USENIX Security '23 | Examining Consumer Reviews to Understand Security and Privacy Issues in the Market of Smart Home Devices | Swaathi Vetrivel, Veerle van Harten, Carlos H. Gañán, Michel van Eeten, Simon Parkin |
USENIX Security '23 | SandDriller: A Fully-Automated Approach for Testing Language-Based JavaScript Sandboxes | Abdullah AlHamdan, Cristian-Alexandru Staicu |
USENIX Security '23 | Remote Code Execution from SSTI in the Sandbox: Automatically Detecting and Exploiting Template Escape Bugs | Yudi Zhao, Yuan Zhang, Min Yang |
USENIX Security '23 | Side-Channel Attacks on Optane Persistent Memory | Sihang Liu, Suraaj Kanniwadi, Martin Schwarzl, Andreas Kogler, Daniel Gruss, Samira Khan |
USENIX Security '23 | Authenticated private information retrieval | Simone Colombo, Kirill Nikitin, Henry Corrigan-Gibbs, David J. Wu, Bryan Ford |
USENIX Security '23 | Near-Ultrasound Inaudible Trojan (Nuit): Exploiting Your Speaker to Attack Your Microphone | Qi Xia, Qian Chen, Shouhuai Xu |
USENIX Security '23 | Lost at C: A User Study on the Security Implications of Large Language Model Code Assistants | Gustavo Sandoval, Hammond Pearce, Teo Nys, Ramesh Karri, Siddharth Garg, Brendan Dolan-Gavitt |
USENIX Security '23 | CSHER: A System for Compact Storage with HE-Retrieval | Adi Akavia, Neta Oren, Boaz Sapir, Margarita Vald |
USENIX Security '22 | "How Do You Not Lose Friends?": Synthesizing a Design Space of Social Controls for Securing Shared Digital Resources Via Participatory Design Jams | Eyitemi Moju-Igbene, Hanan Abdi, Alan Lu, Sauvik Das |
USENIX Security '22 | AMD Prefetch Attacks through Power and Time | Moritz Lipp, Daniel Gruss, Michael Schwarz |
USENIX Security '22 | "I feel invaded, annoyed, anxious and I may protect myself": Individuals' Feelings about Online Tracking and their Protective Behaviour across Gender and Country | Kovila P.L. Coopamootoo, Maryam Mehrnezhad, Ehsan Toreini |
USENIX Security '22 | Mistrust Plugins You Must: A Large-Scale Study Of Malicious Plugins In WordPress Marketplaces | Ranjita Pai Kasturi, Jonathan Fuller, Yiting Sun, Omar Chabklo, Andres Rodriguez, Jeman Park, Brendan Saltaformaggio |
USENIX Security '22 | Web Cache Deception Escalates! | Seyed Ali Mirheidari, Matteo Golinelli, Kaan Onarlioglu, Engin Kirda, Bruno Crispo |
USENIX Security '22 | Exploring the Unchartered Space of Container Registry Typosquatting | Guannan Liu, Xing Gao, Haining Wang, Kun Sun |
USENIX Security '22 | LinKRID: Vetting Imbalance Reference Counting in Linux kernel with Symbolic Execution | Jian Liu, Lin Yi, Weiteng Chen, Chengyu Song, Zhiyun Qian, Qiuping Yi |
USENIX Security '22 | Hiding in Plain Sight? On the Efficacy of Power Side Channel-Based Control Flow Monitoring | Yi Han, Matthew Chan, Zahra Aref, Nils Ole Tippenhauer, Saman Zonouz |
USENIX Security '22 | Secure Poisson Regression | Mahimna Kelkar, Phi Hung Le, Mariana Raykova, Karn Seth |
USENIX Security '22 | Under the Hood of DANE Mismanagement in SMTP | Hyeonmin Lee, Md. Ishtiaq Ashiq, Moritz Müller, Roland van Rijswijk-Deij, Taekyoung "Ted" Kwon, Taejoong Chung |
USENIX Security '22 | The Dangers of Human Touch: Fingerprinting Browser Extensions through User Actions | Konstantinos Solomos, Panagiotis Ilia, Soroush Karami, Nick Nikiforakis, Jason Polakis |
USENIX Security '22 | Poisoning Attacks to Local Differential Privacy Protocols for Key-Value Data | Yongji Wu, Xiaoyu Cao, Jinyuan Jia, Neil Zhenqiang Gong |
USENIX Security '22 | Breaking Bridgefy, again: Adopting libsignal is not enough | Martin R. Albrecht, Raphael Eikenberg, Kenneth G. Paterson |
USENIX Security '22 | Many Roads Lead To Rome: How Packet Headers Influence DNS Censorship Measurement | Abhishek Bhaskar, Paul Pearce |
USENIX Security '22 | Communication-Efficient Triangle Counting under Local Differential Privacy | Jacob Imola, Takao Murakami, Kamalika Chaudhuri |
USENIX Security '22 | Seeing the Forest for the Trees: Understanding Security Hazards in the 3GPP Ecosystem through Intelligent Analysis on Change Requests | Yi Chen, Di Tang, Yepeng Yao, Mingming Zha, XiaoFeng Wang, Xiaozhong Liu, Haixu Tang, Dongfang Zhao |
USENIX Security '22 | OS-Aware Vulnerability Prioritization via Differential Severity Analysis | Qiushi Wu, Yue Xiao, Xiaojing Liao, Kangjie Lu |