| 2022 | "How Do You Not Lose Friends?": Synthesizing a Design Space of Social Controls for Securing Shared Digital Resources Via Participatory Design Jams. Eyitemi Moju-Igbene, Hanan Abdi, Alan Lu, Sauvik Das |
| 2022 | "I feel invaded, annoyed, anxious and I may protect myself": Individuals' Feelings about Online Tracking and their Protective Behaviour across Gender and Country. Kovila P. L. Coopamootoo, Maryam Mehrnezhad, Ehsan Toreini |
| 2022 | "Like Lesbians Walking the Perimeter": Experiences of U.S. LGBTQ+ Folks With Online Security, Safety, and Privacy Advice. Christine Geeng, Mike Harris, Elissa M. Redmiles, Franziska Roesner |
| 2022 | "OK, Siri" or "Hey, Google": Evaluating Voiceprint Distinctiveness via Content-based PROLE Score. Ruiwen He, Xiaoyu Ji, Xinfeng Li, Yushi Cheng, Wenyuan Xu |
| 2022 | "The Same PIN, Just Longer": On the (In)Security of Upgrading PINs from 4 to 6 Digits. Collins W. Munyendo, Philipp Markert, Alexandra Nisenoff, Miles Grant, Elena Korkes, Blase Ur, Adam J. Aviv |
| 2022 | "They Look at Vulnerability and Use That to Abuse You": Participatory Threat Modelling with Migrant Domestic Workers. Julia Slupska, Selina Y. Cho, Marissa Begonia, Ruba Abu-Salma, Nayanatara Prakash, Mallika Balakrishnan |
| 2022 | 31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022 Kevin R. B. Butler, Kurt Thomas |
| 2022 | 99% False Positives: A Qualitative Study of SOC Analysts' Perspectives on Security Alarms. Bushra A. AlAhmadi, Louise Axon, Ivan Martinovic |
| 2022 | A Hardware-Software Co-design for Efficient Intra-Enclave Isolation. Jinyu Gu, Bojun Zhu, Mingyu Li, Wentai Li, Yubin Xia, Haibo Chen |
| 2022 | A Large-scale Investigation into Geodifferences in Mobile Apps. Renuka Kumar, Apurva Virkud, Ram Sundara Raman, Atul Prakash, Roya Ensafi |
| 2022 | A Large-scale Temporal Measurement of Android Malicious Apps: Persistence, Migration, and Lessons Learned. Yun Shen, Pierre-Antoine Vervier, Gianluca Stringhini |
| 2022 | A Large-scale and Longitudinal Measurement Study of DKIM Deployment. Chuhan Wang, Kaiwen Shen, Minglei Guo, Yuxuan Zhao, Mingming Zhang, Jianjun Chen, Baojun Liu, Xiaofeng Zheng, Haixin Duan, Yanzhong Lin, Qingfeng Pan |
| 2022 | ALASTOR: Reconstructing the Provenance of Serverless Intrusions. Pubali Datta, Isaac Polinsky, Muhammad Adil Inam, Adam Bates, William Enck |
| 2022 | AMD Prefetch Attacks through Power and Time. Moritz Lipp, Daniel Gruss, Michael Schwarz |
| 2022 | Aardvark: An Asynchronous Authenticated Dictionary with Applications to Account-based Cryptocurrencies. Derek Leung, Yossi Gilad, Sergey Gorbunov, Leonid Reyzin, Nickolai Zeldovich |
| 2022 | Adversarial Detection Avoidance Attacks: Evaluating the robustness of perceptual hashing-based client-side scanning. Shubham Jain, Ana-Maria Cretu, Yves-Alexandre de Montjoye |
| 2022 | AmpFuzz: Fuzzing for Amplification DDoS Vulnerabilities. Johannes Krupp, Ilya Grishchenko, Christian Rossow |
| 2022 | An Audit of Facebook's Political Ad Policy Enforcement. Victor Le Pochat, Laura Edelson, Tom van Goethem, Wouter Joosen, Damon McCoy, Tobias Lauinger |
| 2022 | An Experimental Study of GPS Spoofing and Takeover Attacks on UAVs. Harshad Sathaye, Martin Strohmeier, Vincent Lenders, Aanjhan Ranganathan |
| 2022 | Anycast Agility: Network Playbooks to Fight DDoS. A. S. M. Rizvi, Leandro M. Bertholdo, João M. Ceron, John S. Heidemann |
| 2022 | Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs. Jayakrishna Vadayath, Moritz Eckert, Kyle Zeng, Nicolaas Weideman, Gokulkrishna Praveen Menon, Yanick Fratantonio, Davide Balzarotti, Adam Doupé, Tiffany Bao, Ruoyu Wang, Christophe Hauser, Yan Shoshitaishvili |
| 2022 | Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models. Shagufta Mehnaz, Sayanton V. Dibbo, Ehsanul Kabir, Ninghui Li, Elisa Bertino |
| 2022 | Attacks on Deidentification's Defenses. Aloni Cohen |
| 2022 | Augmenting Decompiler Output with Learned Variable Names and Types. Qibin Chen, Jeremy Lacomis, Edward J. Schwartz, Claire Le Goues, Graham Neubig, Bogdan Vasilescu |
| 2022 | AutoDA: Automated Decision-based Iterative Adversarial Attacks. Qi-An Fu, Yinpeng Dong, Hang Su, Jun Zhu, Chao Zhang |
| 2022 | Automated Detection of Automated Traffic. Cormac Herley |
| 2022 | Automated Side Channel Analysis of Media Software with Manifold Learning. Yuanyuan Yuan, Qi Pang, Shuai Wang |
| 2022 | Automating Cookie Consent and GDPR Violation Detection. Dino Bollinger, Karel Kubicek, Carlos Cotrini, David A. Basin |
| 2022 | Back-Propagating System Dependency Impact for Attack Investigation. Pengcheng Fang, Peng Gao, Changlin Liu, Erman Ayday, Kangkook Jee, Ting Wang, Yanfang (Fanny) Ye, Zhuotao Liu, Xusheng Xiao |
| 2022 | Backporting Security Patches of Web Applications: A Prototype Design and Implementation on Injection Vulnerability Patches. Youkun Shi, Yuan Zhang, Tianhan Luo, Xiangyu Mao, Yinzhi Cao, Ziwen Wang, Yudi Zhao, Zongan Huang, Min Yang |
| 2022 | Batched Differentially Private Information Retrieval. Kinan Dak Albab, Rawane Issa, Mayank Varia, Kalman Graffi |
