USENIX Security Symposium A*

257 papers

YearTitle / Authors
2022"How Do You Not Lose Friends?": Synthesizing a Design Space of Social Controls for Securing Shared Digital Resources Via Participatory Design Jams.
Eyitemi Moju-Igbene, Hanan Abdi, Alan Lu, Sauvik Das
2022"I feel invaded, annoyed, anxious and I may protect myself": Individuals' Feelings about Online Tracking and their Protective Behaviour across Gender and Country.
Kovila P. L. Coopamootoo, Maryam Mehrnezhad, Ehsan Toreini
2022"Like Lesbians Walking the Perimeter": Experiences of U.S. LGBTQ+ Folks With Online Security, Safety, and Privacy Advice.
Christine Geeng, Mike Harris, Elissa M. Redmiles, Franziska Roesner
2022"OK, Siri" or "Hey, Google": Evaluating Voiceprint Distinctiveness via Content-based PROLE Score.
Ruiwen He, Xiaoyu Ji, Xinfeng Li, Yushi Cheng, Wenyuan Xu
2022"The Same PIN, Just Longer": On the (In)Security of Upgrading PINs from 4 to 6 Digits.
Collins W. Munyendo, Philipp Markert, Alexandra Nisenoff, Miles Grant, Elena Korkes, Blase Ur, Adam J. Aviv
2022"They Look at Vulnerability and Use That to Abuse You": Participatory Threat Modelling with Migrant Domestic Workers.
Julia Slupska, Selina Y. Cho, Marissa Begonia, Ruba Abu-Salma, Nayanatara Prakash, Mallika Balakrishnan
202231st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022
Kevin R. B. Butler, Kurt Thomas
202299% False Positives: A Qualitative Study of SOC Analysts' Perspectives on Security Alarms.
Bushra A. AlAhmadi, Louise Axon, Ivan Martinovic
2022A Hardware-Software Co-design for Efficient Intra-Enclave Isolation.
Jinyu Gu, Bojun Zhu, Mingyu Li, Wentai Li, Yubin Xia, Haibo Chen
2022A Large-scale Investigation into Geodifferences in Mobile Apps.
Renuka Kumar, Apurva Virkud, Ram Sundara Raman, Atul Prakash, Roya Ensafi
2022A Large-scale Temporal Measurement of Android Malicious Apps: Persistence, Migration, and Lessons Learned.
Yun Shen, Pierre-Antoine Vervier, Gianluca Stringhini
2022A Large-scale and Longitudinal Measurement Study of DKIM Deployment.
Chuhan Wang, Kaiwen Shen, Minglei Guo, Yuxuan Zhao, Mingming Zhang, Jianjun Chen, Baojun Liu, Xiaofeng Zheng, Haixin Duan, Yanzhong Lin, Qingfeng Pan
2022ALASTOR: Reconstructing the Provenance of Serverless Intrusions.
Pubali Datta, Isaac Polinsky, Muhammad Adil Inam, Adam Bates, William Enck
2022AMD Prefetch Attacks through Power and Time.
Moritz Lipp, Daniel Gruss, Michael Schwarz
2022Aardvark: An Asynchronous Authenticated Dictionary with Applications to Account-based Cryptocurrencies.
Derek Leung, Yossi Gilad, Sergey Gorbunov, Leonid Reyzin, Nickolai Zeldovich
2022Adversarial Detection Avoidance Attacks: Evaluating the robustness of perceptual hashing-based client-side scanning.
Shubham Jain, Ana-Maria Cretu, Yves-Alexandre de Montjoye
2022AmpFuzz: Fuzzing for Amplification DDoS Vulnerabilities.
Johannes Krupp, Ilya Grishchenko, Christian Rossow
2022An Audit of Facebook's Political Ad Policy Enforcement.
Victor Le Pochat, Laura Edelson, Tom van Goethem, Wouter Joosen, Damon McCoy, Tobias Lauinger
2022An Experimental Study of GPS Spoofing and Takeover Attacks on UAVs.
Harshad Sathaye, Martin Strohmeier, Vincent Lenders, Aanjhan Ranganathan
2022Anycast Agility: Network Playbooks to Fight DDoS.
A. S. M. Rizvi, Leandro M. Bertholdo, João M. Ceron, John S. Heidemann
2022Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs.
Jayakrishna Vadayath, Moritz Eckert, Kyle Zeng, Nicolaas Weideman, Gokulkrishna Praveen Menon, Yanick Fratantonio, Davide Balzarotti, Adam Doupé, Tiffany Bao, Ruoyu Wang, Christophe Hauser, Yan Shoshitaishvili
2022Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models.
Shagufta Mehnaz, Sayanton V. Dibbo, Ehsanul Kabir, Ninghui Li, Elisa Bertino
2022Attacks on Deidentification's Defenses.
Aloni Cohen
2022Augmenting Decompiler Output with Learned Variable Names and Types.
Qibin Chen, Jeremy Lacomis, Edward J. Schwartz, Claire Le Goues, Graham Neubig, Bogdan Vasilescu
2022AutoDA: Automated Decision-based Iterative Adversarial Attacks.
Qi-An Fu, Yinpeng Dong, Hang Su, Jun Zhu, Chao Zhang
2022Automated Detection of Automated Traffic.
Cormac Herley
2022Automated Side Channel Analysis of Media Software with Manifold Learning.
Yuanyuan Yuan, Qi Pang, Shuai Wang
2022Automating Cookie Consent and GDPR Violation Detection.
Dino Bollinger, Karel Kubicek, Carlos Cotrini, David A. Basin
2022Back-Propagating System Dependency Impact for Attack Investigation.
Pengcheng Fang, Peng Gao, Changlin Liu, Erman Ayday, Kangkook Jee, Ting Wang, Yanfang (Fanny) Ye, Zhuotao Liu, Xusheng Xiao
2022Backporting Security Patches of Web Applications: A Prototype Design and Implementation on Injection Vulnerability Patches.
Youkun Shi, Yuan Zhang, Tianhan Luo, Xiangyu Mao, Yinzhi Cao, Ziwen Wang, Yudi Zhao, Zongan Huang, Min Yang
2022Batched Differentially Private Information Retrieval.
Kinan Dak Albab, Rawane Issa, Mayank Varia, Kalman Graffi
2022Bedrock: Programmable Network Support for Secure RDMA Systems.
