| Automated Analysis of Protocols that use Authenticated Encryption: How Subtle AEAD Differences can impact Protocol Security | USENIX Security '23 | Cas Cremers, Alexander Dax, Charlie Jacomme, Mang Zhao |
| A Two-Decade Retrospective Analysis of a University's Vulnerability to Attacks Exploiting Reused Passwords | USENIX Security '23 | Alexandra Nisenoff, Maximilian Golla, Miranda Wei, Juliette Hainline, Hayley Szymanek, Annika Braun, Annika Hildebrandt, Blair Christensen, David Langenberg, Blase Ur |
| All cops are broadcasting: TETRA under scrutiny | USENIX Security '23 | Carlo Meijer, Wouter Bokslag, Jos Wetzels |
| Anatomy of a High-Profile Data Breach: Dissecting the Aftermath of a Crypto-Wallet Case | USENIX Security '23 | Svetlana Abramova, Rainer Böhme |
| Near-Optimal Oblivious Key-Value Stores for Efficient PSI, PSU and Volume-Hiding Multi-Maps | USENIX Security '23 | Alexander Bienstock, Sarvar Patel, Joon Young Seo, Kevin Yeo |
| Lost in Conversion: Exploit Data Structure Conversion with Attribute Loss to Break Android Systems | USENIX Security '23 | Rui Li, Wenrui Diao, Shishuai Yang, Xiangyu Liu, Shanqing Guo, Kehuan Zhang |
| Tight Auditing of Differentially Private Machine Learning | USENIX Security '23 | Milad Nasr, Jamie Hayes, Thomas Steinke, Borja Balle, Florian Tramèr, Matthew Jagielski, Nicholas Carlini, Andreas Terzis |
| SQIRL: Grey-Box Detection of SQL Injection Vulnerabilities Using Reinforcement Learning | USENIX Security '23 | Salim Al Wahaibi, Myles Foley, Sergio Maffeis |
| FedVal: Different good or different bad in federated learning | USENIX Security '23 | Viktor Valadi, Xinchi Qiu, Pedro Porto Buarque de Gusmão, Nicholas D. Lane, Mina Alibeigi |
| Remote Direct Memory Introspection | USENIX Security '23 | Hongyi Liu, Jiarong Xing, Yibo Huang, Danyang Zhuo, Srinivas Devadas, Ang Chen |
| Continuous Learning for Android Malware Detection | USENIX Security '23 | Yizheng Chen, Zhoujie Ding, David Wagner |
| Inception: Exposing New Attack Surfaces with Training in Transient Execution | USENIX Security '23 | Daniël Trujillo, Johannes Wikner, Kaveh Razavi |
| A Hybrid Alias Analysis and Its Application to Global Variable Protection in the Linux Kernel | USENIX Security '23 | Guoren Li, Hang Zhang, Jinmeng Zhou, Wenbo Shen, Yulei Sui, Zhiyun Qian |
| Unique Identification of 50,000+ Virtual Reality Users from Head & Hand Motion Data | USENIX Security '23 | Vivek Nair, Wenbo Guo, Justus Mattern, Rui Wang, James F. O'Brien, Louis Rosenberg, Dawn Song |
| "If I could do this, I feel anyone could:" The Design and Evaluation of a Secondary Authentication Factor Manager | USENIX Security '23 | Garrett Smith, Tarun Yadav, Jonathan Dutson, Scott Ruoti, Kent Seamons |
| Generative Intrusion Detection and Prevention on Data Stream | USENIX Security '23 | HyungBin Seo, MyungKeun Yoon |
| ARGUS: A Framework for Staged Static Taint Analysis of GitHub Workflows and Actions | USENIX Security '23 | Siddharth Muralee, Igibek Koishybayev, Aleksandr Nahapetyan, Greg Tystahl, Brad Reaves, Antonio Bianchi, William Enck, Alexandros Kapravelos, Aravind Machiry |
| Mitigating Security Risks in Linux with KLAUS: A Method for Evaluating Patch Correctness | USENIX Security '23 | Yuhang Wu, Zhenpeng Lin, Yueqi Chen, Dang K Le, Dongliang Mu, Xinyu Xing |
| A Large-Scale Measurement of Website Login Policies | USENIX Security '23 | Suood Al Roomi, Frank Li |
| Your Exploit is Mine: Instantly Synthesizing Counterattack Smart Contract | USENIX Security '23 | Zhuo Zhang, Zhiqiang Lin, Marcelo Morales, Xiangyu Zhang, Kaiyuan Zhang |
| Is Your Wallet Snitching On You? An Analysis on the Privacy Implications of Web3 | USENIX Security '23 | Christof Ferreira Torres, Fiona Willi, Shweta Shinde |
| Cookie Crumbles: Breaking and Fixing Web Session Integrity | USENIX Security '23 | Marco Squarcina, Pedro Adão, Lorenzo Veronese, Matteo Maffei |
| Smart Learning to Find Dumb Contracts | USENIX Security '23 | Tamer Abdelaziz, Aquinas Hobor |
| Auditory Eyesight: Demystifying μs-Precision Keystroke Tracking Attacks on Unconstrained Keyboard Inputs | USENIX Security '23 | Yazhou Tu, Liqun Shan, Md Imran Hossen, Sara Rampazzi, Kevin Butler, Xiali Hei |
| PET: Prevent Discovered Errors from Being Triggered in the Linux Kernel | USENIX Security '23 | Zicheng Wang, Yueqi Chen, Qingkai Zeng |