| 2022 | Bedrock: Programmable Network Support for Secure RDMA Systems. Jiarong Xing, Kuo-Feng Hsu, Yiming Qiu, Ziyang Yang, Hongyi Liu, Ang Chen |
| 2022 | Behind the Tube: Exploitative Monetization of Content on YouTube. Andrew Chu, Arjun Arunasalam, Muslum Ozgur Ozmen, Z. Berkay Celik |
| 2022 | Binoculars: Contention-Based Side-Channel Attacks Exploiting the Page Walker. Zirui Neil Zhao, Adam Morrison, Christopher W. Fletcher, Josep Torrellas |
| 2022 | Birds of a Feather Flock Together: How Set Bias Helps to Deanonymize You via Revealed Intersection Sizes. Xiaojie Guo, Ye Han, Zheli Liu, Ding Wang, Yan Jia, Jin Li |
| 2022 | Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box Attacks. Huiying Li, Shawn Shan, Emily Wenger, Jiayun Zhang, Haitao Zheng, Ben Y. Zhao |
| 2022 | BrakTooth: Causing Havoc on Bluetooth Link Manager via Directed Fuzzing. Matheus E. Garbelini, Vaibhav Bedi, Sudipta Chattopadhyay, Sumei Sun, Ernest Kurniawan |
| 2022 | Branch History Injection: On the Effectiveness of Hardware Mitigations Against Cross-Privilege Spectre-v2 Attacks. Enrico Barberis, Pietro Frigo, Marius Muench, Herbert Bos, Cristiano Giuffrida |
| 2022 | Breaking Bridgefy, again: Adopting libsignal is not enough. Martin R. Albrecht, Raphael Eikenberg, Kenneth G. Paterson |
| 2022 | Building an Open, Robust, and Stable Voting-Based Domain Top List. Qinge Xie, Shujun Tang, Xiaofeng Zheng, Qingran Lin, Baojun Liu, Haixin Duan, Frank Li |
| 2022 | COMRace: Detecting Data Race Vulnerabilities in COM Objects. Fangming Gu, Qingli Guo, Lian Li, Zhiniang Peng, Wei Lin, Xiaobo Yang, Xiaorui Gong |
| 2022 | CamShield: Securing Smart Cameras through Physical Replication and Isolation. Zhiwei Wang, Yihui Yan, Yueli Yan, Huangxun Chen, Zhice Yang |
| 2022 | Can one hear the shape of a neural network?: Snooping the GPU via Magnetic Side Channel. Henrique Teles Maia, Chang Xiao, Dingzeyu Li, Eitan Grinspun, Changxi Zheng |
| 2022 | Caring about Sharing: User Perceptions of Multiparty Data Sharing. Bailey Kacsmar, Kyle Tilbury, Miti Mazmudar, Florian Kerschbaum |
| 2022 | CellIFT: Leveraging Cells for Scalable and Precise Dynamic Information Flow Tracking in RTL. Flavien Solt, Ben Gras, Kaveh Razavi |
| 2022 | Characterizing the Security of Github CI Workflows. Igibek Koishybayev, Aleksandr Nahapetyan, Raima Zachariah, Siddharth Muralee, Bradley Reaves, Alexandros Kapravelos, Aravind Machiry |
| 2022 | Cheetah: Lean and Fast Secure Two-Party Deep Neural Network Inference. Zhicong Huang, Wen-jie Lu, Cheng Hong, Jiansheng Ding |
| 2022 | Communication-Efficient Triangle Counting under Local Differential Privacy. Jacob Imola, Takao Murakami, Kamalika Chaudhuri |
| 2022 | Composable Cachelets: Protecting Enclaves from Cache Side-Channel Attacks. Daniel Townley, Kerem Arikan, Yu David Liu, Dmitry Ponomarev, Oguz Ergin |
| 2022 | Constant-weight PIR: Single-round Keyword PIR via Constant-weight Equality Operators. Rasoul Akhavan Mahdavi, Florian Kerschbaum |
| 2022 | Counting in Regexes Considered Harmful: Exposing ReDoS Vulnerability of Nonbacktracking Matchers. Lenka Turonová, Lukás Holík, Ivan Homoliak, Ondrej Lengál, Margus Veanes, Tomás Vojnar |
| 2022 | Creating a Secure Underlay for the Internet. Henry Birge-Lee, Joel Wanner, Grace H. Cimaszewski, Jonghoon Kwon, Liang Wang, François Wirz, Prateek Mittal, Adrian Perrig, Yixin Sun |
| 2022 | Debloating Address Sanitizer. Yuchen Zhang, Chengbin Pang, Georgios Portokalidis, Nikos Triandopoulos, Jun Xu |
| 2022 | Decomperson: How Humans Decompile and What We Can Learn From It. Kevin Burk, Fabio Pagani, Christopher Kruegel, Giovanni Vigna |
| 2022 | DeepDi: Learning a Relational Graph Convolutional Network Model on Instructions for Fast and Accurate Disassembly. Sheng Yu, Yu Qu, Xunchao Hu, Heng Yin |
| 2022 | DeepPhish: Understanding User Trust Towards Artificially Generated Profiles in Online Social Networks. Jaron Mink, Licheng Luo, Natã M. Barbosa, Olivia Figueira, Yang Wang, Gang Wang |
| 2022 | Detecting Logical Bugs of DBMS with Coverage-based Guidance. Yu Liang, Song Liu, Hong Hu |
| 2022 | DnD: A Cross-Architecture Deep Neural Network Decompiler. Ruoyu Wu, Taegyu Kim, Dave (Jing) Tian, Antonio Bianchi, Dongyan Xu |
| 2022 | DoLTEst: In-depth Downlink Negative Testing Framework for LTE Devices. CheolJun Park, Sangwook Bae, Beomseok Oh, Jiho Lee, Eunkyu Lee, Insu Yun, Yongdae Kim |
| 2022 | Don't Mesh Around: Side-Channel Attacks and Mitigations on Mesh Interconnects. Miles Dai, Riccardo Paccagnella, Miguel Gomez-Garcia, John D. McCalpin, Mengjia Yan |
| 2022 | Dos and Don'ts of Machine Learning in Computer Security. Daniel Arp, Erwin Quiring, Feargus Pendlebury, Alexander Warnecke, Fabio Pierazzi, Christian Wressnegger, Lorenzo Cavallaro, Konrad Rieck |
| 2022 | Double Trouble: Combined Heterogeneous Attacks on Non-Inclusive Cache Hierarchies. Antoon Purnal, Furkan Turan, Ingrid Verbauwhede |
| 2022 | DoubleStar: Long-Range Attack Towards Depth Estimation based Obstacle Avoidance in Autonomous Systems. Ce Zhou, Qiben Yan, Yan Shi, Lichao Sun |
