Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '22Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster DesignAlon Shakevsky, Eyal Ronen, Avishai Wool
    USENIX Security '22Counting in Regexes Considered Harmful: Exposing ReDoS Vulnerability of Nonbacktracking MatchersLenka Turoňová, Lukáš Holík, Ivan Homoliak, Ondřej Lengál, Margus Veanes, Tomáš Vojnar
    USENIX Security '22SCRAPS: Scalable Collective Remote Attestation for Pub-Sub IoT Networks with Untrusted Proxy VerifierLukas Petzi, Ala Eddine Ben Yahya, Alexandra Dmitrienko, Gene Tsudik, Thomas Prantl, Samuel Kounev
    USENIX Security '22Poisoning Attacks to Local Differential Privacy Protocols for Key-Value DataYongji Wu, Xiaoyu Cao, Jinyuan Jia, Neil Zhenqiang Gong
    USENIX Security '22Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary ProgramsJayakrishna Vadayath, Moritz Eckert, Kyle Zeng, Nicolaas Weideman, Gokulkrishna Praveen Menon, Yanick Fratantonio, Davide Balzarotti, Adam Doupé, Tiffany Bao, Ruoyu Wang, Christophe Hauser, Yan Shoshitaishvili
    USENIX Security '22Breaking Bridgefy, again: Adopting libsignal is not enoughMartin R. Albrecht, Raphael Eikenberg, Kenneth G. Paterson
    USENIX Security '22"The Same PIN, Just Longer": On the (In)Security of Upgrading PINs from 4 to 6 DigitsCollins W. Munyendo, Philipp Markert, Alexandra Nisenoff, Miles Grant, Elena Korkes, Blase Ur, Adam J. Aviv
    USENIX Security '22Networks of Care: Tech Abuse Advocates' Digital Security PracticesJulia Slupska, Angelika Strohmayer
    USENIX Security '22Khaleesi: Breaker of Advertising and Tracking Request ChainsUmar Iqbal, Charlie Wolfe, Charles Nguyen, Steven Englehardt, Zubair Shafiq
    USENIX Security '22DeepPhish: Understanding User Trust Towards Artificially Generated Profiles in Online Social NetworksJaron Mink, Licheng Luo, Natã M. Barbosa, Olivia Figueira, Yang Wang, Gang Wang
    USENIX Security '22TLB;DR: Enhancing TLB-based Attacks with TLB Desynchronized Reverse EngineeringAndrei Tatar, Daniël Trujillo, Cristiano Giuffrida, Herbert Bos
    USENIX Security '22Playing Without Paying: Detecting Vulnerable Payment Verification in Native Binaries of Unity Mobile GamesChaoshun Zuo, Zhiqiang Lin
    USENIX Security '22Building an Open, Robust, and Stable Voting-Based Domain Top ListQinge Xie, Shujun Tang, Xiaofeng Zheng, Qingran Lin, Baojun Liu, Haixin Duan, Frank Li
    USENIX Security '22Many Roads Lead To Rome: How Packet Headers Influence DNS Censorship MeasurementAbhishek Bhaskar, Paul Pearce
    USENIX Security '22Minefield: A Software-only Protection for SGX Enclaves against DVFS AttacksAndreas Kogler, Daniel Gruss, Michael Schwarz
    USENIX Security '22Attacks on Deidentification's DefensesAloni Cohen
    USENIX Security '22In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer AuthenticationSungbae Yoo, Jinbum Park, Seolheui Kim, Yeji Kim, Taesoo Kim
    USENIX Security '22Unleash the Simulacrum: Shifting Browser Realities for Robust Extension-Fingerprinting PreventionSoroush Karami, Faezeh Kalantari, Mehrnoosh Zaeifi, Xavier J. Maso, Erik Trickel, Panagiotis Ilia, Yan Shoshitaishvili, Adam Doupé, Jason Polakis
    USENIX Security '22Anycast Agility: Network Playbooks to Fight DDoSA S M Rizvi, Leandro Bertholdo, João Ceron, John Heidemann
    USENIX Security '22PolyCruise: A Cross-Language Dynamic Information Flow AnalysisWen Li, Jiang Ming, Xiapu Luo, Haipeng Cai
    USENIX Security '22Communication-Efficient Triangle Counting under Local Differential PrivacyJacob Imola, Takao Murakami, Kamalika Chaudhuri
    USENIX Security '22Seeing the Forest for the Trees: Understanding Security Hazards in the 3GPP Ecosystem through Intelligent Analysis on Change RequestsYi Chen, Di Tang, Yepeng Yao, Mingming Zha, XiaoFeng Wang, Xiaozhong Liu, Haixu Tang, Dongfang Zhao
    USENIX Security '22Hyperproofs: Aggregating and Maintaining Proofs in Vector CommitmentsShravan Srinivasan, Alexander Chepurnoy, Charalampos Papamanthou, Alin Tomescu, Yupeng Zhang
    USENIX Security '22Leaky Forms: A Study of Email and Password Exfiltration Before Form SubmissionAsuman Senol, Gunes Acar, Mathias Humbert, Frederik Zuiderveen Borgesius
    USENIX Security '22Using Trātṛ to tame Adversarial SynchronizationYuvraj Patel, Chenhao Ye, Akshat Sinha, Abigail Matthews, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, Michael M. Swift

    Pages