| 2022 | A Qualitative Evaluation of Reverse Engineering Tool Usability. James Mattei, Madeline McLaughlin, Samantha Katcher, Daniel Votipka |
| 2022 | A Recent Year On the Internet: Measuring and Understanding the Threats to Everyday Internet Devices. Afsah Anwar, Yi Hui Chen, Roy Hodgman, Tom Sellers, Engin Kirda, Alina Oprea |
| 2022 | AFLGuard: Byzantine-robust Asynchronous Federated Learning. Minghong Fang, Jia Liu, Neil Zhenqiang Gong, Elizabeth S. Bentley |
| 2022 | Accept All Exploits: Exploring the Security Impact of Cookie Banners. David Klein, Marius Musch, Thomas Barber, Moritz Kopmann, Martin Johns |
| 2022 | Alphuzz: Monte Carlo Search on Seed-Mutation Tree for Coverage-Guided Fuzzing. Yiru Zhao, Xiaoke Wang, Lei Zhao, Yueqiang Cheng, Heng Yin |
| 2022 | Analysis of Payment Service Provider SDKs in Android. Samin Yaseer Mahmud, K. Virgil English, Seaver Thorn, William Enck, Adam Oest, Muhammad Saad |
| 2022 | Annual Computer Security Applications Conference, ACSAC 2022, Austin, TX, USA, December 5-9, 2022 |
| 2022 | ArchiveSafe LT: Secure Long-term Archiving System. Moe Sabry, Reza Samavi |
| 2022 | Are There Wireless Hidden Cameras Spying on Me? Jeongyoon Heo, Sangwon Gil, Youngman Jung, Jinmok Kim, Donguk Kim, Woojin Park, Yongdae Kim, Kang G. Shin, Choong-Hoon Lee |
| 2022 | Assessing Model-free Anomaly Detection in Industrial Control Systems Against Generic Concealment Attacks. Alessandro Erba, Nils Ole Tippenhauer |
| 2022 | BayesImposter: Bayesian Estimation Based.bss Imposter Attack on Industrial Control Systems. Anomadarshi Barua, Lelin Pan, Mohammad Abdullah Al Faruque |
| 2022 | Better Together: Attaining the Triad of Byzantine-robust Federated Learning via Local Update Amplification. Liyue Shen, Yanjun Zhang, Jingwei Wang, Guangdong Bai |
| 2022 | Boosting Neural Networks to Decompile Optimized Binaries. Ying Cao, Ruigang Liang, Kai Chen, Peiwei Hu |
| 2022 | Cloak: Transitioning States on Legacy Blockchains Using Secure and Publicly Verifiable Off-Chain Multi-Party Computation. Qian Ren, Yingjun Wu, Han Liu, Yue Li, Anne Victor, Hong Lei, Lei Wang, Bangdao Chen |
| 2022 | Closing the Loophole: Rethinking Reconstruction Attacks in Federated Learning from a Privacy Standpoint. Seung Ho Na, Hyeong Gwon Hong, Junmo Kim, Seungwon Shin |
| 2022 | CoCoTPM: Trusted Platform Modules for Virtual Machines in Confidential Computing Environments. Joana Pecholt, Sascha Wessel |
| 2022 | Compact Abstract Graphs for Detecting Code Vulnerability with GNN Models. Yu Luo, Weifeng Xu, Dianxiang Xu |
| 2022 | Compressed Federated Learning Based on Adaptive Local Differential Privacy. Yinbin Miao, Rongpeng Xie, Xinghua Li, Ximeng Liu, Zhuo Ma, Robert H. Deng |
| 2022 | CryptoGo: Automatic Detection of Go Cryptographic API Misuses. Wenqing Li, Shijie Jia, Limin Liu, Fangyu Zheng, Yuan Ma, Jingqiang Lin |
| 2022 | Curiosity-Driven and Victim-Aware Adversarial Policies. Chen Gong, Zhou Yang, Yunpeng Bai, Jieke Shi, Arunesh Sinha, Bowen Xu, David Lo, Xinwen Hou, Guoliang Fan |
| 2022 | DF-SCA: Dynamic Frequency Side Channel Attacks are Practical. Debopriya Roy Dipta, Berk Gülmezoglu |
| 2022 | DRAGON: Deep Reinforcement Learning for Autonomous Grid Operation and Attack Detection. Matthew Landen, Key-whan Chung, Moses Ike, Sarah Mackay, Jean-Paul Watson, Wenke Lee |
| 2022 | DeView: Confining Progressive Web Applications by Debloating Web APIs. ChangSeok Oh, Sangho Lee, Chenxiong Qian, Hyungjoon Koo, Wenke Lee |
| 2022 | Designing a Provenance Analysis for SGX Enclaves. Flavio Toffalini, Mathias Payer, Jianying Zhou, Lorenzo Cavallaro |
| 2022 | Differentially Private Map Matching for Mobility Trajectories. Ammar Haydari, Chen-Nee Chuah, H. Michael Zhang, Jane MacFarlane, Sean Peisert |
| 2022 | DitDetector: Bimodal Learning based on Deceptive Image and Text for Macro Malware Detection. Jia Yan, Ming Wan, Xiangkun Jia, Lingyun Ying, Purui Su, Zhanyi Wang |
