Conferences

Search results

    TitleConferenceSpeaker(s)
    Helping hands: Measuring the impact of a large threat intelligence sharing communityUSENIX Security '22Xander Bouwman, Victor Le Pochat, Pawel Foremski, Tom Van Goethem, Carlos H. Gañán, Giovane C. M. Moura, Samaneh Tajalizadehkhoob, Wouter Joosen, Michel van Eeten
    Your Microphone Array Retains Your Identity: A Robust Voice Liveness Detection System for Smart SpeakersUSENIX Security '22Yan Meng, Jiachun Li, Matthew Pillari, Arjun Deopujari, Liam Brennan, Hafsah Shamsie, Haojin Zhu, Yuan Tian
    Lumos: Identifying and Localizing Diverse Hidden IoT Devices in an Unfamiliar EnvironmentUSENIX Security '22Rahul Anand Sharma, Elahe Soltanaghaei, Anthony Rowe, Vyas Sekar
    A Large-scale Temporal Measurement of Android Malicious Apps: Persistence, Migration, and Lessons LearnedUSENIX Security '22Yun Shen, Pierre-Antoine Vervier, Gianluca Stringhini
    "OK, Siri" or "Hey, Google": Evaluating Voiceprint Distinctiveness via Content-based PROLE ScoreUSENIX Security '22Ruiwen He, Xiaoyu Ji, Xinfeng Li, Yushi Cheng, Wenyuan Xu
    LTrack: Stealthy Tracking of Mobile Phones in LTEUSENIX Security '22Martin Kotuliak, Simon Erni, Patrick Leu, Marc Röschlin, Srdjan Čapkun
    Watching the Watchers: Practical Video Identification Attack in LTE NetworksUSENIX Security '22Sangwook Bae, Mincheol Son, Dongkwan Kim, CheolJun Park, Jiho Lee, Sooel Son, Yongdae Kim
    Label Inference Attacks Against Vertical Federated LearningUSENIX Security '22Chong Fu, Xuhong Zhang, Shouling Ji, Jinyin Chen, Jingzheng Wu, Shanqing Guo, Jun Zhou, Alex X. Liu, Ting Wang
    DoLTEst: In-depth Downlink Negative Testing Framework for LTE DevicesUSENIX Security '22CheolJun Park, Sangwook Bae, BeomSeok Oh, Jiho Lee, Eunkyu Lee, Insu Yun, Yongdae Kim
    A Large-scale and Longitudinal Measurement Study of DKIM DeploymentUSENIX Security '22Chuhan Wang, Kaiwen Shen, Minglei Guo, Yuxuan Zhao, Mingming Zhang, Jianjun Chen, Baojun Liu, Xiaofeng Zheng, Haixin Duan, Yanzhong Lin, Qingfeng Pan
    Neither Access nor Control: A Longitudinal Investigation of the Efficacy of User Access-Control Solutions on SmartphonesUSENIX Security '22Masoud Mehrabi Koushki, Yue Huang, Julia Rubin, Konstantin Beznosov
    MundoFuzz: Hypervisor Fuzzing with Statistical Coverage Testing and Grammar InferenceUSENIX Security '22Cheolwoo Myung, Gwangmu Lee, Byoungyoung Lee
    Efficient Differentially Private Secure Aggregation for Federated Learning via Hardness of Learning with ErrorsUSENIX Security '22Timothy Stevens, Christian Skalka, Christelle Vincent, John Ring, Samuel Clark, Joseph Near
    Physical-Layer Attacks Against Pulse Width Modulation-Controlled ActuatorsUSENIX Security '22Gökçen Yılmaz Dayanıklı, Sourav Sinha, Devaprakash Muniraj, Ryan M. Gerdes, Mazen Farhood, Mani Mina
    FLAME: Taming Backdoors in Federated LearningUSENIX Security '22Thien Duc Nguyen, Phillip Rieger, Huili Chen, Hossein Yalame, Helen Möllering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Shaza Zeitouni, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider
    FuzzOrigin: Detecting UXSS vulnerabilities in Browsers through Origin FuzzingUSENIX Security '22Sunwoo Kim, Young Min Kim, Jaewon Hur, Suhwan Song, Gwangmu Lee, Byoungyoung Lee
    FRAMESHIFTER: Security Implications of HTTP/2-to-HTTP/1 Conversion AnomaliesUSENIX Security '22Bahruz Jabiyev, Steven Sprecher, Anthony Gavazzi, Tommaso Innocenti, Kaan Onarlioglu, Engin Kirda
    Increasing Adversarial Uncertainty to Scale Private Similarity TestingUSENIX Security '22Yiqing Hua, Armin Namavari, Kaishuo Cheng, Mor Naaman, Thomas Ristenpart
    DoubleStar: Long-Range Attack Towards Depth Estimation based Obstacle Avoidance in Autonomous SystemsUSENIX Security '22Ce Zhou, Qiben Yan, Yan Shi, Lichao Sun
    FReD: Identifying File Re-Delegation in Android System ServicesUSENIX Security '22Sigmund Albert Gorski III, Seaver Thorn, William Enck, Haining Chen
    When Sally Met Trackers: Web Tracking From the Users' PerspectiveUSENIX Security '22Savino Dambra, Iskander Sanchez-Rola, Leyla Bilge, Davide Balzarotti
    FOAP: Fine-Grained Open-World Android App FingerprintingUSENIX Security '22Jianfeng Li, Hao Zhou, Shuohan Wu, Xiapu Luo, Ting Wang, Xian Zhan, Xiaobo Ma
    Behind the Tube: Exploitative Monetization of Content on YouTubeUSENIX Security '22Andrew Chu, Arjun Arunasalam, Muslum Ozgur Ozmen, Z. Berkay Celik
    Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered HandUSENIX Security '22Matteo Cardaioli, Stefano Cecconello, Mauro Conti, Simone Milani, Stjepan Picek, Eugen Saraci
    GhostTouch: Targeted Attacks on Touchscreens without Physical TouchUSENIX Security '22Kai Wang, Richard Mitev, Chen Yan, Xiaoyu Ji, Ahmad-Reza Sadeghi, Wenyuan Xu

Pages