| Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse | USENIX Security '23 | Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Danny Yuxing Huang, Rahul Chatterjee |
| Trojan Source: Invisible Vulnerabilities | USENIX Security '23 | Nicholas Boucher, Ross Anderson |
| ARMore: Pushing Love Back Into Binaries | USENIX Security '23 | Luca Di Bartolomeo, Hossein Moghaddas, Mathias Payer |
| ProSpeCT: Provably Secure Speculation for the Constant-Time Policy | USENIX Security '23 | Lesly-Ann Daniel, Marton Bognar, Job Noorman, Sébastien Bardin, Tamara Rezk, Frank Piessens |
| Exorcising "Wraith": Protecting LiDAR-based Object Detector in Automated Driving System from Appearing Attacks | USENIX Security '23 | Qifan Xiao, Xudong Pan, Yifan Lu, Mi Zhang, Jiarun Dai, Min Yang |
| GAP: Differentially Private Graph Neural Networks with Aggregation Perturbation | USENIX Security '23 | Sina Sajadmanesh, Ali Shahin Shamsabadi, Aurélien Bellet, Daniel Gatica-Perez |
| SandDriller: A Fully-Automated Approach for Testing Language-Based JavaScript Sandboxes | USENIX Security '23 | Abdullah AlHamdan, Cristian-Alexandru Staicu |
| Catch You and I Can: Revealing Source Voiceprint Against Voice Conversion | USENIX Security '23 | Jiangyi Deng, Yanjiao Chen, Yinan Zhong, Qianhao Miao, Xueluan Gong, Wenyuan Xu |
| How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic | USENIX Security '23 | Mingshi Wu, Jackson Sippe, Danesh Sivakumar, Jack Burg, Peter Anderson, Xiaokang Wang, Kevin Bock, Amir Houmansadr, Dave Levin, Eric Wustrow |
| Pool-Party: Exploiting Browser Resource Pools for Web Tracking | USENIX Security '23 | Peter Snyder, Soroush Karami, Arthur Edelstein, Benjamin Livshits, Hamed Haddadi |
| The Role of Professional Product Reviewers in Evaluating Security and Privacy | USENIX Security '23 | Wentao Guo, Jason Walter, Michelle L. Mazurek |
| Near-Ultrasound Inaudible Trojan (Nuit): Exploiting Your Speaker to Attack Your Microphone | USENIX Security '23 | Qi Xia, Qian Chen, Shouhuai Xu |
| Bilingual Problems: Studying the Security Risks Incurred by Native Extensions in Scripting Languages | USENIX Security '23 | Cristian-Alexandru Staicu, Sazzadur Rahaman, Ágnes Kiss, Michael Backes |
| Ultimate SLH: Taking Speculative Load Hardening to the Next Level | USENIX Security '23 | Zhiyuan Zhang, Gilles Barthe, Chitchanok Chuengsatiansup, Peter Schwabe, Yuval Yarom |
| Intender: Fuzzing Intent-Based Networking with Intent-State Transition Guidance | USENIX Security '23 | Jiwon Kim, Benjamin E. Ujcich, Dave (Jing) Tian |
| Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-M | USENIX Security '23 | Xhani Marvin Saß, Richard Mitev, Ahmad-Reza Sadeghi |
| No Single Silver Bullet: Measuring the Accuracy of Password Strength Meters | USENIX Security '23 | Ding Wang, Xuan Shan, Qiying Dong, Yaosheng Shen, Chunfu Jia |
| Place Your Locks Well: Understanding and Detecting Lock Misuse Bugs | USENIX Security '23 | Yuandao Cai, Peisen Yao, Chengfeng Ye, Charles Zhang |
| Three Lessons From Threema: Analysis of a Secure Messenger | USENIX Security '23 | Kenneth G. Paterson, Matteo Scarlata, Kien Tuong Truong |
| One Size Does not Fit All: Quantifying the Risk of Malicious App Encounters for Different Android User Profiles | USENIX Security '23 | Savino Dambra, Leyla Bilge, Platon Kotzias, Yun Shen, Juan Caballero |
| “Security is not my field, I’m a stats guy”: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry | USENIX Security '23 | Jaron Mink, Harjot Kaur, Juliane Schmüser, Sascha Fahl, Yasemin Acar |
| BoKASAN: Binary-only Kernel Address Sanitizer for Effective Kernel Fuzzing | USENIX Security '23 | Mingi Cho, Dohyeon An, Hoyong Jin, Taekyoung Kwon |
| The Blockchain Imitation Game | USENIX Security '23 | Kaihua Qin, Stefanos Chaliasos, Liyi Zhou, Benjamin Livshits, Dawn Song, Arthur Gervais |
| We Really Need to Talk About Session Tickets: A Large-Scale Analysis of Cryptographic Dangers with TLS Session Tickets | USENIX Security '23 | Sven Hebrok, Simon Nachtigall, Marcel Maehren, Nurullah Erinola, Robert Merget, Juraj Somorovsky, Jörg Schwenk |
| Duoram: A Bandwidth-Efficient Distributed ORAM for 2- and 3-Party Computation | USENIX Security '23 | Adithya Vadapalli, Ryan Henry, Ian Goldberg |