USENIX Security '22
256 videos • 7,072 views • by USENIX
1
USENIX Security '22 - Under the Hood of DANE Mismanagement in SMTP
USENIX
Download
2
USENIX Security '22 - Seeing the Forest for the Trees: Understanding Security Hazards in the 3GPP...
USENIX
Download
3
USENIX Security '22 - Exploring the Unchartered Space of Container Registry Typosquatting
USENIX
Download
4
USENIX Security '22 - Uninvited Guests: Analyzing the Identity and Behavior of Certificate...
USENIX
Download
5
USENIX Security '22 - Playing for K(H)eaps: Understanding and Improving Linux Kernel Exploit...
USENIX
Download
6
USENIX Security '22 - In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer...
USENIX
Download
7
USENIX Security '22 - Midas: Systematic Kernel TOCTTOU Protection
USENIX
Download
8
USENIX Security '22 - LinKRID: Vetting Imbalance Reference Counting in Linux kernel with Symbolic...
USENIX
Download
9
USENIX Security '22 - Mining Node.js Vulnerabilities via Object Dependence Graph and Query
USENIX
Download
10
USENIX Security '22 - Mistrust Plugins You Must: A Large-Scale Study Of Malicious Plugins...
USENIX
Download
11
USENIX Security '22 - Web Cache Deception Escalates!
USENIX
Download
12
USENIX Security '22 - FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities
USENIX
Download
13
USENIX Security '22 - TLS-Anvil: Adapting Combinatorial Testing for TLS Libraries
USENIX
Download
14
USENIX Security '22 - Open to a fault: On the passive compromise of TLS keys via transient errors
USENIX
Download
15
USENIX Security '22 - Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster Design
USENIX
Download
16
USENIX Security '22 - Breaking Bridgefy, again: Adopting libsignal is not enough
USENIX
Download
17
USENIX Security '22 - "I feel invaded, annoyed, anxious and I may protect myself"...
USENIX
Download
18
USENIX Security '22 - ""Like Lesbians Walking the Perimeter"": Experiences of U.S. LGBTQ+ Folks...
USENIX
Download
19
USENIX Security '22 - Networks of Care: Tech Abuse Advocates' Digital Security Practices
USENIX
Download
20
USENIX Security '22 - "They Look at Vulnerability and Use That to Abuse You''
USENIX
Download
21
USENIX Security '22 - How Long Do Vulnerabilities Live in the Code? A Large-Scale Empirical...
USENIX
Download
22
USENIX Security '22 - Expected Exploitability: Predicting the Development of Functional...
USENIX
Download
23
USENIX Security '22 - OS-Aware Vulnerability Prioritization via Differential Severity Analysis
USENIX
Download
24
USENIX Security '22 - Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery...
USENIX
Download
25
USENIX Security '22 - Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope
USENIX
Download
26
USENIX Security '22 - Many Roads Lead To Rome: How Packet Headers Influence DNS Censorship...
USENIX
Download
27
USENIX Security '22 - GET /out: Automated Discovery of Application-Layer Censorship Evasion...
USENIX
Download
28
USENIX Security '22 - OpenVPN is Open to VPN Fingerprinting
USENIX
Download
29
USENIX Security '22 - Pool Inference Attacks on Local Differential Privacy...
USENIX
Download
30
USENIX Security '22 - Poisoning Attacks to Local Differential Privacy Protocols for Key-Value Data
USENIX
Download
31
USENIX Security '22 - Communication-Efficient Triangle Counting under Local Differential Privacy
USENIX
Download
32
USENIX Security '22 - Twilight: A Differentially Private Payment Channel Network
USENIX
Download
33
USENIX Security '22 - Watching the watchers: bias and vulnerability in remote proctoring software
USENIX
Download
34
USENIX Security '22- The Antrim County 2020 Election Incident: An Independent Forensic Investigation
USENIX
Download
35
USENIX Security '22 - An Audit of Facebook's Political Ad Policy Enforcement
USENIX
Download
36
USENIX Security '22 - Building an Open, Robust, and Stable Voting-Based Domain Top List
USENIX
Download
37
USENIX Security '22 - AMD Prefetch Attacks through Power and Time
USENIX
Download
38
USENIX Security '22 - Hiding in Plain Sight? On the Efficacy of Power Side Channel-Based Control...
