USENIX Security '22 - How and Why People Use Virtual Private Networks
USENIX Security '22 - Security Analysis of Camera-LiDAR Fusion Against Black-Box Attacks
USENIX Security '22 - Oops... Code Execution and Content Spoofing: The First Comprehensive Analysis
USENIX Security '22 - Adversarial Detection Avoidance Attacks: Evaluating the robustness
USENIX Security '22 - Dos and Don'ts of Machine Learning in Computer Security
USENIX Security '22 - Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster Design
USENIX Security '22 - FRAMESHIFTER: Security Implications of HTTP/2-to-HTTP/1 Conversion Anomalies
USENIX Security '22 - Attacks on Deidentification's Defenses
USENIX Security '22 - Exploring the Security Boundary of Data Reconstruction via Neuron Exclusivity
USENIX Security '22 - RE-Mind: a First Look Inside the Mind of a Reverse Engineer
USENIX Security '22 - Private Signaling
USENIX Security '22 - Rapid Prototyping for Microarchitectural Attacks
USENIX Security '22 - MaDIoT 2.0: Modern High-Wattage IoT Botnet Attacks and Defenses
USENIX Security '22 - How Long Do Vulnerabilities Live in the Code? A Large-Scale Empirical...
USENIX Security '22 - Automated Detection of Automated Traffic
USENIX Security '22 - Aardvark: An Asynchronous Authenticated Dictionary with Applications to
USENIX Security '22 - Web Cache Deception Escalates!
USENIX Security '22 - LTrack: Stealthy Tracking of Mobile Phones in LTE
USENIX Security '22 - "They Look at Vulnerability and Use That to Abuse You''
USENIX Security '22 - Cheetah: Lean and Fast Secure Two-Party Deep Neural Network Inference
USENIX Security '22 - Inferring Phishing Intention via Webpage Appearance and Dynamics
USENIX Security '22 - CellIFT: Leveraging Cells for Scalable and Precise Dynamic Information Flow
USENIX Security '22 - Backporting Security Patches of Web Applications: A Prototype Design
USENIX Security '22 - 99% False Positives: A Qualitative Study of SOC Analysts' Perspectives
USENIX Security '22 - SGXLock: Towards Efficiently Establishing Mutual Distrust Between Host