| No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning | USENIX Security '23 | Thorsten Eisenhofer, Erwin Quiring, Jonas Möller, Doreen Riepel, Thorsten Holz, Konrad Rieck |
| Password Guessing Using Random Forest | USENIX Security '23 | Ding Wang, Yunkai Zou, Zijian Zhang, Kedong Xiu |
| Detecting and Handling IoT Interaction Threats in Multi-Platform Multi-Control-Channel Smart Homes | USENIX Security '23 | Haotian Chi, Qiang Zeng, Xiaojiang Du |
| TRIDENT: Towards Detecting and Mitigating Web-based Social Engineering Attacks | USENIX Security '23 | Zheng Yang, Joey Allen, Matthew Landen, Roberto Perdisci, Wenke Lee |
| “Millions of people are watching you”: Understanding the Digital-Safety Needs and Practices of Creators | USENIX Security '23 | Patrawat Samermit, Anna Turner, Patrick Gage Kelley, Tara Matthews, Vanessia Wu, Sunny Consolvo, Kurt Thomas |
| DDRace: Finding Concurrency UAF Vulnerabilities in Linux Drivers with Directed Fuzzing | USENIX Security '23 | |
| Secure Floating-Point Training | USENIX Security '23 | Deevashwer Rathee, Anwesh Bhattacharya, Divya Gupta, Rahul Sharma, Dawn Song |
| The OK Is Not Enough: A Large Scale Study of Consent Dialogs in Smartphone Applications | USENIX Security '23 | Simon Koch, Benjamin Altpeter, Martin Johns |
| PROGRAPHER: An Anomaly Detection System based on Provenance Graph Embedding | USENIX Security '23 | Fan Yang, Jiacen Xu, Chunlin Xiong, Zhou Li, Kehuan Zhang |
| Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic Augmentation | USENIX Security '23 | Renjie Xie, Jiahao Cao, Enhuan Dong, Mingwei Xu, Kun Sun, Qi Li, Licheng Shen, Menghao Zhang |
| Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks | USENIX Security '23 | Jialai Wang, Ziyuan Zhang, Meiqi Wang, Han Qiu, Tianwei Zhang, Qi Li, Zongpeng Li, Tao Wei, Chao Zhang |
| Design of Access Control Mechanisms in Systems-on-Chip with Formal Integrity Guarantees | USENIX Security '23 | Dino Mehmedagić, Mohammad Rahmani Fadiheh, Johannes Müller, Anna Lena Duque Antón, Dominik Stoffel, Wolfgang Kunz |
| ICSPatch: Automated Vulnerability Localization and Non-Intrusive Hotpatching in Industrial Control Systems using Data Dependence Graphs | USENIX Security '23 | Prashant Hari Narayan Rajput, Constantine Doumanidis, Michail Maniatakos |
| VeriZexe: Decentralized Private Computation with Universal Setup | USENIX Security '23 | Alex Luoyuan Xiong, Binyi Chen, Zhenfei Zhang, Benedikt Bünz, Ben Fisch, Fernando Krell, Philippe Camacho |
| MTSan: A Feasible and Practical Memory Sanitizer for Fuzzing COTS Binaries | USENIX Security '23 | Xingman Chen, Yinghao Shi, Zheyu Jiang, Yuan Li, Ruoyu Wang, Haixin Duan, Haoyu Wang, Chao Zhang |
| Lessons Lost: Incident Response in the Age of Cyber Insurance and Breach Attorneys | USENIX Security '23 | Daniel W. Woods, Rainer Böhme, Josephine Wolff, Daniel Schwarcz |
| NRDelegationAttack: Complexity DDoS attack on DNS Recursive Resolvers | USENIX Security '23 | Yehuda Afek, Anat Bremler-Barr, Shani Stajnrod |
| Jinn: Hijacking Safe Programs with Trojans | USENIX Security '23 | Komail Dharsee, John Criswell |
| Hiding in Plain Sight: An Empirical Study of Web Application Abuse in Malware | USENIX Security '23 | Mingxuan Yao, Jonathan Fuller, Ranjita Pai Kasturi, Saumya Agarwal, Amit Kumar Sikder, Brendan Saltaformaggio |
| CSHER: A System for Compact Storage with HE-Retrieval | USENIX Security '23 | Adi Akavia, Neta Oren, Boaz Sapir, Margarita Vald |
| The Case for Learned Provenance Graph Storage Systems | USENIX Security '23 | Hailun Ding, Juan Zhai, Dong Deng, Shiqing Ma |
| Understand Users' Privacy Perception and Decision of V2X Communication in Connected Autonomous Vehicles | USENIX Security '23 | Zekun Cai, Aiping Xiong |
| Long Live The Honey Badger: Robust Asynchronous DPSS and its Applications | USENIX Security '23 | Thomas Yurek, Zhuolun Xiang, Yu Xia, Andrew Miller |
| Automated Cookie Notice Analysis and Enforcement | USENIX Security '23 | Rishabh Khandelwal, Asmit Nayak, Hamza Harkous, Kassem Fawaz |
| Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy Labels | USENIX Security '23 | Yue Xiao, Zhengyi Li, Yue Qin, Xiaolong Bai, Jiale Guan, Xiaojing Liao, Luyi Xing |