USENIX
Download
39
USENIX Security '22-Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86
USENIX
Download
40
USENIX Security '22 - Binoculars: Contention-Based Side-Channel Attacks Exploiting the Page Walker
USENIX
Download
41
USENIX Security '22 - The Dangers of Human Touch: Fingerprinting Browser Extensions through...
USENIX
Download
42
USENIX Security '22 - Unleash the Simulacrum: Shifting Browser Realities for Robust...
USENIX
Download
43
USENIX Security '22 - Online Website Fingerprinting: Evaluating Website Fingerprinting Attacks...
USENIX
Download
44
USENIX Security '22 - QCSD: A QUIC Client-Side Website-Fingerprinting Defence Framework
USENIX
Download
45
USENIX Security '22 - Secure Poisson Regression
USENIX
Download
46
USENIX Security '22 - Cheetah: Lean and Fast Secure Two-Party Deep Neural Network Inference
USENIX
Download
47
USENIX Security '22 - Piranha: A GPU Platform for Secure Computation
USENIX
Download
48
USENIX Security '22 - OpenSSLNTRU: Faster post-quantum TLS key exchange
USENIX
Download
49
USENIX Security '22 - How Are Your Zombie Accounts? Understanding Users' Practices & Expectations...
USENIX
Download
50
USENIX Security '22 - "How Do You Not Lose Friends?": Synthesizing a Design Space of Social Controls
USENIX
Download
51
USENIX Security '22 - Caring about Sharing: User Perceptions of Multiparty Data Sharing
USENIX
Download
52
USENIX Security '22 - Neither Access nor Control: A Longitudinal Investigation of the Efficacy...
USENIX
Download
53
USENIX Security '22 - Jenny: Securing Syscalls for PKU-based Memory Isolation Systems
USENIX
Download
54
USENIX Security '22 - Physical-Layer Attacks Against Pulse Width Modulation-Controlled Actuators
USENIX
Download
55
USENIX Security '22 - Branch History Injection: On the Effectiveness of Hardware Mitigations...
USENIX
Download
56
USENIX Security '22- TLB;DR: Enhancing TLB-based Attacks with TLB Desynchronized Reverse Engineering
USENIX
Download
57
USENIX Security '22 - FuzzOrigin: Detecting UXSS vulnerabilities in Browsers through Origin Fuzzing
USENIX
Download
58
USENIX Security '22 - BrakTooth: Causing Havoc on Bluetooth Link Manager via Directed Fuzzing
USENIX
Download
59
USENIX Security '22 - AmpFuzz: Fuzzing for Amplification DDoS Vulnerabilities
USENIX
Download
60
USENIX Security '22 - FRAMESHIFTER: Security Implications of HTTP/2-to-HTTP/1 Conversion Anomalies
USENIX
Download
61
USENIX Security '22 - Your Microphone Array Retains Your Identity: A Robust Voice Liveness...
USENIX
Download
62
USENIX Security '22 - Lumos: Identifying and Localizing Diverse Hidden IoT Devices...
USENIX
Download
63
USENIX Security '22 - SkillDetective: Automated Policy-Violation Detection of Voice Assistant...
USENIX
Download
64
USENIX Security '22 - "OK, Siri" or "Hey, Google": Evaluating Voiceprint Distinctiveness via...
USENIX
Download
65
USENIX Security '22 - Helping hands: Measuring the impact of a large threat intelligence sharing...
USENIX
Download
66
USENIX Security '22 - A Large-scale Temporal Measurement of Android Malicious Apps...
