| 2022 | A Systematic Study of Bulletin Board and Its Application. Misni Harjo Suwito, Bayu Adhi Tama, Bagus Santoso, Sabyasachi Dutta, Haowen Tan, Yoshifumi Ueshige, Kouichi Sakurai |
| 2022 | ALEXA VERSUS ALEXA: Controlling Smart Speakers by Self-Issuing Voice Commands. Sergio Esposito, Daniele Sgandurra, Giampaolo Bella |
| 2022 | APKC '22: 9th ACM ASIA Public-Key Cryptography Workshop. Jason Paul Cruz, Naoto Yanai |
| 2022 | ASAP: Algorithm Substitution Attacks on Cryptographic Protocols. Sebastian Berndt, Jan Wichelmann, Claudius Pott, Tim-Henrik Traving, Thomas Eisenbarth |
| 2022 | ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022 Yuji Suga, Kouichi Sakurai, Xuhua Ding, Kazue Sako |
| 2022 | Adversarial Level Agreements for Two-Party Protocols. Marilyn George, Seny Kamara |
| 2022 | Aggregating and Thresholdizing Hash-based Signatures using STARKs. Irakliy Khaburzaniya, Konstantinos Chalkias, Kevin Lewi, Harjasleen Malvai |
| 2022 | Artificial Intelligence Meets Kinesthetic Intelligence: Mouse-based User Authentication based on Hybrid Human-Machine Learning. Shen Fu, Dong Qin, George T. Amariucai, Daji Qiao, Yong Guan, Ann Smiley |
| 2022 | Autonomous Network Defence using Reinforcement Learning. Myles Foley, Chris Hicks, Kate Highnam, Vasilios Mavroudis |
| 2022 | AuxChannel: Enabling Efficient Bi-Directional Channel for Scriptless Blockchains. Zhimei Sui, Joseph K. Liu, Jiangshan Yu, Man Ho Au, Jia Liu |
| 2022 | BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy. Daniele Antonioli, Nils Ole Tippenhauer, Kasper Rasmussen, Mathias Payer |
| 2022 | BSCI 2022: The 4th ACM International Symposium on Blockchain and Secure Critical Infrastructure. Keke Gai, Kim-Kwang Raymond Choo |
| 2022 | Base64 Malleability in Practice. Konstantinos Chalkias, Panagiotis Chatzigiannis |
| 2022 | Black-box and Target-specific Attack Against Interpretable Deep Learning Systems. Eldor Abdukhamidov, Firuz Juraev, Mohammed Abuhamad, Tamer AbuHmed |
| 2022 | Byzantine-Robust Private Information Retrieval with Low Communication and Efficient Decoding. Liang Feng Zhang, Huaxiong Wang, Li-Ping Wang |
| 2022 | CPSS '22: 8th ACM Cyber-Physical System Security Workshop. Alvaro A. Cárdenas, Daisuke Mashima |
| 2022 | Cellular Security: Why is it difficult? Yongdae Kim |
| 2022 | Common Evaluation Pitfalls in Touch-Based Authentication Systems. Martin Georgiev, Simon Eberz, Henry Turner, Giulio Lovisotto, Ivan Martinovic |
| 2022 | Confusing and Detecting ML Adversarial Attacks with Injected Attractors. Jiyi Zhang, Ee-Chien Chang, Hwee Kuan Lee |
| 2022 | CySSS '22: 1st International Workshop on Cybersecurity and Social Sciences. Eric Chan-Tin, Shelia Kennison |
| 2022 | DPaSE: Distributed Password-Authenticated Symmetric-Key Encryption, or How to Get Many Keys from One Password. Poulami Das, Julia Hesse, Anja Lehmann |
| 2022 | Decentralized Federated Learning for Internet of Things Anomaly Detection. Zhuotao Lian, Chunhua Su |
| 2022 | Decentralized and Collaborative Tracing for Group Signatures. Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng, Kouichi Sakurai |
| 2022 | Depth, Breadth, and Complexity: Ways to Attack and Defend Deep Learning Models. Firuz Juraev, Eldor Abdukhamidov, Mohammed Abuhamad, Tamer AbuHmed |
