| 2022 | "Adversarial Examples" for Proof-of-Learning. Rui Zhang, Jian Liu, Yuan Ding, Zhibo Wang, Qingbiao Wu, Kui Ren |
| 2022 | "Desperate Times Call for Desperate Measures": User Concerns with Mobile Loan Apps in Kenya. Collins W. Munyendo, Yasemin Acar, Adam J. Aviv |
| 2022 | "Flawed, but like democracy we don't have a better system": The Experts' Insights on the Peer Review Process of Evaluating Security Papers. Ananta Soneji, Faris Bugra Kokulu, Carlos E. Rubio-Medrano, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé |
| 2022 | "They're not that hard to mitigate": What Cryptographic Library Developers Think About Timing Attacks. Jan Jancar, Marcel Fourné, Daniel De Almeida Braga, Mohamed Sabt, Peter Schwabe, Gilles Barthe, Pierre-Alain Fouque, Yasemin Acar |
| 2022 | 27 Years and 81 Million Opportunities Later: Investigating the Use of Email Encryption for an Entire University. Christian Stransky, Oliver Wiese, Volker Roth, Yasemin Acar, Sascha Fahl |
| 2022 | 43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022 |
| 2022 | A Formal Security Analysis of the W3C Web Payment APIs: Attacks and Verification. Quoc Huy Do, Pedram Hosseyni, Ralf Küsters, Guido Schmitz, Nils Wenzler, Tim Würtele |
| 2022 | A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols. Cas Cremers, Caroline Fontaine, Charlie Jacomme |
| 2022 | A Secret-Free Hypervisor: Rethinking Isolation in the Age of Speculative Vulnerabilities. Hongyan Xia, David Zhang, Wei Liu, István Haller, Bruce Sherwin, David Chisnall |
| 2022 | A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP. Mengyuan Li, Luca Wilke, Jan Wichelmann, Thomas Eisenbarth, Radu Teodorescu, Yinqian Zhang |
| 2022 | AccEar: Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary. Pengfei Hu, Hui Zhuang, Panneer Selvam Santhalingam, Riccardo Spolaor, Parth H. Pathak, Guoming Zhang, Xiuzhen Cheng |
| 2022 | Adversarial Prefetch: New Cross-Core Cache Side Channel Attacks. Yanan Guo, Andrew Zigerelli, Youtao Zhang, Jun Yang |
| 2022 | Analyzing Ground-Truth Data of Mobile Gambling Scams. Geng Hong, Zhemin Yang, Sen Yang, Xiaojing Liao, Xiaolin Du, Min Yang, Haixin Duan |
| 2022 | Annotating, Tracking, and Protecting Cryptographic Secrets with CryptoMPK. Xuancheng Jin, Xuangan Xiao, Songlin Jia, Wang Gao, Dawu Gu, Hang Zhang, Siqi Ma, Zhiyun Qian, Juanru Li |
| 2022 | Anti-Tamper Radio: System-Level Tamper Detection for Computing Systems. Paul Staat, Johannes Tobisch, Christian T. Zenger, Christof Paar |
| 2022 | Are We There Yet? Timing and Floating-Point Attacks on Differential Privacy Systems. Jiankai Jin, Eleanor McMurtry, Benjamin I. P. Rubinstein, Olga Ohrimenko |
| 2022 | Asleep at the Keyboard? Assessing the Security of GitHub Copilot's Code Contributions. Hammond Pearce, Baleegh Ahmad, Benjamin Tan, Brendan Dolan-Gavitt, Ramesh Karri |
| 2022 | Attacks on Wireless Coexistence: Exploiting Cross-Technology Performance Features for Inter-Chip Privilege Escalation. Jiska Classen, Francesco Gringoli, Michael Hermann, Matthias Hollick |
| 2022 | Augury: Using Data Memory-Dependent Prefetchers to Leak Data at Rest. Jose Rodrigo Sanchez Vicarte, Michael Flanders, Riccardo Paccagnella, Grant Garrett-Grossman, Adam Morrison, Christopher W. Fletcher, David Kohlbrenner |