| 2022 | Drifuzz: Harvesting Bugs in Device Drivers from Golden Seeds. Zekun Shen, Ritik Roongta, Brendan Dolan-Gavitt |
| 2022 | Dynamic Searchable Encryption with Optimal Search in the Presence of Deletions. Javad Ghareh Chamani, Dimitrios Papadopoulos, Mohammadamin Karbasforushan, Ioannis Demertzis |
| 2022 | Efficient Differentially Private Secure Aggregation for Federated Learning via Hardness of Learning with Errors. Timothy Stevens, Christian Skalka, Christelle Vincent, John H. Ring, Samuel Clark, Joseph P. Near |
| 2022 | Efficient Representation of Numerical Optimization Problems for SNARKs. Sebastian Angel, Andrew J. Blumberg, Eleftherios Ioannidis, Jess Woods |
| 2022 | Elasticlave: An Efficient Memory Model for Enclaves. Jason Zhijingcheng Yu, Shweta Shinde, Trevor E. Carlson, Prateek Saxena |
| 2022 | Electronic Monitoring Smartphone Apps: An Analysis of Risks from Technical, Human-Centered, and Legal Perspectives. Kentrell Owens, Anita Alem, Franziska Roesner, Tadayoshi Kohno |
| 2022 | Empirical Understanding of Deletion Privacy: Experiences, Expectations, and Measures. Mohsen Minaei, Mainack Mondal, Aniket Kate |
| 2022 | End-to-Same-End Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage. Long Chen, Ya-Nan Li, Qiang Tang, Moti Yung |
| 2022 | Estimating Incidental Collection in Foreign Intelligence Surveillance: Large-Scale Multiparty Private Set Intersection with Union and Sum. Anunay Kulshrestha, Jonathan R. Mayer |
| 2022 | Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits. Octavian Suciu, Connor Nelson, Zhuoer Lyu, Tiffany Bao, Tudor Dumitras |
| 2022 | Experimental Security Analysis of the App Model in Business Collaboration Platforms. Yunang Chen, Yue Gao, Nick Ceccio, Rahul Chatterjee, Kassem Fawaz, Earlence Fernandes |
| 2022 | Experimenting with Collaborative zk-SNARKs: Zero-Knowledge Proofs for Distributed Secrets. Alex Ozdemir, Dan Boneh |
| 2022 | Exploring the Security Boundary of Data Reconstruction via Neuron Exclusivity Analysis. Xudong Pan, Mi Zhang, Yifan Yan, Jiaming Zhu, Zhemin Yang |
| 2022 | Exploring the Unchartered Space of Container Registry Typosquatting. Guannan Liu, Xing Gao, Haining Wang, Kun Sun |
| 2022 | FIXREVERTER: A Realistic Bug Injection Methodology for Benchmarking Fuzz Testing. Zenong Zhang, Zach Patterson, Michael Hicks, Shiyi Wei |
| 2022 | FLAME: Taming Backdoors in Federated Learning. Thien Duc Nguyen, Phillip Rieger, Huili Chen, Hossein Yalame, Helen Möllering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Shaza Zeitouni, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider |
| 2022 | FOAP: Fine-Grained Open-World Android App Fingerprinting. Jianfeng Li, Hao Zhou, Shuohan Wu, Xiapu Luo, Ting Wang, Xian Zhan, Xiaobo Ma |
| 2022 | FRAMESHIFTER: Security Implications of HTTP/2-to-HTTP/1 Conversion Anomalies. Bahruz Jabiyev, Steven Sprecher, Anthony Gavazzi, Tommaso Innocenti, Kaan Onarlioglu, Engin Kirda |
| 2022 | FReD: Identifying File Re-Delegation in Android System Services. Sigmund Albert Gorski III, Seaver Thorn, William Enck, Haining Chen |
| 2022 | FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities. Sunnyeo Park, Daejun Kim, Suman Jana, Sooel Son |
| 2022 | Faster Yet Safer: Logging System Via Fixed-Key Blockcipher. Viet Tung Hoang, Cong Wu, Xin Yuan |
| 2022 | Ferry: State-Aware Symbolic Execution for Exploring State-Dependent Program Paths. Shunfan Zhou, Zhemin Yang, Dan Qiao, Peng Liu, Min Yang, Zhe Wang, Chenggang Wu |
| 2022 | FlowMatrix: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation. Kaihang Ji, Jun Zeng, Yuancheng Jiang, Zhenkai Liang, Zheng Leong Chua, Prateek Saxena, Abhik Roychoudhury |
| 2022 | FreeWill: Automatically Diagnosing Use-after-free Bugs via Reference Miscounting Detection on Binaries. Liang He, Hong Hu, Purui Su, Yan Cai, Zhenkai Liang |
| 2022 | FuzzOrigin: Detecting UXSS vulnerabilities in Browsers through Origin Fuzzing. Sunwoo Kim, Young Min Kim, Jaewon Hur, Suhwan Song, Gwangmu Lee, Byoungyoung Lee |
| 2022 | Fuzzing Hardware Like Software. Timothy Trippel, Kang G. Shin, Alex Chernyakhovsky, Garret Kelly, Dominic Rizzo, Matthew Hicks |
| 2022 | Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing. Tobias Scharnowski, Nils Bars, Moritz Schloegel, Eric Gustafson, Marius Muench, Giovanni Vigna, Christopher Kruegel, Thorsten Holz, Ali Abbasi |
| 2022 | GAROTA: Generalized Active Root-Of-Trust Architecture (for Tiny Embedded Devices). Esmerald Aliaj, Ivan De Oliveira Nunes, Gene Tsudik |
| 2022 | GET /out: Automated Discovery of Application-Layer Censorship Evasion Strategies. Michael Harrity, Kevin Bock, Frederick Sell, Dave Levin |
| 2022 | GPU-accelerated PIR with Client-Independent Preprocessing for Large-Scale Applications. Daniel Günther, Maurice Heymann, Benny Pinkas, Thomas Schneider |
| 2022 | Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging. Patrick Leu, Giovanni Camurati, Alexander Heinrich, Marc Roeschlin, Claudio Anliker, Matthias Hollick, Srdjan Capkun, Jiska Classen |
