USENIX Security '23 | FuzzJIT: Oracle-Enhanced Fuzzing for JavaScript Engine JIT Compiler | |
USENIX Security '23 | Credit Karma: Understanding Security Implications of Exposed Cloud Services through Automated Capability Inference | |
USENIX Security '23 | That Person Moves Like A Car: Misclassification Attack Detection for Autonomous Systems Using Spatiotemporal Consistency | |
USENIX Security '23 | Pspray: Timing Side-Channel based Linux Kernel Heap Exploitation Technique | |
USENIX Security '23 | Strategies and Vulnerabilities of Participants in Venezuelan Influence Operations | |
USENIX Security '23 | Investigating Verification Behavior and Perceptions of Visual Digital Certificates | |
USENIX Security '23 | Remote Attacks on Speech Recognition Systems Using Sound from Power Supply | |
USENIX Security '23 | HOMESPY: The Invisible Sniffer of Infrared Remote Control of Smart TVs | |
USENIX Security '23 | TPatch: A Triggered Physical Adversarial Patch | |
USENIX Security '23 | Assessing Anonymity Techniques Employed in German Court Decisions: A De-Anonymization Experiment | |
USENIX Security '23 | GLeeFuzz: Fuzzing WebGL Through Error Message Guided Mutation | |
USENIX Security '23 | Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps | |
USENIX Security '23 | The Space of Adversarial Strategies | |
USENIX Security '23 | Side-Channel Attacks on Optane Persistent Memory | |
USENIX Security '23 | Automated Security Analysis of Exposure Notification Systems | |
USENIX Security '23 | xNIDS: Explaining Deep Learning-based Network Intrusion Detection Systems for Active Intrusion Responses | |
USENIX Security '23 | Glowing in the Dark: Uncovering IPv6 Address Discovery and Scanning Strategies in the Wild | |
USENIX Security '23 | Every Signature is Broken: On the Insecurity of Microsoft Office’s OOXML Signatures | |
USENIX Security '23 | Humans vs. Machines in Malware Classification | |
USENIX Security '23 | How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment | |
USENIX Security '23 | Distance-Aware Private Set Intersection | |
USENIX Security '23 | PhyAuth: Physical-Layer Message Authentication for ZigBee Networks | |
USENIX Security '23 | Person Re-identification in 3D Space: A WiFi Vision-based Approach | |
USENIX Security '23 | Fourteen Years in the Life: A Root Server’s Perspective on DNS Resolver Security | |
USENIX Security '23 | ClepsydraCache -- Preventing Cache Attacks with Time-Based Evictions | |