Jiarong Xing, Kuo-Feng Hsu, Yiming Qiu, Ziyang Yang, Hongyi Liu, Ang Chen
2022Behind the Tube: Exploitative Monetization of Content on YouTube.
Andrew Chu, Arjun Arunasalam, Muslum Ozgur Ozmen, Z. Berkay Celik
2022Binoculars: Contention-Based Side-Channel Attacks Exploiting the Page Walker.
Zirui Neil Zhao, Adam Morrison, Christopher W. Fletcher, Josep Torrellas
2022Birds of a Feather Flock Together: How Set Bias Helps to Deanonymize You via Revealed Intersection Sizes.
Xiaojie Guo, Ye Han, Zheli Liu, Ding Wang, Yan Jia, Jin Li
2022Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box Attacks.
Huiying Li, Shawn Shan, Emily Wenger, Jiayun Zhang, Haitao Zheng, Ben Y. Zhao
2022BrakTooth: Causing Havoc on Bluetooth Link Manager via Directed Fuzzing.
Matheus E. Garbelini, Vaibhav Bedi, Sudipta Chattopadhyay, Sumei Sun, Ernest Kurniawan
2022Branch History Injection: On the Effectiveness of Hardware Mitigations Against Cross-Privilege Spectre-v2 Attacks.
Enrico Barberis, Pietro Frigo, Marius Muench, Herbert Bos, Cristiano Giuffrida
2022Breaking Bridgefy, again: Adopting libsignal is not enough.
Martin R. Albrecht, Raphael Eikenberg, Kenneth G. Paterson
2022Building an Open, Robust, and Stable Voting-Based Domain Top List.
Qinge Xie, Shujun Tang, Xiaofeng Zheng, Qingran Lin, Baojun Liu, Haixin Duan, Frank Li
2022COMRace: Detecting Data Race Vulnerabilities in COM Objects.
Fangming Gu, Qingli Guo, Lian Li, Zhiniang Peng, Wei Lin, Xiaobo Yang, Xiaorui Gong
2022CamShield: Securing Smart Cameras through Physical Replication and Isolation.
Zhiwei Wang, Yihui Yan, Yueli Yan, Huangxun Chen, Zhice Yang
2022Can one hear the shape of a neural network?: Snooping the GPU via Magnetic Side Channel.
Henrique Teles Maia, Chang Xiao, Dingzeyu Li, Eitan Grinspun, Changxi Zheng
2022Caring about Sharing: User Perceptions of Multiparty Data Sharing.
Bailey Kacsmar, Kyle Tilbury, Miti Mazmudar, Florian Kerschbaum
2022CellIFT: Leveraging Cells for Scalable and Precise Dynamic Information Flow Tracking in RTL.
Flavien Solt, Ben Gras, Kaveh Razavi
2022Characterizing the Security of Github CI Workflows.
Igibek Koishybayev, Aleksandr Nahapetyan, Raima Zachariah, Siddharth Muralee, Bradley Reaves, Alexandros Kapravelos, Aravind Machiry
2022Cheetah: Lean and Fast Secure Two-Party Deep Neural Network Inference.
Zhicong Huang, Wen-jie Lu, Cheng Hong, Jiansheng Ding
2022Communication-Efficient Triangle Counting under Local Differential Privacy.
Jacob Imola, Takao Murakami, Kamalika Chaudhuri
2022Composable Cachelets: Protecting Enclaves from Cache Side-Channel Attacks.
Daniel Townley, Kerem Arikan, Yu David Liu, Dmitry Ponomarev, Oguz Ergin
2022Constant-weight PIR: Single-round Keyword PIR via Constant-weight Equality Operators.
Rasoul Akhavan Mahdavi, Florian Kerschbaum
2022Counting in Regexes Considered Harmful: Exposing ReDoS Vulnerability of Nonbacktracking Matchers.
Lenka Turonová, Lukás Holík, Ivan Homoliak, Ondrej Lengál, Margus Veanes, Tomás Vojnar
2022Creating a Secure Underlay for the Internet.
Henry Birge-Lee, Joel Wanner, Grace H. Cimaszewski, Jonghoon Kwon, Liang Wang, François Wirz, Prateek Mittal, Adrian Perrig, Yixin Sun
2022Debloating Address Sanitizer.
Yuchen Zhang, Chengbin Pang, Georgios Portokalidis, Nikos Triandopoulos, Jun Xu
2022Decomperson: How Humans Decompile and What We Can Learn From It.
Kevin Burk, Fabio Pagani, Christopher Kruegel, Giovanni Vigna
2022DeepDi: Learning a Relational Graph Convolutional Network Model on Instructions for Fast and Accurate Disassembly.
Sheng Yu, Yu Qu, Xunchao Hu, Heng Yin
2022DeepPhish: Understanding User Trust Towards Artificially Generated Profiles in Online Social Networks.
Jaron Mink, Licheng Luo, Natã M. Barbosa, Olivia Figueira, Yang Wang, Gang Wang
2022Detecting Logical Bugs of DBMS with Coverage-based Guidance.
Yu Liang, Song Liu, Hong Hu
2022DnD: A Cross-Architecture Deep Neural Network Decompiler.
Ruoyu Wu, Taegyu Kim, Dave (Jing) Tian, Antonio Bianchi, Dongyan Xu
2022DoLTEst: In-depth Downlink Negative Testing Framework for LTE Devices.
CheolJun Park, Sangwook Bae, Beomseok Oh, Jiho Lee, Eunkyu Lee, Insu Yun, Yongdae Kim
2022Don't Mesh Around: Side-Channel Attacks and Mitigations on Mesh Interconnects.
Miles Dai, Riccardo Paccagnella, Miguel Gomez-Garcia, John D. McCalpin, Mengjia Yan
2022Dos and Don'ts of Machine Learning in Computer Security.
Daniel Arp, Erwin Quiring, Feargus Pendlebury, Alexander Warnecke, Fabio Pierazzi, Christian Wressnegger, Lorenzo Cavallaro, Konrad Rieck
2022Double Trouble: Combined Heterogeneous Attacks on Non-Inclusive Cache Hierarchies.
Antoon Purnal, Furkan Turan, Ingrid Verbauwhede
2022DoubleStar: Long-Range Attack Towards Depth Estimation based Obstacle Avoidance in Autonomous Systems.