| 2022 | GhostTouch: Targeted Attacks on Touchscreens without Physical Touch. Kai Wang, Richard Mitev, Chen Yan, Xiaoyu Ji, Ahmad-Reza Sadeghi, Wenyuan Xu |
| 2022 | Gossamer: Securely Measuring Password-based Logins. Marina Sanusi Bohuk, Mazharul Islam, Suleman Ahmad, Michael M. Swift, Thomas Ristenpart, Rahul Chatterjee |
| 2022 | Ground Truth for Binary Disassembly is Not Easy. Chengbin Pang, Tiantai Zhang, Ruotong Yu, Bing Mao, Jun Xu |
| 2022 | Half-Double: Hammering From the Next Row Over. Andreas Kogler, Jonas Juffinger, Salman Qazi, Yoongu Kim, Moritz Lipp, Nicolas Boichat, Eric Shiu, Mattias Nissler, Daniel Gruss |
| 2022 | Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand. Matteo Cardaioli, Stefano Cecconello, Mauro Conti, Simone Milani, Stjepan Picek, Eugen Saraci |
| 2022 | Hecate: Abuse Reporting in Secure Messengers with Sealed Sender. Rawane Issa, Nicolas Alhaddad, Mayank Varia |
| 2022 | Helping hands: Measuring the impact of a large threat intelligence sharing community. Xander Bouwman, Victor Le Pochat, Pawel Foremski, Tom van Goethem, Carlos Hernandez Gañán, Giovane C. M. Moura, Samaneh Tajalizadehkhoob, Wouter Joosen, Michel van Eeten |
| 2022 | Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86. Yingchen Wang, Riccardo Paccagnella, Elizabeth Tang He, Hovav Shacham, Christopher W. Fletcher, David Kohlbrenner |
| 2022 | Hidden Trigger Backdoor Attack on NLP Models via Linguistic Style Manipulation. Xudong Pan, Mi Zhang, Beina Sheng, Jiaming Zhu, Min Yang |
| 2022 | Hiding in Plain Sight? On the Efficacy of Power Side Channel-Based Control Flow Monitoring. Yi Han, Matthew Chan, Zahra Aref, Nils Ole Tippenhauer, Saman A. Zonouz |
| 2022 | Holistic Control-Flow Protection on Real-Time Embedded Systems with Kage. Yufei Du, Zhuojia Shen, Komail Dharsee, Jie Zhou, Robert J. Walls, John Criswell |
| 2022 | How Are Your Zombie Accounts? Understanding Users' Practices and Expectations on Mobile App Account Deletion. Yijing Liu, Yan Jia, Qingyin Tan, Zheli Liu, Luyi Xing |
| 2022 | How Long Do Vulnerabilities Live in the Code? A Large-Scale Empirical Measurement Study on FOSS Vulnerability Lifetimes. Nikolaos Alexopoulos, Manuel Brack, Jan Philipp Wagner, Tim Grube, Max Mühlhäuser |
| 2022 | How Machine Learning Is Solving the Binary Function Similarity Problem. Andrea Marcelli, Mariano Graziano, Xabier Ugarte-Pedrero, Yanick Fratantonio, Mohamad Mansouri, Davide Balzarotti |
| 2022 | How and Why People Use Virtual Private Networks. Agnieszka Dutkowska-Zuk, Austin Hounsel, Amy Morrill, Andre Xiong, Marshini Chetty, Nick Feamster |
| 2022 | How to Abuse and Fix Authenticated Encryption Without Key Commitment. Ange Albertini, Thai Duong, Shay Gueron, Stefan Kölbl, Atul Luykx, Sophie Schmieg |
| 2022 | How to Peel a Million: Validating and Expanding Bitcoin Clusters. George Kappos, Haaroon Yousaf, Rainer Stütz, Sofia Rollet, Bernhard Haslhofer, Sarah Meiklejohn |
| 2022 | HyperDegrade: From GHz to MHz Effective CPU Frequencies. Alejandro Cabrera Aldaya, Billy Bob Brumley |
| 2022 | Hyperproofs: Aggregating and Maintaining Proofs in Vector Commitments. Shravan Srinivasan, Alexander Chepurnoy, Charalampos Papamanthou, Alin Tomescu, Yupeng Zhang |
| 2022 | IHOP: Improved Statistical Query Recovery against Searchable Symmetric Encryption through Quadratic Optimization. Simon Oya, Florian Kerschbaum |
| 2022 | Identity Confusion in WebView-based Mobile App-in-app Ecosystems. Lei Zhang, Zhibo Zhang, Ancong Liu, Yinzhi Cao, Xiaohan Zhang, Yanjun Chen, Yuan Zhang, Guangliang Yang, Min Yang |
| 2022 | In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer Authentication. Sungbae Yoo, Jinbum Park, Seolheui Kim, Yeji Kim, Taesoo Kim |
| 2022 | Increasing Adversarial Uncertainty to Scale Private Similarity Testing. Yiqing Hua, Armin Namavari, Kaishuo Cheng, Mor Naaman, Thomas Ristenpart |
| 2022 | Incremental Offline/Online PIR. Yiping Ma, Ke Zhong, Tal Rabin, Sebastian Angel |
| 2022 | Inference Attacks Against Graph Neural Networks. Zhikun Zhang, Min Chen, Michael Backes, Yun Shen, Yang Zhang |
| 2022 | Inferring Phishing Intention via Webpage Appearance and Dynamics: A Deep Vision Based Approach. Ruofan Liu, Yun Lin, Xianglin Yang, Siang Hwee Ng, Dinil Mon Divakaran, Jin Song Dong |
| 2022 | Investigating State-of-the-Art Practices for Fostering Subjective Trust in Online Voting through Interviews. Karola Marky, Paul Gerber, Sebastian Günther, Mohamed Khamis, Maximilian Fries, Max Mühlhäuser |
| 2022 | Jenny: Securing Syscalls for PKU-based Memory Isolation Systems. David Schrammel, Samuel Weiser, Richard Sadek, Stefan Mangard |
| 2022 | Khaleesi: Breaker of Advertising and Tracking Request Chains. Umar Iqbal, Charlie Wolfe, Charles Nguyen, Steven Englehardt, Zubair Shafiq |
| 2022 | LTrack: Stealthy Tracking of Mobile Phones in LTE. Martin Kotuliak, Simon Erni, Patrick Leu, Marc Röschlin, Srdjan Capkun |
| 2022 | Label Inference Attacks Against Vertical Federated Learning. Chong Fu, Xuhong Zhang, Shouling Ji, Jinyin Chen, Jingzheng Wu, Shanqing Guo, Jun Zhou, Alex X. Liu, Ting Wang |
