Search results

    USENIX Security '22Stick It to The Man: Correcting for Non-Cooperative Behavior of Subjects in Experiments on Social Networks
    USENIX Security '22Mining Node.js Vulnerabilities via Object Dependence Graph and Query
    USENIX Security '22Aardvark: An Asynchronous Authenticated Dictionary with Applications to Account-based Cryptocurrencies
    USENIX Security '22OVRseen: Auditing Network Traffic and Privacy Policies in Oculus VR
    USENIX Security '22Lumos: Identifying and Localizing Diverse Hidden IoT Devices in an Unfamiliar Environment
    USENIX Security '22AMD Prefetch Attacks through Power and Time
    USENIX Security '22ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models
    USENIX Security '22Jenny: Securing Syscalls for PKU-based Memory Isolation Systems
    USENIX Security '22DoubleStar: Long-Range Attack Towards Depth Estimation based Obstacle Avoidance in Autonomous Systems
    USENIX Security '22PrivGuard: Privacy Regulation Compliance Made Easier
    USENIX Security '22DeepDi: Learning a Relational Graph Convolutional Network Model on Instructions for Fast and Accurate Disassembly
    USENIX Security '22Understanding and Improving Usability of Data Dashboards for Simplified Privacy Control of Voice Assistant Data
    USENIX Security '22Helping hands: Measuring the impact of a large threat intelligence sharing community
    USENIX Security '22Back-Propagating System Dependency Impact for Attack Investigation
    USENIX Security '22SecSMT: Securing SMT Processors against Contention-Based Covert Channels
    USENIX Security '22Increasing Adversarial Uncertainty to Scale Private Similarity Testing
    USENIX Security '22"How Do You Not Lose Friends?": Synthesizing a Design Space of Social Controls for Securing Shared Digital Resources Via Participatory Design Jams
    USENIX Security '22Your Microphone Array Retains Your Identity: A Robust Voice Liveness Detection System for Smart Speakers
    USENIX Security '22An Audit of Facebook's Political Ad Policy Enforcement
    USENIX Security '22Rendering Contention Channel Made Practical in Web Browsers
    USENIX Security '22SAID: State-aware Defense Against Injection Attacks on In-vehicle Network
    USENIX Security '22Automated Side Channel Analysis of Media Software with Manifold Learning
    USENIX Security '22Private Signaling
    USENIX Security '22Branch History Injection: On the Effectiveness of Hardware Mitigations Against Cross-Privilege Spectre-v2 Attacks
    USENIX Security '22Playing for K(H)eaps: Understanding and Improving Linux Kernel Exploit Reliability