| 2022 | Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification Documents. Maria Leonor Pacheco, Max von Hippel, Ben Weintraub, Dan Goldwasser, Cristina Nita-Rotaru |
| 2022 | BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning. Heqing Huang, Yiyuan Guo, Qingkai Shi, Peisen Yao, Rongxin Wu, Charles Zhang |
| 2022 | BLACKSMITH: Scalable Rowhammering in the Frequency Domain. Patrick Jattke, Victor van der Veen, Pietro Frigo, Stijn Gunter, Kaveh Razavi |
| 2022 | Back to the Drawing Board: A Critical Evaluation of Poisoning Attacks on Production Federated Learning. Virat Shejwalkar, Amir Houmansadr, Peter Kairouz, Daniel Ramage |
| 2022 | Bad Characters: Imperceptible NLP Attacks. Nicholas Boucher, Ilia Shumailov, Ross Anderson, Nicolas Papernot |
| 2022 | BadEncoder: Backdoor Attacks to Pre-trained Encoders in Self-Supervised Learning. Jinyuan Jia, Yupei Liu, Neil Zhenqiang Gong |
| 2022 | COBRA: Dynamic Proactive Secret Sharing for Confidential BFT Services. Robin Vassantlal, Eduardo Alchieri, Bernardo Ferreira, Alysson Bessani |
| 2022 | Cats vs. Spectre: An Axiomatic Approach to Modeling Speculative Execution Attacks. Hernán Ponce de León, Johannes Kinder |
| 2022 | CirC: Compiler infrastructure for proof systems, software verification, and more. Alex Ozdemir, Fraser Brown, Riad S. Wahby |
| 2022 | Committed to Trust: A Qualitative Study on Security & Trust in Open Source Software Projects. Dominik Wermke, Noah Wöhler, Jan H. Klemmer, Marcel Fourné, Yasemin Acar, Sascha Fahl |
| 2022 | Copy, Right? A Testing Framework for Copyright Protection of Deep Learning Models. Jialuo Chen, Jingyi Wang, Tinglan Peng, Youcheng Sun, Peng Cheng, Shouling Ji, Xingjun Ma, Bo Li, Dawn Song |
| 2022 | DEEPCASE: Semi-Supervised Contextual Analysis of Security Events. Thijs van Ede, Hojjat Aghakhani, Noah Spahn, Riccardo Bortolameotti, Marco Cova, Andrea Continella, Maarten van Steen, Andreas Peter, Christopher Kruegel, Giovanni Vigna |
| 2022 | DEPCOMM: Graph Summarization on System Audit Logs for Attack Investigation. Zhiqiang Xu, Pengcheng Fang, Changlin Liu, Xusheng Xiao, Yu Wen, Dan Meng |
| 2022 | DeepCoFFEA: Improved Flow Correlation Attacks on Tor via Metric Learning and Amplification. Se Eun Oh, Taiji Yang, Nate Mathews, James K. Holland, Mohammad Saidur Rahman, Nicholas Hopper, Matthew Wright |
| 2022 | DeepSteal: Advanced Model Extractions Leveraging Efficient Weight Stealing in Memories. Adnan Siraj Rakin, Md Hafizul Islam Chowdhuryy, Fan Yao, Deliang Fan |
| 2022 | Delay Wreaks Havoc on Your Smart Home: Delay-based Automation Interference Attacks. Haotian Chi, Chenglong Fu, Qiang Zeng, Xiaojiang Du |
| 2022 | Deployment of Source Address Validation by Network Operators: A Randomized Control Trial. Qasim Lone, Alisa Frik, Matthew Luckie, Maciej Korczynski, Michel van Eeten, Carlos Gañán |
| 2022 | Device Fingerprinting with Peripheral Timestamps. John V. Monaco |
| 2022 | Differential Privacy and Swapping: Examining De-Identification's Impact on Minority Representation and Privacy Preservation in the U.S. Census. Miranda Christ, Sarah Radway, Steven M. Bellovin |
| 2022 | Differentially Private Histograms in the Shuffle Model from Fake Users. Albert Cheu, Maxim Zhilyaev |