| 2022 | Lamphone: Passive Sound Recovery from a Desk Lamp's Light Bulb Vibrations. Ben Nassi, Yaron Pirutin, Raz Swisa, Adi Shamir, Yuval Elovici, Boris Zadov |
| 2022 | Leaky Forms: A Study of Email and Password Exfiltration Before Form Submission. Asuman Senol, Gunes Acar, Mathias Humbert, Frederik J. Zuiderveen Borgesius |
| 2022 | Lend Me Your Ear: Passive Remote Physical Side Channels on PCs. Daniel Genkin, Noam Nissan, Roei Schuster, Eran Tromer |
| 2022 | LinKRID: Vetting Imbalance Reference Counting in Linux kernel with Symbolic Execution. Jian Liu, Lin Yi, Weiteng Chen, Chengyu Song, Zhiyun Qian, Qiuping Yi |
| 2022 | Loki: Hardening Code Obfuscation Against Automated Attacks. Moritz Schloegel, Tim Blazytko, Moritz Contag, Cornelius Aschermann, Julius Basler, Thorsten Holz, Ali Abbasi |
| 2022 | Lumos: Identifying and Localizing Diverse Hidden IoT Devices in an Unfamiliar Environment. Rahul Anand Sharma, Elahe Soltanaghaei, Anthony Rowe, Vyas Sekar |
| 2022 | MAGE: Mutual Attestation for a Group of Enclaves without Trusted Third Parties. Guoxing Chen, Yinqian Zhang |
| 2022 | ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models. Yugeng Liu, Rui Wen, Xinlei He, Ahmed Salem, Zhikun Zhang, Michael Backes, Emiliano De Cristofaro, Mario Fritz, Yang Zhang |
| 2022 | MOVERY: A Precise Approach for Modified Vulnerable Code Clone Discovery from Modified Open-Source Software Components. Seunghoon Woo, Hyunji Hong, Eunjin Choi, Heejo Lee |
| 2022 | MaDIoT 2.0: Modern High-Wattage IoT Botnet Attacks and Defenses. Tohid Shekari, Alvaro A. Cárdenas, Raheem Beyah |
| 2022 | Many Roads Lead To Rome: How Packet Headers Influence DNS Censorship Measurement. Abhishek Bhaskar, Paul Pearce |
| 2022 | Measurement by Proxy: On the Accuracy of Online Marketplace Measurements. Alejandro Cuevas Villalba, Fieke Miedema, Kyle Soska, Nicolas Christin, Rolf van Wegberg |
| 2022 | Membership Inference Attacks and Defenses in Neural Network Pruning. Xiaoyong Yuan, Lan Zhang |
| 2022 | Midas: Systematic Kernel TOCTTOU Protection. Atri Bhattacharyya, Uros Tesic, Mathias Payer |
| 2022 | Might I Get Pwned: A Second Generation Compromised Credential Checking Service. Bijeeta Pal, Mazharul Islam, Marina Sanusi Bohuk, Nick Sullivan, Luke Valenta, Tara Whalen, Christopher A. Wood, Thomas Ristenpart, Rahul Chatterjee |
| 2022 | Minefield: A Software-only Protection for SGX Enclaves against DVFS Attacks. Andreas Kogler, Daniel Gruss, Michael Schwarz |
| 2022 | Mining Node.js Vulnerabilities via Object Dependence Graph and Query. Song Li, Mingqing Kang, Jianwei Hou, Yinzhi Cao |
| 2022 | Mistrust Plugins You Must: A Large-Scale Study Of Malicious Plugins In WordPress Marketplaces. Ranjita Pai Kasturi, Jonathan Fuller, Yiting Sun, Omar Chabklo, Andres Rodriguez, Jeman Park, Brendan Saltaformaggio |
| 2022 | Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture. Xinyu Tang, Saeed Mahloujifar, Liwei Song, Virat Shejwalkar, Milad Nasr, Amir Houmansadr, Prateek Mittal |
| 2022 | Morphuzz: Bending (Input) Space to Fuzz Virtual Devices. Alexander Bulekov, Bandan Das, Stefan Hajnoczi, Manuel Egele |
| 2022 | MundoFuzz: Hypervisor Fuzzing with Statistical Coverage Testing and Grammar Inference. Cheolwoo Myung, Gwangmu Lee, Byoungyoung Lee |
| 2022 | Neither Access nor Control: A Longitudinal Investigation of the Efficacy of User Access-Control Solutions on Smartphones. Masoud Mehrabi Koushki, Yue Huang, Julia Rubin, Konstantin Beznosov |
| 2022 | Networks of Care: Tech Abuse Advocates' Digital Security Practices. Julia Slupska, Angelika Strohmayer |
| 2022 | OS-Aware Vulnerability Prioritization via Differential Severity Analysis. Qiushi Wu, Yue Xiao, Xiaojing Liao, Kangjie Lu |
| 2022 | OVRseen: Auditing Network Traffic and Privacy Policies in Oculus VR. Rahmadi Trimananda, Hieu Le, Hao Cui, Janice Tran Ho, Anastasia Shuba, Athina Markopoulou |
| 2022 | Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect Attacks. Xuewei Feng, Qi Li, Kun Sun, Zhiyun Qian, Gang Zhao, Xiaohui Kuang, Chuanpu Fu, Ke Xu |
| 2022 | Omnes pro uno: Practical Multi-Writer Encrypted Database. Jiafan Wang, Sherman S. M. Chow |
| 2022 | On the Necessity of Auditable Algorithmic Definitions for Machine Unlearning. Anvith Thudi, Hengrui Jia, Ilia Shumailov, Nicolas Papernot |
| 2022 | On the Security Risks of AutoML. Ren Pang, Zhaohan Xi, Shouling Ji, Xiapu Luo, Ting Wang |
| 2022 | One-off Disclosure Control by Heterogeneous Generalization. Olga Gkountouna, Katerina Doka, Mingqiang Xue, Jianneng Cao, Panagiotis Karras |
| 2022 | Online Website Fingerprinting: Evaluating Website Fingerprinting Attacks on Tor in the Real World. Giovanni Cherubin, Rob Jansen, Carmela Troncoso |
| 2022 | Oops... Code Execution and Content Spoofing: The First Comprehensive Analysis of OpenDocument Signatures. Simon Rohlmann, Christian Mainka, Vladislav Mladenov, Jörg Schwenk |
| 2022 | Open to a fault: On the passive compromise of TLS keys via transient errors. George Arnold Sullivan, Jackson Sippe, Nadia Heninger, Eric Wustrow |
| 2022 | OpenSSLNTRU: Faster post-quantum TLS key exchange. Daniel J. Bernstein, Billy Bob Brumley, Ming-Shing Chen, Nicola Tuveri |