USENIX
Download
67
USENIX Security '22 - A Large-scale and Longitudinal Measurement Study of DKIM Deployment
USENIX
Download
68
USENIX Security '22 - A Large-scale Investigation into Geodifferences in Mobile Apps
USENIX
Download
69
USENIX Security '22 - Morphuzz: Bending (Input) Space to Fuzz Virtual Devices
USENIX
Download
70
USENIX Security '22 - Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing
USENIX
Download
71
USENIX Security '22 - MundoFuzz: Hypervisor Fuzzing with Statistical Coverage Testing and Grammar...
USENIX
Download
72
USENIX Security '22 - Drifuzz: Harvesting Bugs in Device Drivers from Golden Seeds
USENIX
Download
73
USENIX Security '22 - LTrack: Stealthy Tracking of Mobile Phones in LTE
USENIX
Download
74
USENIX Security '22 - Watching the Watchers: Practical Video Identification Attack in LTE Networks
USENIX
Download
75
USENIX Security '22 - DoLTEst: In-depth Downlink Negative Testing Framework for LTE Devices
USENIX
Download
76
USENIX Security '22 - Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging
USENIX
Download
77
USENIX Security '22 - SIMC: ML Inference Secure Against Malicious Clients at Semi-Honest Cost
USENIX
Download
78
USENIX Security '22 - Efficient Differentially Private Secure Aggregation for Federated Learning...
USENIX
Download
79
USENIX Security '22 - Label Inference Attacks Against Vertical Federated Learning
USENIX
Download
80
USENIX Security '22 - FLAME: Taming Backdoors in Federated Learning
USENIX
Download
81
USENIX Security '22 - Mitigating Membership Inference Attacks by Self-Distillation Through a Novel
USENIX
Download
82
USENIX Security '22 - Synthetic Data – Anonymisation Groundhog Day
USENIX
Download
83
USENIX Security '22 - Attacks on Deidentification's Defenses
USENIX
Download
84
USENIX Security '22 - Birds of a Feather Flock Together: How Set Bias Helps to Deanonymize You
USENIX
Download
85
USENIX Security '22 - Targeted Deanonymization via the Cache Side Channel: Attacks and Defenses
USENIX
Download
86
USENIX Security '22 - FReD: Identifying File Re-Delegation in Android System Services
USENIX
Download
87
USENIX Security '22 - GhostTouch: Targeted Attacks on Touchscreens without Physical Touch
USENIX
Download
88
USENIX Security '22 - SARA: Secure Android Remote Authorization
USENIX
Download
89
USENIX Security '22 - FOAP: Fine-Grained Open-World Android App Fingerprinting
USENIX
Download
90
USENIX Security '22 - Identity Confusion in WebView-based Mobile App-in-app Ecosystems
USENIX
Download
91
USENIX Security '22 - Automated Detection of Automated Traffic
USENIX
Download
92
USENIX Security '22 - Inferring Phishing Intention via Webpage Appearance and Dynamics
USENIX
Download
93
USENIX Security '22 - Phish in Sheep's Clothing: Exploring the Authentication Pitfalls...
USENIX
Download
94
USENIX Security '22 - DeepPhish: Understanding User Trust Towards Artificially Generated Profiles...