Ce Zhou, Qiben Yan, Yan Shi, Lichao Sun
2022Drifuzz: Harvesting Bugs in Device Drivers from Golden Seeds.
Zekun Shen, Ritik Roongta, Brendan Dolan-Gavitt
2022Dynamic Searchable Encryption with Optimal Search in the Presence of Deletions.
Javad Ghareh Chamani, Dimitrios Papadopoulos, Mohammadamin Karbasforushan, Ioannis Demertzis
2022Efficient Differentially Private Secure Aggregation for Federated Learning via Hardness of Learning with Errors.
Timothy Stevens, Christian Skalka, Christelle Vincent, John H. Ring, Samuel Clark, Joseph P. Near
2022Efficient Representation of Numerical Optimization Problems for SNARKs.
Sebastian Angel, Andrew J. Blumberg, Eleftherios Ioannidis, Jess Woods
2022Elasticlave: An Efficient Memory Model for Enclaves.
Jason Zhijingcheng Yu, Shweta Shinde, Trevor E. Carlson, Prateek Saxena
2022Electronic Monitoring Smartphone Apps: An Analysis of Risks from Technical, Human-Centered, and Legal Perspectives.
Kentrell Owens, Anita Alem, Franziska Roesner, Tadayoshi Kohno
2022Empirical Understanding of Deletion Privacy: Experiences, Expectations, and Measures.
Mohsen Minaei, Mainack Mondal, Aniket Kate
2022End-to-Same-End Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage.
Long Chen, Ya-Nan Li, Qiang Tang, Moti Yung
2022Estimating Incidental Collection in Foreign Intelligence Surveillance: Large-Scale Multiparty Private Set Intersection with Union and Sum.
Anunay Kulshrestha, Jonathan R. Mayer
2022Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits.
Octavian Suciu, Connor Nelson, Zhuoer Lyu, Tiffany Bao, Tudor Dumitras
2022Experimental Security Analysis of the App Model in Business Collaboration Platforms.
Yunang Chen, Yue Gao, Nick Ceccio, Rahul Chatterjee, Kassem Fawaz, Earlence Fernandes
2022Experimenting with Collaborative zk-SNARKs: Zero-Knowledge Proofs for Distributed Secrets.
Alex Ozdemir, Dan Boneh
2022Exploring the Security Boundary of Data Reconstruction via Neuron Exclusivity Analysis.
Xudong Pan, Mi Zhang, Yifan Yan, Jiaming Zhu, Zhemin Yang
2022Exploring the Unchartered Space of Container Registry Typosquatting.
Guannan Liu, Xing Gao, Haining Wang, Kun Sun
2022FIXREVERTER: A Realistic Bug Injection Methodology for Benchmarking Fuzz Testing.
Zenong Zhang, Zach Patterson, Michael Hicks, Shiyi Wei
2022FLAME: Taming Backdoors in Federated Learning.
Thien Duc Nguyen, Phillip Rieger, Huili Chen, Hossein Yalame, Helen Möllering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Shaza Zeitouni, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider
2022FOAP: Fine-Grained Open-World Android App Fingerprinting.
Jianfeng Li, Hao Zhou, Shuohan Wu, Xiapu Luo, Ting Wang, Xian Zhan, Xiaobo Ma
2022FRAMESHIFTER: Security Implications of HTTP/2-to-HTTP/1 Conversion Anomalies.
Bahruz Jabiyev, Steven Sprecher, Anthony Gavazzi, Tommaso Innocenti, Kaan Onarlioglu, Engin Kirda
2022FReD: Identifying File Re-Delegation in Android System Services.
Sigmund Albert Gorski III, Seaver Thorn, William Enck, Haining Chen
2022FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities.
Sunnyeo Park, Daejun Kim, Suman Jana, Sooel Son
2022Faster Yet Safer: Logging System Via Fixed-Key Blockcipher.
Viet Tung Hoang, Cong Wu, Xin Yuan
2022Ferry: State-Aware Symbolic Execution for Exploring State-Dependent Program Paths.
Shunfan Zhou, Zhemin Yang, Dan Qiao, Peng Liu, Min Yang, Zhe Wang, Chenggang Wu
2022FlowMatrix: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation.
Kaihang Ji, Jun Zeng, Yuancheng Jiang, Zhenkai Liang, Zheng Leong Chua, Prateek Saxena, Abhik Roychoudhury
2022FreeWill: Automatically Diagnosing Use-after-free Bugs via Reference Miscounting Detection on Binaries.
Liang He, Hong Hu, Purui Su, Yan Cai, Zhenkai Liang
2022FuzzOrigin: Detecting UXSS vulnerabilities in Browsers through Origin Fuzzing.
Sunwoo Kim, Young Min Kim, Jaewon Hur, Suhwan Song, Gwangmu Lee, Byoungyoung Lee
2022Fuzzing Hardware Like Software.
Timothy Trippel, Kang G. Shin, Alex Chernyakhovsky, Garret Kelly, Dominic Rizzo, Matthew Hicks
2022Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing.
Tobias Scharnowski, Nils Bars, Moritz Schloegel, Eric Gustafson, Marius Muench, Giovanni Vigna, Christopher Kruegel, Thorsten Holz, Ali Abbasi
2022GAROTA: Generalized Active Root-Of-Trust Architecture (for Tiny Embedded Devices).
Esmerald Aliaj, Ivan De Oliveira Nunes, Gene Tsudik
2022GET /out: Automated Discovery of Application-Layer Censorship Evasion Strategies.
Michael Harrity, Kevin Bock, Frederick Sell, Dave Levin
2022GPU-accelerated PIR with Client-Independent Preprocessing for Large-Scale Applications.
Daniel Günther, Maurice Heymann, Benny Pinkas, Thomas Schneider
2022Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging.
Patrick Leu, Giovanni Camurati, Alexander Heinrich, Marc Roeschlin, Claudio Anliker, Matthias Hollick, Srdjan Capkun, Jiska Classen
2022GhostTouch: Targeted Attacks on Touchscreens without Physical Touch.
Kai Wang, Richard Mitev, Chen Yan, Xiaoyu Ji, Ahmad-Reza Sadeghi, Wenyuan Xu
2022Gossamer: Securely Measuring Password-based Logins.
