| Secure Poisson Regression | USENIX Security '22 | Mahimna Kelkar, Phi Hung Le, Mariana Raykova, Karn Seth |
| Under the Hood of DANE Mismanagement in SMTP | USENIX Security '22 | Hyeonmin Lee, Md. Ishtiaq Ashiq, Moritz Müller, Roland van Rijswijk-Deij, Taekyoung "Ted" Kwon, Taejoong Chung |
| The Dangers of Human Touch: Fingerprinting Browser Extensions through User Actions | USENIX Security '22 | Konstantinos Solomos, Panagiotis Ilia, Soroush Karami, Nick Nikiforakis, Jason Polakis |
| Poisoning Attacks to Local Differential Privacy Protocols for Key-Value Data | USENIX Security '22 | Yongji Wu, Xiaoyu Cao, Jinyuan Jia, Neil Zhenqiang Gong |
| Breaking Bridgefy, again: Adopting libsignal is not enough | USENIX Security '22 | Martin R. Albrecht, Raphael Eikenberg, Kenneth G. Paterson |
| Many Roads Lead To Rome: How Packet Headers Influence DNS Censorship Measurement | USENIX Security '22 | Abhishek Bhaskar, Paul Pearce |
| Communication-Efficient Triangle Counting under Local Differential Privacy | USENIX Security '22 | Jacob Imola, Takao Murakami, Kamalika Chaudhuri |
| Seeing the Forest for the Trees: Understanding Security Hazards in the 3GPP Ecosystem through Intelligent Analysis on Change Requests | USENIX Security '22 | Yi Chen, Di Tang, Yepeng Yao, Mingming Zha, XiaoFeng Wang, Xiaozhong Liu, Haixu Tang, Dongfang Zhao |
| OS-Aware Vulnerability Prioritization via Differential Severity Analysis | USENIX Security '22 | Qiushi Wu, Yue Xiao, Xiaojing Liao, Kangjie Lu |
| OpenVPN is Open to VPN Fingerprinting | USENIX Security '22 | Diwen Xue, Reethika Ramesh, Arham Jain, Michalis Kallitsis, J. Alex Halderman, Jedidiah R. Crandall, Roya Ensafi |
| Binoculars: Contention-Based Side-Channel Attacks Exploiting the Page Walker | USENIX Security '22 | Zirui Neil Zhao, Adam Morrison, Christopher W. Fletcher, Josep Torrellas |
| Watching the watchers: bias and vulnerability in remote proctoring software | USENIX Security '22 | Ben Burgess, Avi Ginsberg, Edward W. Felten, Shaanan Cohney |
| Pool Inference Attacks on Local Differential Privacy: Quantifying the Privacy Guarantees of Apple's Count Mean Sketch in Practice | USENIX Security '22 | Andrea Gadotti, Florimond Houssiau, Meenatchi Sundaram Muthu Selva Annamalai, Yves-Alexandre de Montjoye |
| The Antrim County 2020 Election Incident: An Independent Forensic Investigation | USENIX Security '22 | J. Alex Halderman |
| How Are Your Zombie Accounts? Understanding Users' Practices and Expectations on Mobile App Account Deletion | USENIX Security '22 | Yijing Liu, Yan Jia, Qingyin Tan, Zheli Liu, Luyi Xing |
| Open to a fault: On the passive compromise of TLS keys via transient errors | USENIX Security '22 | George Arnold Sullivan, Jackson Sippe, Nadia Heninger, Eric Wustrow |
| "Like Lesbians Walking the Perimeter": Experiences of U.S. LGBTQ+ Folks With Online Security, Safety, and Privacy Advice | USENIX Security '22 | Christine Geeng, Mike Harris, Elissa Redmiles, Franziska Roesner |
| Unleash the Simulacrum: Shifting Browser Realities for Robust Extension-Fingerprinting Prevention | USENIX Security '22 | Soroush Karami, Faezeh Kalantari, Mehrnoosh Zaeifi, Xavier J. Maso, Erik Trickel, Panagiotis Ilia, Yan Shoshitaishvili, Adam Doupé, Jason Polakis |
| Helping hands: Measuring the impact of a large threat intelligence sharing community | USENIX Security '22 | Xander Bouwman, Victor Le Pochat, Pawel Foremski, Tom Van Goethem, Carlos H. Gañán, Giovane C. M. Moura, Samaneh Tajalizadehkhoob, Wouter Joosen, Michel van Eeten |
| Your Microphone Array Retains Your Identity: A Robust Voice Liveness Detection System for Smart Speakers | USENIX Security '22 | Yan Meng, Jiachun Li, Matthew Pillari, Arjun Deopujari, Liam Brennan, Hafsah Shamsie, Haojin Zhu, Yuan Tian |
| Lumos: Identifying and Localizing Diverse Hidden IoT Devices in an Unfamiliar Environment | USENIX Security '22 | Rahul Anand Sharma, Elahe Soltanaghaei, Anthony Rowe, Vyas Sekar |
| A Large-scale Temporal Measurement of Android Malicious Apps: Persistence, Migration, and Lessons Learned | USENIX Security '22 | Yun Shen, Pierre-Antoine Vervier, Gianluca Stringhini |
| "OK, Siri" or "Hey, Google": Evaluating Voiceprint Distinctiveness via Content-based PROLE Score | USENIX Security '22 | Ruiwen He, Xiaoyu Ji, Xinfeng Li, Yushi Cheng, Wenyuan Xu |
| LTrack: Stealthy Tracking of Mobile Phones in LTE | USENIX Security '22 | Martin Kotuliak, Simon Erni, Patrick Leu, Marc Röschlin, Srdjan Čapkun |
| Watching the Watchers: Practical Video Identification Attack in LTE Networks | USENIX Security '22 | Sangwook Bae, Mincheol Son, Dongkwan Kim, CheolJun Park, Jiho Lee, Sooel Son, Yongdae Kim |