| 2022 | OpenVPN is Open to VPN Fingerprinting. Diwen Xue, Reethika Ramesh, Arham Jain, Michalis Kallitsis, J. Alex Halderman, Jedidiah R. Crandall, Roya Ensafi |
| 2022 | Orca: Blocklisting in Sender-Anonymous Messaging. Nirvan Tyagi, Julia Len, Ian Miers, Thomas Ristenpart |
| 2022 | PISTIS: Trusted Computing Architecture for Low-end Embedded Systems. Michele Grisafi, Mahmoud Ammar, Marco Roveri, Bruno Crispo |
| 2022 | Pacer: Comprehensive Network Side-Channel Mitigation in the Cloud. Aastha Mehta, Mohamed Alzayat, Roberta De Viti, Björn B. Brandenburg, Peter Druschel, Deepak Garg |
| 2022 | PatchCleanser: Certifiably Robust Defense against Adversarial Patches for Any Image Classifier. Chong Xiang, Saeed Mahloujifar, Prateek Mittal |
| 2022 | Phish in Sheep's Clothing: Exploring the Authentication Pitfalls of Browser Fingerprinting. Xu Lin, Panagiotis Ilia, Saumya Solanki, Jason Polakis |
| 2022 | Physical-Layer Attacks Against Pulse Width Modulation-Controlled Actuators. Gökçen Yilmaz Dayanikli, Sourav Sinha, Devaprakash Muniraj, Ryan M. Gerdes, Mazen Farhood, Mani Mina |
| 2022 | Piranha: A GPU Platform for Secure Computation. Jean-Luc Watson, Sameer Wagh, Raluca Ada Popa |
| 2022 | Playing Without Paying: Detecting Vulnerable Payment Verification in Native Binaries of Unity Mobile Games. Chaoshun Zuo, Zhiqiang Lin |
| 2022 | Playing for K(H)eaps: Understanding and Improving Linux Kernel Exploit Reliability. Kyle Zeng, Yueqi Chen, Haehyun Cho, Xinyu Xing, Adam Doupé, Yan Shoshitaishvili, Tiffany Bao |
| 2022 | Poison Forensics: Traceback of Data Poisoning Attacks in Neural Networks. Shawn Shan, Arjun Nitin Bhagoji, Haitao Zheng, Ben Y. Zhao |
| 2022 | PoisonedEncoder: Poisoning the Unlabeled Pre-training Data in Contrastive Learning. Hongbin Liu, Jinyuan Jia, Neil Zhenqiang Gong |
| 2022 | Poisoning Attacks to Local Differential Privacy Protocols for Key-Value Data. Yongji Wu, Xiaoyu Cao, Jinyuan Jia, Neil Zhenqiang Gong |
| 2022 | PolyCruise: A Cross-Language Dynamic Information Flow Analysis. Wen Li, Jiang Ming, Xiapu Luo, Haipeng Cai |
| 2022 | Polynomial Commitment with a One-to-Many Prover and Applications. Jiaheng Zhang, Tiancheng Xie, Thang Hoang, Elaine Shi, Yupeng Zhang |
| 2022 | Pool Inference Attacks on Local Differential Privacy: Quantifying the Privacy Guarantees of Apple's Count Mean Sketch in Practice. Andrea Gadotti, Florimond Houssiau, Meenatchi Sundaram Muthu Selva Annamalai, Yves-Alexandre de Montjoye |
| 2022 | Post-Quantum Cryptography with Contemporary Co-Processors: Beyond Kronecker, Schönhage-Strassen & Nussbaumer. Joppe W. Bos, Joost Renes, Christine van Vredendaal |
| 2022 | Practical Data Access Minimization in Trigger-Action Platforms. Yunang Chen, Mohannad Alhanahnah, Andrei Sabelfeld, Rahul Chatterjee, Earlence Fernandes |
| 2022 | Practical Privacy-Preserving Authentication for SSH. Lawrence Roy, Stanislav Lyakhov, Yeongjin Jang, Mike Rosulek |
| 2022 | Pre-hijacked accounts: An Empirical Study of Security Failures in User Account Creation on the Web. Avinash Sudhodanan, Andrew Paverd |
| 2022 | PrivGuard: Privacy Regulation Compliance Made Easier. Lun Wang, Usmann Khan, Joseph P. Near, Qi Pang, Jithendaraa Subramanian, Neel Somani, Peng Gao, Andrew Low, Dawn Song |
| 2022 | Private Signaling. Varun Madathil, Alessandra Scafuro, István András Seres, Omer Shlomovits, Denis Varlakov |
| 2022 | ProFactory: Improving IoT Security via Formalized Protocol Customization. Fei Wang, Jianliang Wu, Yuhong Nan, Yousra Aafer, Xiangyu Zhang, Dongyan Xu, Mathias Payer |
| 2022 | Provably-Safe Multilingual Software Sandboxing using WebAssembly. Jay Bosamiya, Wen Shih Lim, Bryan Parno |
| 2022 | QCSD: A QUIC Client-Side Website-Fingerprinting Defence Framework. Jean-Pierre Smith, Luca Dolfi, Prateek Mittal, Adrian Perrig |
| 2022 | QuORAM: A Quorum-Replicated Fault Tolerant ORAM Datastore. Sujaya Maiyya, Seif Ibrahim, Caitlin Scarberry, Divyakant Agrawal, Amr El Abbadi, Huijia Lin, Stefano Tessaro, Victor Zakhary |
| 2022 | RE-Mind: a First Look Inside the Mind of a Reverse Engineer. Alessandro Mantovani, Simone Aonzo, Yanick Fratantonio, Davide Balzarotti |
| 2022 | RETBLEED: Arbitrary Speculative Code Execution with Return Instructions. Johannes Wikner, Kaveh Razavi |
| 2022 | Rapid Prototyping for Microarchitectural Attacks. Catherine Easdon, Michael Schwarz, Martin Schwarzl, Daniel Gruss |
| 2022 | RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices. Yi He, Zhenhua Zou, Kun Sun, Zhuotao Liu, Ke Xu, Qian Wang, Chao Shen, Zhi Wang, Qi Li |
| 2022 | ReZone: Disarming TrustZone with TEE Privilege Reduction. David Cerdeira, José Martins, Nuno Santos, Sandro Pinto |
| 2022 | RegexScalpel: Regular Expression Denial of Service (ReDoS) Defense by Localize-and-Fix. Yeting Li, Yecheng Sun, Zhiwu Xu, Jialun Cao, Yuekang Li, Rongchen Li, Haiming Chen, Shing-Chi Cheung, Yang Liu, Yang Xiao |
| 2022 | Regulator: Dynamic Analysis to Detect ReDoS. Robert McLaughlin, Fabio Pagani, Noah Spahn, Christopher Kruegel, Giovanni Vigna |
