USENIX Security '22 | Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models | |
USENIX Security '22 | Stalloris: RPKI Downgrade Attack | |
USENIX Security '22 | V'CER: Efficient Certificate Validation in Constrained Networks | |
USENIX Security '22 | Oops... Code Execution and Content Spoofing: The First Comprehensive Analysis of OpenDocument Signatures | |
USENIX Security '22 | How Machine Learning Is Solving the Binary Function Similarity Problem | |
USENIX Security '22 | FLAME: Taming Backdoors in Federated Learning | |
USENIX Security '22 | Efficient Differentially Private Secure Aggregation for Federated Learning via Hardness of Learning with Errors | |
USENIX Security '22 | OpenVPN is Open to VPN Fingerprinting | |
USENIX Security '22 | Backporting Security Patches of Web Applications: A Prototype Design and Implementation on Injection Vulnerability Patches | |
USENIX Security '22 | MaDIoT 2.0: Modern High-Wattage IoT Botnet Attacks and Defenses | |
USENIX Security '22 | Physical-Layer Attacks Against Pulse Width Modulation-Controlled Actuators | |
USENIX Security '22 | Who Are You (I Really Wanna Know)? Detecting Audio DeepFakes Through Vocal Tract Reconstruction | |
USENIX Security '22 | Shuffle-based Private Set Union: Faster and More Secure | |
USENIX Security '22 | Pacer: Comprehensive Network Side-Channel Mitigation in the Cloud | |
USENIX Security '22 | Zero-Knowledge Middleboxes | |
USENIX Security '22 | TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable Vulnerabilities | |
USENIX Security '22 | Constant-weight PIR: Single-round Keyword PIR via Constant-weight Equality Operators | |
USENIX Security '22 | ALASTOR: Reconstructing the Provenance of Serverless Intrusions | |
USENIX Security '22 | Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era | |
USENIX Security '22 | On the Necessity of Auditable Algorithmic Definitions for Machine Unlearning | |
USENIX Security '22 | Might I Get Pwned: A Second Generation Compromised Credential Checking Service | |
USENIX Security '22 | Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture | |
USENIX Security '22 | OS-Aware Vulnerability Prioritization via Differential Severity Analysis | |
USENIX Security '22 | Efficient Representation of Numerical Optimization Problems for SNARKs | |
USENIX Security '22 | Experimenting with Collaborative zk-SNARKs: Zero-Knowledge Proofs for Distributed Secrets | |