulator: Dynamic Analysis to Detect ReDoS | Robert McLaughlin, Fabio Pagani, Noah Spahn, Christopher Kruegel, Giovanni Vigna |
USENIX Security '22 | Incremental Offline/Online PIR | Yiping Ma, Ke Zhong, Tal Rabin, Sebastian Angel |
USENIX Security '22 | Dos and Don'ts of Machine Learning in Computer Security | Daniel Arp, Erwin Quiring, Feargus Pendlebury, Alexander Warnecke, Fabio Pierazzi, Christian Wressnegger, Lorenzo Cavallaro, Konrad Rieck |
USENIX Security '22 | Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits | Octavian Suciu, Connor Nelson, Zhuoer Lyu, Tiffany Bao, Tudor Dumitraș |
USENIX Security '22 | An Audit of Facebook's Political Ad Policy Enforcement | Victor Le Pochat, Laura Edelson, Tom Van Goethem, Wouter Joosen, Damon McCoy, Tobias Lauinger |
USENIX Security '22 | Helping hands: Measuring the impact of a large threat intelligence sharing community | Xander Bouwman, Victor Le Pochat, Pawel Foremski, Tom Van Goethem, Carlos H. Gañán, Giovane C. M. Moura, Samaneh Tajalizadehkhoob, Wouter Joosen, Michel van Eeten |
USENIX Security '22 | Back-Propagating System Dependency Impact for Attack Investigation | Pengcheng Fang, Peng Gao, Changlin Liu, Erman Ayday, Kangkook Jee, Ting Wang, Yanfang (Fanny) Ye, Zhuotao Liu, Xusheng Xiao |
USENIX Security '22 | SecSMT: Securing SMT Processors against Contention-Based Covert Channels | Mohammadkazem Taram, Xida Ren, Ashish Venkat, Dean Tullsen |
USENIX Security '22 | Increasing Adversarial Uncertainty to Scale Private Similarity Testing | Yiqing Hua, Armin Namavari, Kaishuo Cheng, Mor Naaman, Thomas Ristenpart |
USENIX Security '22 | "How Do You Not Lose Friends?": Synthesizing a Design Space of Social Controls for Securing Shared Digital Resources Via Participatory Design Jams | Eyitemi Moju-Igbene, Hanan Abdi, Alan Lu, Sauvik Das |
USENIX Security '22 | Your Microphone Array Retains Your Identity: A Robust Voice Liveness Detection System for Smart Speakers | Yan Meng, Jiachun Li, Matthew Pillari, Arjun Deopujari, Liam Brennan, Hafsah Shamsie, Haojin Zhu, Yuan Tian |
USENIX Security '22 | Aardvark: An Asynchronous Authenticated Dictionary with Applications to Account-based Cryptocurrencies | Derek Leung, Yossi Gilad, Sergey Gorbunov, Leonid Reyzin, Nickolai Zeldovich |
USENIX Security '22 | OVRseen: Auditing Network Traffic and Privacy Policies in Oculus VR | Rahmadi Trimananda, Hieu Le, Hao Cui, Janice Tran Ho, Anastasia Shuba, Athina Markopoulou |
USENIX Security '22 | Lumos: Identifying and Localizing Diverse Hidden IoT Devices in an Unfamiliar Environment | Rahul Anand Sharma, Elahe Soltanaghaei, Anthony Rowe, Vyas Sekar |
USENIX Security '22 | AMD Prefetch Attacks through Power and Time | Moritz Lipp, Daniel Gruss, Michael Schwarz |
USENIX Security '22 | ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models | Yugeng Liu, Rui Wen, Xinlei He, Ahmed Salem, Zhikun Zhang, Michael Backes, Emiliano De Cristofaro, Mario Fritz, Yang Zhang |
USENIX Security '22 | Jenny: Securing Syscalls for PKU-based Memory Isolation Systems | David Schrammel, Samuel Weiser, Richard Sadek, Stefan Mangard |
USENIX Security '22 | DoubleStar: Long-Range Attack Towards Depth Estimation based Obstacle Avoidance in Autonomous Systems | Ce Zhou, Qiben Yan, Yan Shi, Lichao Sun |