| 2022 | Developing Secured Android Applications by Mitigating Code Vulnerabilities with Machine Learning. Janaka Senanayake, Harsha K. Kalutarage, M. Omar Al-Kadri, Andrei V. Petrovski, Luca Piras |
| 2022 | Differentially Private Data Synthesis: State of the Art and Challenges. Ninghui Li |
| 2022 | Driving Execution of Target Paths in Android Applications with (a) CAR. Michelle Y. Wong, David Lie |
| 2022 | Duplicates also Matter! Towards Secure Deletion on Flash-based Storage Media by Removing Duplicates. Niusen Chen, Bo Chen |
| 2022 | EPID with Efficient Proof of Non-Revocation. Olivier Sanders |
| 2022 | EVOLIoT: A Self-Supervised Contrastive Learning Framework for Detecting and Characterizing Evolving IoT Malware Variants. Mirabelle Dib, Sadegh Torabi, Elias Bou-Harb, Nizar Bouguila, Chadi Assi |
| 2022 | Easy-to-Implement Two-Server based Anonymous Communication with Simulation Security. Adam Bowers, Jize Du, Dan Lin, Wei Jiang |
| 2022 | Efficient Oblivious Permutation via the Waksman Network. William L. Holland, Olga Ohrimenko, Anthony Wirth |
| 2022 | Eliminating Sandwich Attacks with the Help of Game Theory. Lioba Heimbach, Roger Wattenhofer |
| 2022 | Email Summarization to Assist Users in Phishing Identification. Amir Kashapov, Tingmin Wu, Sharif Abuadbba, Carsten Rudolph |
| 2022 | Enabling Attribute-Based Access Control in Linux Kernel. H. O. Sai Varshith, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri |
| 2022 | EnclaveTree: Privacy-preserving Data Stream Training and Inference Using TEE. Qifan Wang, Shujie Cui, Lei Zhou, Ocean Wu, Yonghua Zhu, Giovanni Russello |
| 2022 | Evaluating Blockchain Protocols with Abusive Modeling. Vishal Sharma, Pawel Szalachowski, Jianying Zhou |
| 2022 | Exploring Unfairness on Proof of Authority: Order Manipulation Attacks and Remedies. Qin Wang, Rujia Li, Qi Wang, Shiping Chen, Yang Xiang |
| 2022 | FLARE: Defending Federated Learning against Model Poisoning Attacks via Latent Space Representations. Ning Wang, Yang Xiao, Yimin Chen, Yang Hu, Wenjing Lou, Y. Thomas Hou |
| 2022 | Gatekeeper: A Gateway-based Broadcast Authentication Protocol for the In-Vehicle Ethernet. Shengtuo Hu, Qingzhao Zhang, André Weimerskirch, Z. Morley Mao |
| 2022 | Generating Content-Preserving and Semantics-Flipping Adversarial Text. Weiping Pei, Chuan Yue |
| 2022 | GraphTrack: A Graph-based Cross-Device Tracking Framework. Binghui Wang, Tianchen Zhou, Song Li, Yinzhi Cao, Neil Zhenqiang Gong |
| 2022 | Hearing Check Failed: Using Laser Vibrometry to Analyze the Potential for Hard Disk Drives to Eavesdrop Speech Vibrations. Payton Walker, Shalini Saini, S. Abhishek Anand, Tzipora Halevi, Nitesh Saxena |
| 2022 | Hierarchical Identity-based Puncturable Encryption from Lattices with Application to Forward Security. Priyanka Dutta, Mei Jiang, Dung Hoang Duong, Willy Susilo, Kazuhide Fukushima, Shinsaku Kiyomoto |
| 2022 | Hopper: Per-Device Nano Segmentation for the Industrial IoT. Piet De Vaere, Andrea Tulimiero, Adrian Perrig |
| 2022 | Hunter: HE-Friendly Structured Pruning for Efficient Privacy-Preserving Deep Learning. Yifei Cai, Qiao Zhang, Rui Ning, Chunsheng Xin, Hongyi Wu |
| 2022 | InfoCensor: An Information-Theoretic Framework against Sensitive Attribute Inference and Demographic Disparity. Tianhang Zheng, Baochun Li |
