USENIX Security '23 | How to Cover up Anomalous Accesses to Electronic Health Records | Xiaojun Xu, Qingying Hao, Zhuolin Yang, Bo Li, David Liebovitz, Gang Wang, Carl A. Gunter |
USENIX Security '23 | Distance-Aware Private Set Intersection | Anrin Chakraborti, Giulia Fanti, Michael K. Reiter |
USENIX Security '23 | TPatch: A Triggered Physical Adversarial Patch | Wenjun Zhu, Xiaoyu Ji, Yushi Cheng, Shibo Zhang, Wenyuan Xu |
USENIX Security '23 | CAPatch: Physical Adversarial Patch against Image Captioning Systems | Shibo Zhang, Yushi Cheng, Wenjun Zhu, Xiaoyu Ji, Wenyuan Xu |
USENIX Security '23 | Adversarial Training for Raw-Binary Malware Classifiers | Keane Lucas, Samruddhi Pai, Weiran Lin, Lujo Bauer, Michael K. Reiter, Mahmood Sharif |
USENIX Security '23 | Formal Analysis of Session-Handling in Secure Messaging: Lifting Security from Sessions to Conversations | Cas Cremers, Charlie Jacomme, Aurora Naska |
USENIX Security '23 | Meta-Sift: How to Sift Out a Clean Subset in the Presence of Data Poisoning? | Yi Zeng, Minzhou Pan, Himanshu Jahagirdar, Ming Jin, Lingjuan Lyu, Ruoxi Jia |
USENIX Security '23 | Every Vote Counts: Ranking-Based Training of Federated Learning to Resist Poisoning Attacks | Hamid Mozaffari, Virat Shejwalkar, Amir Houmansadr |
USENIX Security '23 | Proxy Hunting: Understanding and Characterizing Proxy-based Upgradeable Smart Contracts in Blockchains | William E Bodell III, Sajad Meisami, Yue Duan |
USENIX Security '23 | “Employees Who Don’t Accept the Time Security Takes Are Not Aware Enough”: The CISO View of Human-Centred Security | Jonas Hielscher, Uta Menges, Simon Parkin, Annette Kluge, M. Angela Sasse |
USENIX Security '23 | Framing Frames: Bypassing Wi-Fi Encryption by Manipulating Transmit Queues | Domien Schepers, Aanjhan Ranganathan, Mathy Vanhoef |
USENIX Security '23 | Towards a General Video-based Keystroke Inference Attack | Zhuolin Yang, Yuxin Chen, Zain Sarwar, Hadleigh Schwartz, Ben Y. Zhao, Haitao Zheng |
USENIX Security '23 | Going through the motions: AR/VR keylogging from user head motions | Carter Slocum, Yicheng Zhang, Nael Abu-Ghazaleh, Jiasi Chen |
USENIX Security '23 | Watch your Watch: Inferring Personality Traits from Wearable Activity Trackers | Noé Zufferey, Mathias Humbert, Romain Tavenard, Kévin Huguenin |
USENIX Security '23 | Combating Robocalls with Phone Virtual Assistant Mediated Interaction | Sharbani Pandit, Krishanu Sarker, Roberto Perdisci, Mustaque Ahamad, Diyi Yang |
USENIX Security '23 | The Gates of Time: Improving Cache Attacks with Transient Execution | Daniel Katzman, William Kosasih, Chitchanok Chuengsatiansup, Eyal Ronen, Yuval Yarom |
USENIX Security '23 | The Writing on the Wall and 3D Digital Twins: Personal Information in (not so) Private Real Estate | Rachel McAmis, Tadayoshi Kohno |
USENIX Security '23 | Hidden Reality: Caution, Your Hand Gesture Inputs in the Immersive Virtual World are Visible to All! | Sindhu Reddy Kalathur Gopal, Diksha Shukla, James David Wheelock, Nitesh Saxena |
USENIX Security '23 | Exploring User Reactions and Mental Models Towards Perceptual Manipulation Attacks in Mixed Reality | Kaiming Cheng, Jeffery F. Tian, Tadayoshi Kohno, Franziska Roesner |
USENIX Security '23 | Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy Labels | Yue Xiao, Zhengyi Li, Yue Qin, Xiaolong Bai, Jiale Guan, Xiaojing Liao, Luyi Xing |
USENIX Security '23 | Automated Cookie Notice Analysis and Enforcement | Rishabh Khandelwal, Asmit Nayak, Hamza Harkous, Kassem Fawaz |
USENIX Security '23 | Are Consumers Willing to Pay for Security and Privacy of IoT Devices? | Pardis Emami-Naeini, Janarth Dheenadhayalan, Yuvraj Agarwal, Lorrie Faith Cranor |
USENIX Security '23 | Detecting and Handling IoT Interaction Threats in Multi-Platform Multi-Control-Channel Smart Homes | Haotian Chi, Qiang Zeng, Xiaojiang Du |
USENIX Security '23 | PrivateFL: Accurate, Differentially Private Federated Learning via Personalized Data Transformation | Yuchen Yang, Bo Hui, Haolin Yuan, Neil Gong, Yinzhi Cao |
USENIX Security '23 | PrivTrace: Differentially Private Trajectory Synthesis by Adaptive Markov Models | Haiming Wang, Zhikun Zhang, Tianhao Wang, Shibo He, Michael Backes, Jiming Chen, Yang Zhang |