| 2022 | 7th IEEE European Symposium on Security and Privacy, EuroS&P 2022, Genoa, Italy, June 6-10, 2022 |
| 2022 | Captcha me if you can: Imitation Games with Reinforcement Learning. Ilias Tsingenopoulos, Davy Preuveneers, Lieven Desmet, Wouter Joosen |
| 2022 | Compositional Information Flow Monitoring for Reactive Programs. McKenna McCall, Abhishek Bichhawat, Limin Jia |
| 2022 | CostCO: An automatic cost modeling framework for secure multi-party computation. Vivian Fang, Lloyd Brown, William Lin, Wenting Zheng, Aurojit Panda, Raluca Ada Popa |
| 2022 | Cross Chain Atomic Swaps in the Absence of Time via Attribute Verifiable Timed Commitments. Yacov Manevich, Adi Akavia |
| 2022 | DNN Model Architecture Fingerprinting Attack on CPU-GPU Edge Devices. Kartik Patwari, Syed Mahbub Hafiz, Han Wang, Houman Homayoun, Zubair Shafiq, Chen-Nee Chuah |
| 2022 | Difficult for Thee, But Not for Me: Measuring the Difficulty and User Experience of Remediating Persistent IoT Malware. Elsa Turcios Rodriguez, Max Fukkink, Simon Parkin, Michel van Eeten, Carlos Gañán |
| 2022 | Dynamic Backdoor Attacks Against Machine Learning Models. Ahmed Salem, Rui Wen, Michael Backes, Shiqing Ma, Yang Zhang |
| 2022 | Dynamic Policies Revisited. Amir M. Ahmadian, Musard Balliu |
| 2022 | EZEE: Epoch Parallel Zero Knowledge for ANSI C. Yibin Yang, David Heath, Vladimir Kolesnikov, David Devecsery |
| 2022 | Fuzzing with Data Dependency Information. Alessandro Mantovani, Andrea Fioraldi, Davide Balzarotti |
| 2022 | GRAPHITE: Generating Automatic Physical Examples for Machine-Learning Attacks on Computer Vision Systems. Ryan Feng, Neal Mangaokar, Jiefeng Chen, Earlence Fernandes, Somesh Jha, Atul Prakash |
| 2022 | HARM: Hardware-Assisted Continuous Re-randomization for Microcontrollers. Jiameng Shi, Le Guan, Wenqiang Li, Dayou Zhang, Ping Chen, Ning Zhang |
| 2022 | Hand Sanitizers in the Wild: A Large-scale Study of Custom JavaScript Sanitizer Functions. David Klein, Thomas Barber, Souphiane Bensalim, Ben Stock, Martin Johns |
| 2022 | Hide and Seek: Revisiting DNS-based User Tracking. Deliang Chang, Joann Qiongna Chen, Zhou Li, Xing Li |
| 2022 | HyperLogLog: Exponentially Bad in Adversarial Settings. Kenneth G. Paterson, Mathilde Raynal |
| 2022 | Illuminati: Towards Explaining Graph Neural Networks for Cybersecurity Analysis. Haoyu He, Yuede Ji, H. Howie Huang |
| 2022 | Investigating Graph Embedding Methods for Cross-Platform Binary Code Similarity Detection. Victor Cochard, Damian Pfammatter, Chi Thang Duong, Mathias Humbert |
| 2022 | KGP Meter: Communicating Kin Genomic Privacy to the Masses. Mathias Humbert, Didier Dupertuis, Mauro Cherubini, Kévin Huguenin |
| 2022 | Laser Meager Listener: A Scientific Exploration of Laser-based Speech Eavesdropping in Commercial User Space. Payton Walker, Nitesh Saxena |
| 2022 | Lethe: Practical Data Breach Detection with Zero Persistent Secret State. Antreas Dionysiou, Elias Athanasopoulos |
| 2022 | Lightweight, Multi-Stage, Compiler-Assisted Application Specialization. Mohannad Alhanahnah, Rithik Jain, Vaibhav Rastogi, Somesh Jha, Thomas W. Reps |