| 2022 | IoT System Trustworthiness Assurance. Razvan Beuran, Ooi Sian En, Abbie O. Barbir, Yasuo Tan |
| 2022 | Iterative Oblivious Pseudo-Random Functions and Applications. Erik-Oliver Blass, Florian Kerschbaum, Travis Mayberry |
| 2022 | Leveraging Spectral Representations of Control Flow Graphs for Efficient Analysis of Windows Malware. Qirui Sun, Eldor Abdukhamidov, Tamer AbuHmed, Mohammed Abuhamad |
| 2022 | Lures for Money: A First Look into YouTube Videos Promoting Money-Making Apps. Noshaba Nasir, Faqia Iqbal, Mahnoor Zaheer, Mariam Shahjahan, Mobin Javed |
| 2022 | MAB-Malware: A Reinforcement Learning Framework for Blackbox Generation of Adversarial Malware. Wei Song, Xuezixiang Li, Sadia Afroz, Deepali Garg, Dmitry Kuznetsov, Heng Yin |
| 2022 | Machine Learning-based Online Social Network Privacy Preservation. Tianchong Gao, Feng Li |
| 2022 | Markov Chain Monte Carlo-Based Machine Unlearning: Unlearning What Needs to be Forgotten. Quoc Phong Nguyen, Ryutaro Oikawa, Dinil Mon Divakaran, Mun Choon Chan, Bryan Kian Hsiang Low |
| 2022 | Membership Feature Disentanglement Network. Heonseok Ha, Jaehee Jang, Yonghyun Jeong, Sungroh Yoon |
| 2022 | Memory and Round-Efficient MPC Primitives in the Pre-Processing Model from Unit Vectorization. Nuttapong Attrapadung, Hiraku Morita, Kazuma Ohara, Jacob C. N. Schuldt, Kazunari Tozawa |
| 2022 | Mirror, Mirror on the Wall: Wireless Environment Reconfiguration Attacks Based on Fast Software-Controlled Surfaces. Paul Staat, Harald Elders-Boll, Markus Heinrichs, Christian T. Zenger, Christof Paar |
| 2022 | Missed Opportunities: Measuring the Untapped TLS Support in the Industrial Internet of Things. Markus Dahlmanns, Johannes Lohmöller, Jan Pennekamp, Jörn Bodenhausen, Klaus Wehrle, Martin Henze |
| 2022 | Mixed Certificate Chains for the Transition to Post-Quantum Authentication in TLS 1.3. Sebastian Paul, Yulia Kuzovkova, Norman Lahr, Ruben Niederhagen |
| 2022 | Model Extraction Attacks on Graph Neural Networks: Taxonomy and Realisation. Bang Wu, Xiangwen Yang, Shirui Pan, Xingliang Yuan |
| 2022 | Multi-Key Homomorphic MACs with Efficient Verification for Quadratic Arithmetic Circuits. Shuai Feng, Shuaijianni Xu, Liang Feng Zhang |
| 2022 | New Multiparty Computational Model: From Nakamoto to YOSO. Tal Rabin |
| 2022 | No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis. Arwa Abdulkarim Al Alsadi, Kaichi Sameshima, Jakob Bleier, Katsunari Yoshioka, Martina Lindorfer, Michel van Eeten, Carlos Hernandez Gañán |
| 2022 | On Measuring Vulnerable JavaScript Functions in the Wild. Maryna Kluban, Mohammad Mannan, Amr M. Youssef |
| 2022 | On the Security of the FLARM Collision Warning System. Boya Wang, Giorgio Tresoldi, Martin Strohmeier, Vincent Lenders |
| 2022 | PSImple: Practical Multiparty Maliciously-Secure Private Set Intersection. Aner Ben-Efraim, Olga Nissenbaum, Eran Omri, Anat Paskin-Cherniavsky |
| 2022 | PacJam: Securing Dependencies Continuously via Package-Oriented Debloating. Pardis Pashakhanloo, Aravind Machiry, Hyon-Young Choi, Anthony Canino, Kihong Heo, Insup Lee, Mayur Naik |
| 2022 | PeriScope: Comprehensive Vulnerability Analysis of Mobile App-defined Bluetooth Peripherals. Qingchuan Zhao, Chaoshun Zuo, Jorge Blasco, Zhiqiang Lin |