| 2022 | Rendering Contention Channel Made Practical in Web Browsers. Shujiang Wu, Jianjia Yu, Min Yang, Yinzhi Cao |
| 2022 | Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX. Lukas Giner, Andreas Kogler, Claudio Canella, Michael Schwarz, Daniel Gruss |
| 2022 | Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition. Chen Yan, Zhijian Xu, Zhanyuan Yin, Xiaoyu Ji, Wenyuan Xu |
| 2022 | SAID: State-aware Defense Against Injection Attacks on In-vehicle Network. Lei Xue, Yangyang Liu, Tianqi Li, Kaifa Zhao, Jianfeng Li, Le Yu, Xiapu Luo, Yajin Zhou, Guofei Gu |
| 2022 | SAPIC+: protocol verifiers of the world, unite! Vincent Cheval, Charlie Jacomme, Steve Kremer, Robert Künnemann |
| 2022 | SARA: Secure Android Remote Authorization. Abdullah Imran, Habiba Farrukh, Muhammad Ibrahim, Z. Berkay Celik, Antonio Bianchi |
| 2022 | SCRAPS: Scalable Collective Remote Attestation for Pub-Sub IoT Networks with Untrusted Proxy Verifier. Lukas Petzi, Ala Eddine Ben Yahya, Alexandra Dmitrienko, Gene Tsudik, Thomas Prantl, Samuel Kounev |
| 2022 | SGXFuzz: Efficiently Synthesizing Nested Structures for SGX Enclave Fuzzing. Tobias Cloosters, Johannes Willbold, Thorsten Holz, Lucas Davi |
| 2022 | SGXLock: Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX. Yuan Chen, Jiaqi Li, Guorui Xu, Yajin Zhou, Zhi Wang, Cong Wang, Kui Ren |
| 2022 | SIMC: ML Inference Secure Against Malicious Clients at Semi-Honest Cost. Nishanth Chandran, Divya Gupta, Sai Lakshmi Bhavana Obbattu, Akash Shah |
| 2022 | SWAPP: A New Programmable Playground for Web Application Security. Phakpoom Chinprutthiwong, Jianwei Huang, Guofei Gu |
| 2022 | SYMSAN: Time and Space Efficient Concolic Execution via Dynamic Data-flow Analysis. Ju Chen, Wookhyun Han, Mingjun Yin, Haochen Zeng, Chengyu Song, Byoungyoung Lee, Heng Yin, Insik Shin |
| 2022 | SecSMT: Securing SMT Processors against Contention-Based Covert Channels. Mohammadkazem Taram, Xida Ren, Ashish Venkat, Dean M. Tullsen |
| 2022 | Secure Poisson Regression. Mahimna Kelkar, Phi Hung Le, Mariana Raykova, Karn Seth |
| 2022 | Security Analysis of Camera-LiDAR Fusion Against Black-Box Attacks on Autonomous Vehicles. R. Spencer Hallyburton, Yupei Liu, Yulong Cao, Z. Morley Mao, Miroslav Pajic |
| 2022 | Security and Privacy Perceptions of Third-Party Application Access for Google Accounts. David G. Balash, Xiaoyuan Wu, Miles Grant, Irwin Reyes, Adam J. Aviv |
| 2022 | Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among Experts and Non-Experts in a Corporate Context. Veroniek Binkhorst, Tobias Fiebig, Katharina Krombholz, Wolter Pieters, Katsiaryna Labunets |
| 2022 | Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era. Changjiang Li, Li Wang, Shouling Ji, Xuhong Zhang, Zhaohan Xi, Shanqing Guo, Ting Wang |
| 2022 | Seeing the Forest for the Trees: Understanding Security Hazards in the 3GPP Ecosystem through Intelligent Analysis on Change Requests. Yi Chen, Di Tang, Yepeng Yao, Mingming Zha, Xiaofeng Wang, Xiaozhong Liu, Haixu Tang, Dongfang Zhao |
| 2022 | Shuffle-based Private Set Union: Faster and More Secure. Yanxue Jia, Shifeng Sun, Hong-Sheng Zhou, Jiajun Du, Dawu Gu |
| 2022 | SkillDetective: Automated Policy-Violation Detection of Voice Assistant Applications in the Wild. Jeffrey Young, Song Liao, Long Cheng, Hongxin Hu, Huixing Deng |
| 2022 | Smart Home Privacy Policies Demystified: A Study of Availability, Content, and Coverage. Sunil Manandhar, Kaushal Kafle, Benjamin Andow, Kapil Singh, Adwait Nadkarni |
| 2022 | Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope. Raphael Hiesgen, Marcin Nawrocki, Alistair King, Alberto Dainotti, Thomas C. Schmidt, Matthias Wählisch |
| 2022 | Stalloris: RPKI Downgrade Attack. Tomas Hlavacek, Philipp Jeitner, Donika Mirdita, Haya Schulmann, Michael Waidner |
| 2022 | StateFuzz: System Call-Based State-Aware Linux Driver Fuzzing. Bodong Zhao, Zheming Li, Shisong Qin, Zheyu Ma, Ming Yuan, Wenyu Zhu, Zhihong Tian, Chao Zhang |
| 2022 | Stateful Greybox Fuzzing. Jinsheng Ba, Marcel Böhme, Zahra Mirzamomen, Abhik Roychoudhury |
| 2022 | Stick It to The Man: Correcting for Non-Cooperative Behavior of Subjects in Experiments on Social Networks. Kaleigh Clary, Emma Tosch, Jeremiah Onaolapo, David D. Jensen |
| 2022 | Synthetic Data - Anonymisation Groundhog Day. Theresa Stadler, Bristena Oprisanu, Carmela Troncoso |
| 2022 | SyzScope: Revealing High-Risk Security Impacts of Fuzzer-Exposed Bugs in Linux kernel. Xiaochen Zou, Guoren Li, Weiteng Chen, Hang Zhang, Zhiyun Qian |
| 2022 | TLB;DR: Enhancing TLB-based Attacks with TLB Desynchronized Reverse Engineering. Andrei Tatar, Daniël Trujillo, Cristiano Giuffrida, Herbert Bos |
| 2022 | TLS-Anvil: Adapting Combinatorial Testing for TLS Libraries. Marcel Maehren, Philipp Nieting, Sven Hebrok, Robert Merget, Juraj Somorovsky, Jörg Schwenk |
| 2022 | Targeted Deanonymization via the Cache Side Channel: Attacks and Defenses. Mojtaba Zaheri, Yossi Oren, Reza Curtmola |
| 2022 | Teacher Model Fingerprinting Attacks Against Transfer Learning. Yufei Chen, Chao Shen, Cong Wang, Yang Zhang |