| 2022 | Domains Do Change Their Spots: Quantifying Potential Abuse of Residual Trust. Johnny So, Najmeh Miramirkhani, Michael Ferdman, Nick Nikiforakis |
| 2022 | Effective Seed Scheduling for Fuzzing with Graph Centrality Analysis. Dongdong She, Abhishek Shah, Suman Jana |
| 2022 | Evaluating Physical-Layer BLE Location Tracking Attacks on Mobile Devices. Hadi Givehchian, Nishant Bhaskar, Eliana Rodriguez Herrera, Héctor Rodrigo López Soto, Christian Dameff, Dinesh Bharadia, Aaron Schulman |
| 2022 | Exploit the Last Straw That Breaks Android Systems. Lei Zhang, Keke Lian, Haoyu Xiao, Zhibo Zhang, Peng Liu, Yuan Zhang, Min Yang, Haixin Duan |
| 2022 | Exposed Infrastructures: Discovery, Attacks and Remediation of Insecure ICS Remote Management Devices. Takayuki Sasaki, Akira Fujita, Carlos Hernandez Gañán, Michel van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto |
| 2022 | FSAFlow: Lightweight and Fast Dynamic Path Tracking and Control for Privacy Protection on Android Using Hybrid Analysis with State-Reduction Strategy. Zhi Yang, Zhanhui Yuan, Shuyuan Jin, Xingyuan Chen, Lei Sun, Xuehui Du, Wenfa Li, Hongqi Zhang |
| 2022 | Finding SMM Privilege-Escalation Vulnerabilities in UEFI Firmware with Protocol-Centric Static Analysis. Jiawei Yin, Menghao Li, Wei Wu, Dandan Sun, Jianhua Zhou, Wei Huo, Jingling Xue |
| 2022 | Finding and Exploiting CPU Features using MSR Templating. Andreas Kogler, Daniel Weber, Martin Haubenwallner, Moritz Lipp, Daniel Gruss, Michael Schwarz |
| 2022 | Formal Model-Driven Discovery of Bluetooth Protocol Design Vulnerabilities. Jianliang Wu, Ruoyu Wu, Dongyan Xu, Dave Jing Tian, Antonio Bianchi |
| 2022 | Foundations of Dynamic BFT. Sisi Duan, Haibin Zhang |
| 2022 | Four Attacks and a Proof for Telegram. Martin R. Albrecht, Lenka Mareková, Kenneth G. Paterson, Igors Stepanovs |
| 2022 | FuzzUSB: Hybrid Stateful Fuzzing of USB Gadget Stacks. Kyungtae Kim, Taegyu Kim, Ertza Warraich, Byoungyoung Lee, Kevin R. B. Butler, Antonio Bianchi, Dave Jing Tian |
| 2022 | GREBE: Unveiling Exploitation Potential for Linux Kernel Bugs. Zhenpeng Lin, Yueqi Chen, Yuhang Wu, Dongliang Mu, Chensheng Yu, Xinyu Xing, Kang Li |
| 2022 | Goshawk: Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis. Yunlong Lyu, Yi Fang, Yiwei Zhang, Qibin Sun, Siqi Ma, Elisa Bertino, Kangjie Lu, Juanru Li |
| 2022 | Graphics Peeping Unit: Exploiting EM Side-Channel Information of GPUs to Eavesdrop on Your Neighbors. Zihao Zhan, Zhenkai Zhang, Sisheng Liang, Fan Yao, Xenofon D. Koutsoukos |
| 2022 | HAMRAZ: Resilient Partitioning and Replication. Xiao Li, Farzin Houshmand, Mohsen Lesani |
| 2022 | HARDLOG: Practical Tamper-Proof System Auditing Using a Novel Audit Device. Adil Ahmad, Sangho Lee, Marcus Peinado |
| 2022 | HEAPSTER: Analyzing the Security of Dynamic Allocators for Monolithic Firmware Images. Fabio Gritti, Fabio Pagani, Ilya Grishchenko, Lukas Dresel, Nilo Redini, Christopher Kruegel, Giovanni Vigna |
| 2022 | Hardening Circuit-Design IP Against Reverse-Engineering Attacks. Animesh Chhotaray, Thomas Shrimpton |
| 2022 | Hark: A Deep Learning System for Navigating Privacy Feedback at Scale. Hamza Harkous, Sai Teja Peddinti, Rishabh Khandelwal, Animesh Srivastava, Nina Taft |
