| A Research Framework and Initial Study of Browser Security for the Visually Impaired | USENIX Security '23 | Elaine Lau, Zachary Peterson |
| PUMM: Preventing Use-After-Free Using Execution Unit Partitioning | USENIX Security '23 | Carter Yagemann, Simon P. Chung, Brendan Saltaformaggio, Wenke Lee |
| POLICYCOMP: Counterpart Comparison of Privacy Policies Uncovers Overbroad Personal Data Collection Practices | USENIX Security '23 | Lu Zhou, Chengyongxiao Wei, Tong Zhu, Guoxing Chen, Xiaokuan Zhang, Suguo Du, Hui Cao, Haojin Zhu |
| One Server for the Price of Two: Simple and Fast Single-Server Private Information Retrieval | USENIX Security '23 | Alexandra Henzinger, Matthew M. Hong, Henry Corrigan-Gibbs, Sarah Meiklejohn, Vinod Vaikuntanathan |
| Exploring User Reactions and Mental Models Towards Perceptual Manipulation Attacks in Mixed Reality | USENIX Security '23 | Kaiming Cheng, Jeffery F. Tian, Tadayoshi Kohno, Franziska Roesner |
| Eavesdropping Mobile App Activity via Radio-Frequency Energy Harvesting | USENIX Security '23 | Tao Ni, Guohao Lan, Jia Wang, Qingchuan Zhao, Weitao Xu |
| Side-Channel Attacks on Optane Persistent Memory | USENIX Security '23 | Sihang Liu, Suraaj Kanniwadi, Martin Schwarzl, Andreas Kogler, Daniel Gruss, Samira Khan |
| A Study of Multi-Factor and Risk-Based Authentication Availability | USENIX Security '23 | Anthony Gavazzi, Ryan Williams, Engin Kirda, Long Lu, Andre King, Andy Davis, Tim Leek |
| Person Re-identification in 3D Space: A WiFi Vision-based Approach | USENIX Security '23 | Yili Ren, Yichao Wang, Sheng Tan, Yingying Chen, Jie Yang |
| Fourteen Years in the Life: A Root Server’s Perspective on DNS Resolver Security | USENIX Security '23 | Alden Hilton, Casey Deccio, Jacob Davis |
| ClepsydraCache -- Preventing Cache Attacks with Time-Based Evictions | USENIX Security '23 | Jan Philipp Thoma, Christian Niesler, Dominic Funke, Gregor Leander, Pierre Mayr, Nils Pohl, Lucas Davi, Tim Güneysu |
| Guarding Serverless Applications with Kalium | USENIX Security '23 | Deepak Sirone Jegan, Liang Wang, Siddhant Bhagat, Michael Swift |
| DynSQL: Stateful Fuzzing for Database Management Systems with Complex and Valid SQL Query Generation | USENIX Security '23 | Zu-Ming Jiang, Jia-Ju Bai, Zhendong Su |
| Automated Security Analysis of Exposure Notification Systems | USENIX Security '23 | Kevin Morio, Ilkan Esiyok, Dennis Jackson, Robert Künnemann |
| xNIDS: Explaining Deep Learning-based Network Intrusion Detection Systems for Active Intrusion Responses | USENIX Security '23 | Feng Wei, Hongda Li, Ziming Zhao, Hongxin Hu |
| Pspray: Timing Side-Channel based Linux Kernel Heap Exploitation Technique | USENIX Security '23 | Yoochan Lee, Jinhan Kwak, Junesoo Kang, Yuseok Jeon, Byoungyoung Lee |
| Strategies and Vulnerabilities of Participants in Venezuelan Influence Operations | USENIX Security '23 | Ruben Recabarren, Bogdan Carbunar, Nestor Hernandez, Ashfaq Ali Shafin |
| Investigating Verification Behavior and Perceptions of Visual Digital Certificates | USENIX Security '23 | Dañiel Gerhardt, Alexander Ponticello, Adrian Dabrowski, Katharina Krombholz |
| Remote Attacks on Speech Recognition Systems Using Sound from Power Supply | USENIX Security '23 | Lanqing Yang, Xinqi Chen, Xiangyong Jian, Leping Yang, Yijie Li, Qianfei Ren, Yi-Chao Chen, Guangtao Xue, Xiaoyu Ji |
| HOMESPY: The Invisible Sniffer of Infrared Remote Control of Smart TVs | USENIX Security '23 | Kong Huang, YuTong Zhou, Ke Zhang, Jiacen Xu, Jiongyi Chen, Di Tang, Kehuan Zhang |
| FuzzJIT: Oracle-Enhanced Fuzzing for JavaScript Engine JIT Compiler | USENIX Security '23 | Junjie Wang, Zhiyi Zhang, Shuang Liu, Xiaoning Du, Junjie Chen |
| TPatch: A Triggered Physical Adversarial Patch | USENIX Security '23 | Wenjun Zhu, Xiaoyu Ji, Yushi Cheng, Shibo Zhang, Wenyuan Xu |
| TAP: Transparent and Privacy-Preserving Data Services | USENIX Security '23 | Daniel Reijsbergen, Aung Maw, Zheng Yang, Tien Tuan Anh Dinh, Jianying Zhou |
| UnGANable: Defending Against GAN-based Face Manipulation | USENIX Security '23 | Zheng Li, Ning Yu, Ahmed Salem, Michael Backes, Mario Fritz, Yang Zhang |
| Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine Learning | USENIX Security '23 | Jonathan Prokos, Neil Fendley, Matthew Green, Roei Schuster, Eran Tromer, Tushar Jois, Yinzhi Cao |