USENIX Security '23 | Improving Logging to Reduce Permission Over-Granting Mistakes | Bingyu Shen, Tianyi Shan, Yuanyuan Zhou |
USENIX Security '23 | PUMM: Preventing Use-After-Free Using Execution Unit Partitioning | Carter Yagemann, Simon P. Chung, Brendan Saltaformaggio, Wenke Lee |
USENIX Security '23 | TPatch: A Triggered Physical Adversarial Patch | Wenjun Zhu, Xiaoyu Ji, Yushi Cheng, Shibo Zhang, Wenyuan Xu |
USENIX Security '23 | Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine Learning | Jonathan Prokos, Neil Fendley, Matthew Green, Roei Schuster, Eran Tromer, Tushar Jois, Yinzhi Cao |
USENIX Security '23 | Combating Robocalls with Phone Virtual Assistant Mediated Interaction | Sharbani Pandit, Krishanu Sarker, Roberto Perdisci, Mustaque Ahamad, Diyi Yang |
USENIX Security '23 | Distance-Aware Private Set Intersection | Anrin Chakraborti, Giulia Fanti, Michael K. Reiter |
USENIX Security '23 | Towards a General Video-based Keystroke Inference Attack | Zhuolin Yang, Yuxin Chen, Zain Sarwar, Hadleigh Schwartz, Ben Y. Zhao, Haitao Zheng |
USENIX Security '23 | PhyAuth: Physical-Layer Message Authentication for ZigBee Networks | Ang Li, Jiawei Li, Dianqi Han, Yan Zhang, Tao Li, Ting Zhu, Yanchao Zhang |
USENIX Security '23 | Linear Private Set Union from Multi-Query Reverse Private Membership Test | Cong Zhang, Yu Chen, Weiran Liu, Min Zhang, Dongdai Lin |
USENIX Security '23 | Framing Frames: Bypassing Wi-Fi Encryption by Manipulating Transmit Queues | Domien Schepers, Aanjhan Ranganathan, Mathy Vanhoef |
USENIX Security '23 | Formal Analysis and Patching of BLE-SC Pairing | Min Shi, Jing Chen, Kun He, Haoran Zhao, Meng Jia, Ruiying Du |
USENIX Security '23 | CAPatch: Physical Adversarial Patch against Image Captioning Systems | Shibo Zhang, Yushi Cheng, Wenjun Zhu, Xiaoyu Ji, Wenyuan Xu |
USENIX Security '23 | Going through the motions: AR/VR keylogging from user head motions | Carter Slocum, Yicheng Zhang, Nael Abu-Ghazaleh, Jiasi Chen |
USENIX Security '23 | Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic Augmentation | Renjie Xie, Jiahao Cao, Enhuan Dong, Mingwei Xu, Kun Sun, Qi Li, Licheng Shen, Menghao Zhang |
USENIX Security '23 | MTSan: A Feasible and Practical Memory Sanitizer for Fuzzing COTS Binaries | Xingman Chen, Yinghao Shi, Zheyu Jiang, Yuan Li, Ruoyu Wang, Haixin Duan, Haoyu Wang, Chao Zhang |
USENIX Security '23 | Capstone: A Capability-based Foundation for Trustless Secure Memory Access | Jason Zhijingcheng Yu, Conrad Watt, Aditya Badole, Trevor E. Carlson, Prateek Saxena |
USENIX Security '23 | Watch your Watch: Inferring Personality Traits from Wearable Activity Trackers | Noé Zufferey, Mathias Humbert, Romain Tavenard, Kévin Huguenin |
USENIX Security '23 | Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse | Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Danny Yuxing Huang, Rahul Chatterjee |
USENIX Security '23 | Diving into Robocall Content with SnorCall | Sathvik Prasad, Trevor Dunlap, Alexander Ross, Bradley Reaves |
USENIX Security '23 | How to Cover up Anomalous Accesses to Electronic Health Records | Xiaojun Xu, Qingying Hao, Zhuolin Yang, Bo Li, David Liebovitz, Gang Wang, Carl A. Gunter |
USENIX Security '23 | Know Your Cybercriminal: Evaluating Attacker Preferences by Measuring Profile Sales on an Active, Leading Criminal Market for User Impersonation at Scale | Michele Campobasso, Luca Allodi |
USENIX Security '23 | An Input-Agnostic Hierarchical Deep Learning Framework for Traffic Fingerprinting | Jian Qu, Xiaobo Ma, Jianfeng Li, Xiapu Luo, Lei Xue, Junjie Zhang, Zhenhua Li, Li Feng, Xiaohong Guan |
USENIX Security '23 | Subverting Website Fingerprinting Defenses with Robust Traffic Representation | Meng Shen, Kexin Ji, Zhenbo Gao, Qi Li, Liehuang Zhu, Ke Xu |
USENIX Security '23 | POLICYCOMP: Counterpart Comparison of Privacy Policies Uncovers Overbroad Personal Data Collection Practices | Lu Zhou, Chengyongxiao Wei, Tong Zhu, Guoxing Chen, Xiaokuan Zhang, Suguo Du, Hui Cao, Haojin Zhu |
USENIX Security '23 | Exploring User Reactions and Mental Models Towards Perceptual Manipulation Attacks in Mixed Reality | Kaiming Cheng, Jeffery F. Tian, Tadayoshi Kohno, Franziska Roesner |