| 2022 | How Does Usable Security (Not) End Up in Software Products? Results From a Qualitative Interview Study. Marco Gutfleisch, Jan H. Klemmer, Niklas Busch, Yasemin Acar, M. Angela Sasse, Sascha Fahl |
| 2022 | How Not to Protect Your IP - An Industry-Wide Break of IEEE 1735 Implementations. Julian Speith, Florian Schweins, Maik Ender, Marc Fyrbiak, Alexander May, Christof Paar |
| 2022 | How to Attack and Generate Honeywords. Ding Wang, Yunkai Zou, Qiying Dong, Yuanming Song, Xinyi Huang |
| 2022 | IRQDebloat: Reducing Driver Attack Surface in Embedded Devices. Zhenghao Hu, Brendan Dolan-Gavitt |
| 2022 | IRShield: A Countermeasure Against Adversarial Physical-Layer Wireless Sensing. Paul Staat, Simon Mulzer, Stefan Roth, Veelasha Moonsamy, Markus Heinrichs, Rainer Kronberger, Aydin Sezgin, Christof Paar |
| 2022 | Investigating Influencer VPN Ads on YouTube. Omer Akgul, Richard Roberts, Moses Namara, Dave Levin, Michelle L. Mazurek |
| 2022 | Invisible Finger: Practical Electromagnetic Interference Attack on Touchscreen-based Electronic Devices. Haoqi Shan, Boyi Zhang, Zihao Zhan, Dean Sullivan, Shuo Wang, Yier Jin |
| 2022 | IronMask: Versatile Verification of Masking Security. Sonia Belaïd, Darius Mercadier, Matthieu Rivain, Abdul Rahman Taleb |
| 2022 | JIGSAW: Efficient and Scalable Path Constraints Fuzzing. Ju Chen, Jinghan Wang, Chengyu Song, Heng Yin |
| 2022 | Journey to the Center of the Cookie Ecosystem: Unraveling Actors' Roles and Relationships. Iskander Sánchez-Rola, Matteo Dell'Amico, Davide Balzarotti, Pierre-Antoine Vervier, Leyla Bilge |
| 2022 | LINKTELLER: Recovering Private Edges from Graph Neural Networks via Influence Analysis. Fan Wu, Yunhui Long, Ce Zhang, Bo Li |
| 2022 | Locally Differentially Private Sparse Vector Aggregation. Mingxun Zhou, Tianhao Wang, T.-H. Hubert Chan, Giulia Fanti, Elaine Shi |
| 2022 | Low-Bandwidth Threshold ECDSA via Pseudorandom Correlation Generators. Damiano Abram, Ariel Nof, Claudio Orlandi, Peter Scholl, Omer Shlomovits |
| 2022 | MatRiCT Muhammed F. Esgin, Ron Steinfeld, Raymond K. Zhao |
| 2022 | Measuring and Mitigating the Risk of IP Reuse on Public Clouds. Eric Pauley, Ryan Sheatsley, Blaine Hoak, Quinn Burke, Yohan Beugin, Patrick D. McDaniel |
| 2022 | Membership Inference Attacks From First Principles. Nicholas Carlini, Steve Chien, Milad Nasr, Shuang Song, Andreas Terzis, Florian Tramèr |
| 2022 | MeshUp: Stateless Cache Side-channel Attack on CPU Mesh. Junpeng Wan, Yanxiang Bi, Zhe Zhou, Zhou Li |
| 2022 | Mind the Gap: Studying the Insecurity of Provably Secure Embedded Trusted Execution Architectures. Marton Bognar, Jo Van Bulck, Frank Piessens |
| 2022 | Mitigating Information Leakage Vulnerabilities with Type-based Data Isolation. Alyssa Milburn, Erik van der Kouwe, Cristiano Giuffrida |
| 2022 | Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Security. Guanhong Tao, Yingqi Liu, Guangyu Shen, Qiuling Xu, Shengwei An, Zhuo Zhang, Xiangyu Zhang |
| 2022 | Model Stealing Attacks Against Inductive Graph Neural Networks. Yun Shen, Xinlei He, Yufei Han, Yang Zhang |
| 2022 | Multi-Server Verifiable Computation of Low-Degree Polynomials. Liang Feng Zhang, Huaxiong Wang |
| 2022 | Noise*: A Library of Verified High-Performance Secure Channel Protocol Implementations. Son Ho, Jonathan Protzenko, Abhishek Bichhawat, Karthikeyan Bhargavan |
