Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '22Neither Access nor Control: A Longitudinal Investigation of the Efficacy of User Access-Control Solutions on SmartphonesMasoud Mehrabi Koushki, Yue Huang, Julia Rubin, Konstantin Beznosov
    USENIX Security '22Jenny: Securing Syscalls for PKU-based Memory Isolation SystemsDavid Schrammel, Samuel Weiser, Richard Sadek, Stefan Mangard
    USENIX Security '22ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning ModelsYugeng Liu, Rui Wen, Xinlei He, Ahmed Salem, Zhikun Zhang, Michael Backes, Emiliano De Cristofaro, Mario Fritz, Yang Zhang
    USENIX Security '22A Large-scale Investigation into Geodifferences in Mobile AppsRenuka Kumar, Apurva Virkud, Ram Sundara Raman, Atul Prakash, Roya Ensafi
    USENIX Security '22Helping hands: Measuring the impact of a large threat intelligence sharing communityXander Bouwman, Victor Le Pochat, Pawel Foremski, Tom Van Goethem, Carlos H. Gañán, Giovane C. M. Moura, Samaneh Tajalizadehkhoob, Wouter Joosen, Michel van Eeten
    USENIX Security '22LTrack: Stealthy Tracking of Mobile Phones in LTEMartin Kotuliak, Simon Erni, Patrick Leu, Marc Röschlin, Srdjan Čapkun
    USENIX Security '22Inference Attacks Against Graph Neural NetworksZhikun Zhang, Min Chen, Michael Backes, Yun Shen, Yang Zhang
    USENIX Security '22Efficient Differentially Private Secure Aggregation for Federated Learning via Hardness of Learning with ErrorsTimothy Stevens, Christian Skalka, Christelle Vincent, John Ring, Samuel Clark, Joseph Near
    USENIX Security '22Label Inference Attacks Against Vertical Federated LearningChong Fu, Xuhong Zhang, Shouling Ji, Jinyin Chen, Jingzheng Wu, Shanqing Guo, Jun Zhou, Alex X. Liu, Ting Wang
    USENIX Security '22FLAME: Taming Backdoors in Federated LearningThien Duc Nguyen, Phillip Rieger, Huili Chen, Hossein Yalame, Helen Möllering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Shaza Zeitouni, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider
    USENIX Security '22"Like Lesbians Walking the Perimeter": Experiences of U.S. LGBTQ+ Folks With Online Security, Safety, and Privacy AdviceChristine Geeng, Mike Harris, Elissa Redmiles, Franziska Roesner
    USENIX Security '22Midas: Systematic Kernel TOCTTOU ProtectionAtri Bhattacharyya, Uros Tesic, Mathias Payer
    USENIX Security '22Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification ModelsShagufta Mehnaz, Sayanton V. Dibbo, Ehsanul Kabir, Ninghui Li, Elisa Bertino
    USENIX Security '22A Large-scale and Longitudinal Measurement Study of DKIM DeploymentChuhan Wang, Kaiwen Shen, Minglei Guo, Yuxuan Zhao, Mingming Zhang, Jianjun Chen, Baojun Liu, Xiaofeng Zheng, Haixin Duan, Yanzhong Lin, Qingfeng Pan
    USENIX Security '22Synthetic Data – Anonymisation Groundhog DayTheresa Stadler, Bristena Oprisanu, Carmela Troncoso
    USENIX Security '22GhostTouch: Targeted Attacks on Touchscreens without Physical TouchKai Wang, Richard Mitev, Chen Yan, Xiaoyu Ji, Ahmad-Reza Sadeghi, Wenyuan Xu
    USENIX Security '22SARA: Secure Android Remote AuthorizationAbdullah Imran, Habiba Farrukh, Muhammad Ibrahim, Z. Berkay Celik, Antonio Bianchi
    USENIX Security '22FOAP: Fine-Grained Open-World Android App FingerprintingJianfeng Li, Hao Zhou, Shuohan Wu, Xiapu Luo, Ting Wang, Xian Zhan, Xiaobo Ma
    USENIX Security '22Automated Detection of Automated TrafficCormac Herley
    USENIX Security '22DeepPhish: Understanding User Trust Towards Artificially Generated Profiles in Online Social NetworksJaron Mink, Licheng Luo, Natã M. Barbosa, Olivia Figueira, Yang Wang, Gang Wang
    USENIX Security '22Constant-weight PIR: Single-round Keyword PIR via Constant-weight Equality OperatorsRasoul Akhavan Mahdavi, Florian Kerschbaum
    USENIX Security '22Phish in Sheep's Clothing: Exploring the Authentication Pitfalls of Browser FingerprintingXu Lin, Panagiotis Ilia, Saumya Solanki, Jason Polakis
    USENIX Security '22Increasing Adversarial Uncertainty to Scale Private Similarity TestingYiqing Hua, Armin Namavari, Kaishuo Cheng, Mor Naaman, Thomas Ristenpart
    USENIX Security '22SAID: State-aware Defense Against Injection Attacks on In-vehicle NetworkLei Xue, Yangyang Liu, Tianqi Li, Kaifa Zhao, Jianfeng Li, Le Yu, Xiapu Luo, Yajin Zhou, Guofei Gu
    USENIX Security '22Towards Automatically Reverse Engineering Vehicle Diagnostic ProtocolsLe Yu, Yangyang Liu, Pengfei Jing, Xiapu Luo, Lei Xue, Kaifa Zhao, Yajin Zhou, Ting Wang, Guofei Gu, Sen Nie, Shi Wu

Pages