USENIX Security '22 | Membership Inference Attacks and Defenses in Neural Network Pruning | |
USENIX Security '22 | Communication-Efficient Triangle Counting under Local Differential Privacy | |
USENIX Security '22 | Seeing the Forest for the Trees: Understanding Security Hazards in the 3GPP Ecosystem through Intelligent Analysis on Change Requests | |
USENIX Security '22 | Using Trātṛ to tame Adversarial Synchronization | |
USENIX Security '22 | Security Analysis of Camera-LiDAR Fusion Against Black-Box Attacks on Autonomous Vehicles | |
USENIX Security '22 | Automated Detection of Automated Traffic | |
USENIX Security '22 | Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging | |
USENIX Security '22 | Transferring Adversarial Robustness Through Robust Representation Matching | |
USENIX Security '22 | Provably-Safe Multilingual Software Sandboxing using WebAssembly | |
USENIX Security '22 | TLB;DR: Enhancing TLB-based Attacks with TLB Desynchronized Reverse Engineering | |
USENIX Security '22 | Playing Without Paying: Detecting Vulnerable Payment Verification in Native Binaries of Unity Mobile Games | |
USENIX Security '22 | Building an Open, Robust, and Stable Voting-Based Domain Top List | |
USENIX Security '22 | Many Roads Lead To Rome: How Packet Headers Influence DNS Censorship Measurement | |
USENIX Security '22 | Minefield: A Software-only Protection for SGX Enclaves against DVFS Attacks | |
USENIX Security '22 | Attacks on Deidentification's Defenses | |
USENIX Security '22 | In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer Authentication | |
USENIX Security '22 | Unleash the Simulacrum: Shifting Browser Realities for Robust Extension-Fingerprinting Prevention | |
USENIX Security '22 | Anycast Agility: Network Playbooks to Fight DDoS | |
USENIX Security '22 | PolyCruise: A Cross-Language Dynamic Information Flow Analysis | |
USENIX Security '22 | Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster Design | |
USENIX Security '22 | Counting in Regexes Considered Harmful: Exposing ReDoS Vulnerability of Nonbacktracking Matchers | |
USENIX Security '22 | SCRAPS: Scalable Collective Remote Attestation for Pub-Sub IoT Networks with Untrusted Proxy Verifier | |
USENIX Security '22 | Poisoning Attacks to Local Differential Privacy Protocols for Key-Value Data | |
USENIX Security '22 | Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs | |
USENIX Security '22 | Breaking Bridgefy, again: Adopting libsignal is not enough | |