| Defining "Broken": User Experiences and Remediation Tactics When Ad-Blocking or Tracking-Protection Tools Break a Website’s User Experience | USENIX Security '23 | Alexandra Nisenoff, Arthur Borem, Madison Pickering, Grant Nakanishi, Maya Thumpasery, Blase Ur |
| Log: It’s Big, It’s Heavy, It’s Filled with Personal Data! Measuring the Logging of Sensitive Information in the Android Ecosystem | USENIX Security '23 | Allan Lyons, Julien Gamba, Austin Shawaga, Joel Reardon, Juan Tapiador, Serge Egelman, Narseo Vallina-Rodriguez |
| Fact-Saboteurs: A Taxonomy of Evidence Manipulation Attacks against Fact-Verification Systems | USENIX Security '23 | Sahar Abdelnabi, Mario Fritz |
| Meta-Sift: How to Sift Out a Clean Subset in the Presence of Data Poisoning? | USENIX Security '23 | Yi Zeng, Minzhou Pan, Himanshu Jahagirdar, Ming Jin, Lingjuan Lyu, Ruoxi Jia |
| “Employees Who Don’t Accept the Time Security Takes Are Not Aware Enough”: The CISO View of Human-Centred Security | USENIX Security '23 | Jonas Hielscher, Uta Menges, Simon Parkin, Annette Kluge, M. Angela Sasse |
| How Library IT Staff Navigate Privacy and Security Challenges and Responsibilities | USENIX Security '23 | Alan F. Luo, Noel Warford, Samuel Dooley, Rachel Greenstadt, Michelle L. Mazurek, Nora McDonald |
| Silent Bugs Matter: A Study of Compiler-Introduced Security Bugs | USENIX Security '23 | Jianhao Xu, Kangjie Lu, Zhengjie Du, Zhu Ding, Linke Li, Qiushi Wu, Mathias Payer, Bing Mao |
| IvySyn: Automated Vulnerability Discovery in Deep Learning Frameworks | USENIX Security '23 | Neophytos Christou, Di Jin, Vaggelis Atlidakis, Baishakhi Ray, Vasileios P. Kemerlis |
| User Awareness and Behaviors Concerning Encrypted DNS Settings in Web Browsers | USENIX Security '23 | Alexandra Nisenoff, Ranya Sharma, Nick Feamster |
| It's all in your head(set): Side-channel attacks on AR/VR systems | USENIX Security '23 | Yicheng Zhang, Carter Slocum, Jiasi Chen, Nael Abu-Ghazaleh |
| Work-From-Home and COVID-19: Trajectories of Endpoint Security Management in a Security Operations Center | USENIX Security '23 | Kailani R. Jones, Dalton A. Brucker-Hahn, Bradley Fidler, Alexandru G. Bardas |
| Adversarial Training for Raw-Binary Malware Classifiers | USENIX Security '23 | Keane Lucas, Samruddhi Pai, Weiran Lin, Lujo Bauer, Michael K. Reiter, Mahmood Sharif |
| ELASM: Error-Latency-Aware Scale Management for Fully Homomorphic Encryption | USENIX Security '23 | Yongwoo Lee, Seonyoung Cheon, Dongkwan Kim, Dongyoon Lee, Hanjun Kim |
| Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse | USENIX Security '23 | Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Danny Yuxing Huang, Rahul Chatterjee |
| Trojan Source: Invisible Vulnerabilities | USENIX Security '23 | Nicholas Boucher, Ross Anderson |
| ARMore: Pushing Love Back Into Binaries | USENIX Security '23 | Luca Di Bartolomeo, Hossein Moghaddas, Mathias Payer |
| ProSpeCT: Provably Secure Speculation for the Constant-Time Policy | USENIX Security '23 | Lesly-Ann Daniel, Marton Bognar, Job Noorman, Sébastien Bardin, Tamara Rezk, Frank Piessens |
| Exorcising "Wraith": Protecting LiDAR-based Object Detector in Automated Driving System from Appearing Attacks | USENIX Security '23 | Qifan Xiao, Xudong Pan, Yifan Lu, Mi Zhang, Jiarun Dai, Min Yang |
| GAP: Differentially Private Graph Neural Networks with Aggregation Perturbation | USENIX Security '23 | Sina Sajadmanesh, Ali Shahin Shamsabadi, Aurélien Bellet, Daniel Gatica-Perez |
| SandDriller: A Fully-Automated Approach for Testing Language-Based JavaScript Sandboxes | USENIX Security '23 | Abdullah AlHamdan, Cristian-Alexandru Staicu |
| Catch You and I Can: Revealing Source Voiceprint Against Voice Conversion | USENIX Security '23 | Jiangyi Deng, Yanjiao Chen, Yinan Zhong, Qianhao Miao, Xueluan Gong, Wenyuan Xu |
| How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic | USENIX Security '23 | Mingshi Wu, Jackson Sippe, Danesh Sivakumar, Jack Burg, Peter Anderson, Xiaokang Wang, Kevin Bock, Amir Houmansadr, Dave Levin, Eric Wustrow |
| Pool-Party: Exploiting Browser Resource Pools for Web Tracking | USENIX Security '23 | Peter Snyder, Soroush Karami, Arthur Edelstein, Benjamin Livshits, Hamed Haddadi |
| The Role of Professional Product Reviewers in Evaluating Security and Privacy | USENIX Security '23 | Wentao Guo, Jason Walter, Michelle L. Mazurek |
| Near-Ultrasound Inaudible Trojan (Nuit): Exploiting Your Speaker to Attack Your Microphone | USENIX Security '23 | Qi Xia, Qian Chen, Shouhuai Xu |