Marina Sanusi Bohuk, Mazharul Islam, Suleman Ahmad, Michael M. Swift, Thomas Ristenpart, Rahul Chatterjee
2022Ground Truth for Binary Disassembly is Not Easy.
Chengbin Pang, Tiantai Zhang, Ruotong Yu, Bing Mao, Jun Xu
2022Half-Double: Hammering From the Next Row Over.
Andreas Kogler, Jonas Juffinger, Salman Qazi, Yoongu Kim, Moritz Lipp, Nicolas Boichat, Eric Shiu, Mattias Nissler, Daniel Gruss
2022Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand.
Matteo Cardaioli, Stefano Cecconello, Mauro Conti, Simone Milani, Stjepan Picek, Eugen Saraci
2022Hecate: Abuse Reporting in Secure Messengers with Sealed Sender.
Rawane Issa, Nicolas Alhaddad, Mayank Varia
2022Helping hands: Measuring the impact of a large threat intelligence sharing community.
Xander Bouwman, Victor Le Pochat, Pawel Foremski, Tom van Goethem, Carlos Hernandez Gañán, Giovane C. M. Moura, Samaneh Tajalizadehkhoob, Wouter Joosen, Michel van Eeten
2022Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86.
Yingchen Wang, Riccardo Paccagnella, Elizabeth Tang He, Hovav Shacham, Christopher W. Fletcher, David Kohlbrenner
2022Hidden Trigger Backdoor Attack on NLP Models via Linguistic Style Manipulation.
Xudong Pan, Mi Zhang, Beina Sheng, Jiaming Zhu, Min Yang
2022Hiding in Plain Sight? On the Efficacy of Power Side Channel-Based Control Flow Monitoring.
Yi Han, Matthew Chan, Zahra Aref, Nils Ole Tippenhauer, Saman A. Zonouz
2022Holistic Control-Flow Protection on Real-Time Embedded Systems with Kage.
Yufei Du, Zhuojia Shen, Komail Dharsee, Jie Zhou, Robert J. Walls, John Criswell
2022How Are Your Zombie Accounts? Understanding Users' Practices and Expectations on Mobile App Account Deletion.
Yijing Liu, Yan Jia, Qingyin Tan, Zheli Liu, Luyi Xing
2022How Long Do Vulnerabilities Live in the Code? A Large-Scale Empirical Measurement Study on FOSS Vulnerability Lifetimes.
Nikolaos Alexopoulos, Manuel Brack, Jan Philipp Wagner, Tim Grube, Max Mühlhäuser
2022How Machine Learning Is Solving the Binary Function Similarity Problem.
Andrea Marcelli, Mariano Graziano, Xabier Ugarte-Pedrero, Yanick Fratantonio, Mohamad Mansouri, Davide Balzarotti
2022How and Why People Use Virtual Private Networks.
Agnieszka Dutkowska-Zuk, Austin Hounsel, Amy Morrill, Andre Xiong, Marshini Chetty, Nick Feamster
2022How to Abuse and Fix Authenticated Encryption Without Key Commitment.
Ange Albertini, Thai Duong, Shay Gueron, Stefan Kölbl, Atul Luykx, Sophie Schmieg
2022How to Peel a Million: Validating and Expanding Bitcoin Clusters.
George Kappos, Haaroon Yousaf, Rainer Stütz, Sofia Rollet, Bernhard Haslhofer, Sarah Meiklejohn
2022HyperDegrade: From GHz to MHz Effective CPU Frequencies.
Alejandro Cabrera Aldaya, Billy Bob Brumley
2022Hyperproofs: Aggregating and Maintaining Proofs in Vector Commitments.
Shravan Srinivasan, Alexander Chepurnoy, Charalampos Papamanthou, Alin Tomescu, Yupeng Zhang
2022IHOP: Improved Statistical Query Recovery against Searchable Symmetric Encryption through Quadratic Optimization.
Simon Oya, Florian Kerschbaum
2022Identity Confusion in WebView-based Mobile App-in-app Ecosystems.
Lei Zhang, Zhibo Zhang, Ancong Liu, Yinzhi Cao, Xiaohan Zhang, Yanjun Chen, Yuan Zhang, Guangliang Yang, Min Yang
2022In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer Authentication.
Sungbae Yoo, Jinbum Park, Seolheui Kim, Yeji Kim, Taesoo Kim
2022Increasing Adversarial Uncertainty to Scale Private Similarity Testing.
Yiqing Hua, Armin Namavari, Kaishuo Cheng, Mor Naaman, Thomas Ristenpart
2022Incremental Offline/Online PIR.
Yiping Ma, Ke Zhong, Tal Rabin, Sebastian Angel
2022Inference Attacks Against Graph Neural Networks.
Zhikun Zhang, Min Chen, Michael Backes, Yun Shen, Yang Zhang
2022Inferring Phishing Intention via Webpage Appearance and Dynamics: A Deep Vision Based Approach.
Ruofan Liu, Yun Lin, Xianglin Yang, Siang Hwee Ng, Dinil Mon Divakaran, Jin Song Dong
2022Investigating State-of-the-Art Practices for Fostering Subjective Trust in Online Voting through Interviews.
Karola Marky, Paul Gerber, Sebastian Günther, Mohamed Khamis, Maximilian Fries, Max Mühlhäuser
2022Jenny: Securing Syscalls for PKU-based Memory Isolation Systems.
David Schrammel, Samuel Weiser, Richard Sadek, Stefan Mangard
2022Khaleesi: Breaker of Advertising and Tracking Request Chains.
Umar Iqbal, Charlie Wolfe, Charles Nguyen, Steven Englehardt, Zubair Shafiq
2022LTrack: Stealthy Tracking of Mobile Phones in LTE.
Martin Kotuliak, Simon Erni, Patrick Leu, Marc Röschlin, Srdjan Capkun
2022Label Inference Attacks Against Vertical Federated Learning.
Chong Fu, Xuhong Zhang, Shouling Ji, Jinyin Chen, Jingzheng Wu, Shanqing Guo, Jun Zhou, Alex X. Liu, Ting Wang
2022Lamphone: Passive Sound Recovery from a Desk Lamp's Light Bulb Vibrations.
Ben Nassi, Yaron Pirutin, Raz Swisa, Adi Shamir, Yuval Elovici, Boris Zadov
2022Leaky Forms: A Study of Email and Password Exfiltration Before Form Submission.