| 2022 | Drone Authentication via Acoustic Fingerprint. Yufeng Diao, Yichi Zhang, Guodong Zhao, Mohamed Khamis |
| 2022 | ENIDrift: A Fast and Adaptive Ensemble System for Network Intrusion Detection under Real-world Drift. Xian Wang |
| 2022 | FAuST: Striking a Bargain between Forensic Auditing's Security and Throughput. Muhammad Adil Inam, Akul Goyal, Jason Liu, Jaron Mink, Noor Michael, Sneha Gaur, Adam Bates, Wajih Ul Hassan |
| 2022 | Formal Modeling and Security Analysis for Intra-level Privilege Separation. Yinggang Guo, Zicheng Wang, Bingnan Zhong, Qingkai Zeng |
| 2022 | From Hindsight to Foresight: Enhancing Design Artifacts for Business Logic Flaw Discovery. Carmen Cheh, Nicholas Tay, Binbin Chen |
| 2022 | Heimdallr: Fingerprinting SD-WAN Control-Plane Architecture via Encrypted Control Traffic. Minjae Seo, Jaehan Kim, Eduard Marin, Myoungsung You, Taejune Park, Seungsoo Lee, Seungwon Shin, Jinwoo Kim |
| 2022 | If You Can't Beat Them, Pay Them: Bitcoin Protection Racket is Profitable. Zheng Yang, Chao Yin, Junming Ke, Tien Tuan Anh Dinh, Jianying Zhou |
| 2022 | Interaction matters: a comprehensive analysis and a dataset of hybrid IoT/OT honeypots. Shreyas Srinivasa, Jens Myrup Pedersen, Emmanouil Vasilomanolakis |
| 2022 | Learning from Failures: Secure and Fault-Tolerant Aggregation for Federated Learning. Mohamad Mansouri, Melek Önen, Wafa Ben Jaballah |
| 2022 | Local Power Grids at Risk - An Experimental and Simulation-based Analysis of Attacks on Vehicle-To-Grid Communication. Maria Zhdanova, Julian Urbansky, Anne Hagemeier, Daniel Zelle, Isabelle Herrmann, Dorian Höffner |
| 2022 | MADDC: Multi-Scale Anomaly Detection, Diagnosis and Correction for Discrete Event Logs. Xiaolei Wang, Lin Yang, Dongyang Li, Linru Ma, YongZhong He, Junchao Xiao, Jiyuan Liu, Yuexiang Yang |
| 2022 | MProbe: Make the code probing meaningless. Yong-Gang Li, Yeh-Ching Chung, Jinbiao Xing, Yu Bao, Guoyuan Lin |
| 2022 | Make Data Reliable: An Explanation-powered Cleaning on Malware Dataset Against Backdoor Poisoning Attacks. Xutong Wang, Chaoge Liu, Xiaohui Hu, Zhi Wang, Jie Yin, Xiang Cui |
| 2022 | Making Memory Account Accountable: Analyzing and Detecting Memory Missing-account bugs for Container Platforms. Yutian Yang, Wenbo Shen, Xun Xie, Kangjie Lu, Mingsen Wang, Tianyu Zhou, Chenggang Qin, Wang Yu, Kui Ren |
| 2022 | MoLE: Mitigation of Side-channel Attacks against SGX via Dynamic Data Location Escape. Fan Lang, Wei Wang, Lingjia Meng, Jingqiang Lin, Qiongxiao Wang, Linli Lu |
| 2022 | More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks. Jing Xu, Rui Wang, Stefanos Koffas, Kaitai Liang, Stjepan Picek |
| 2022 | NeuGuard: Lightweight Neuron-Guided Defense against Membership Inference Attacks. Nuo Xu, Binghui Wang, Ran Ran, Wujie Wen, Parv Venkitasubramaniam |
| 2022 | No Signal Left to Chance: Driving Browser Extension Analysis by Download Patterns. Pablo Picazo-Sanchez, Benjamin Eriksson, Andrei Sabelfeld |
| 2022 | On the Implications of Spoofing and Jamming Aviation Datalink Applications. Harshad Sathaye, Guevara Noubir, Aanjhan Ranganathan |
| 2022 | One Fuzz Doesn't Fit All: Optimizing Directed Fuzzing via Target-tailored Program State Restriction. Prashast Srivastava, Stefan Nagy, Matthew Hicks, Antonio Bianchi, Mathias Payer |
| 2022 | POPKORN: Popping Windows Kernel Drivers At Scale. Rajat Gupta, Lukas Patrick Dresel, Noah Spahn, Giovanni Vigna, Christopher Kruegel, Taesoo Kim |
| 2022 | Parallel Small Polynomial Multiplication for Dilithium: A Faster Design and Implementation. Jieyu Zheng, Feng He, Shiyu Shen, Chenxi Xue, Yunlei Zhao |
| 2022 | Play the Imitation Game: Model Extraction Attack against Autonomous Driving Localization. Qifan Zhang, Junjie Shen, Mingtian Tan, Zhe Zhou, Zhou Li, Qi Alfred Chen, Haipeng Zhang |
