| Helping hands: Measuring the impact of a large threat intelligence sharing community | USENIX Security '22 | Xander Bouwman, Victor Le Pochat, Pawel Foremski, Tom Van Goethem, Carlos H. Gañán, Giovane C. M. Moura, Samaneh Tajalizadehkhoob, Wouter Joosen, Michel van Eeten |
| Your Microphone Array Retains Your Identity: A Robust Voice Liveness Detection System for Smart Speakers | USENIX Security '22 | Yan Meng, Jiachun Li, Matthew Pillari, Arjun Deopujari, Liam Brennan, Hafsah Shamsie, Haojin Zhu, Yuan Tian |
| Lumos: Identifying and Localizing Diverse Hidden IoT Devices in an Unfamiliar Environment | USENIX Security '22 | Rahul Anand Sharma, Elahe Soltanaghaei, Anthony Rowe, Vyas Sekar |
| A Large-scale Temporal Measurement of Android Malicious Apps: Persistence, Migration, and Lessons Learned | USENIX Security '22 | Yun Shen, Pierre-Antoine Vervier, Gianluca Stringhini |
| "OK, Siri" or "Hey, Google": Evaluating Voiceprint Distinctiveness via Content-based PROLE Score | USENIX Security '22 | Ruiwen He, Xiaoyu Ji, Xinfeng Li, Yushi Cheng, Wenyuan Xu |
| LTrack: Stealthy Tracking of Mobile Phones in LTE | USENIX Security '22 | Martin Kotuliak, Simon Erni, Patrick Leu, Marc Röschlin, Srdjan Čapkun |
| Watching the Watchers: Practical Video Identification Attack in LTE Networks | USENIX Security '22 | Sangwook Bae, Mincheol Son, Dongkwan Kim, CheolJun Park, Jiho Lee, Sooel Son, Yongdae Kim |
| Label Inference Attacks Against Vertical Federated Learning | USENIX Security '22 | Chong Fu, Xuhong Zhang, Shouling Ji, Jinyin Chen, Jingzheng Wu, Shanqing Guo, Jun Zhou, Alex X. Liu, Ting Wang |
| DoLTEst: In-depth Downlink Negative Testing Framework for LTE Devices | USENIX Security '22 | CheolJun Park, Sangwook Bae, BeomSeok Oh, Jiho Lee, Eunkyu Lee, Insu Yun, Yongdae Kim |
| A Large-scale and Longitudinal Measurement Study of DKIM Deployment | USENIX Security '22 | Chuhan Wang, Kaiwen Shen, Minglei Guo, Yuxuan Zhao, Mingming Zhang, Jianjun Chen, Baojun Liu, Xiaofeng Zheng, Haixin Duan, Yanzhong Lin, Qingfeng Pan |
| Neither Access nor Control: A Longitudinal Investigation of the Efficacy of User Access-Control Solutions on Smartphones | USENIX Security '22 | Masoud Mehrabi Koushki, Yue Huang, Julia Rubin, Konstantin Beznosov |
| MundoFuzz: Hypervisor Fuzzing with Statistical Coverage Testing and Grammar Inference | USENIX Security '22 | Cheolwoo Myung, Gwangmu Lee, Byoungyoung Lee |
| Efficient Differentially Private Secure Aggregation for Federated Learning via Hardness of Learning with Errors | USENIX Security '22 | Timothy Stevens, Christian Skalka, Christelle Vincent, John Ring, Samuel Clark, Joseph Near |
| Physical-Layer Attacks Against Pulse Width Modulation-Controlled Actuators | USENIX Security '22 | Gökçen Yılmaz Dayanıklı, Sourav Sinha, Devaprakash Muniraj, Ryan M. Gerdes, Mazen Farhood, Mani Mina |
| FLAME: Taming Backdoors in Federated Learning | USENIX Security '22 | Thien Duc Nguyen, Phillip Rieger, Huili Chen, Hossein Yalame, Helen Möllering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Shaza Zeitouni, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider |
| FuzzOrigin: Detecting UXSS vulnerabilities in Browsers through Origin Fuzzing | USENIX Security '22 | Sunwoo Kim, Young Min Kim, Jaewon Hur, Suhwan Song, Gwangmu Lee, Byoungyoung Lee |
| FRAMESHIFTER: Security Implications of HTTP/2-to-HTTP/1 Conversion Anomalies | USENIX Security '22 | Bahruz Jabiyev, Steven Sprecher, Anthony Gavazzi, Tommaso Innocenti, Kaan Onarlioglu, Engin Kirda |
| Increasing Adversarial Uncertainty to Scale Private Similarity Testing | USENIX Security '22 | Yiqing Hua, Armin Namavari, Kaishuo Cheng, Mor Naaman, Thomas Ristenpart |
| DoubleStar: Long-Range Attack Towards Depth Estimation based Obstacle Avoidance in Autonomous Systems | USENIX Security '22 | Ce Zhou, Qiben Yan, Yan Shi, Lichao Sun |
| FReD: Identifying File Re-Delegation in Android System Services | USENIX Security '22 | Sigmund Albert Gorski III, Seaver Thorn, William Enck, Haining Chen |
| When Sally Met Trackers: Web Tracking From the Users' Perspective | USENIX Security '22 | Savino Dambra, Iskander Sanchez-Rola, Leyla Bilge, Davide Balzarotti |
| FOAP: Fine-Grained Open-World Android App Fingerprinting | USENIX Security '22 | Jianfeng Li, Hao Zhou, Shuohan Wu, Xiapu Luo, Ting Wang, Xian Zhan, Xiaobo Ma |
| Behind the Tube: Exploitative Monetization of Content on YouTube | USENIX Security '22 | Andrew Chu, Arjun Arunasalam, Muslum Ozgur Ozmen, Z. Berkay Celik |
| Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand | USENIX Security '22 | Matteo Cardaioli, Stefano Cecconello, Mauro Conti, Simone Milani, Stjepan Picek, Eugen Saraci |
| GhostTouch: Targeted Attacks on Touchscreens without Physical Touch | USENIX Security '22 | Kai Wang, Richard Mitev, Chen Yan, Xiaoyu Ji, Ahmad-Reza Sadeghi, Wenyuan Xu |