USENIX
Download
95
USENIX Security '22 - Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand
USENIX
Download
96
USENIX Security '22 - Estimating Incidental Collection in Foreign Intelligence Surveillance
USENIX
Download
97
USENIX Security '22 - Constant-weight PIR: Single-round Keyword PIR via Constant-weight Equality
USENIX
Download
98
USENIX Security '22 - Incremental Offline/Online PIR
USENIX
Download
99
USENIX Security '22 - GPU-accelerated PIR with Client-Independent Preprocessing for Large-Scale
USENIX
Download
100
USENIX Security '22 - Increasing Adversarial Uncertainty to Scale Private Similarity Testing
USENIX
Download
101
USENIX Security '22 - Pre-hijacked accounts: An Empirical Study of Security Failures in User Account
USENIX
Download
102
USENIX Security '22 - Leaky Forms: A Study of Email and Password Exfiltration Before Form Submission
USENIX
Download
103
USENIX Security '22 - Might I Get Pwned: A Second Generation Compromised Credential Checking Service
USENIX
Download
104
USENIX Security '22 - Why Users (Don't) Use Password Managers at a Large Educational Institution
USENIX
Download
105
USENIX Security '22 - Gossamer: Securely Measuring Password-based Logins
USENIX
Download
106
USENIX Security '22 - DoubleStar: Long-Range Attack Towards Depth Estimation based Obstacle
USENIX
Download
107
USENIX Security '22 - Security Analysis of Camera-LiDAR Fusion Against Black-Box Attacks
USENIX
Download
108
USENIX Security '22 - SAID: State-aware Defense Against Injection Attacks on In-vehicle Network
USENIX
Download
109
USENIX Security '22 - Towards Automatically Reverse Engineering Vehicle Diagnostic Protocols
USENIX
Download
110
USENIX Security '22 - Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition
USENIX
Download
111
USENIX Security '22 - Provably-Safe Multilingual Software Sandboxing using WebAssembly
USENIX
Download
112
USENIX Security '22 - Backporting Security Patches of Web Applications: A Prototype Design
USENIX
Download
113
USENIX Security '22 - Experimental Security Analysis of the App Model in Business Collaboration...
USENIX
Download
114
USENIX Security '22 - SWAPP: A New Programmable Playground for Web Application Security
USENIX
Download
115
USENIX Security '22 - The Security Lottery: Measuring Client-Side Web Security Inconsistencies
USENIX
Download
116
USENIX Security '22 - PatchCleanser: Certifiably Robust Defense against Adversarial Patches...
USENIX
Download
117
USENIX Security '22 - Transferring Adversarial Robustness Through Robust Representation Matching
USENIX
Download
118
USENIX Security '22 - How Machine Learning Is Solving the Binary Function Similarity Problem
USENIX
Download
119
USENIX Security '22 - Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box
USENIX
Download
120
USENIX Security '22 - DnD: A Cross-Architecture Deep Neural Network Decompiler
USENIX
Download
121
USENIX Security '22 - Measurement by Proxy: On the Accuracy of Online Marketplace Measurements
USENIX
Download
122
USENIX Security '22 - Behind the Tube: Exploitative Monetization of Content on YouTube
USENIX
Download
123
USENIX Security '22 - When Sally Met Trackers: Web Tracking From the Users' Perspective
USENIX
Download
124
USENIX Security '22 - How to Peel a Million: Validating and Expanding Bitcoin Clusters
USENIX
Download
125
USENIX Security '22 - RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices
USENIX
Download
126
USENIX Security '22 - GAROTA: Generalized Active Root-Of-Trust Architecture
USENIX
Download
127
USENIX Security '22 - ReZone: Disarming TrustZone with TEE Privilege Reduction
USENIX
Download
128
USENIX Security '22 - Holistic Control-Flow Protection on Real-Time Embedded Systems with Kage
USENIX
Download
129
USENIX Security '22 - Orca: Blocklisting in Sender-Anonymous Messaging
