Search results

    USENIX Security '22Who Are You (I Really Wanna Know)? Detecting Audio DeepFakes Through Vocal Tract ReconstructionLogan Blue, Kevin Warren, Hadi Abdullah, Cassidy Gibson, Luis Vargas, Jessica O'Dell, Kevin Butler, Patrick Traynor
    USENIX Security '22Shuffle-based Private Set Union: Faster and More SecureYanxue Jia, Shi-Feng Sun, Hong-Sheng Zhou, Jiajun Du, Dawu Gu
    USENIX Security '22SAID: State-aware Defense Against Injection Attacks on In-vehicle NetworkLei Xue, Yangyang Liu, Tianqi Li, Kaifa Zhao, Jianfeng Li, Le Yu, Xiapu Luo, Yajin Zhou, Guofei Gu
    USENIX Security '22Understanding and Improving Usability of Data Dashboards for Simplified Privacy Control of Voice Assistant DataVandit Sharma, Mainack Mondal
    USENIX Security '22Rendering Contention Channel Made Practical in Web BrowsersShujiang Wu, Jianjia Yu, Min Yang, Yinzhi Cao
    USENIX Security '22Stick It to The Man: Correcting for Non-Cooperative Behavior of Subjects in Experiments on Social NetworksKaleigh Clary, Emma Tosch, Jeremiah Onaolapo, David D. Jensen
    USENIX Security '22Total Eclipse of the Heart – Disrupting the InterPlanetary File SystemBernd Prünster, Alexander Marsalek, Thomas Zefferer
    USENIX Security '22Post-Quantum Cryptography with Contemporary Co-Processors: Beyond Kronecker, Schönhage-Strassen & NussbaumerJoppe W. Bos, Joost Renes, Christine van Vredendaal
    USENIX Security '22Empirical Understanding of Deletion Privacy: Experiences, Expectations, and MeasuresMohsen Minaei, Mainack Mondal, Aniket Kate
    USENIX Security '22Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among Experts and Non-Experts in a Corporate ContextVeroniek Binkhorst, Tobias Fiebig, Katharina Krombholz, Wolter Pieters, Katsiaryna Labunets
    USENIX Security '22CamShield: Securing Smart Cameras through Physical Replication and IsolationZhiwei Wang, Yihui Yan, Yueli Yan, Huangxun Chen, Zhice Yang
    USENIX Security '22TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable VulnerabilitiesRahul Kande, Addison Crump, Garrett Persyn, Patrick Jauernig, Ahmad-Reza Sadeghi, Aakash Tyagi, Jeyavijayan Rajendran
    USENIX Security '22Private SignalingVarun Madathil, Alessandra Scafuro, István András Seres, Omer Shlomovits, Denis Varlakov
    USENIX Security '22ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning ModelsYugeng Liu, Rui Wen, Xinlei He, Ahmed Salem, Zhikun Zhang, Michael Backes, Emiliano De Cristofaro, Mario Fritz, Yang Zhang
    USENIX Security '22Rapid Prototyping for Microarchitectural AttacksCatherine Easdon, Michael Schwarz, Martin Schwarzl, Daniel Gruss
    USENIX Security '22Can one hear the shape of a neural network?: Snooping the GPU via Magnetic Side Channel
    USENIX Security '22Augmenting Decompiler Output with Learned Variable Names and TypesQibin Chen, Jeremy Lacomis, Edward J. Schwartz, Claire Le Goues, Graham Neubig, Bogdan Vasilescu
    USENIX Security '22Lamphone: Passive Sound Recovery from a Desk Lamp's Light Bulb VibrationsBen Nassi, Yaron Pirutin, Raz Swisa, Adi Shamir, Yuval Elovici, Boris Zadov
    USENIX Security '22Dos and Don'ts of Machine Learning in Computer SecurityDaniel Arp, Erwin Quiring, Feargus Pendlebury, Alexander Warnecke, Fabio Pierazzi, Christian Wressnegger, Lorenzo Cavallaro, Konrad Rieck
    USENIX Security '22ProFactory: Improving IoT Security via Formalized Protocol CustomizationFei Wang, Jianliang Wu, Yuhong Nan, Yousra Aafer, Xiangyu Zhang, Dongyan Xu, Mathias Payer
    USENIX Security '22Ferry: State-Aware Symbolic Execution for Exploring State-Dependent Program PathsShunfan Zhou, Zhemin Yang, Dan Qiao, Peng Liu, Min Yang, Zhe Wang, Chenggang Wu
    USENIX Security '22SGXLock: Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGXYuan Chen, Jiaqi Li, Guorui Xu, Yajin Zhou, Zhi Wang, Cong Wang, Kui Ren
    USENIX Security '22Lend Me Your Ear: Passive Remote Physical Side Channels on PCsDaniel Genkin, Noam Nissan, Roei Schuster, Eran Tromer
    USENIX Security '22Electronic Monitoring Smartphone Apps: An Analysis of Risks from Technical, Human-Centered, and Legal PerspectivesKentrell Owens, Anita Alem, Franziska Roesner, Tadayoshi Kohno
    USENIX Security '22Exploring the Security Boundary of Data Reconstruction via Neuron Exclusivity AnalysisXudong Pan, Mi Zhang, Yifan Yan, Jiaming Zhu, Zhemin Yang