Asuman Senol, Gunes Acar, Mathias Humbert, Frederik J. Zuiderveen Borgesius
2022Lend Me Your Ear: Passive Remote Physical Side Channels on PCs.
Daniel Genkin, Noam Nissan, Roei Schuster, Eran Tromer
2022LinKRID: Vetting Imbalance Reference Counting in Linux kernel with Symbolic Execution.
Jian Liu, Lin Yi, Weiteng Chen, Chengyu Song, Zhiyun Qian, Qiuping Yi
2022Loki: Hardening Code Obfuscation Against Automated Attacks.
Moritz Schloegel, Tim Blazytko, Moritz Contag, Cornelius Aschermann, Julius Basler, Thorsten Holz, Ali Abbasi
2022Lumos: Identifying and Localizing Diverse Hidden IoT Devices in an Unfamiliar Environment.
Rahul Anand Sharma, Elahe Soltanaghaei, Anthony Rowe, Vyas Sekar
2022MAGE: Mutual Attestation for a Group of Enclaves without Trusted Third Parties.
Guoxing Chen, Yinqian Zhang
2022ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models.
Yugeng Liu, Rui Wen, Xinlei He, Ahmed Salem, Zhikun Zhang, Michael Backes, Emiliano De Cristofaro, Mario Fritz, Yang Zhang
2022MOVERY: A Precise Approach for Modified Vulnerable Code Clone Discovery from Modified Open-Source Software Components.
Seunghoon Woo, Hyunji Hong, Eunjin Choi, Heejo Lee
2022MaDIoT 2.0: Modern High-Wattage IoT Botnet Attacks and Defenses.
Tohid Shekari, Alvaro A. Cárdenas, Raheem Beyah
2022Many Roads Lead To Rome: How Packet Headers Influence DNS Censorship Measurement.
Abhishek Bhaskar, Paul Pearce
2022Measurement by Proxy: On the Accuracy of Online Marketplace Measurements.
Alejandro Cuevas Villalba, Fieke Miedema, Kyle Soska, Nicolas Christin, Rolf van Wegberg
2022Membership Inference Attacks and Defenses in Neural Network Pruning.
Xiaoyong Yuan, Lan Zhang
2022Midas: Systematic Kernel TOCTTOU Protection.
Atri Bhattacharyya, Uros Tesic, Mathias Payer
2022Might I Get Pwned: A Second Generation Compromised Credential Checking Service.
Bijeeta Pal, Mazharul Islam, Marina Sanusi Bohuk, Nick Sullivan, Luke Valenta, Tara Whalen, Christopher A. Wood, Thomas Ristenpart, Rahul Chatterjee
2022Minefield: A Software-only Protection for SGX Enclaves against DVFS Attacks.
Andreas Kogler, Daniel Gruss, Michael Schwarz
2022Mining Node.js Vulnerabilities via Object Dependence Graph and Query.
Song Li, Mingqing Kang, Jianwei Hou, Yinzhi Cao
2022Mistrust Plugins You Must: A Large-Scale Study Of Malicious Plugins In WordPress Marketplaces.
Ranjita Pai Kasturi, Jonathan Fuller, Yiting Sun, Omar Chabklo, Andres Rodriguez, Jeman Park, Brendan Saltaformaggio
2022Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture.
Xinyu Tang, Saeed Mahloujifar, Liwei Song, Virat Shejwalkar, Milad Nasr, Amir Houmansadr, Prateek Mittal
2022Morphuzz: Bending (Input) Space to Fuzz Virtual Devices.
Alexander Bulekov, Bandan Das, Stefan Hajnoczi, Manuel Egele
2022MundoFuzz: Hypervisor Fuzzing with Statistical Coverage Testing and Grammar Inference.
Cheolwoo Myung, Gwangmu Lee, Byoungyoung Lee
2022Neither Access nor Control: A Longitudinal Investigation of the Efficacy of User Access-Control Solutions on Smartphones.
Masoud Mehrabi Koushki, Yue Huang, Julia Rubin, Konstantin Beznosov
2022Networks of Care: Tech Abuse Advocates' Digital Security Practices.
Julia Slupska, Angelika Strohmayer
2022OS-Aware Vulnerability Prioritization via Differential Severity Analysis.
Qiushi Wu, Yue Xiao, Xiaojing Liao, Kangjie Lu
2022OVRseen: Auditing Network Traffic and Privacy Policies in Oculus VR.
Rahmadi Trimananda, Hieu Le, Hao Cui, Janice Tran Ho, Anastasia Shuba, Athina Markopoulou
2022Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect Attacks.
Xuewei Feng, Qi Li, Kun Sun, Zhiyun Qian, Gang Zhao, Xiaohui Kuang, Chuanpu Fu, Ke Xu
2022Omnes pro uno: Practical Multi-Writer Encrypted Database.
Jiafan Wang, Sherman S. M. Chow
2022On the Necessity of Auditable Algorithmic Definitions for Machine Unlearning.
Anvith Thudi, Hengrui Jia, Ilia Shumailov, Nicolas Papernot
2022On the Security Risks of AutoML.
Ren Pang, Zhaohan Xi, Shouling Ji, Xiapu Luo, Ting Wang
2022One-off Disclosure Control by Heterogeneous Generalization.
Olga Gkountouna, Katerina Doka, Mingqiang Xue, Jianneng Cao, Panagiotis Karras
2022Online Website Fingerprinting: Evaluating Website Fingerprinting Attacks on Tor in the Real World.
Giovanni Cherubin, Rob Jansen, Carmela Troncoso
2022Oops... Code Execution and Content Spoofing: The First Comprehensive Analysis of OpenDocument Signatures.
Simon Rohlmann, Christian Mainka, Vladislav Mladenov, Jörg Schwenk
2022Open to a fault: On the passive compromise of TLS keys via transient errors.
George Arnold Sullivan, Jackson Sippe, Nadia Heninger, Eric Wustrow
2022OpenSSLNTRU: Faster post-quantum TLS key exchange.
Daniel J. Bernstein, Billy Bob Brumley, Ming-Shing Chen, Nicola Tuveri
2022OpenVPN is Open to VPN Fingerprinting.