| 2022 | Noise-SDR: Arbitrary Modulation of Electromagnetic Noise from Unprivileged Software and Its Impact on Emission Security. Giovanni Camurati, Aurélien Francillon |
| 2022 | PATA: Fuzzing with Path Aware Taint Analysis. Jie Liang, Mingzhe Wang, Chijin Zhou, Zhiyong Wu, Yu Jiang, Jianzhong Liu, Zhe Liu, Jiaguang Sun |
| 2022 | PCR-Auth: Solving Authentication Puzzle Challenge with Encoded Palm Contact Response. Long Huang, Chen Wang |
| 2022 | PGPatch: Policy-Guided Logic Bug Patching for Robotic Vehicles. Hyungsub Kim, Muslum Ozgur Ozmen, Z. Berkay Celik, Antonio Bianchi, Dongyan Xu |
| 2022 | Peekaboo: A Hub-Based Approach to Enable Transparency in Data Processing within Smart Homes. Haojian Jin, Gram Liu, David Hwang, Swarun Kumar, Yuvraj Agarwal, Jason I. Hong |
| 2022 | Phishing in Organizations: Findings from a Large-Scale and Long-Term Study. Daniele Lain, Kari Kostiainen, Srdjan Capkun |
| 2022 | Piccolo: Exposing Complex Backdoors in NLP Transformer Models. Yingqi Liu, Guangyu Shen, Guanhong Tao, Shengwei An, Shiqing Ma, Xiangyu Zhang |
| 2022 | Practical Asynchronous Distributed Key Generation. Sourav Das, Thomas Yurek, Zhuolun Xiang, Andrew Miller, Lefteris Kokoris-Kogias, Ling Ren |
| 2022 | Practical EMV Relay Protection. Andreea-Ina Radu, Tom Chothia, Christopher J. P. Newton, Ioana Boureanu, Liqun Chen |
| 2022 | Privacy-from-Birth: Protecting Sensed Data from Malicious Sensors with VERSA. Ivan De Oliveira Nunes, Seoyeon Hwang, Sashidhar Jakkamsetti, Gene Tsudik |
| 2022 | Private Approximate Nearest Neighbor Search with Sublinear Communication. Sacha Servan-Schreiber, Simon Langowski, Srinivas Devadas |
| 2022 | ProTRR: Principled yet Optimal In-DRAM Target Row Refresh. Michele Marazzi, Patrick Jattke, Flavien Solt, Kaveh Razavi |
| 2022 | ProVerif with Lemmas, Induction, Fast Subsumption, and Much More. Bruno Blanchet, Vincent Cheval, Véronique Cortier |
| 2022 | Property Inference from Poisoning. Saeed Mahloujifar, Esha Ghosh, Melissa Chase |
| 2022 | Publicly Accountable Robust Multi-Party Computation. Marc Rivinius, Pascal Reisert, Daniel Rausch, Ralf Küsters |
| 2022 | Quantifying Blockchain Extractable Value: How dark is the forest? Kaihua Qin, Liyi Zhou, Arthur Gervais |
| 2022 | RT-TEE: Real-time System Availability for Cyber-physical Systems using ARM TrustZone. Jinwen Wang, Ao Li, Haoran Li, Chenyang Lu, Ning Zhang |
| 2022 | Reconstructing Training Data with Informed Adversaries. Borja Balle, Giovanni Cherubin, Jamie Hayes |
| 2022 | Repairing DoS Vulnerability of Real-World Regexes. Nariyoshi Chida, Tachio Terauchi |
| 2022 | Robbery on DevOps: Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms. Zhi Li, Weijie Liu, Hongbo Chen, Xiaofeng Wang, Xiaojing Liao, Luyi Xing, Mingming Zha, Hai Jin, Deqing Zou |
| 2022 | SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in Seconds. Priyanka Bose, Dipanjan Das, Yanju Chen, Yu Feng, Christopher Kruegel, Giovanni Vigna |
| 2022 | SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records. Jun Zeng, Xiang Wang, Jiahao Liu, Yinfang Chen, Zhenkai Liang, Tat-Seng Chua, Zheng Leong Chua |
| 2022 | SIRAJ: A Unified Framework for Aggregation of Malicious Entity Detectors. Saravanan Thirumuruganathan, Mohamed Nabeel, Euijin Choo, Issa Khalil, Ting Yu |