| 2022 | Port Contention Goes Portable: Port Contention Side Channels in Web Browsers. Thomas Rokicki, Clémentine Maurice, Marina Botvinnik, Yossi Oren |
| 2022 | Privacy Guarantees of BLE Contact Tracing for COVID-19 and Beyond: A Case Study on COVIDWISE. Salman Ahmed, Ya Xiao, Taejoong (Tijay) Chung, Carol J. Fung, Moti Yung, Danfeng (Daphne) Yao |
| 2022 | Privacy-Preserving Deep Sequential Model with Matrix Homomorphic Encryption. Jaehee Jang, Younho Lee, Andrey Kim, Byunggook Na, Donggeon Yhee, Byounghan Lee, Jung Hee Cheon, Sungroh Yoon |
| 2022 | Proximity Searchable Encryption for the Iris Biometric. Chloé Cachet, Sohaib Ahmad, Luke Demarest, Ariel Hamlin, Benjamin Fuller |
| 2022 | Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation. Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen |
| 2022 | RBMon: Real Time System Behavior Monitoring Tool. Nitesh Kumar, Anand Handa, Sandeep K. Shukla |
| 2022 | ReFuzz - Structure Aware Fuzzing of the Resilient File System (ReFS). Tobias Groß, Tobias Schleier, Tilo Müller |
| 2022 | RecIPE: Revisiting the Evaluation of Memory Error Defenses. Yuancheng Jiang, Roland H. C. Yap, Zhenkai Liang, Hubert Rosier |
| 2022 | Ruling the Rules: Quantifying the Evolution of Rulesets, Alerts and Incidents in Network Intrusion Detection. Mathew Vermeer, Michel van Eeten, Carlos Gañán |
| 2022 | SMS OTP Security (SOS): Hardening SMS-Based Two Factor Authentication. Christian Peeters, Christopher Patton, Imani N. S. Munyaka, Daniel Olszewski, Thomas Shrimpton, Patrick Traynor |
| 2022 | SUPERVOICE: Text-Independent Speaker Verification Using Ultrasound Energy in Human Speech. Hanqing Guo, Qiben Yan, Nikolay Ivanov, Ying Zhu, Li Xiao, Eric J. Hunter |
| 2022 | Scalable Private Decision Tree Evaluation with Sublinear Communication. Jianli Bai, Xiangfu Song, Shujie Cui, Ee-Chien Chang, Giovanni Russello |
| 2022 | Secure-Computation-Friendly Private Set Intersection from Oblivious Compact Graph Evaluation. Jack P. K. Ma, Sherman S. M. Chow |
| 2022 | Server-Side Browsers: Exploring the Web's Hidden Attack Surface. Marius Musch, Robin Kirchner, Max Boll, Martin Johns |
| 2022 | ShadowAuth: Backward-Compatible Automatic CAN Authentication for Legacy ECUs. Sungwoo Kim, Gisu Yeo, Taegyu Kim, Junghwan John Rhee, Yuseok Jeon, Antonio Bianchi, Dongyan Xu, Dave (Jing) Tian |
| 2022 | Signal Injection Attacks against CCD Image Sensors. Sebastian Köhler, Richard Baker, Ivan Martinovic |
| 2022 | SoK: A Survey Of Indirect Network-level Covert Channels. Tobias Schmidbauer, Steffen Wendzel |
| 2022 | SoK: Design Tools for Side-Channel-Aware Implementations. Ileana Buhan, Lejla Batina, Yuval Yarom, Patrick Schaumont |
| 2022 | SoK: Exploring Current and Future Research Directions on XS-Leaks through an Extended Formal Model. Tom van Goethem, Gertjan Franken, Iskander Sánchez-Rola, David Dworken, Wouter Joosen |
| 2022 | SoK: Password-Authenticated Key Exchange - Theory, Practice, Standardization and Real-World Lessons. Feng Hao, Paul C. van Oorschot |
| 2022 | SoK: The Evolution of Trusted UI on Mobile. Davide Bove |
| 2022 | Speedster: An Efficient Multi-party State Channel via Enclaves. Jinghui Liao, Fengwei Zhang, Wenhai Sun, Weisong Shi |
| 2022 | Stegozoa: Enhancing WebRTC Covert Channels with Video Steganography for Internet Censorship Circumvention. Gabriel Figueira, Diogo Barradas, Nuno Santos |
