| Detecting Multi-Step IAM Attacks in AWS Environments via Model Checking | USENIX Security '23 | Ilia Shevrin, Oded Margalit |
| Lost at C: A User Study on the Security Implications of Large Language Model Code Assistants | USENIX Security '23 | Gustavo Sandoval, Hammond Pearce, Teo Nys, Ramesh Karri, Siddharth Garg, Brendan Dolan-Gavitt |
| ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks | USENIX Security '23 | Phillip Rieger, Marco Chilese, Reham Mohamed, Markus Miettinen, Hossein Fereidooni, Ahmad-Reza Sadeghi |
| How to Cover up Anomalous Accesses to Electronic Health Records | USENIX Security '23 | Xiaojun Xu, Qingying Hao, Zhuolin Yang, Bo Li, David Liebovitz, Gang Wang, Carl A. Gunter |
| TreeSync: Authenticated Group Management for Messaging Layer Security | USENIX Security '23 | Théophile Wallez, Jonathan Protzenko, Benjamin Beurdouche, Karthikeyan Bhargavan |
| Network Responses to Russia's Invasion of Ukraine in 2022: A Cautionary Tale for Internet Freedom | USENIX Security '23 | Reethika Ramesh, Ram Sundara Raman, Apurva Virkud, Alexandra Dirksen, Armin Huremagic, David Fifield, Dirk Rodenburg, Rod Hynes, Doug Madory, Roya Ensafi |
| ZBCAN: A Zero-Byte CAN Defense System | USENIX Security '23 | Khaled Serag, Rohit Bhatia, Akram Faqih, Muslum Ozgur Ozmen, Vireshwar Kumar, Z. Berkay Celik, Dongyan Xu |
| Know Your Cybercriminal: Evaluating Attacker Preferences by Measuring Profile Sales on an Active, Leading Criminal Market for User Impersonation at Scale | USENIX Security '23 | Michele Campobasso, Luca Allodi |
| Formal Analysis of Session-Handling in Secure Messaging: Lifting Security from Sessions to Conversations | USENIX Security '23 | Cas Cremers, Charlie Jacomme, Aurora Naska |
| HOLMES: Efficient Distribution Testing for Secure Collaborative Learning | USENIX Security '23 | Ian Chang, Katerina Sotiraki, Weikeng Chen, Murat Kantarcioglu, Raluca Popa |
| MobileAtlas: Geographically Decoupled Measurements in Cellular Networks for Security and Privacy Research | USENIX Security '23 | Gabriel K. Gegenhuber, Wilfried Mayer, Edgar Weippl, Adrian Dabrowski |
| Don’t be Dense: Efficient Keyword PIR for Sparse Databases | USENIX Security '23 | Sarvar Patel, Joon Young Seo, Kevin Yeo |
| Proxy Hunting: Understanding and Characterizing Proxy-based Upgradeable Smart Contracts in Blockchains | USENIX Security '23 | William E Bodell III, Sajad Meisami, Yue Duan |
| Fine-grained Poisoning Attack to Local Differential Privacy Protocols for Mean and Variance Estimation | USENIX Security '23 | Xiaoguang Li, Ninghui Li, Wenhai Sun, Neil Zhenqiang Gong, Hui Li |
| PrivateFL: Accurate, Differentially Private Federated Learning via Personalized Data Transformation | USENIX Security '23 | Yuchen Yang, Bo Hui, Haolin Yuan, Neil Gong, Yinzhi Cao |
| Controlled Data Races in Enclaves: Attacks and Detection | USENIX Security '23 | Sanchuan Chen, Zhiqiang Lin, Yinqian Zhang |
| BalanceProofs: Maintainable Vector Commitments with Fast Aggregation | USENIX Security '23 | Weijie Wang, Annie Ulichney, Charalampos Papamanthou |
| autofz: Automated Fuzzer Composition at Runtime | USENIX Security '23 | Yu-Fu Fu, Jaehyuk Lee, Taesoo Kim |
| Multi-Factor Key Derivation Function (MFKDF) for Fast, Flexible, Secure, & Practical Key Management | USENIX Security '23 | Vivek Nair, Dawn Song |
| PROGRAPHER: An Anomaly Detection System based on Provenance Graph Embedding | USENIX Security '23 | Fan Yang, Jiacen Xu, Chunlin Xiong, Zhou Li, Kehuan Zhang |
| Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic Augmentation | USENIX Security '23 | Renjie Xie, Jiahao Cao, Enhuan Dong, Mingwei Xu, Kun Sun, Qi Li, Licheng Shen, Menghao Zhang |
| Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks | USENIX Security '23 | Jialai Wang, Ziyuan Zhang, Meiqi Wang, Han Qiu, Tianwei Zhang, Qi Li, Zongpeng Li, Tao Wei, Chao Zhang |
| Design of Access Control Mechanisms in Systems-on-Chip with Formal Integrity Guarantees | USENIX Security '23 | Dino Mehmedagić, Mohammad Rahmani Fadiheh, Johannes Müller, Anna Lena Duque Antón, Dominik Stoffel, Wolfgang Kunz |
| ICSPatch: Automated Vulnerability Localization and Non-Intrusive Hotpatching in Industrial Control Systems using Data Dependence Graphs | USENIX Security '23 | Prashant Hari Narayan Rajput, Constantine Doumanidis, Michail Maniatakos |
| VeriZexe: Decentralized Private Computation with Universal Setup | USENIX Security '23 | Alex Luoyuan Xiong, Binyi Chen, Zhenfei Zhang, Benedikt Bünz, Ben Fisch, Fernando Krell, Philippe Camacho |