| MTSan: A Feasible and Practical Memory Sanitizer for Fuzzing COTS Binaries | USENIX Security '23 | Xingman Chen, Yinghao Shi, Zheyu Jiang, Yuan Li, Ruoyu Wang, Haixin Duan, Haoyu Wang, Chao Zhang |
| Capstone: A Capability-based Foundation for Trustless Secure Memory Access | USENIX Security '23 | Jason Zhijingcheng Yu, Conrad Watt, Aditya Badole, Trevor E. Carlson, Prateek Saxena |
| Watch your Watch: Inferring Personality Traits from Wearable Activity Trackers | USENIX Security '23 | Noé Zufferey, Mathias Humbert, Romain Tavenard, Kévin Huguenin |
| Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse | USENIX Security '23 | Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Danny Yuxing Huang, Rahul Chatterjee |
| Diving into Robocall Content with SnorCall | USENIX Security '23 | Sathvik Prasad, Trevor Dunlap, Alexander Ross, Bradley Reaves |
| How to Cover up Anomalous Accesses to Electronic Health Records | USENIX Security '23 | Xiaojun Xu, Qingying Hao, Zhuolin Yang, Bo Li, David Liebovitz, Gang Wang, Carl A. Gunter |
| Know Your Cybercriminal: Evaluating Attacker Preferences by Measuring Profile Sales on an Active, Leading Criminal Market for User Impersonation at Scale | USENIX Security '23 | Michele Campobasso, Luca Allodi |
| An Input-Agnostic Hierarchical Deep Learning Framework for Traffic Fingerprinting | USENIX Security '23 | Jian Qu, Xiaobo Ma, Jianfeng Li, Xiapu Luo, Lei Xue, Junjie Zhang, Zhenhua Li, Li Feng, Xiaohong Guan |
| Subverting Website Fingerprinting Defenses with Robust Traffic Representation | USENIX Security '23 | Meng Shen, Kexin Ji, Zhenbo Gao, Qi Li, Liehuang Zhu, Ke Xu |
| HorusEye: A Realtime IoT Malicious Traffic Detection Framework using Programmable Switches | USENIX Security '23 | Yutao Dong, Qing Li, Kaidong Wu, Ruoyu Li, Dan Zhao, Gareth Tyson, Junkun Peng, Yong Jiang, Shutao Xia, Mingwei Xu |
| Exploring Tenants' Preferences of Privacy Negotiation in Airbnb | USENIX Security '23 | Zixin Wang, Danny Yuxing Huang, Yaxing Yao |
| Auditing Frameworks Need Resource Isolation: A Systematic Study on the Super Producer Threat to System Auditing and Its Mitigation | USENIX Security '23 | Peng Jiang, Ruizhe Huang, Ding Li, Yao Guo, Xiangqun Chen, Jianhai Luan, Yuxin Ren, Xinwei Hu |
| Towards Targeted Obfuscation of Adversarial Unsafe Images using Reconstruction and Counterfactual Super Region Attribution Explainability | USENIX Security '23 | Mazal Bethany, Andrew Seong, Samuel Henrique Silva, Nicole Beebe, Nishant Vishwamitra, Peyman Najafirad |
| Sneaky Spy Devices and Defective Detectors: The Ecosystem of Intimate Partner Surveillance with Covert Devices | USENIX Security '23 | Rose Ceccio, Sophie Stephenson, Varun Chadha, Danny Yuxing Huang, Rahul Chatterjee |
| AIRTAG: Towards Automated Attack Investigation by Unsupervised Learning with Log Texts | USENIX Security '23 | Hailun Ding, Juan Zhai, Yuhong Nan, Shiqing Ma |
| KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR Systems | USENIX Security '23 | Xinghui Wu, Shiqing Ma, Chao Shen, Chenhao Lin, Qian Wang, Qi Li, Yuan Rao |
| BotScreen: Trust Everybody, but Cut the Aimbots Yourself | USENIX Security '23 | Minyeop Choi, Gihyuk Ko, Sang Kil Cha |
| Time for Change: How Clocks Break UWB Secure Ranging | USENIX Security '23 | Claudio Anliker, Giovanni Camurati, Srdjan Čapkun |
| Efficient Unbalanced Private Set Intersection Cardinality and User-friendly Privacy-preserving Contact Tracing | USENIX Security '23 | Mingli Wu, Tsz Hon Yuen |
| FloatZone: Accelerating Memory Error Detection using the Floating Point Unit | USENIX Security '23 | Floris Gorter, Enrico Barberis, Raphael Isemann, Erik van der Kouwe, Cristiano Giuffrida, Herbert Bos |
| The Digital-Safety Risks of Financial Technologies for Survivors of Intimate Partner Violence | USENIX Security '23 | Rosanna Bellini, Kevin Lee, Megan A. Brown, Jeremy Shaffer, Rasika Bhalerao, Thomas Ristenpart |
| Mixed Signals: Analyzing Ground-Truth Data on the Users and Economics of a Bitcoin Mixing Service | USENIX Security '23 | Fieke Miedema, Kelvin Lubbertsen, Verena Schrama, Rolf van Wegberg |
| Exploring Privacy and Incentives Considerations in Adoption of COVID-19 Contact Tracing Apps | USENIX Security '23 | Oshrat Ayalon, Dana Turjeman, Elissa M. Redmiles |
| "It's the Equivalent of Feeling Like You're in Jail”: Lessons from Firsthand and Secondhand Accounts of IoT-Enabled Intimate Partner Abuse | USENIX Security '23 | Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Rahul Chatterjee |
| Anatomy of a High-Profile Data Breach: Dissecting the Aftermath of a Crypto-Wallet Case | USENIX Security '23 | Svetlana Abramova, Rainer Böhme |