| MorFuzz: Fuzzing Processor via Runtime Instruction Morphing enhanced Synchronizable Co-simulation | USENIX Security '23 | Jinyan Xu, Yiyuan Liu, Sirui He, Haoran Lin, Yajin Zhou, Cong Wang |
| Meta-Sift: How to Sift Out a Clean Subset in the Presence of Data Poisoning? | USENIX Security '23 | Yi Zeng, Minzhou Pan, Himanshu Jahagirdar, Ming Jin, Lingjuan Lyu, Ruoxi Jia |
| Adversarial Training for Raw-Binary Malware Classifiers | USENIX Security '23 | Keane Lucas, Samruddhi Pai, Weiran Lin, Lujo Bauer, Michael K. Reiter, Mahmood Sharif |
| No Single Silver Bullet: Measuring the Accuracy of Password Strength Meters | USENIX Security '23 | Ding Wang, Xuan Shan, Qiying Dong, Yaosheng Shen, Chunfu Jia |
| Three Lessons From Threema: Analysis of a Secure Messenger | USENIX Security '23 | Kenneth G. Paterson, Matteo Scarlata, Kien Tuong Truong |
| TreeSync: Authenticated Group Management for Messaging Layer Security | USENIX Security '23 | Théophile Wallez, Jonathan Protzenko, Benjamin Beurdouche, Karthikeyan Bhargavan |
| Formal Analysis of Session-Handling in Secure Messaging: Lifting Security from Sessions to Conversations | USENIX Security '23 | Cas Cremers, Charlie Jacomme, Aurora Naska |
| Fine-grained Poisoning Attack to Local Differential Privacy Protocols for Mean and Variance Estimation | USENIX Security '23 | Xiaoguang Li, Ninghui Li, Wenhai Sun, Neil Zhenqiang Gong, Hui Li |
| PrivateFL: Accurate, Differentially Private Federated Learning via Personalized Data Transformation | USENIX Security '23 | Yuchen Yang, Bo Hui, Haolin Yuan, Neil Gong, Yinzhi Cao |
| Every Vote Counts: Ranking-Based Training of Federated Learning to Resist Poisoning Attacks | USENIX Security '23 | Hamid Mozaffari, Virat Shejwalkar, Amir Houmansadr |
| Hidden Reality: Caution, Your Hand Gesture Inputs in the Immersive Virtual World are Visible to All! | USENIX Security '23 | Sindhu Reddy Kalathur Gopal, Diksha Shukla, James David Wheelock, Nitesh Saxena |
| Measuring Up to (Reasonable) Consumer Expectations: Providing an Empirical Basis for Holding IoT Manufacturers Legally Responsible | USENIX Security '23 | Lorenz Kustosch, Carlos Gañán, Mattis van 't Schip, Michel van Eeten, Simon Parkin |
| Pass2Edit: A Multi-Step Generative Model for Guessing Edited Passwords | USENIX Security '23 | Ding Wang, Yunkai Zou, Yuan-An Xiao, Siqi Ma, Xiaofeng Chen |
| PoliGraph: Automated Privacy Policy Analysis using Knowledge Graphs | USENIX Security '23 | Hao Cui, Rahmadi Trimananda, Athina Markopoulou, Scott Jordan |
| µFUZZ: Redesign of Parallel Fuzzing using Microservice Architecture | USENIX Security '23 | Yongheng Chen, Rui Zhong, Yupeng Yang, Hong Hu, Dinghao Wu, Wenke Lee |
| FISHFUZZ: Catch Deeper Bugs by Throwing Larger Nets | USENIX Security '23 | Han Zheng, Jiayuan Zhang, Yuhang Huang, Zezhong Ren, He Wang, Chunjie Cao, Yuqing Zhang, Flavio Toffalini, Mathias Payer |
| PORE: Provably Robust Recommender Systems against Data Poisoning Attacks | USENIX Security '23 | Jinyuan Jia, Yupei Liu, Yuepeng Hu, Neil Zhenqiang Gong |
| Private Proof-of-Stake Blockchains using Differentially-Private Stake Distortion | USENIX Security '23 | Chenghong Wang, David Pujol, Kartik Nayak, Ashwin Machanavajjhala |
| Evading Provenance-Based ML Detectors with Adversarial System Actions | USENIX Security '23 | Kunal Mukherjee, Joshua Wiedemeier, Tianhao Wang, James Wei, Feng Chen, Muhyun Kim, Murat Kantarcioglu, Kangkook Jee |
| Wink: Deniable Secure Messaging | USENIX Security '23 | Anrin Chakraborti, Darius Suciu, Radu Sion |
| Cryptographic Administration for Secure Group Messaging | USENIX Security '23 | David Balbás, Daniel Collins, Serge Vaudenay |
| Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against Data-Oriented Attacks | USENIX Security '23 | Salman Ahmed, Hans Liljestrand, Hani Jamjoom, Matthew Hicks, N. Asokan, Danfeng (Daphne) Yao |
| Calpric: Inclusive and Fine-grain Labeling of Privacy Policies with Crowdsourcing and Active Learning | USENIX Security '23 | Wenjun Qiu, David Lie, Lisa Austin |
| HyPFuzz: Formal-Assisted Processor Fuzzing | USENIX Security '23 | Chen Chen, Rahul Kande, Nathan Nguyen, Flemming Andersen, Aakash Tyagi, Ahmad-Reza Sadeghi, Jeyavijayan Rajendran |
| LocIn: Inferring Semantic Location from Spatial Maps in Mixed Reality | USENIX Security '23 | Habiba Farrukh, Reham Mohamed, Aniket Nare, Antonio Bianchi, Z. Berkay Celik |