USENIX
Download
130
USENIX Security '22 - Adversarial Detection Avoidance Attacks: Evaluating the robustness
USENIX
Download
131
USENIX Security '22 - Hecate: Abuse Reporting in Secure Messengers with Sealed Sender
USENIX
Download
132
USENIX Security '22 - End-to-Same-End Encryption: Modularly Augmenting an App with an Efficient
USENIX
Download
133
USENIX Security '22 - Omnes pro uno: Practical Multi-Writer Encrypted Database
USENIX
Download
134
USENIX Security '22 - Faster Yet Safer: Logging System Via Fixed-Key Blockcipher
USENIX
Download
135
USENIX Security '22 - IHOP: Improved Statistical Query Recovery against Searchable Symmetric
USENIX
Download
136
USENIX Security '22 - Dynamic Searchable Encryption with Optimal Search in the Presence of Deletions
USENIX
Download
137
USENIX Security '22 - ALASTOR: Reconstructing the Provenance of Serverless Intrusions
USENIX
Download
138
USENIX Security '22 - Back-Propagating System Dependency Impact for Attack Investigation
USENIX
Download
139
USENIX Security '22 - Ground Truth for Binary Disassembly is Not Easy
USENIX
Download
140
USENIX Security '22 - FreeWill: Automatically Diagnosing Use-after-free Bugs via Reference
USENIX
Download
141
USENIX Security '22 - PolyCruise: A Cross-Language Dynamic Information Flow Analysis
USENIX
Download
142
USENIX Security '22 - SYMSAN: Time and Space Efficient Concolic Execution via Dynamic Data-flow
USENIX
Download
143
USENIX Security '22 - CellIFT: Leveraging Cells for Scalable and Precise Dynamic Information Flow
USENIX
Download
144
USENIX Security '22 - FlowMatrix: GPU-Assisted Information-Flow Analysis through Matrix-Based
USENIX
Download
145
USENIX Security '22 - Bedrock: Programmable Network Support for Secure RDMA Systems
USENIX
Download
146
USENIX Security '22 - Creating a Secure Underlay for the Internet
USENIX
Download
147
USENIX Security '22 - Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect Attacks
USENIX
Download
148
USENIX Security '22 - VerLoc: Verifiable Localization in Decentralized Systems
USENIX
Download
149
USENIX Security '22 - Towards More Robust Keyword Spotting for Voice Assistants
USENIX
Download
150
USENIX Security '22 - Seeing is Living? Rethinking the Security of Facial Liveness Verification
USENIX
Download
151
USENIX Security '22 - Who Are You (I Really Wanna Know)? Detecting Audio DeepFakes Through Vocal
USENIX
Download
152
USENIX Security '22 - DeepDi: Learning a Relational Graph Convolutional Network Model on Instruction
USENIX
Download
153
USENIX Security '22 - RE-Mind: a First Look Inside the Mind of a Reverse Engineer
USENIX
Download
154
USENIX Security '22 - Characterizing the Security of Github CI Workflows
USENIX
Download
155
USENIX Security '22 - Decomperson: How Humans Decompile and What We Can Learn From It
USENIX
Download
156
USENIX Security '22 - 99% False Positives: A Qualitative Study of SOC Analysts' Perspectives
USENIX
Download
157
USENIX Security '22 - HyperDegrade: From GHz to MHz Effective CPU Frequencies
USENIX
Download
158
USENIX Security '22 - Pacer: Comprehensive Network Side-Channel Mitigation in the Cloud
USENIX
Download
159
USENIX Security '22 - Composable Cachelets: Protecting Enclaves from Cache Side-Channel Attacks
USENIX
Download
160
USENIX Security '22 - Don't Mesh Around: Side-Channel Attacks and Mitigations on Mesh Interconnects
USENIX
Download
161
USENIX Security '22 - WebGraph: Capturing Advertising and Tracking Information Flows
USENIX
Download
162
USENIX Security '22 - Automating Cookie Consent and GDPR Violation Detection
USENIX
Download
163
USENIX Security '22 - Khaleesi: Breaker of Advertising and Tracking Request Chains
USENIX
Download
164
USENIX Security '22 - Practical Data Access Minimization in Trigger-Action Platforms
USENIX
