Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '22Empirical Understanding of Deletion Privacy: Experiences, Expectations, and MeasuresMohsen Minaei, Mainack Mondal, Aniket Kate
    USENIX Security '22Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among Experts and Non-Experts in a Corporate ContextVeroniek Binkhorst, Tobias Fiebig, Katharina Krombholz, Wolter Pieters, Katsiaryna Labunets
    USENIX Security '22CamShield: Securing Smart Cameras through Physical Replication and IsolationZhiwei Wang, Yihui Yan, Yueli Yan, Huangxun Chen, Zhice Yang
    USENIX Security '22TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable VulnerabilitiesRahul Kande, Addison Crump, Garrett Persyn, Patrick Jauernig, Ahmad-Reza Sadeghi, Aakash Tyagi, Jeyavijayan Rajendran
    USENIX Security '22Private SignalingVarun Madathil, Alessandra Scafuro, István András Seres, Omer Shlomovits, Denis Varlakov
    USENIX Security '22ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning ModelsYugeng Liu, Rui Wen, Xinlei He, Ahmed Salem, Zhikun Zhang, Michael Backes, Emiliano De Cristofaro, Mario Fritz, Yang Zhang
    USENIX Security '22Rapid Prototyping for Microarchitectural AttacksCatherine Easdon, Michael Schwarz, Martin Schwarzl, Daniel Gruss
    USENIX Security '22Can one hear the shape of a neural network?: Snooping the GPU via Magnetic Side Channel
    USENIX Security '22Augmenting Decompiler Output with Learned Variable Names and TypesQibin Chen, Jeremy Lacomis, Edward J. Schwartz, Claire Le Goues, Graham Neubig, Bogdan Vasilescu
    USENIX Security '22Lamphone: Passive Sound Recovery from a Desk Lamp's Light Bulb VibrationsBen Nassi, Yaron Pirutin, Raz Swisa, Adi Shamir, Yuval Elovici, Boris Zadov
    USENIX Security '22Dos and Don'ts of Machine Learning in Computer SecurityDaniel Arp, Erwin Quiring, Feargus Pendlebury, Alexander Warnecke, Fabio Pierazzi, Christian Wressnegger, Lorenzo Cavallaro, Konrad Rieck
    USENIX Security '22ProFactory: Improving IoT Security via Formalized Protocol CustomizationFei Wang, Jianliang Wu, Yuhong Nan, Yousra Aafer, Xiangyu Zhang, Dongyan Xu, Mathias Payer
    USENIX Security '22Ferry: State-Aware Symbolic Execution for Exploring State-Dependent Program PathsShunfan Zhou, Zhemin Yang, Dan Qiao, Peng Liu, Min Yang, Zhe Wang, Chenggang Wu
    USENIX Security '22SGXLock: Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGXYuan Chen, Jiaqi Li, Guorui Xu, Yajin Zhou, Zhi Wang, Cong Wang, Kui Ren
    USENIX Security '22Lend Me Your Ear: Passive Remote Physical Side Channels on PCsDaniel Genkin, Noam Nissan, Roei Schuster, Eran Tromer
    USENIX Security '22Electronic Monitoring Smartphone Apps: An Analysis of Risks from Technical, Human-Centered, and Legal PerspectivesKentrell Owens, Anita Alem, Franziska Roesner, Tadayoshi Kohno
    USENIX Security '22Exploring the Security Boundary of Data Reconstruction via Neuron Exclusivity AnalysisXudong Pan, Mi Zhang, Yifan Yan, Jiaming Zhu, Zhemin Yang
    USENIX Security '22Counting in Regexes Considered Harmful: Exposing ReDoS Vulnerability of Nonbacktracking MatchersLenka Turoňová, Lukáš Holík, Ivan Homoliak, Ondřej Lengál, Margus Veanes, Tomáš Vojnar
    USENIX Security '22"The Same PIN, Just Longer": On the (In)Security of Upgrading PINs from 4 to 6 DigitsCollins W. Munyendo, Philipp Markert, Alexandra Nisenoff, Miles Grant, Elena Korkes, Blase Ur, Adam J. Aviv
    USENIX Security '22Using Trātṛ to tame Adversarial SynchronizationYuvraj Patel, Chenhao Ye, Akshat Sinha, Abigail Matthews, Andrea C. Arpaci-Dusseau, Michael M. Swift
    USENIX Security '22On the Necessity of Auditable Algorithmic Definitions for Machine UnlearningAnvith Thudi, Hengrui Jia, Ilia Shumailov, Nicolas Papernot
    USENIX Security '22Stalloris: RPKI Downgrade AttackTomas Hlavacek, Philipp Jeitner, Donika Mirdita, Haya Shulman, Michael Waidner
    USENIX Security '22V'CER: Efficient Certificate Validation in Constrained NetworksDavid Koisser, Patrick Jauernig, Gene Tsudik, Ahmad-Reza Sadeghi
    USENIX Security '22MaDIoT 2.0: Modern High-Wattage IoT Botnet Attacks and DefensesTohid Shekari, Alvaro A. Cardenas, Raheem Beyah
    USENIX Security '22Inference Attacks Against Graph Neural NetworksZhikun Zhang, Min Chen, Michael Backes, Yun Shen, Yang Zhang

Pages