USENIX Security '22 | Who Are You (I Really Wanna Know)? Detecting Audio DeepFakes Through Vocal Tract Reconstruction | Logan Blue, Kevin Warren, Hadi Abdullah, Cassidy Gibson, Luis Vargas, Jessica O'Dell, Kevin Butler, Patrick Traynor |
USENIX Security '22 | Shuffle-based Private Set Union: Faster and More Secure | Yanxue Jia, Shi-Feng Sun, Hong-Sheng Zhou, Jiajun Du, Dawu Gu |
USENIX Security '22 | SAID: State-aware Defense Against Injection Attacks on In-vehicle Network | Lei Xue, Yangyang Liu, Tianqi Li, Kaifa Zhao, Jianfeng Li, Le Yu, Xiapu Luo, Yajin Zhou, Guofei Gu |
USENIX Security '22 | Understanding and Improving Usability of Data Dashboards for Simplified Privacy Control of Voice Assistant Data | Vandit Sharma, Mainack Mondal |
USENIX Security '22 | Rendering Contention Channel Made Practical in Web Browsers | Shujiang Wu, Jianjia Yu, Min Yang, Yinzhi Cao |
USENIX Security '22 | Stick It to The Man: Correcting for Non-Cooperative Behavior of Subjects in Experiments on Social Networks | Kaleigh Clary, Emma Tosch, Jeremiah Onaolapo, David D. Jensen |
USENIX Security '22 | Total Eclipse of the Heart – Disrupting the InterPlanetary File System | Bernd Prünster, Alexander Marsalek, Thomas Zefferer |
USENIX Security '22 | Post-Quantum Cryptography with Contemporary Co-Processors: Beyond Kronecker, Schönhage-Strassen & Nussbaumer | Joppe W. Bos, Joost Renes, Christine van Vredendaal |
USENIX Security '22 | Empirical Understanding of Deletion Privacy: Experiences, Expectations, and Measures | Mohsen Minaei, Mainack Mondal, Aniket Kate |
USENIX Security '22 | Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among Experts and Non-Experts in a Corporate Context | Veroniek Binkhorst, Tobias Fiebig, Katharina Krombholz, Wolter Pieters, Katsiaryna Labunets |
USENIX Security '22 | CamShield: Securing Smart Cameras through Physical Replication and Isolation | Zhiwei Wang, Yihui Yan, Yueli Yan, Huangxun Chen, Zhice Yang |
USENIX Security '22 | TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable Vulnerabilities | Rahul Kande, Addison Crump, Garrett Persyn, Patrick Jauernig, Ahmad-Reza Sadeghi, Aakash Tyagi, Jeyavijayan Rajendran |
USENIX Security '22 | Private Signaling | Varun Madathil, Alessandra Scafuro, István András Seres, Omer Shlomovits, Denis Varlakov |
USENIX Security '22 | ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models | Yugeng Liu, Rui Wen, Xinlei He, Ahmed Salem, Zhikun Zhang, Michael Backes, Emiliano De Cristofaro, Mario Fritz, Yang Zhang |
USENIX Security '22 | Rapid Prototyping for Microarchitectural Attacks | Catherine Easdon, Michael Schwarz, Martin Schwarzl, Daniel Gruss |
USENIX Security '22 | Can one hear the shape of a neural network?: Snooping the GPU via Magnetic Side Channel | |
USENIX Security '22 | Augmenting Decompiler Output with Learned Variable Names and Types | Qibin Chen, Jeremy Lacomis, Edward J. Schwartz, Claire Le Goues, Graham Neubig, Bogdan Vasilescu |
USENIX Security '22 | Lamphone: Passive Sound Recovery from a Desk Lamp's Light Bulb Vibrations | Ben Nassi, Yaron Pirutin, Raz Swisa, Adi Shamir, Yuval Elovici, Boris Zadov |
USENIX Security '22 | Dos and Don'ts of Machine Learning in Computer Security | Daniel Arp, Erwin Quiring, Feargus Pendlebury, Alexander Warnecke, Fabio Pierazzi, Christian Wressnegger, Lorenzo Cavallaro, Konrad Rieck |
USENIX Security '22 | ProFactory: Improving IoT Security via Formalized Protocol Customization | Fei Wang, Jianliang Wu, Yuhong Nan, Yousra Aafer, Xiangyu Zhang, Dongyan Xu, Mathias Payer |
USENIX Security '22 | Ferry: State-Aware Symbolic Execution for Exploring State-Dependent Program Paths | Shunfan Zhou, Zhemin Yang, Dan Qiao, Peng Liu, Min Yang, Zhe Wang, Chenggang Wu |
USENIX Security '22 | SGXLock: Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX | Yuan Chen, Jiaqi Li, Guorui Xu, Yajin Zhou, Zhi Wang, Cong Wang, Kui Ren |
USENIX Security '22 | Lend Me Your Ear: Passive Remote Physical Side Channels on PCs | Daniel Genkin, Noam Nissan, Roei Schuster, Eran Tromer |
USENIX Security '22 | Electronic Monitoring Smartphone Apps: An Analysis of Risks from Technical, Human-Centered, and Legal Perspectives | Kentrell Owens, Anita Alem, Franziska Roesner, Tadayoshi Kohno |
USENIX Security '22 | Exploring the Security Boundary of Data Reconstruction via Neuron Exclusivity Analysis | Xudong Pan, Mi Zhang, Yifan Yan, Jiaming Zhu, Zhemin Yang |