Search results

    USENIX Security '22Membership Inference Attacks and Defenses in Neural Network Pruning
    USENIX Security '22Communication-Efficient Triangle Counting under Local Differential Privacy
    USENIX Security '22Seeing the Forest for the Trees: Understanding Security Hazards in the 3GPP Ecosystem through Intelligent Analysis on Change Requests
    USENIX Security '22Using Trātṛ to tame Adversarial Synchronization
    USENIX Security '22Security Analysis of Camera-LiDAR Fusion Against Black-Box Attacks on Autonomous Vehicles
    USENIX Security '22Automated Detection of Automated Traffic
    USENIX Security '22Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging
    USENIX Security '22Transferring Adversarial Robustness Through Robust Representation Matching
    USENIX Security '22Provably-Safe Multilingual Software Sandboxing using WebAssembly
    USENIX Security '22TLB;DR: Enhancing TLB-based Attacks with TLB Desynchronized Reverse Engineering
    USENIX Security '22Playing Without Paying: Detecting Vulnerable Payment Verification in Native Binaries of Unity Mobile Games
    USENIX Security '22Building an Open, Robust, and Stable Voting-Based Domain Top List
    USENIX Security '22Many Roads Lead To Rome: How Packet Headers Influence DNS Censorship Measurement
    USENIX Security '22Minefield: A Software-only Protection for SGX Enclaves against DVFS Attacks
    USENIX Security '22Attacks on Deidentification's Defenses
    USENIX Security '22In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer Authentication
    USENIX Security '22Unleash the Simulacrum: Shifting Browser Realities for Robust Extension-Fingerprinting Prevention
    USENIX Security '22Anycast Agility: Network Playbooks to Fight DDoS
    USENIX Security '22PolyCruise: A Cross-Language Dynamic Information Flow Analysis
    USENIX Security '22Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster Design
    USENIX Security '22Counting in Regexes Considered Harmful: Exposing ReDoS Vulnerability of Nonbacktracking Matchers
    USENIX Security '22SCRAPS: Scalable Collective Remote Attestation for Pub-Sub IoT Networks with Untrusted Proxy Verifier
    USENIX Security '22Poisoning Attacks to Local Differential Privacy Protocols for Key-Value Data
    USENIX Security '22Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs
    USENIX Security '22Breaking Bridgefy, again: Adopting libsignal is not enough