| On the Security Risks of Knowledge Graph Reasoning | USENIX Security '23 | Zhaohan Xi, Tianyu Du, Changjiang Li, Ren Pang, Shouling Ji, Xiapu Luo, Xusheng Xiao, Fenglong Ma, Ting Wang |
| Private Proof-of-Stake Blockchains using Differentially-Private Stake Distortion | USENIX Security '23 | Chenghong Wang, David Pujol, Kartik Nayak, Ashwin Machanavajjhala |
| Union under Duress: Understanding Hazards of Duplicate Resource Mismediation in Android Software Supply Chain | USENIX Security '23 | Xueqiang Wang, Yifan Zhang, XiaoFeng Wang, Yan Jia, Luyi Xing |
| Medusa Attack: Exploring Security Hazards of In-App QR Code Scanning | USENIX Security '23 | Xing Han, Yuheng Zhang, Xue Zhang, Zeyuan Chen, Mingzhe Wang, Yiwei Zhang, Siqi Ma, Yu Yu, Elisa Bertino, Juanru Li |
| LibScan: Towards More Precise Third-Party Library Identification for Android Applications | USENIX Security '23 | Yafei Wu, Cong Sun, Dongrui Zeng, Gang Tan, Siqi Ma, Peicheng Wang |
| Beyond Typosquatting: An In-depth Look at Package Confusion | USENIX Security '23 | Shradha Neupane, Grant Holmes, Elizabeth Wyss, Drew Davidson, Lorenzo De Carli |
| PrivGraph: Differentially Private Graph Data Publication by Exploiting Community Information | USENIX Security '23 | Quan Yuan, Zhikun Zhang, Linkang Du, Min Chen, Peng Cheng, Mingyang Sun |
| WaterBear: Practical Asynchronous BFT Matching Security Guarantees of Partially Synchronous BFT | USENIX Security '23 | Haibin Zhang, Sisi Duan, Boxin Zhao, Liehuang Zhu |
| FACE-AUDITOR: Data Auditing in Facial Recognition Systems | USENIX Security '23 | Min Chen, Zhikun Zhang, Tianhao Wang, Michael Backes, Yang Zhang |
| Rods with Laser Beams: Understanding Browser Fingerprinting on Phishing Pages | USENIX Security '23 | Iskander Sanchez-Rola, Leyla Bilge, Davide Balzarotti, Armin Buescher, Petros Efstathopoulos |
| Dubhe: Succinct Zero-Knowledge Proofs for Standard AES and related Applications | USENIX Security '23 | Changchang Ding, Yan Huang |
| Two-in-One: A Model Hijacking Attack Against Text Generation Models | USENIX Security '23 | Wai Man Si, Michael Backes, Yang Zhang, Ahmed Salem |
| Evading Provenance-Based ML Detectors with Adversarial System Actions | USENIX Security '23 | Kunal Mukherjee, Joshua Wiedemeier, Tianhao Wang, James Wei, Feng Chen, Muhyun Kim, Murat Kantarcioglu, Kangkook Jee |
| Curve Trees: Practical and Transparent Zero-Knowledge Accumulators | USENIX Security '23 | Matteo Campanelli, Mathias Hall-Andersen, Simon Holmgaard Kamp |
| An Empirical Study & Evaluation of Modern CAPTCHAs | USENIX Security '23 | Andrew Searles, Yoshimichi Nakatsuka, Ercan Ozturk, Andrew Paverd, Gene Tsudik, Ai Enkoji |
| Checking Passwords on Leaky Computers: A Side Channel Analysis of Chrome's Password Leak Detect Protocol | USENIX Security '23 | Andrew Kwong, Walter Wang, Jason Kim, Jonathan Berger, Daniel Genkin, Eyal Ronen, Hovav Shacham, Riad Wahby, Yuval Yarom |
| AIRTAG: Towards Automated Attack Investigation by Unsupervised Learning with Log Texts | USENIX Security '23 | Hailun Ding, Juan Zhai, Yuhong Nan, Shiqing Ma |
| Wink: Deniable Secure Messaging | USENIX Security '23 | Anrin Chakraborti, Darius Suciu, Radu Sion |
| PATROL: Provable Defense against Adversarial Policy in Two-player Games | USENIX Security '23 | Wenbo Guo, Xian Wu, Lun Wang, Xinyu Xing, Dawn Song |
| Cryptographic Administration for Secure Group Messaging | USENIX Security '23 | David Balbás, Daniel Collins, Serge Vaudenay |
| RIDAS: Real-time identification of attack sources on controller area networks | USENIX Security '23 | Jiwoo Shin, Hyunghoon Kim, Seyoung Lee, Wonsuk Choi, Dong Hoon Lee, Hyo Jin Jo |
| No Linux, No Problem: Fast and Correct Windows Binary Fuzzing via Target-embedded Snapshotting | USENIX Security '23 | Leo Stone, Rishi Ranjan, Stefan Nagy, Matthew Hicks |
| Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against Data-Oriented Attacks | USENIX Security '23 | Salman Ahmed, Hans Liljestrand, Hani Jamjoom, Matthew Hicks, N. Asokan, Danfeng (Daphne) Yao |
| Freaky Leaky SMS: Extracting User Locations by Analyzing SMS Timings | USENIX Security '23 | Evangelos Bitsikas, Theodor Schnitzler, Christina Pöpper, Aanjhan Ranganathan |
| EnigMap: External-Memory Oblivious Map for Secure Enclaves | USENIX Security '23 | Afonso Tinoco, Sixiang Gao, Elaine Shi |