| FreeEagle: Detecting Complex Neural Trojans in Data-Free Cases | USENIX Security '23 | Chong Fu, Xuhong Zhang, Shouling Ji, Ting Wang, Peng Lin, Yanghe Feng, Jianwei Yin |
| Panda: Security Analysis of Algorand Smart Contracts | USENIX Security '23 | Zhiyuan Sun, Xiapu Luo, Yinqian Zhang |
| Formal Analysis and Patching of BLE-SC Pairing | USENIX Security '23 | Min Shi, Jing Chen, Kun He, Haoran Zhao, Meng Jia, Ruiying Du |
| SHELTER: Extending Arm CCA with Isolation in User Space | USENIX Security '23 | Yiming Zhang, Yuxin Hu, Zhenyu Ning, Fengwei Zhang, Xiapu Luo, Haoyang Huang, Shoumeng Yan, Zhengyu He |
| CAPatch: Physical Adversarial Patch against Image Captioning Systems | USENIX Security '23 | Shibo Zhang, Yushi Cheng, Wenjun Zhu, Xiaoyu Ji, Wenyuan Xu |
| MINER: A Hybrid Data-Driven Approach for REST API Fuzzing | USENIX Security '23 | Chenyang Lyu, Jiacheng Xu, Shouling Ji, Xuhong Zhang, Qinying Wang, Binbin Zhao, Gaoning Pan, Wei Cao, Peng Chen, Raheem Beyah |
| FABRID: Flexible Attestation-Based Routing for Inter-Domain Networks | USENIX Security '23 | Cyrill Krähenbühl, Marc Wyss, David Basin, Vincent Lenders, Adrian Perrig, Martin Strohmeier |
| Educators’ Perspectives of Using (or Not Using) Online Exam Proctoring | USENIX Security '23 | David G. Balash, Elena Korkes, Miles Grant, Adam J. Aviv, Rahel A. Fainchtein, Micah Sherr |
| Going through the motions: AR/VR keylogging from user head motions | USENIX Security '23 | Carter Slocum, Yicheng Zhang, Nael Abu-Ghazaleh, Jiasi Chen |
| No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning | USENIX Security '23 | Thorsten Eisenhofer, Erwin Quiring, Jonas Möller, Doreen Riepel, Thorsten Holz, Konrad Rieck |
| Password Guessing Using Random Forest | USENIX Security '23 | Ding Wang, Yunkai Zou, Zijian Zhang, Kedong Xiu |
| Detecting and Handling IoT Interaction Threats in Multi-Platform Multi-Control-Channel Smart Homes | USENIX Security '23 | Haotian Chi, Qiang Zeng, Xiaojiang Du |
| TRIDENT: Towards Detecting and Mitigating Web-based Social Engineering Attacks | USENIX Security '23 | Zheng Yang, Joey Allen, Matthew Landen, Roberto Perdisci, Wenke Lee |
| “Millions of people are watching you”: Understanding the Digital-Safety Needs and Practices of Creators | USENIX Security '23 | Patrawat Samermit, Anna Turner, Patrick Gage Kelley, Tara Matthews, Vanessia Wu, Sunny Consolvo, Kurt Thomas |
| DDRace: Finding Concurrency UAF Vulnerabilities in Linux Drivers with Directed Fuzzing | USENIX Security '23 | |
| Secure Floating-Point Training | USENIX Security '23 | Deevashwer Rathee, Anwesh Bhattacharya, Divya Gupta, Rahul Sharma, Dawn Song |
| The OK Is Not Enough: A Large Scale Study of Consent Dialogs in Smartphone Applications | USENIX Security '23 | Simon Koch, Benjamin Altpeter, Martin Johns |
| Timeless Timing Attacks and Preload Defenses in Tor's DNS Cache | USENIX Security '23 | Rasmus Dahlberg, Tobias Pulls |
| CacheQL: Quantifying and Localizing Cache Side-Channel Vulnerabilities in Production Software | USENIX Security '23 | Yuanyuan Yuan, Zhibo Liu, Shuai Wang |
| “If sighted people know, I should be able to know:” Privacy Perceptions of Bystanders with Visual Impairments around Camera-based Technology | USENIX Security '23 | Yuhang Zhao, Yaxing Yao, Jiaru Fu, Nihan Zhou |
| Access Denied: Assessing Physical Risks to Internet Access Networks | USENIX Security '23 | Alexander Marder, Zesen Zhang, Ricky Mok, Ramakrishna Padmanabhan, Bradley Huffaker, Matthew Luckie, Alberto Dainotti, kc claffy, Alex C. Snoeren, Aaron Schulman |
| Security and Privacy Failures in Popular 2FA Apps | USENIX Security '23 | Conor Gilsenan, Fuzail Shakir, Noura Alomar, Serge Egelman |
| A comprehensive, formal and automated analysis of the EDHOC protocol | USENIX Security '23 | Charlie Jacomme, Elise Klein, Steve Kremer, Maïwenn Racouchot |
| Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses | USENIX Security '23 | Vincent Cheval, Cas Cremers, Alexander Dax, Lucca Hirschi, Charlie Jacomme, Steve Kremer |
| Content-Type: multipart/oracle - Tapping into Format Oracles in Email End-to-End Encryption | USENIX Security '23 | Fabian Ising, Damian Poddebniak, Tobias Kappert, Christoph Saatjohann, Sebastian Schinzel |