Download
165
USENIX Security '22 - Shuffle-based Private Set Union: Faster and More Secure
USENIX
Download
166
USENIX Security '22 - Polynomial Commitment with a One-to-Many Prover and Applications
USENIX
Download
167
USENIX Security '22 - ppSAT: Towards Two-Party Private SAT Solving
USENIX
Download
168
USENIX Security '22 - Hyperproofs: Aggregating and Maintaining Proofs in Vector Commitments
USENIX
Download
169
USENIX Security '22 - COMRace: Detecting Data Race Vulnerabilities in COM Objects
USENIX
Download
170
USENIX Security '22 - MOVERY: A Precise Approach for Modified Vulnerable Code Clone Discovery from
USENIX
Download
171
USENIX Security '22 - Loki: Hardening Code Obfuscation Against Automated Attacks
USENIX
Download
172
USENIX Security '22 - Oops... Code Execution and Content Spoofing: The First Comprehensive Analysis
USENIX
Download
173
USENIX Security '22 - Playing Without Paying: Detecting Vulnerable Payment Verification in Native
USENIX
Download
174
USENIX Security '22 - Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX
USENIX
Download
175
USENIX Security '22 - A Hardware-Software Co-design for Efficient Intra-Enclave Isolation
USENIX
Download
176
USENIX Security '22 - SGXFuzz: Efficiently Synthesizing Nested Structures for SGX Enclave Fuzzing
USENIX
Download
177
USENIX Security '22 - SecSMT: Securing SMT Processors against Contention-Based Covert Channels
USENIX
Download
178
USENIX Security '22 - Rendering Contention Channel Made Practical in Web Browsers
USENIX
Download
179
USENIX Security '22 - SyzScope: Revealing High-Risk Security Impacts of Fuzzer-Exposed Bugs in Linux
USENIX
Download
180
USENIX Security '22 - TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for
USENIX
Download
181
USENIX Security '22 - Fuzzing Hardware Like Software
USENIX
Download
182
USENIX Security '22 - Stateful Greybox Fuzzing
USENIX
Download
183
USENIX Security '22 - StateFuzz: System Call-Based State-Aware Linux Driver Fuzzing
USENIX
Download
184
USENIX Security '22 - How to Abuse and Fix Authenticated Encryption Without Key Commitment
USENIX
Download
185
USENIX Security '22 - Private Signaling
USENIX
Download
186
USENIX Security '22 - Batched Differentially Private Information Retrieval
USENIX
Download
187
USENIX Security '22 - Practical Privacy-Preserving Authentication for SSH
USENIX
Download
188
USENIX Security '22 - One-off Disclosure Control by Heterogeneous Generalization
USENIX
Download
189
USENIX Security '22 - Understanding and Improving Usability of Data Dashboards for Simplified
USENIX
Download
190
USENIX Security '22 - Security and Privacy Perceptions of Third-Party Application Access for Google
USENIX
Download
191
USENIX Security '22 - Empirical Understanding of Deletion Privacy: Experiences, Expectations, and
USENIX
Download
192
USENIX Security '22 - Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among
USENIX
Download
193
USENIX Security '22 - How and Why People Use Virtual Private Networks
USENIX
Download
194
USENIX Security '22 - CamShield: Securing Smart Cameras through Physical Replication and Isolation
USENIX
Download
195
USENIX Security '22 - SCRAPS: Scalable Collective Remote Attestation for Pub-Sub IoT Networks with
USENIX
Download
196
USENIX Security '22 - An Experimental Study of GPS Spoofing and Takeover Attacks on UAVs
USENIX
Download
197
USENIX Security '22 - Smart Home Privacy Policies Demystified: A Study of Availability, Content, and
USENIX
Download
198
USENIX Security '22 - MaDIoT 2.0: Modern High-Wattage IoT Botnet Attacks and Defenses
USENIX
Download
199
USENIX Security '22 - AutoDA: Automated Decision-based Iterative Adversarial Attacks
USENIX
Download
200
USENIX Security '22 - Poison Forensics: Traceback of Data Poisoning Attacks in Neural Networks
USENIX
Download