Diwen Xue, Reethika Ramesh, Arham Jain, Michalis Kallitsis, J. Alex Halderman, Jedidiah R. Crandall, Roya Ensafi
2022Orca: Blocklisting in Sender-Anonymous Messaging.
Nirvan Tyagi, Julia Len, Ian Miers, Thomas Ristenpart
2022PISTIS: Trusted Computing Architecture for Low-end Embedded Systems.
Michele Grisafi, Mahmoud Ammar, Marco Roveri, Bruno Crispo
2022Pacer: Comprehensive Network Side-Channel Mitigation in the Cloud.
Aastha Mehta, Mohamed Alzayat, Roberta De Viti, Björn B. Brandenburg, Peter Druschel, Deepak Garg
2022PatchCleanser: Certifiably Robust Defense against Adversarial Patches for Any Image Classifier.
Chong Xiang, Saeed Mahloujifar, Prateek Mittal
2022Phish in Sheep's Clothing: Exploring the Authentication Pitfalls of Browser Fingerprinting.
Xu Lin, Panagiotis Ilia, Saumya Solanki, Jason Polakis
2022Physical-Layer Attacks Against Pulse Width Modulation-Controlled Actuators.
Gökçen Yilmaz Dayanikli, Sourav Sinha, Devaprakash Muniraj, Ryan M. Gerdes, Mazen Farhood, Mani Mina
2022Piranha: A GPU Platform for Secure Computation.
Jean-Luc Watson, Sameer Wagh, Raluca Ada Popa
2022Playing Without Paying: Detecting Vulnerable Payment Verification in Native Binaries of Unity Mobile Games.
Chaoshun Zuo, Zhiqiang Lin
2022Playing for K(H)eaps: Understanding and Improving Linux Kernel Exploit Reliability.
Kyle Zeng, Yueqi Chen, Haehyun Cho, Xinyu Xing, Adam Doupé, Yan Shoshitaishvili, Tiffany Bao
2022Poison Forensics: Traceback of Data Poisoning Attacks in Neural Networks.
Shawn Shan, Arjun Nitin Bhagoji, Haitao Zheng, Ben Y. Zhao
2022PoisonedEncoder: Poisoning the Unlabeled Pre-training Data in Contrastive Learning.
Hongbin Liu, Jinyuan Jia, Neil Zhenqiang Gong
2022Poisoning Attacks to Local Differential Privacy Protocols for Key-Value Data.
Yongji Wu, Xiaoyu Cao, Jinyuan Jia, Neil Zhenqiang Gong
2022PolyCruise: A Cross-Language Dynamic Information Flow Analysis.
Wen Li, Jiang Ming, Xiapu Luo, Haipeng Cai
2022Polynomial Commitment with a One-to-Many Prover and Applications.
Jiaheng Zhang, Tiancheng Xie, Thang Hoang, Elaine Shi, Yupeng Zhang
2022Pool Inference Attacks on Local Differential Privacy: Quantifying the Privacy Guarantees of Apple's Count Mean Sketch in Practice.
Andrea Gadotti, Florimond Houssiau, Meenatchi Sundaram Muthu Selva Annamalai, Yves-Alexandre de Montjoye
2022Post-Quantum Cryptography with Contemporary Co-Processors: Beyond Kronecker, Schönhage-Strassen & Nussbaumer.
Joppe W. Bos, Joost Renes, Christine van Vredendaal
2022Practical Data Access Minimization in Trigger-Action Platforms.
Yunang Chen, Mohannad Alhanahnah, Andrei Sabelfeld, Rahul Chatterjee, Earlence Fernandes
2022Practical Privacy-Preserving Authentication for SSH.
Lawrence Roy, Stanislav Lyakhov, Yeongjin Jang, Mike Rosulek
2022Pre-hijacked accounts: An Empirical Study of Security Failures in User Account Creation on the Web.
Avinash Sudhodanan, Andrew Paverd
2022PrivGuard: Privacy Regulation Compliance Made Easier.
Lun Wang, Usmann Khan, Joseph P. Near, Qi Pang, Jithendaraa Subramanian, Neel Somani, Peng Gao, Andrew Low, Dawn Song
2022Private Signaling.
Varun Madathil, Alessandra Scafuro, István András Seres, Omer Shlomovits, Denis Varlakov
2022ProFactory: Improving IoT Security via Formalized Protocol Customization.
Fei Wang, Jianliang Wu, Yuhong Nan, Yousra Aafer, Xiangyu Zhang, Dongyan Xu, Mathias Payer
2022Provably-Safe Multilingual Software Sandboxing using WebAssembly.
Jay Bosamiya, Wen Shih Lim, Bryan Parno
2022QCSD: A QUIC Client-Side Website-Fingerprinting Defence Framework.
Jean-Pierre Smith, Luca Dolfi, Prateek Mittal, Adrian Perrig
2022QuORAM: A Quorum-Replicated Fault Tolerant ORAM Datastore.
Sujaya Maiyya, Seif Ibrahim, Caitlin Scarberry, Divyakant Agrawal, Amr El Abbadi, Huijia Lin, Stefano Tessaro, Victor Zakhary
2022RE-Mind: a First Look Inside the Mind of a Reverse Engineer.
Alessandro Mantovani, Simone Aonzo, Yanick Fratantonio, Davide Balzarotti
2022RETBLEED: Arbitrary Speculative Code Execution with Return Instructions.
Johannes Wikner, Kaveh Razavi
2022Rapid Prototyping for Microarchitectural Attacks.
Catherine Easdon, Michael Schwarz, Martin Schwarzl, Daniel Gruss
2022RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices.
Yi He, Zhenhua Zou, Kun Sun, Zhuotao Liu, Ke Xu, Qian Wang, Chao Shen, Zhi Wang, Qi Li
2022ReZone: Disarming TrustZone with TEE Privilege Reduction.
David Cerdeira, José Martins, Nuno Santos, Sandro Pinto
2022RegexScalpel: Regular Expression Denial of Service (ReDoS) Defense by Localize-and-Fix.
Yeting Li, Yecheng Sun, Zhiwu Xu, Jialun Cao, Yuekang Li, Rongchen Li, Haiming Chen, Shing-Chi Cheung, Yang Liu, Yang Xiao
2022Regulator: Dynamic Analysis to Detect ReDoS.
