Search results

    USENIX Security '22OpenSSLNTRU: Faster post-quantum TLS key exchange
    USENIX Security '22"OK, Siri" or "Hey, Google": Evaluating Voiceprint Distinctiveness via Content-based PROLE Score
    USENIX Security '22PISTIS: Trusted Computing Architecture for Low-end Embedded Systems
    USENIX Security '22Stick It to The Man: Correcting for Non-Cooperative Behavior of Subjects in Experiments on Social Networks
    USENIX Security '22Mining Node.js Vulnerabilities via Object Dependence Graph and Query
    USENIX Security '22Aardvark: An Asynchronous Authenticated Dictionary with Applications to Account-based Cryptocurrencies
    USENIX Security '22OVRseen: Auditing Network Traffic and Privacy Policies in Oculus VR
    USENIX Security '22Lumos: Identifying and Localizing Diverse Hidden IoT Devices in an Unfamiliar Environment
    USENIX Security '22AMD Prefetch Attacks through Power and Time
    USENIX Security '22ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models
    USENIX Security '22Jenny: Securing Syscalls for PKU-based Memory Isolation Systems
    USENIX Security '22DoubleStar: Long-Range Attack Towards Depth Estimation based Obstacle Avoidance in Autonomous Systems
    USENIX Security '22PrivGuard: Privacy Regulation Compliance Made Easier
    USENIX Security '22DeepDi: Learning a Relational Graph Convolutional Network Model on Instructions for Fast and Accurate Disassembly
    USENIX Security '22Understanding and Improving Usability of Data Dashboards for Simplified Privacy Control of Voice Assistant Data
    USENIX Security '22Helping hands: Measuring the impact of a large threat intelligence sharing community
    USENIX Security '22Back-Propagating System Dependency Impact for Attack Investigation
    USENIX Security '22SecSMT: Securing SMT Processors against Contention-Based Covert Channels
    USENIX Security '22Increasing Adversarial Uncertainty to Scale Private Similarity Testing
    USENIX Security '22"How Do You Not Lose Friends?": Synthesizing a Design Space of Social Controls for Securing Shared Digital Resources Via Participatory Design Jams
    USENIX Security '22Your Microphone Array Retains Your Identity: A Robust Voice Liveness Detection System for Smart Speakers