| 2022 | SteinerLog: Prize Collecting the Audit Logs for Threat Hunting on Enterprise Network. Bibek Bhattarai, H. Howie Huang |
| 2022 | Symbolic Synthesis of Indifferentiability Attacks. Itsaka Rakotonirina, Miguel Ambrona, Alejandro Aguirre, Gilles Barthe |
| 2022 | TRAP: The Bait of Rational Players to Solve Byzantine Consensus. Alejandro Ranchal-Pedrosa, Vincent Gramoli |
| 2022 | TTP-Aided Secure Computation using Secret Sharing With Only One Computing Server. Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal, Masaki Inamura |
| 2022 | TargetFuzz: Using DARTs to Guide Directed Greybox Fuzzers. Sadullah Canakci, Nikolay Matyunin, Kalman Graffi, Ajay Joshi, Manuel Egele |
| 2022 | The 5G Key-Establishment Stack: In-Depth Formal Verification and Experimentation. Rhys Miller, Ioana Boureanu, Stephan Wesemeyer, Christopher J. P. Newton |
| 2022 | The Convergence of Source Code and Binary Vulnerability Discovery - A Case Study. Alessandro Mantovani, Luca Compagna, Yan Shoshitaishvili, Davide Balzarotti |
| 2022 | The Personalities of Social Media Posts and Photos. Anne Wagner, Anna Bakas, Daisy Reyes, Shelia Kennison, Eric Chan-Tin |
| 2022 | Tight Leakage-Resilient Identity-based Encryption under Multi-challenge Setting. Cailing Cai, Xianrui Qin, Tsz Hon Yuen, Siu-Ming Yiu |
| 2022 | Towards Polyvalent Adversarial Attacks on URL Classification Engines. Fabien Charmet, Harry Chandra Tanuwidjaja, Tomohiro Morikawa, Takeshi Takahashi |
| 2022 | Towards a Utopia of Dataset Sharing: A Case Study on Machine Learning-based Malware Detection Algorithms. Ping-Jui Chuang, Chih-Fan Hsu, Yung-Tien Chu, Szu-Chun Huang, Chun-Ying Huang |
| 2022 | Understanding Disparate Effects of Membership Inference Attacks and their Countermeasures. Da Zhong, Haipei Sun, Jun Xu, Neil Zhenqiang Gong, Wendy Hui Wang |
| 2022 | Understanding and Detecting Remote Infection on Linux-based IoT Devices. Hongda Li, Qiqing Huang, Fei Ding, Hongxin Hu, Long Cheng, Guofei Gu, Ziming Zhao |
| 2022 | VERICONDOR: End-to-End Verifiable Condorcet Voting without Tallying Authorities. Luke Harrison, Samiran Bag, Hang Luo, Feng Hao |
| 2022 | VWAnalyzer: A Systematic Security Analysis Framework for the Voice over WiFi Protocol. Hyunwoo Lee, Imtiaz Karim, Ninghui Li, Elisa Bertino |
| 2022 | Veksel: Simple, Efficient, Anonymous Payments with Large Anonymity Sets from Well-Studied Assumptions. Matteo Campanelli, Mathias Hall-Andersen |
| 2022 | Vulnerability Detection via Multimodal Learning: Datasets and Analysis. Xin Zhou, Rakesh M. Verma |
| 2022 | WDC'22: 1st Workshop on the Security Implications of Deepfakes and Cheapfakes. Simon S. Woo, Shahroz Tariq, Hyoungshick Kim |
| 2022 | WearRF-CLA: Continuous Location Authentication with Wrist Wearables and UHF RFID. Ang Li, Jiawei Li, Dianqi Han, Yan Zhang, Tao Li, Yanchao Zhang |
| 2022 | Wireless Manipulation of Serial Communication. Gökçen Yilmaz Dayanikli, Abdullah Zubair Mohammed, Ryan M. Gerdes, Mani Mina |
| 2022 | WoRMA '22: 1st Workshop on Robust Malware Analysis. Fabio Pierazzi, Nedim Srndic |
| 2022 | Wolf at the Door: Preventing Install-Time Attacks in npm with Latch. Elizabeth Wyss, Alexander Wittman, Drew Davidson, Lorenzo De Carli |