Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '22"The Same PIN, Just Longer": On the (In)Security of Upgrading PINs from 4 to 6 Digits
    USENIX Security '22Networks of Care: Tech Abuse Advocates' Digital Security Practices
    USENIX Security '22Khaleesi: Breaker of Advertising and Tracking Request Chains
    USENIX Security '22DeepPhish: Understanding User Trust Towards Artificially Generated Profiles in Online Social Networks
    USENIX Security '22ppSAT: Towards Two-Party Private SAT Solving
    USENIX Security '22"Like Lesbians Walking the Perimeter": Experiences of U.S. LGBTQ+ Folks With Online Security, Safety, and Privacy Advice
    USENIX Security '22CamShield: Securing Smart Cameras through Physical Replication and Isolation
    USENIX Security '22PatchCleanser: Certifiably Robust Defense against Adversarial Patches for Any Image Classifier
    USENIX Security '22Phish in Sheep's Clothing: Exploring the Authentication Pitfalls of Browser Fingerprinting
    USENIX Security '22FreeWill: Automatically Diagnosing Use-after-free Bugs via Reference Miscounting Detection on Binaries
    USENIX Security '22ReZone: Disarming TrustZone with TEE Privilege Reduction
    USENIX Security '22Double Trouble: Combined Heterogeneous Attacks on Non-Inclusive Cache Hierarchies
    USENIX Security '22The Dangers of Human Touch: Fingerprinting Browser Extensions through User Actions
    USENIX Security '22SARA: Secure Android Remote Authorization
    USENIX Security '22Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among Experts and Non-Experts in a Corporate Context
    USENIX Security '22GAROTA: Generalized Active Root-Of-Trust Architecture (for Tiny Embedded Devices)
    USENIX Security '22A Large-scale and Longitudinal Measurement Study of DKIM Deployment
    USENIX Security '22Neither Access nor Control: A Longitudinal Investigation of the Efficacy of User Access-Control Solutions on Smartphones
    USENIX Security '22Cheetah: Lean and Fast Secure Two-Party Deep Neural Network Inference
    USENIX Security '22Inferring Phishing Intention via Webpage Appearance and Dynamics: A Deep Vision Based Approach
    USENIX Security '22Electronic Monitoring Smartphone Apps: An Analysis of Risks from Technical, Human-Centered, and Legal Perspectives
    USENIX Security '22MundoFuzz: Hypervisor Fuzzing with Statistical Coverage Testing and Grammar Inference
    USENIX Security '22Exploring the Security Boundary of Data Reconstruction via Neuron Exclusivity Analysis
    USENIX Security '22Hyperproofs: Aggregating and Maintaining Proofs in Vector Commitments
    USENIX Security '22Leaky Forms: A Study of Email and Password Exfiltration Before Form Submission

Pages