| 2022 | SNARKBlock: Federated Anonymous Blocklisting from Hidden Common Input Aggregate Proofs. Michael Rosenberg, Mary Maller, Ian Miers |
| 2022 | SPIRAL: Fast, High-Rate Single-Server PIR via FHE Composition. Samir Jordan Menon, David J. Wu |
| 2022 | SWARMFLAWFINDER: Discovering and Exploiting Logic Flaws of Swarm Algorithms. Chijung Jung, Ali Ahad, Yuseok Jeon, Yonghwi Kwon |
| 2022 | SYMBEXCEL: Automated Analysis and Understanding of Malicious Excel 4.0 Macros. Nicola Ruaro, Fabio Pagani, Stefano Ortolani, Christopher Kruegel, Giovanni Vigna |
| 2022 | Sabre: Sender-Anonymous Messaging with Fast Audits. Adithya Vadapalli, Kyle Storrier, Ryan Henry |
| 2022 | Scraping Sticky Leftovers: App User Information Left on Servers After Account Deletion. Preethi Santhanam, Hoang Dang, Zhiyong Shan, Iulian Neamtiu |
| 2022 | SecFloat: Accurate Floating-Point meets Secure 2-Party Computation. Deevashwer Rathee, Anwesh Bhattacharya, Rahul Sharma, Divya Gupta, Nishanth Chandran, Aseem Rastogi |
| 2022 | Security Analysis of the MLS Key Derivation. Chris Brzuska, Eric Cornelissen, Konrad Kohbrok |
| 2022 | Security Foundations for Application-Based Covert Communication Channels. James K. Howes IV, Marios Georgiou, Alex J. Malozemoff, Thomas Shrimpton |
| 2022 | ShorTor: Improving Tor Network Latency via Multi-hop Overlay Routing. Kyle Hogan, Sacha Servan-Schreiber, Zachary Newman, Ben Weintraub, Cristina Nita-Rotaru, Srinivas Devadas |
| 2022 | Smile: Secure Memory Introspection for Live Enclave. Lei Zhou, Xuhua Ding, Fengwei Zhang |
| 2022 | SoK: A Framework for Unifying At-Risk User Research. Noel Warford, Tara Matthews, Kaitlyn Yang, Omer Akgul, Sunny Consolvo, Patrick Gage Kelley, Nathan Malkin, Michelle L. Mazurek, Manya Sleeper, Kurt Thomas |
| 2022 | SoK: Authentication in Augmented and Virtual Reality. Sophie Stephenson, Bijeeta Pal, Stephen Fan, Earlence Fernandes, Yuhang Zhao, Rahul Chatterjee |
| 2022 | SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications. Zhibo Liu, Yuanyuan Yuan, Shuai Wang, Yuyan Bao |
| 2022 | SoK: How Robust is Image Classification Deep Neural Network Watermarking? Nils Lukas, Edward Jiang, Xinda Li, Florian Kerschbaum |
| 2022 | SoK: Practical Foundations for Software Spectre Defenses. Sunjay Cauligi, Craig Disselkoen, Daniel Moghimi, Gilles Barthe, Deian Stefan |
| 2022 | SoK: Social Cybersecurity. Yuxi Wu, W. Keith Edwards, Sauvik Das |
| 2022 | SoK: The Dual Nature of Technology in Sexual Abuse. Borke Obada-Obieh, Yue Huang, Lucrezia Spagnolo, Konstantin Beznosov |
| 2022 | SpecHammer: Combining Spectre and Rowhammer for New Speculative Attacks. Youssef Tobah, Andrew Kwong, Ingab Kang, Daniel Genkin, Kang G. Shin |
| 2022 | Sphinx: Enabling Privacy-Preserving Online Learning over the Cloud. Han Tian, Chaoliang Zeng, Zhenghang Ren, Di Chai, Junxue Zhang, Kai Chen, Qiang Yang |
| 2022 | Spinning Language Models: Risks of Propaganda-As-A-Service and Countermeasures. Eugene Bagdasaryan, Vitaly Shmatikov |
| 2022 | Spook.js: Attacking Chrome Strict Site Isolation via Speculative Execution. Ayush Agarwal, Sioli O'Connell, Jason Kim, Shaked Yehezkel, Daniel Genkin, Eyal Ronen, Yuval Yarom |