Robert McLaughlin, Fabio Pagani, Noah Spahn, Christopher Kruegel, Giovanni Vigna
2022Rendering Contention Channel Made Practical in Web Browsers.
Shujiang Wu, Jianjia Yu, Min Yang, Yinzhi Cao
2022Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX.
Lukas Giner, Andreas Kogler, Claudio Canella, Michael Schwarz, Daniel Gruss
2022Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition.
Chen Yan, Zhijian Xu, Zhanyuan Yin, Xiaoyu Ji, Wenyuan Xu
2022SAID: State-aware Defense Against Injection Attacks on In-vehicle Network.
Lei Xue, Yangyang Liu, Tianqi Li, Kaifa Zhao, Jianfeng Li, Le Yu, Xiapu Luo, Yajin Zhou, Guofei Gu
2022SAPIC+: protocol verifiers of the world, unite!
Vincent Cheval, Charlie Jacomme, Steve Kremer, Robert Künnemann
2022SARA: Secure Android Remote Authorization.
Abdullah Imran, Habiba Farrukh, Muhammad Ibrahim, Z. Berkay Celik, Antonio Bianchi
2022SCRAPS: Scalable Collective Remote Attestation for Pub-Sub IoT Networks with Untrusted Proxy Verifier.
Lukas Petzi, Ala Eddine Ben Yahya, Alexandra Dmitrienko, Gene Tsudik, Thomas Prantl, Samuel Kounev
2022SGXFuzz: Efficiently Synthesizing Nested Structures for SGX Enclave Fuzzing.
Tobias Cloosters, Johannes Willbold, Thorsten Holz, Lucas Davi
2022SGXLock: Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX.
Yuan Chen, Jiaqi Li, Guorui Xu, Yajin Zhou, Zhi Wang, Cong Wang, Kui Ren
2022SIMC: ML Inference Secure Against Malicious Clients at Semi-Honest Cost.
Nishanth Chandran, Divya Gupta, Sai Lakshmi Bhavana Obbattu, Akash Shah
2022SWAPP: A New Programmable Playground for Web Application Security.
Phakpoom Chinprutthiwong, Jianwei Huang, Guofei Gu
2022SYMSAN: Time and Space Efficient Concolic Execution via Dynamic Data-flow Analysis.
Ju Chen, Wookhyun Han, Mingjun Yin, Haochen Zeng, Chengyu Song, Byoungyoung Lee, Heng Yin, Insik Shin
2022SecSMT: Securing SMT Processors against Contention-Based Covert Channels.
Mohammadkazem Taram, Xida Ren, Ashish Venkat, Dean M. Tullsen
2022Secure Poisson Regression.
Mahimna Kelkar, Phi Hung Le, Mariana Raykova, Karn Seth
2022Security Analysis of Camera-LiDAR Fusion Against Black-Box Attacks on Autonomous Vehicles.
R. Spencer Hallyburton, Yupei Liu, Yulong Cao, Z. Morley Mao, Miroslav Pajic
2022Security and Privacy Perceptions of Third-Party Application Access for Google Accounts.
David G. Balash, Xiaoyuan Wu, Miles Grant, Irwin Reyes, Adam J. Aviv
2022Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among Experts and Non-Experts in a Corporate Context.
Veroniek Binkhorst, Tobias Fiebig, Katharina Krombholz, Wolter Pieters, Katsiaryna Labunets
2022Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era.
Changjiang Li, Li Wang, Shouling Ji, Xuhong Zhang, Zhaohan Xi, Shanqing Guo, Ting Wang
2022Seeing the Forest for the Trees: Understanding Security Hazards in the 3GPP Ecosystem through Intelligent Analysis on Change Requests.
Yi Chen, Di Tang, Yepeng Yao, Mingming Zha, Xiaofeng Wang, Xiaozhong Liu, Haixu Tang, Dongfang Zhao
2022Shuffle-based Private Set Union: Faster and More Secure.
Yanxue Jia, Shifeng Sun, Hong-Sheng Zhou, Jiajun Du, Dawu Gu
2022SkillDetective: Automated Policy-Violation Detection of Voice Assistant Applications in the Wild.
Jeffrey Young, Song Liao, Long Cheng, Hongxin Hu, Huixing Deng
2022Smart Home Privacy Policies Demystified: A Study of Availability, Content, and Coverage.
Sunil Manandhar, Kaushal Kafle, Benjamin Andow, Kapil Singh, Adwait Nadkarni
2022Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope.
Raphael Hiesgen, Marcin Nawrocki, Alistair King, Alberto Dainotti, Thomas C. Schmidt, Matthias Wählisch
2022Stalloris: RPKI Downgrade Attack.
Tomas Hlavacek, Philipp Jeitner, Donika Mirdita, Haya Schulmann, Michael Waidner
2022StateFuzz: System Call-Based State-Aware Linux Driver Fuzzing.
Bodong Zhao, Zheming Li, Shisong Qin, Zheyu Ma, Ming Yuan, Wenyu Zhu, Zhihong Tian, Chao Zhang
2022Stateful Greybox Fuzzing.
Jinsheng Ba, Marcel Böhme, Zahra Mirzamomen, Abhik Roychoudhury
2022Stick It to The Man: Correcting for Non-Cooperative Behavior of Subjects in Experiments on Social Networks.
Kaleigh Clary, Emma Tosch, Jeremiah Onaolapo, David D. Jensen
2022Synthetic Data - Anonymisation Groundhog Day.
Theresa Stadler, Bristena Oprisanu, Carmela Troncoso
2022SyzScope: Revealing High-Risk Security Impacts of Fuzzer-Exposed Bugs in Linux kernel.
Xiaochen Zou, Guoren Li, Weiteng Chen, Hang Zhang, Zhiyun Qian
2022TLB;DR: Enhancing TLB-based Attacks with TLB Desynchronized Reverse Engineering.
Andrei Tatar, Daniël Trujillo, Cristiano Giuffrida, Herbert Bos
2022TLS-Anvil: Adapting Combinatorial Testing for TLS Libraries.
Marcel Maehren, Philipp Nieting, Sven Hebrok, Robert Merget, Juraj Somorovsky, Jörg Schwenk
2022Targeted Deanonymization via the Cache Side Channel: Attacks and Defenses.
Mojtaba Zaheri, Yossi Oren, Reza Curtmola
2022Teacher Model Fingerprinting Attacks Against Transfer Learning.
