Search results

    Towards Automatically Reverse Engineering Vehicle Diagnostic ProtocolsUSENIX Security '22Le Yu, Yangyang Liu, Pengfei Jing, Xiapu Luo, Lei Xue, Kaifa Zhao, Yajin Zhou, Ting Wang, Guofei Gu, Sen Nie, Shi Wu
    Rolling Colors: Adversarial Laser Exploits against Traffic Light RecognitionUSENIX Security '22Chen Yan, Zhijian Xu, Zhanyuan Yin, Xiaoyu Ji, Wenyuan Xu
    GAROTA: Generalized Active Root-Of-Trust Architecture (for Tiny Embedded Devices)USENIX Security '22Esmerald Aliaj, Ivan De Oliveira Nunes, Gene Tsudik
    Inferring Phishing Intention via Webpage Appearance and Dynamics: A Deep Vision Based ApproachUSENIX Security '22Ruofan Liu, Yun Lin, Xianglin Yang, Siang Hwee Ng, Dinil Mon Divakaran, Jin Song Dong
    Phish in Sheep's Clothing: Exploring the Authentication Pitfalls of Browser FingerprintingUSENIX Security '22Xu Lin, Panagiotis Ilia, Saumya Solanki, Jason Polakis
    ReZone: Disarming TrustZone with TEE Privilege ReductionUSENIX Security '22David Cerdeira, José Martins, Nuno Santos, Sandro Pinto
    SARA: Secure Android Remote AuthorizationUSENIX Security '22Abdullah Imran, Habiba Farrukh, Muhammad Ibrahim, Z. Berkay Celik, Antonio Bianchi
    Attacks on Deidentification's DefensesUSENIX Security '22Aloni Cohen
    Leaky Forms: A Study of Email and Password Exfiltration Before Form SubmissionUSENIX Security '22Asuman Senol, Gunes Acar, Mathias Humbert, Frederik Zuiderveen Borgesius
    Security Analysis of Camera-LiDAR Fusion Against Black-Box Attacks on Autonomous VehiclesUSENIX Security '22R. Spencer Hallyburton, Yupei Liu, Yulong Cao, Z. Morley Mao, Miroslav Pajic
    Automated Detection of Automated TrafficUSENIX Security '22Cormac Herley
    Backporting Security Patches of Web Applications: A Prototype Design and Implementation on Injection Vulnerability PatchesUSENIX Security '22Youkun Shi, Yuan Zhang, Tianhan Luo, Xiangyu Mao, Yinzhi Cao, Ziwen Wang, Yudi Zhao, Zongan Huang, Min Yang
    Identity Confusion in WebView-based Mobile App-in-app EcosystemsUSENIX Security '22Lei Zhang, Zhibo Zhang, Ancong Liu, Yinzhi Cao, Xiaohan Zhang, Yanjun Chen, Yuan Zhang, Guangliang Yang, Min Yang
    How Machine Learning Is Solving the Binary Function Similarity ProblemUSENIX Security '22Andrea Marcelli, Mariano Graziano, Xabier Ugarte-Pedrero, Yanick Fratantonio, Mohamad Mansouri, Davide Balzarotti
    Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box AttacksUSENIX Security '22Huiying Li, Shawn Shan, Emily Wenger, Jiayun Zhang, Haitao Zheng, Ben Y. Zhao
    Birds of a Feather Flock Together: How Set Bias Helps to Deanonymize You via Revealed Intersection SizesUSENIX Security '22Xiaojie Guo, Ye Han, Zheli Liu, Ding Wang, Yan Jia, Jin Li
    Pre-hijacked accounts: An Empirical Study of Security Failures in User Account Creation on the WebUSENIX Security '22Avinash Sudhodanan, Andrew Paverd
    Gossamer: Securely Measuring Password-based LoginsUSENIX Security '22Marina Sanusi Bohuk, Mazharul Islam, Suleman Ahmad, Michael Swift, Thomas Ristenpart, Rahul Chatterjee
    DnD: A Cross-Architecture Deep Neural Network DecompilerUSENIX Security '22Ruoyu Wu, Taegyu Kim, Dave (Jing) Tian, Antonio Bianchi, Dongyan Xu
    How to Peel a Million: Validating and Expanding Bitcoin ClustersUSENIX Security '22George Kappos, Haaroon Yousaf, Rainer Stütz, Sofia Rollet, Bernhard Haslhofer, Sarah Meiklejohn
    GPU-accelerated PIR with Client-Independent Preprocessing for Large-Scale ApplicationsUSENIX Security '22Daniel Günther, Maurice Heymann, Benny Pinkas, Thomas Schneider
    Towards More Robust Keyword Spotting for Voice AssistantsUSENIX Security '22Shimaa Ahmed, Ilia Shumailov, Nicolas Papernot, Kassem Fawaz
    VerLoc: Verifiable Localization in Decentralized SystemsUSENIX Security '22Katharina Kohls, Claudia Diaz
    Omnes pro uno: Practical Multi-Writer Encrypted DatabaseUSENIX Security '22Jiafan Wang, Sherman S. M. Chow
    99% False Positives: A Qualitative Study of SOC Analysts' Perspectives on Security AlarmsUSENIX Security '22Bushra A. Alahmadi, Louise Axon, Ivan Martinovic