| 2022 | LockedDown: Exploiting Contention on Host-GPU PCIe Bus for Fun and Profit. Mert Side, Fan Yao, Zhenkai Zhang |
| 2022 | Modelling direct messaging networks with multiple recipients for cyber deception. Kristen Moore, Cody James Christopher, David Liebowitz, Surya Nepal, Renee Selvey |
| 2022 | SAUSAGE: Security Analysis of Unix domain Socket usAGE in Android. Mounir Elgharabawy, Blas Kojusner, Mohammad Mannan, Kevin R. B. Butler, Byron Williams, Amr M. Youssef |
| 2022 | SIERRA: Ranking Anomalous Activities in Enterprise Networks. Jehyun Lee, Farren Tang, Phyo May Thet, Desmond Yeoh, Mitch Rybczynski, Dinil Mon Divakaran |
| 2022 | Signature Correction Attack on Dilithium Signature Scheme. Saad Islam, Koksal Mus, Richa Singh, Patrick Schaumont, Berk Sunar |
| 2022 | SoK: All or Nothing - A Postmortem of Solutions to the Third-Party Script Inclusion Permission Model and a Path Forward. Steven Sprecher, Christoph Kerschbaumer, Engin Kirda |
| 2022 | SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data. Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, Michael Yonli |
| 2022 | SoK: Oblivious Pseudorandom Functions. Sílvia Casacuberta, Julia Hesse, Anja Lehmann |
| 2022 | SoK: Privacy-Preserving Computing in the Blockchain Era. Ghada Almashaqbeh, Ravital Solomon |
| 2022 | SoK: The Impact of Unlabelled Data in Cyberthreat Detection. Giovanni Apruzzese, Pavel Laskov, Aliya Tastemirova |
| 2022 | SoK: Workerounds - Categorizing Service Worker Attacks and Mitigations. Karthika Subramani, Jordan Jueckstock, Alexandros Kapravelos, Roberto Perdisci |
| 2022 | Towards Fair and Robust Classification. Haipei Sun, Kun Wu, Ting Wang, Wendy Hui Wang |
| 2022 | Trampoline Over the Air: Breaking in IoT Devices Through MQTT Brokers. Huikai Xu, Miao Yu, Yanhao Wang, Yue Liu, Qinsheng Hou, Zhenbang Ma, Haixin Duan, Jianwei Zhuge, Baojun Liu |
| 2022 | Transformer-based Extraction of Deep Image Models. Verena Battis, Alexander Penner |
| 2022 | Transparent DIFC: Harnessing Innate Application Event Logging for Fine-Grained Decentralized Information Flow Control. Jason Liu, Anant Kandikuppa, Adam Bates |
| 2022 | TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors. Ren Pang, Zheng Zhang, Xiangshan Gao, Zhaohan Xi, Shouling Ji, Peng Cheng, Xiapu Luo, Ting Wang |
| 2022 | Unrolling SGD: Understanding Factors Influencing Machine Unlearning. Anvith Thudi, Gabriel Deza, Varun Chandrasekaran, Nicolas Papernot |
| 2022 | WatchAuth: User Authentication and Intent Recognition in Mobile Payments using a Smartwatch. Jack Sturgess, Simon Eberz, Ivo Sluganovic, Ivan Martinovic |
| 2022 | We Can Make Mistakes: Fault-tolerant Forward Private Verifiable Dynamic Searchable Symmetric Encryption. Dandan Yuan, Shujie Cui, Giovanni Russello |
| 2022 | aaeCAPTCHA: The Design and Implementation of Audio Adversarial CAPTCHA. Md. Imran Hossen, Xiali Hei |
| 2022 | xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64. Lukas Bernhard, Michael Rodler, Thorsten Holz, Lucas Davi |