Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '22Towards Automatically Reverse Engineering Vehicle Diagnostic ProtocolsLe Yu, Yangyang Liu, Pengfei Jing, Xiapu Luo, Lei Xue, Kaifa Zhao, Yajin Zhou, Ting Wang, Guofei Gu, Sen Nie, Shi Wu
    USENIX Security '22Rolling Colors: Adversarial Laser Exploits against Traffic Light RecognitionChen Yan, Zhijian Xu, Zhanyuan Yin, Xiaoyu Ji, Wenyuan Xu
    USENIX Security '22Backporting Security Patches of Web Applications: A Prototype Design and Implementation on Injection Vulnerability PatchesYoukun Shi, Yuan Zhang, Tianhan Luo, Xiangyu Mao, Yinzhi Cao, Ziwen Wang, Yudi Zhao, Zongan Huang, Min Yang
    USENIX Security '22PatchCleanser: Certifiably Robust Defense against Adversarial Patches for Any Image ClassifierChong Xiang, Saeed Mahloujifar, Prateek Mittal
    USENIX Security '22How Machine Learning Is Solving the Binary Function Similarity ProblemAndrea Marcelli, Mariano Graziano, Xabier Ugarte-Pedrero, Yanick Fratantonio, Mohamad Mansouri, Davide Balzarotti
    USENIX Security '22Behind the Tube: Exploitative Monetization of Content on YouTubeAndrew Chu, Arjun Arunasalam, Muslum Ozgur Ozmen, Z. Berkay Celik
    USENIX Security '22RapidPatch: Firmware Hotpatching for Real-Time Embedded DevicesYi He, Zhenhua Zou, Kun Sun, Zhuotao Liu, Ke Xu, Qian Wang, Chao Shen, Zhi Wang, Qi Li
    USENIX Security '22Holistic Control-Flow Protection on Real-Time Embedded Systems with KageYufei Du, Zhuojia Shen, Komail Dharsee, Jie Zhou, Robert J. Walls, John Criswell
    USENIX Security '22ALASTOR: Reconstructing the Provenance of Serverless IntrusionsPubali Datta, Isaac Polinsky, Muhammad Adil Inam, Adam Bates, William Enck
    USENIX Security '22FreeWill: Automatically Diagnosing Use-after-free Bugs via Reference Miscounting Detection on BinariesLiang He, Hong Hu, Purui Su, Yan Cai, Zhenkai Liang
    USENIX Security '22VerLoc: Verifiable Localization in Decentralized SystemsKatharina Kohls, Claudia Diaz
    USENIX Security '22Who Are You (I Really Wanna Know)? Detecting Audio DeepFakes Through Vocal Tract ReconstructionLogan Blue, Kevin Warren, Hadi Abdullah, Cassidy Gibson, Luis Vargas, Jessica O'Dell, Kevin Butler, Patrick Traynor
    USENIX Security '22PolyCruise: A Cross-Language Dynamic Information Flow AnalysisWen Li, Jiang Ming, Xiapu Luo, Haipeng Cai
    USENIX Security '22HyperDegrade: From GHz to MHz Effective CPU FrequenciesAlejandro Cabrera Aldaya, Billy Bob Brumley
    USENIX Security '22Pacer: Comprehensive Network Side-Channel Mitigation in the CloudAastha Mehta, Mohamed Alzayat, Roberta De Viti, Björn B. Brandenburg, Peter Druschel, Deepak Garg
    USENIX Security '22Automating Cookie Consent and GDPR Violation DetectionDino Bollinger, Karel Kubicek, Carlos Cotrini, David Basin
    USENIX Security '22Khaleesi: Breaker of Advertising and Tracking Request ChainsUmar Iqbal, Charlie Wolfe, Charles Nguyen, Steven Englehardt, Zubair Shafiq
    USENIX Security '22Shuffle-based Private Set Union: Faster and More SecureYanxue Jia, Shi-Feng Sun, Hong-Sheng Zhou, Jiajun Du, Dawu Gu
    USENIX Security '22Omnes pro uno: Practical Multi-Writer Encrypted DatabaseJiafan Wang, Sherman S. M. Chow
    USENIX Security '22Lumos: Identifying and Localizing Diverse Hidden IoT Devices in an Unfamiliar EnvironmentRahul Anand Sharma, Elahe Soltanaghaei, Anthony Rowe, Vyas Sekar
    USENIX Security '22Inferring Phishing Intention via Webpage Appearance and Dynamics: A Deep Vision Based ApproachRuofan Liu, Yun Lin, Xianglin Yang, Siang Hwee Ng, Dinil Mon Divakaran, Jin Song Dong
    USENIX Security '22Oops... Code Execution and Content Spoofing: The First Comprehensive Analysis of OpenDocument SignaturesSimon Rohlmann, Christian Mainka, Vladislav Mladenov, Jörg Schwenk
    USENIX Security '22Playing Without Paying: Detecting Vulnerable Payment Verification in Native Binaries of Unity Mobile GamesChaoshun Zuo, Zhiqiang Lin
    USENIX Security '22Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGXLukas Giner, Andreas Kogler, Claudio Canella, Michael Schwarz, Daniel Gruss
    USENIX Security '22SyzScope: Revealing High-Risk Security Impacts of Fuzzer-Exposed Bugs in Linux kernelXiaochen Zou, Guoren Li, Weiteng Chen, Hang Zhang, Zhiyun Qian

Pages