| Efficient Memory Overcommitment for I/O Passthrough Enabled VMs via Fine-grained Page Meta-data Management | USENIX ATC '23 | Yaohui Wang, Ben Luo, Yibin Shen |
| Pinolo: Detecting Logical Bugs in Database Management Systems with Approximate Query Synthesis | USENIX ATC '23 | Zongyin Hao, Quanfeng Huang, Chengpeng Wang, Jianfeng Wang, Yushan Zhang, Rongxin Wu, Charles Zhang |
| Global Capacity Management With Flux | OSDI '23 | Marius Eriksen, Kaushik Veeraraghavan, Yusuf Abdulghani, Andrew Birchall, Po-Yen Chou, Richard Cornew, Adela Kabiljo, Ranjith Kumar S, Maroo Lieuw, Justin Meza, Scott Michelson, Thomas Rohloff, Hayley Russell, Jeff Qin, Chunqiang Tang |
| FedVal: Different good or different bad in federated learning | USENIX Security '23 | Viktor Valadi, Xinchi Qiu, Pedro Porto Buarque de Gusmão, Nicholas D. Lane, Mina Alibeigi |
| How Effective is Multiple-Vantage-Point Domain Control Validation? | USENIX Security '23 | Grace H. Cimaszewski, Henry Birge-Lee, Liang Wang, Jennifer Rexford, Prateek Mittal |
| Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing Tables | USENIX Security '23 | Nian Xue, Yashaswi Malla, Zihang Xia, Christina Pöpper, Mathy Vanhoef |
| Auditing Frameworks Need Resource Isolation: A Systematic Study on the Super Producer Threat to System Auditing and Its Mitigation | USENIX Security '23 | Peng Jiang, Ruizhe Huang, Ding Li, Yao Guo, Xiangqun Chen, Jianhai Luan, Yuxin Ren, Xinwei Hu |
| MobileAtlas: Geographically Decoupled Measurements in Cellular Networks for Security and Privacy Research | USENIX Security '23 | Gabriel K. Gegenhuber, Wilfried Mayer, Edgar Weippl, Adrian Dabrowski |
| Improving Logging to Reduce Permission Over-Granting Mistakes | USENIX Security '23 | Bingyu Shen, Tianyi Shan, Yuanyuan Zhou |
| Automata-Guided Control-Flow-Sensitive Fuzz Driver Generation | USENIX Security '23 | |
| Cross Container Attacks: The Bewildered eBPF on Clouds | USENIX Security '23 | Yi He, Roland Guo, Yunlong Xing, Xijia Che, Kun Sun, Zhuotao Liu, Ke Xu, Qi Li |
| Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secret Information in Source Code Repositories | USENIX Security '23 | Alexander Krause, Jan H. Klemmer, Nicolas Huaman, Dominik Wermke, Yasemin Acar, Sascha Fahl |
| You've Got Report: Measurement and Security Implications of DMARC Reporting | USENIX Security '23 | Md. Ishtiaq Ashiq, Weitong Li, Tobias Fiebig, Taejoong Chung |
| “Employees Who Don’t Accept the Time Security Takes Are Not Aware Enough”: The CISO View of Human-Centred Security | USENIX Security '23 | Jonas Hielscher, Uta Menges, Simon Parkin, Annette Kluge, M. Angela Sasse |
| Framing Frames: Bypassing Wi-Fi Encryption by Manipulating Transmit Queues | USENIX Security '23 | Domien Schepers, Aanjhan Ranganathan, Mathy Vanhoef |
| Network Detection of Interactive SSH Impostors Using Deep Learning | USENIX Security '23 | Julien Piet, Aashish Sharma, Vern Paxson, David Wagner |
| Detecting Multi-Step IAM Attacks in AWS Environments via Model Checking | USENIX Security '23 | Ilia Shevrin, Oded Margalit |
| Formal Analysis of Session-Handling in Secure Messaging: Lifting Security from Sessions to Conversations | USENIX Security '23 | Cas Cremers, Charlie Jacomme, Aurora Naska |
| Union under Duress: Understanding Hazards of Duplicate Resource Mismediation in Android Software Supply Chain | USENIX Security '23 | Xueqiang Wang, Yifan Zhang, XiaoFeng Wang, Yan Jia, Luyi Xing |
| Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference | USENIX Security '23 | Yun Li, Yufei Duan, Zhicong Huang, Cheng Hong, Chao Zhang, Yifan Song |
| Systematic Assessment of Fuzzers using Mutation Analysis | USENIX Security '23 | Philipp Görz, Björn Mathis, Keno Hassler, Emre Güler, Thorsten Holz, Andreas Zeller, Rahul Gopinath |
| Automated Exploitable Heap Layout Generation for Heap Overflows Through Manipulation Distance-Guided Fuzzing | USENIX Security '23 | Bin Zhang, Jiongyi Chen, Runhao Li, Chao Feng, Ruilin Li, Chaojing Tang |
| We Really Need to Talk About Session Tickets: A Large-Scale Analysis of Cryptographic Dangers with TLS Session Tickets | USENIX Security '23 | Sven Hebrok, Simon Nachtigall, Marcel Maehren, Nurullah Erinola, Robert Merget, Juraj Somorovsky, Jörg Schwenk |
| An Efficient Design of Intelligent Network Data Plane | USENIX Security '23 | Guangmeng Zhou, Zhuotao Liu, Chuanpu Fu, Qi Li, Ke Xu |
| Side-Channel Attacks on Optane Persistent Memory | USENIX Security '23 | Sihang Liu, Suraaj Kanniwadi, Martin Schwarzl, Andreas Kogler, Daniel Gruss, Samira Khan |