| Freaky Leaky SMS: Extracting User Locations by Analyzing SMS Timings | USENIX Security '23 | Evangelos Bitsikas, Theodor Schnitzler, Christina Pöpper, Aanjhan Ranganathan |
| EnigMap: External-Memory Oblivious Map for Secure Enclaves | USENIX Security '23 | Afonso Tinoco, Sixiang Gao, Elaine Shi |
| Spying through Your Voice Assistants: Realistic Voice Command Fingerprinting | USENIX Security '23 | Dilawer Ahmed, Aafaq Sabir, Anupam Das |
| Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference | USENIX Security '23 | Yun Li, Yufei Duan, Zhicong Huang, Cheng Hong, Chao Zhang, Yifan Song |
| "Un-Equal Online Safety?" A Gender Analysis of Security and Privacy Protection Advice and Behaviour Patterns | USENIX Security '23 | Kovila P.L. Coopamootoo, Magdalene Ng |
| Extracting Protocol Format as State Machine via Controlled Static Loop Analysis | USENIX Security '23 | Qingkai Shi, Xiangzhe Xu, Xiangyu Zhang |
| Network Detection of Interactive SSH Impostors Using Deep Learning | USENIX Security '23 | Julien Piet, Aashish Sharma, Vern Paxson, David Wagner |
| Calpric: Inclusive and Fine-grain Labeling of Privacy Policies with Crowdsourcing and Active Learning | USENIX Security '23 | Wenjun Qiu, David Lie, Lisa Austin |
| One Size Does Not Fit All: Uncovering and Exploiting Cross Platform Discrepant APIs in WeChat | USENIX Security '23 | Chao Wang, Yue Zhang, Zhiqiang Lin |
| KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR Systems | USENIX Security '23 | Xinghui Wu, Shiqing Ma, Chao Shen, Chenhao Lin, Qian Wang, Qi Li, Yuan Rao |
| “I wouldn't want my unsafe code to run my pacemaker”: An Interview Study on the Use, Comprehension, and Perceived Risks of Unsafe Rust | USENIX Security '23 | Sandra Höltervennhoff, Philip Klostermeyer, Noah Wöhler, Yasemin Acar, Sascha Fahl |
| Detecting Union Type Confusion in Component Object Model | USENIX Security '23 | Yuxing Zhang, Xiaogang Zhu, Daojing He, Minhui Xue, Shouling Ji, Mohammad Sayad Haghighi, Sheng Wen, Zhiniang Peng |
| AlphaEXP: An Expert System for Identifying Security-Sensitive Kernel Objects | USENIX Security '23 | Ruipeng Wang, Kaixiang Chen, Chao Zhang, Zulie Pan, Qianyu Li, Siliang Qin, Shenglin Xu, Min Zhang, Yang Li |
| Knowledge Expansion and Counterfactual Interaction for Reference-Based Phishing Detection | USENIX Security '23 | Ruofan Liu, Yun Lin, Yifan Zhang, Penn Han Lee, Jin Song Dong |
| Discovering Adversarial Driving Maneuvers against Autonomous Vehicles | USENIX Security '23 | Ruoyu Song, Muslum Ozgur Ozmen, Hyungsub Kim, Raymond Muller, Z. Berkay Celik, Antonio Bianchi |
| Demystifying Pointer Authentication on Apple M1 | USENIX Security '23 | Zechao Cai, Jiaxun Zhu, Wenbo Shen, Yutian Yang, Rui Chang, Yu Wang, Jinku Li, Kui Ren |
| ACORN: Input Validation for Secure Aggregation | USENIX Security '23 | James Bell, Adrià Gascón, Tancrède Lepoint, Baiyu Li, Sarah Meiklejohn, Mariana Raykova, Cathie Yun |
| Two Sides of the Shield: Understanding Protective DNS adoption factors | USENIX Security '23 | Elsa Rodríguez, Radu Anghel, Simon Parkin, Michel van Eeten, Carlos Gañán |
| Aliasing Backdoor Attacks on Pre-trained Models | USENIX Security '23 | Cheng'an Wei, Yeonjoon Lee, Kai Chen, Guozhu Meng, Peizhuo Lv |
| QFA2SR: Query-Free Adversarial Transfer Attacks to Speaker Recognition Systems | USENIX Security '23 | Guangke Chen, Yedi Zhang, Zhe Zhao, Fu Song |
| BotScreen: Trust Everybody, but Cut the Aimbots Yourself | USENIX Security '23 | Minyeop Choi, Gihyuk Ko, Sang Kil Cha |
| Detecting API Post-Handling Bugs Using Code and Description in Patches | USENIX Security '23 | Miaoqian Lin, Kai Chen, Yang Xiao |
| Fast IDentity Online with Anonymous Credentials (FIDO-AC) | USENIX Security '23 | Wei-Zhu Yeoh, Michal Kepkowski, Gunnar Heide, Dali Kaafar, Lucjan Hanzlik |
| Time for Change: How Clocks Break UWB Secure Ranging | USENIX Security '23 | Claudio Anliker, Giovanni Camurati, Srdjan Čapkun |
| Efficient Unbalanced Private Set Intersection Cardinality and User-friendly Privacy-preserving Contact Tracing | USENIX Security '23 | Mingli Wu, Tsz Hon Yuen |