USENIX Security '22 | "The Same PIN, Just Longer": On the (In)Security of Upgrading PINs from 4 to 6 Digits | |
USENIX Security '22 | Networks of Care: Tech Abuse Advocates' Digital Security Practices | |
USENIX Security '22 | Khaleesi: Breaker of Advertising and Tracking Request Chains | |
USENIX Security '22 | DeepPhish: Understanding User Trust Towards Artificially Generated Profiles in Online Social Networks | |
USENIX Security '22 | ppSAT: Towards Two-Party Private SAT Solving | |
USENIX Security '22 | "Like Lesbians Walking the Perimeter": Experiences of U.S. LGBTQ+ Folks With Online Security, Safety, and Privacy Advice | |
USENIX Security '22 | CamShield: Securing Smart Cameras through Physical Replication and Isolation | |
USENIX Security '22 | PatchCleanser: Certifiably Robust Defense against Adversarial Patches for Any Image Classifier | |
USENIX Security '22 | Phish in Sheep's Clothing: Exploring the Authentication Pitfalls of Browser Fingerprinting | |
USENIX Security '22 | FreeWill: Automatically Diagnosing Use-after-free Bugs via Reference Miscounting Detection on Binaries | |
USENIX Security '22 | ReZone: Disarming TrustZone with TEE Privilege Reduction | |
USENIX Security '22 | Double Trouble: Combined Heterogeneous Attacks on Non-Inclusive Cache Hierarchies | |
USENIX Security '22 | The Dangers of Human Touch: Fingerprinting Browser Extensions through User Actions | |
USENIX Security '22 | SARA: Secure Android Remote Authorization | |
USENIX Security '22 | Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among Experts and Non-Experts in a Corporate Context | |
USENIX Security '22 | GAROTA: Generalized Active Root-Of-Trust Architecture (for Tiny Embedded Devices) | |
USENIX Security '22 | A Large-scale and Longitudinal Measurement Study of DKIM Deployment | |
USENIX Security '22 | Neither Access nor Control: A Longitudinal Investigation of the Efficacy of User Access-Control Solutions on Smartphones | |
USENIX Security '22 | Cheetah: Lean and Fast Secure Two-Party Deep Neural Network Inference | |
USENIX Security '22 | Inferring Phishing Intention via Webpage Appearance and Dynamics: A Deep Vision Based Approach | |
USENIX Security '22 | Electronic Monitoring Smartphone Apps: An Analysis of Risks from Technical, Human-Centered, and Legal Perspectives | |
USENIX Security '22 | MundoFuzz: Hypervisor Fuzzing with Statistical Coverage Testing and Grammar Inference | |
USENIX Security '22 | Exploring the Security Boundary of Data Reconstruction via Neuron Exclusivity Analysis | |
USENIX Security '22 | Hyperproofs: Aggregating and Maintaining Proofs in Vector Commitments | |
USENIX Security '22 | Leaky Forms: A Study of Email and Password Exfiltration Before Form Submission | |