| 2022 | Practical Binary Code Similarity Detection with BERT-based Transferable Similarity Learning. Sunwoo Ahn, Seonggwan Ahn, Hyungjoon Koo, Yunheung Paek |
| 2022 | Privacy-Preserving Trajectory Matching on Autonomous Unmanned Aerial Vehicles. Savio Sciancalepore, Dominik Roy George |
| 2022 | RAPID: Real-Time Alert Investigation with Context-aware Prioritization for Efficient Threat Discovery. Yushan Liu, Xiaokui Shu, Yixin Sun, Jiyong Jang, Prateek Mittal |
| 2022 | Randezvous: Making Randomization Effective on MCUs. Zhuojia Shen, Komail Dharsee, John Criswell |
| 2022 | Reconstruction Attack on Differential Private Trajectory Protection Mechanisms. Erik Buchholz, Alsharif Abuadbba, Shuo Wang, Surya Nepal, Salil Subhash Kanhere |
| 2022 | Ripples in the Pond: Transmitting Information through Grid Frequency Modulation. Jan Sebastian Götte, Liran Katzir, Björn Scheuermann |
| 2022 | SLOPT: Bandit Optimization Framework for Mutation-Based Fuzzing. Yuki Koike, Hiroyuki Katsura, Hiromu Yakura, Yuma Kurogome |
| 2022 | Snappy: Efficient Fuzzing with Adaptive and Mutable Snapshots. Elia Geretto, Cristiano Giuffrida, Herbert Bos, Erik van der Kouwe |
| 2022 | SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning. Giovanni Apruzzese, Mauro Conti, Ying Yuan |
| 2022 | Spacelord: Private and Secure Smart Space Sharing. Yechan Bae, Sarbartha Banerjee, Sangho Lee, Marcus Peinado |
| 2022 | Squeezing More Utility via Adaptive Clipping on Differentially Private Gradients in Federated Meta-Learning. Ning Wang, Yang Xiao, Yimin Chen, Ning Zhang, Wenjing Lou, Y. Thomas Hou |
| 2022 | StateDiver: Testing Deep Packet Inspection Systems with State-Discrepancy Guidance. Zhechang Zhang, Bin Yuan, Kehan Yang, Deqing Zou, Hai Jin |
| 2022 | Stepping out of the MUD: Contextual threat information for IoT devices with manufacturer-provided behavior profiles. Luca Morgese Zangrandi, Thijs van Ede, Tim M. Booij, Savio Sciancalepore, Luca Allodi, Andrea Continella |
| 2022 | Stopping Silent Sneaks: Defending against Malicious Mixes with Topological Engineering. Xinshu Ma, Florentin Rochet, Tariq Elahi |
| 2022 | Towards Enhanced EEG-based Authentication with Motor Imagery Brain-Computer Interface. Bingkun Wu, Weizhi Meng, Wei-Yang Chiu |
| 2022 | Towards Practical Application-level Support for Privilege Separation. Nik Sultana, Henry Zhu, Ke Zhong, Zhilei Zheng, Ruijie Mao, Digvijaysinh Chauhan, Stephen Carrasquillo, Junyong Zhao, Lei Shi, Nikos Vasilakis, Boon Thau Loo |
| 2022 | Transformer-Based Language Models for Software Vulnerability Detection. Chandra Thapa, Seung Ick Jang, Muhammad Ejaz Ahmed, Seyit Camtepe, Josef Pieprzyk, Surya Nepal |
| 2022 | Trebiz: Byzantine Fault Tolerance with Byzantine Merchants. Xiaohai Dai, Liping Huang, Jiang Xiao, Zhaonan Zhang, Xia Xie, Hai Jin |
| 2022 | TyPro: Forward CFI for C-Style Indirect Function Calls Using Type Propagation. Markus Bauer, Ilya Grishchenko, Christian Rossow |
| 2022 | User Perceptions of Five-Word Passwords. Xiaoyuan Wu, Collins W. Munyendo, Eddie Cosic, Genevieve A. Flynn, Olivia Legault, Adam J. Aviv |
| 2022 | User Perceptions of the Privacy and Usability of Smart DNS. Rahel A. Fainchtein, Adam J. Aviv, Micah Sherr |
| 2022 | View from Above: Exploring the Malware Ecosystem from the Upper DNS Hierarchy. Aaron Faulkenberry, Athanasios Avgetidis, Zane Ma, Omar Alrawi, Charles Lever, Panagiotis Kintis, Fabian Monrose, Angelos D. Keromytis, Manos Antonakakis |
| 2022 | You have been warned: Abusing 5G's Warning and Emergency Systems. Evangelos Bitsikas, Christina Pöpper |
| 2022 | ZeroDNS: Towards Better Zero Trust Security using DNS. Levente Csikor, Sriram Ramachandran, Anantharaman Lakshminarayanan |
| 2022 | iService: Detecting and Evaluating the Impact of Confused Deputy Problem in AppleOS. Yizhuo Wang, Yikun Hu, Xuangan Xiao, Dawu Gu |