Conferences

Search results

    TitleConferenceSpeaker(s)
    Secure Poisson RegressionUSENIX Security '22Mahimna Kelkar, Phi Hung Le, Mariana Raykova, Karn Seth
    Under the Hood of DANE Mismanagement in SMTPUSENIX Security '22Hyeonmin Lee, Md. Ishtiaq Ashiq, Moritz Müller, Roland van Rijswijk-Deij, Taekyoung "Ted" Kwon, Taejoong Chung
    The Dangers of Human Touch: Fingerprinting Browser Extensions through User ActionsUSENIX Security '22Konstantinos Solomos, Panagiotis Ilia, Soroush Karami, Nick Nikiforakis, Jason Polakis
    Poisoning Attacks to Local Differential Privacy Protocols for Key-Value DataUSENIX Security '22Yongji Wu, Xiaoyu Cao, Jinyuan Jia, Neil Zhenqiang Gong
    Breaking Bridgefy, again: Adopting libsignal is not enoughUSENIX Security '22Martin R. Albrecht, Raphael Eikenberg, Kenneth G. Paterson
    Many Roads Lead To Rome: How Packet Headers Influence DNS Censorship MeasurementUSENIX Security '22Abhishek Bhaskar, Paul Pearce
    Communication-Efficient Triangle Counting under Local Differential PrivacyUSENIX Security '22Jacob Imola, Takao Murakami, Kamalika Chaudhuri
    Seeing the Forest for the Trees: Understanding Security Hazards in the 3GPP Ecosystem through Intelligent Analysis on Change RequestsUSENIX Security '22Yi Chen, Di Tang, Yepeng Yao, Mingming Zha, XiaoFeng Wang, Xiaozhong Liu, Haixu Tang, Dongfang Zhao
    OS-Aware Vulnerability Prioritization via Differential Severity AnalysisUSENIX Security '22Qiushi Wu, Yue Xiao, Xiaojing Liao, Kangjie Lu
    OpenVPN is Open to VPN FingerprintingUSENIX Security '22Diwen Xue, Reethika Ramesh, Arham Jain, Michalis Kallitsis, J. Alex Halderman, Jedidiah R. Crandall, Roya Ensafi
    Binoculars: Contention-Based Side-Channel Attacks Exploiting the Page WalkerUSENIX Security '22Zirui Neil Zhao, Adam Morrison, Christopher W. Fletcher, Josep Torrellas
    Watching the watchers: bias and vulnerability in remote proctoring softwareUSENIX Security '22Ben Burgess, Avi Ginsberg, Edward W. Felten, Shaanan Cohney
    Pool Inference Attacks on Local Differential Privacy: Quantifying the Privacy Guarantees of Apple's Count Mean Sketch in PracticeUSENIX Security '22Andrea Gadotti, Florimond Houssiau, Meenatchi Sundaram Muthu Selva Annamalai, Yves-Alexandre de Montjoye
    The Antrim County 2020 Election Incident: An Independent Forensic InvestigationUSENIX Security '22J. Alex Halderman
    How Are Your Zombie Accounts? Understanding Users' Practices and Expectations on Mobile App Account DeletionUSENIX Security '22Yijing Liu, Yan Jia, Qingyin Tan, Zheli Liu, Luyi Xing
    Open to a fault: On the passive compromise of TLS keys via transient errorsUSENIX Security '22George Arnold Sullivan, Jackson Sippe, Nadia Heninger, Eric Wustrow
    "Like Lesbians Walking the Perimeter": Experiences of U.S. LGBTQ+ Folks With Online Security, Safety, and Privacy AdviceUSENIX Security '22Christine Geeng, Mike Harris, Elissa Redmiles, Franziska Roesner
    Unleash the Simulacrum: Shifting Browser Realities for Robust Extension-Fingerprinting PreventionUSENIX Security '22Soroush Karami, Faezeh Kalantari, Mehrnoosh Zaeifi, Xavier J. Maso, Erik Trickel, Panagiotis Ilia, Yan Shoshitaishvili, Adam Doupé, Jason Polakis
    Helping hands: Measuring the impact of a large threat intelligence sharing communityUSENIX Security '22Xander Bouwman, Victor Le Pochat, Pawel Foremski, Tom Van Goethem, Carlos H. Gañán, Giovane C. M. Moura, Samaneh Tajalizadehkhoob, Wouter Joosen, Michel van Eeten
    Your Microphone Array Retains Your Identity: A Robust Voice Liveness Detection System for Smart SpeakersUSENIX Security '22Yan Meng, Jiachun Li, Matthew Pillari, Arjun Deopujari, Liam Brennan, Hafsah Shamsie, Haojin Zhu, Yuan Tian
    Lumos: Identifying and Localizing Diverse Hidden IoT Devices in an Unfamiliar EnvironmentUSENIX Security '22Rahul Anand Sharma, Elahe Soltanaghaei, Anthony Rowe, Vyas Sekar
    A Large-scale Temporal Measurement of Android Malicious Apps: Persistence, Migration, and Lessons LearnedUSENIX Security '22Yun Shen, Pierre-Antoine Vervier, Gianluca Stringhini
    "OK, Siri" or "Hey, Google": Evaluating Voiceprint Distinctiveness via Content-based PROLE ScoreUSENIX Security '22Ruiwen He, Xiaoyu Ji, Xinfeng Li, Yushi Cheng, Wenyuan Xu
    LTrack: Stealthy Tracking of Mobile Phones in LTEUSENIX Security '22Martin Kotuliak, Simon Erni, Patrick Leu, Marc Röschlin, Srdjan Čapkun
    Watching the Watchers: Practical Video Identification Attack in LTE NetworksUSENIX Security '22Sangwook Bae, Mincheol Son, Dongkwan Kim, CheolJun Park, Jiho Lee, Sooel Son, Yongdae Kim

Pages