| 2022 | Spurt: Scalable Distributed Randomness Beacon with Transparent Setup. Sourav Das, Vinith Krishnan, Irene Miriam Isaac, Ling Ren |
| 2022 | Statistical Quantification of Differential Privacy: A Local Approach. Önder Askin, Tim Kutta, Holger Dette |
| 2022 | Surakav: Generating Realistic Traces for a Strong Website Fingerprinting Defense. Jiajun Gong, Wuqi Zhang, Charles Zhang, Tao Wang |
| 2022 | TASHAROK: Using Mechanism Design for Enhancing Security Resource Allocation in Interdependent Systems. Mustafa Abdallah, Daniel Woods, Parinaz Naghizadeh, Issa Khalil, Timothy N. Cason, Shreyas Sundaram, Saurabh Bagchi |
| 2022 | The State of the SameSite: Studying the Usage, Effectiveness, and Adequacy of SameSite Cookies. Soheil Khodayari, Giancarlo Pellegrino |
| 2022 | Time-Print: Authenticating USB Flash Drives with Novel Timing Fingerprints. Patrick Cronin, Xing Gao, Haining Wang, Chase Cotton |
| 2022 | Timing-Based Browsing Privacy Vulnerabilities Via Site Isolation. Zihao Jin, Ziqiao Kong, Shuo Chen, Haixin Duan |
| 2022 | Towards Automated Auditing for Account and Session Management Flaws in Single Sign-On Deployments. Mohammad Ghasemisharif, Chris Kanich, Jason Polakis |
| 2022 | Transcending TRANSCEND: Revisiting Malware Classification in the Presence of Concept Drift. Federico Barbero, Feargus Pendlebury, Fabio Pierazzi, Lorenzo Cavallaro |
| 2022 | Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings. Yuhao Mao, Chong Fu, Saizhuo Wang, Shouling Ji, Xuhong Zhang, Zhenguang Liu, Jun Zhou, Alex X. Liu, Raheem Beyah, Ting Wang |
| 2022 | TrollMagnifier: Detecting State-Sponsored Troll Accounts on Reddit. Mohammad Hammas Saeed, Shiza Ali, Jeremy Blackburn, Emiliano De Cristofaro, Savvas Zannettou, Gianluca Stringhini |
| 2022 | Universal 3-Dimensional Perturbations for Black-Box Attacks on Video Recognition Systems. Shangyu Xie, Han Wang, Yu Kong, Yuan Hong |
| 2022 | Universal Atomic Swaps: Secure Exchange of Coins Across All Blockchains. Sri Aravinda Krishnan Thyagarajan, Giulio Malavolta, Pedro Moreno-Sanchez |
| 2022 | Using Throughput-Centric Byzantine Broadcast to Tolerate Malicious Majority in Blockchains. Ruomu Hou, Haifeng Yu, Prateek Saxena |
| 2022 | WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens. Yan Jiang, Xiaoyu Ji, Kai Wang, Chen Yan, Richard Mitev, Ahmad-Reza Sadeghi, Wenyuan Xu |
| 2022 | WTAGRAPH: Web Tracking and Advertising Detection using Graph Neural Networks. Zhiju Yang, Weiping Pei, Monchu Chen, Chuan Yue |
| 2022 | Waldo: A Private Time-Series Database from Function Secret Sharing. Emma Dauterman, Mayank Rathee, Raluca Ada Popa, Ion Stoica |
| 2022 | Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques. Amit Seal Ami, Nathan Cooper, Kaushal Kafle, Kevin Moran, Denys Poshyvanyk, Adwait Nadkarni |
| 2022 | Wobfuscator: Obfuscating JavaScript Malware via Opportunistic Translation to WebAssembly. Alan Romano, Daniel Lehmann, Michael Pradel, Weihang Wang |
| 2022 | ZeeStar: Private Smart Contracts by Homomorphic Encryption and Zero-knowledge Proofs. Samuel Steffen, Benjamin Bichsel, Roger Baumgartner, Martin T. Vechev |
| 2022 | mmSpy: Spying Phone Calls using mmWave Radars. Suryoday Basak, Mahanth Gowda |
| 2022 | vSGX: Virtualizing SGX Enclaves on AMD SEV. Shixuan Zhao, Mengyuan Li, Yinqian Zhang, Zhiqiang Lin |