| 2022 | The Antrim County 2020 Election Incident: An Independent Forensic Investigation. J. Alex Halderman |
| 2022 | The Dangers of Human Touch: Fingerprinting Browser Extensions through User Actions. Konstantinos Solomos, Panagiotis Ilia, Soroush Karami, Nick Nikiforakis, Jason Polakis |
| 2022 | The Security Lottery: Measuring Client-Side Web Security Inconsistencies. Sebastian Roth, Stefano Calzavara, Moritz Wilhelm, Alvise Rabitti, Ben Stock |
| 2022 | TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable Vulnerabilities. Rahul Kande, Addison Crump, Garrett Persyn, Patrick Jauernig, Ahmad-Reza Sadeghi, Aakash Tyagi, Jeyavijayan Rajendran |
| 2022 | Themis: Accelerating the Detection of Route Origin Hijacking by Distinguishing Legitimate and Illegitimate MOAS. Lancheng Qin, Dan Li, Ruifeng Li, Kang Wang |
| 2022 | Tightly Seal Your Sensitive Pointers with PACTight. Mohannad Ismail, Andrew Quach, Christopher Jelesnianski, Yeongjin Jang, Changwoo Min |
| 2022 | Total Eclipse of the Heart - Disrupting the InterPlanetary File System. Bernd Prünster, Alexander Marsalek, Thomas Zefferer |
| 2022 | Towards Automatically Reverse Engineering Vehicle Diagnostic Protocols. Le Yu, Yangyang Liu, Pengfei Jing, Xiapu Luo, Lei Xue, Kaifa Zhao, Yajin Zhou, Ting Wang, Guofei Gu, Sen Nie, Shi Wu |
| 2022 | Towards More Robust Keyword Spotting for Voice Assistants. Shimaa Ahmed, Ilia Shumailov, Nicolas Papernot, Kassem Fawaz |
| 2022 | Transferring Adversarial Robustness Through Robust Representation Matching. Pratik Vaishnavi, Kevin Eykholt, Amir Rahmati |
| 2022 | Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster Design. Alon Shakevsky, Eyal Ronen, Avishai Wool |
| 2022 | Twilight: A Differentially Private Payment Channel Network. Maya Dotan, Saar Tochner, Aviv Zohar, Yossi Gilad |
| 2022 | Under the Hood of DANE Mismanagement in SMTP. Hyeonmin Lee, Md. Ishtiaq Ashiq, Moritz Müller, Roland van Rijswijk-Deij, Ted Taekyoung Kwon, Taejoong Chung |
| 2022 | Understanding and Improving Usability of Data Dashboards for Simplified Privacy Control of Voice Assistant Data. Vandit Sharma, Mainack Mondal |
| 2022 | Uninvited Guests: Analyzing the Identity and Behavior of Certificate Transparency Bots. Brian Kondracki, Johnny So, Nick Nikiforakis |
| 2022 | Unleash the Simulacrum: Shifting Browser Realities for Robust Extension-Fingerprinting Prevention. Soroush Karami, Faezeh Kalantari, Mehrnoosh Zaeifi, Xavier J. Maso, Erik Trickel, Panagiotis Ilia, Yan Shoshitaishvili, Adam Doupé, Jason Polakis |
| 2022 | Using Trātṛ to tame Adversarial Synchronization. Yuvraj Patel, Chenhao Ye, Akshat Sinha, Abigail Matthews, Andrea C. Arpaci-Dusseau, Michael M. Swift |
| 2022 | V'CER: Efficient Certificate Validation in Constrained Networks. David Koisser, Patrick Jauernig, Gene Tsudik, Ahmad-Reza Sadeghi |
| 2022 | VerLoc: Verifiable Localization in Decentralized Systems. Katharina Kohls, Claudia Díaz |
| 2022 | Watching the Watchers: Practical Video Identification Attack in LTE Networks. Sangwook Bae, Mincheol Son, Dongkwan Kim, CheolJun Park, Jiho Lee, Sooel Son, Yongdae Kim |
| 2022 | Watching the watchers: bias and vulnerability in remote proctoring software. Ben Burgess, Avi Ginsberg, Edward W. Felten, Shaanan Cohney |
| 2022 | Web Cache Deception Escalates! Seyed Ali Mirheidari, Matteo Golinelli, Kaan Onarlioglu, Engin Kirda, Bruno Crispo |
| 2022 | WebGraph: Capturing Advertising and Tracking Information Flows for Robust Blocking. Sandra Deepthy Siby, Umar Iqbal, Steven Englehardt, Zubair Shafiq, Carmela Troncoso |
| 2022 | When Sally Met Trackers: Web Tracking From the Users' Perspective. Savino Dambra, Iskander Sánchez-Rola, Leyla Bilge, Davide Balzarotti |
| 2022 | Where to Recruit for Security Development Studies: Comparing Six Software Developer Samples. Harjot Kaur, Sabrina Amft, Daniel Votipka, Yasemin Acar, Sascha Fahl |
| 2022 | Who Are You (I Really Wanna Know)? Detecting Audio DeepFakes Through Vocal Tract Reconstruction. Logan Blue, Kevin Warren, Hadi Abdullah, Cassidy Gibson, Luis Vargas, Jessica O'Dell, Kevin R. B. Butler, Patrick Traynor |
| 2022 | Why Users (Don't) Use Password Managers at a Large Educational Institution. Peter Mayer, Collins W. Munyendo, Michelle L. Mazurek, Adam J. Aviv |
| 2022 | XDRI Attacks - and - How to Enhance Resilience of Residential Routers. Philipp Jeitner, Haya Schulmann, Lucas Teichmann, Michael Waidner |
| 2022 | Your Microphone Array Retains Your Identity: A Robust Voice Liveness Detection System for Smart Speakers. Yan Meng, Jiachun Li, Matthew Pillari, Arjun Deopujari, Liam Brennan, Hafsah Shamsie, Haojin Zhu, Yuan Tian |
| 2022 | Zero-Knowledge Middleboxes. Paul Grubbs, Arasu Arun, Ye Zhang, Joseph Bonneau, Michael Walfish |
| 2022 | ppSAT: Towards Two-Party Private SAT Solving. Ning Luo, Samuel Judson, Timos Antonopoulos, Ruzica Piskac, Xiao Wang |
| 2022 | ÆPIC Leak: Architecturally Leaking Uninitialized Data from the Microarchitecture. Pietro Borrello, Andreas Kogler, Martin Schwarzl, Moritz Lipp, Daniel Gruss, Michael Schwarz |