Yufei Chen, Chao Shen, Cong Wang, Yang Zhang
2022The Antrim County 2020 Election Incident: An Independent Forensic Investigation.
J. Alex Halderman
2022The Dangers of Human Touch: Fingerprinting Browser Extensions through User Actions.
Konstantinos Solomos, Panagiotis Ilia, Soroush Karami, Nick Nikiforakis, Jason Polakis
2022The Security Lottery: Measuring Client-Side Web Security Inconsistencies.
Sebastian Roth, Stefano Calzavara, Moritz Wilhelm, Alvise Rabitti, Ben Stock
2022TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable Vulnerabilities.
Rahul Kande, Addison Crump, Garrett Persyn, Patrick Jauernig, Ahmad-Reza Sadeghi, Aakash Tyagi, Jeyavijayan Rajendran
2022Themis: Accelerating the Detection of Route Origin Hijacking by Distinguishing Legitimate and Illegitimate MOAS.
Lancheng Qin, Dan Li, Ruifeng Li, Kang Wang
2022Tightly Seal Your Sensitive Pointers with PACTight.
Mohannad Ismail, Andrew Quach, Christopher Jelesnianski, Yeongjin Jang, Changwoo Min
2022Total Eclipse of the Heart - Disrupting the InterPlanetary File System.
Bernd Prünster, Alexander Marsalek, Thomas Zefferer
2022Towards Automatically Reverse Engineering Vehicle Diagnostic Protocols.
Le Yu, Yangyang Liu, Pengfei Jing, Xiapu Luo, Lei Xue, Kaifa Zhao, Yajin Zhou, Ting Wang, Guofei Gu, Sen Nie, Shi Wu
2022Towards More Robust Keyword Spotting for Voice Assistants.
Shimaa Ahmed, Ilia Shumailov, Nicolas Papernot, Kassem Fawaz
2022Transferring Adversarial Robustness Through Robust Representation Matching.
Pratik Vaishnavi, Kevin Eykholt, Amir Rahmati
2022Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster Design.
Alon Shakevsky, Eyal Ronen, Avishai Wool
2022Twilight: A Differentially Private Payment Channel Network.
Maya Dotan, Saar Tochner, Aviv Zohar, Yossi Gilad
2022Under the Hood of DANE Mismanagement in SMTP.
Hyeonmin Lee, Md. Ishtiaq Ashiq, Moritz Müller, Roland van Rijswijk-Deij, Ted Taekyoung Kwon, Taejoong Chung
2022Understanding and Improving Usability of Data Dashboards for Simplified Privacy Control of Voice Assistant Data.
Vandit Sharma, Mainack Mondal
2022Uninvited Guests: Analyzing the Identity and Behavior of Certificate Transparency Bots.
Brian Kondracki, Johnny So, Nick Nikiforakis
2022Unleash the Simulacrum: Shifting Browser Realities for Robust Extension-Fingerprinting Prevention.
Soroush Karami, Faezeh Kalantari, Mehrnoosh Zaeifi, Xavier J. Maso, Erik Trickel, Panagiotis Ilia, Yan Shoshitaishvili, Adam Doupé, Jason Polakis
2022Using Trātṛ to tame Adversarial Synchronization.
Yuvraj Patel, Chenhao Ye, Akshat Sinha, Abigail Matthews, Andrea C. Arpaci-Dusseau, Michael M. Swift
2022V'CER: Efficient Certificate Validation in Constrained Networks.
David Koisser, Patrick Jauernig, Gene Tsudik, Ahmad-Reza Sadeghi
2022VerLoc: Verifiable Localization in Decentralized Systems.
Katharina Kohls, Claudia Díaz
2022Watching the Watchers: Practical Video Identification Attack in LTE Networks.
Sangwook Bae, Mincheol Son, Dongkwan Kim, CheolJun Park, Jiho Lee, Sooel Son, Yongdae Kim
2022Watching the watchers: bias and vulnerability in remote proctoring software.
Ben Burgess, Avi Ginsberg, Edward W. Felten, Shaanan Cohney
2022Web Cache Deception Escalates!
Seyed Ali Mirheidari, Matteo Golinelli, Kaan Onarlioglu, Engin Kirda, Bruno Crispo
2022WebGraph: Capturing Advertising and Tracking Information Flows for Robust Blocking.
Sandra Deepthy Siby, Umar Iqbal, Steven Englehardt, Zubair Shafiq, Carmela Troncoso
2022When Sally Met Trackers: Web Tracking From the Users' Perspective.
Savino Dambra, Iskander Sánchez-Rola, Leyla Bilge, Davide Balzarotti
2022Where to Recruit for Security Development Studies: Comparing Six Software Developer Samples.
Harjot Kaur, Sabrina Amft, Daniel Votipka, Yasemin Acar, Sascha Fahl
2022Who Are You (I Really Wanna Know)? Detecting Audio DeepFakes Through Vocal Tract Reconstruction.
Logan Blue, Kevin Warren, Hadi Abdullah, Cassidy Gibson, Luis Vargas, Jessica O'Dell, Kevin R. B. Butler, Patrick Traynor
2022Why Users (Don't) Use Password Managers at a Large Educational Institution.
Peter Mayer, Collins W. Munyendo, Michelle L. Mazurek, Adam J. Aviv
2022XDRI Attacks - and - How to Enhance Resilience of Residential Routers.
Philipp Jeitner, Haya Schulmann, Lucas Teichmann, Michael Waidner
2022Your Microphone Array Retains Your Identity: A Robust Voice Liveness Detection System for Smart Speakers.
Yan Meng, Jiachun Li, Matthew Pillari, Arjun Deopujari, Liam Brennan, Hafsah Shamsie, Haojin Zhu, Yuan Tian
2022Zero-Knowledge Middleboxes.
Paul Grubbs, Arasu Arun, Ye Zhang, Joseph Bonneau, Michael Walfish
2022ppSAT: Towards Two-Party Private SAT Solving.
Ning Luo, Samuel Judson, Timos Antonopoulos, Ruzica Piskac, Xiao Wang
2022ÆPIC Leak: Architecturally Leaking Uninitialized Data from the Microarchitecture.
Pietro Borrello, Andreas Kogler, Martin Schwarzl, Moritz Lipp, Daniel Gruss, Michael Schwarz