USENIX Security '23 | How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic | Mingshi Wu, Jackson Sippe, Danesh Sivakumar, Jack Burg, Peter Anderson, Xiaokang Wang, Kevin Bock, Amir Houmansadr, Dave Levin, Eric Wustrow |
USENIX Security '23 | ARI: Attestation of Real-time Mission Execution Integrity | Jinwen Wang, Yujie Wang, Ao Li, Yang Xiao, Ruide Zhang, Wenjing Lou, Y. Thomas Hou, Ning Zhang |
USENIX Security '23 | Understand Users' Privacy Perception and Decision of V2X Communication in Connected Autonomous Vehicles | Zekun Cai, Aiping Xiong |
USENIX Security '23 | You Can't See Me: Physical Removal Attacks on LiDAR-based Autonomous Vehicles Driving Frameworks | Yulong Cao, S. Hrushikesh Bhupathiraju, Pirouz Naghavi, Takeshi Sugawara, Z. Morley Mao, Sara Rampazzi |
USENIX Security '23 | NRDelegationAttack: Complexity DDoS attack on DNS Recursive Resolvers | Yehuda Afek, Anat Bremler-Barr, Shani Stajnrod |
USENIX Security '23 | The Case for Learned Provenance Graph Storage Systems | Hailun Ding, Juan Zhai, Dong Deng, Shiqing Ma |
USENIX Security '23 | DynSQL: Stateful Fuzzing for Database Management Systems with Complex and Valid SQL Query Generation | Zu-Ming Jiang, Jia-Ju Bai, Zhendong Su |
USENIX Security '23 | ELASM: Error-Latency-Aware Scale Management for Fully Homomorphic Encryption | Yongwoo Lee, Seonyoung Cheon, Dongkwan Kim, Dongyoon Lee, Hanjun Kim |
USENIX Security '23 | “If sighted people know, I should be able to know:” Privacy Perceptions of Bystanders with Visual Impairments around Camera-based Technology | Yuhang Zhao, Yaxing Yao, Jiaru Fu, Nihan Zhou |
USENIX Security '23 | Remote Attacks on Speech Recognition Systems Using Sound from Power Supply | Lanqing Yang, Xinqi Chen, Xiangyong Jian, Leping Yang, Yijie Li, Qianfei Ren, Yi-Chao Chen, Guangtao Xue, Xiaoyu Ji |
USENIX Security '23 | The Space of Adversarial Strategies | Ryan Sheatsley, Blaine Hoak, Eric Pauley, Patrick McDaniel |
USENIX Security '23 | "My Privacy for their Security": Employees' Privacy Perspectives and Expectations when using Enterprise Security Software | Jonah Stegman, Patrick J. Trottier, Caroline Hillier, Hassan Khan, Mohammad Mannan |
USENIX Security '23 | Don’t be Dense: Efficient Keyword PIR for Sparse Databases | Sarvar Patel, Joon Young Seo, Kevin Yeo |
USENIX Security '23 | VeriZexe: Decentralized Private Computation with Universal Setup | Alex Luoyuan Xiong, Binyi Chen, Zhenfei Zhang, Benedikt Bünz, Ben Fisch, Fernando Krell, Philippe Camacho |
USENIX Security '23 | SMACK: Semantically Meaningful Adversarial Audio Attack | Zhiyuan Yu, Yuanhaur Chang, Ning Zhang, Chaowei Xiao |
USENIX Security '23 | Duoram: A Bandwidth-Efficient Distributed ORAM for 2- and 3-Party Computation | Adithya Vadapalli, Ryan Henry, Ian Goldberg |
USENIX Security '23 | Controlled Data Races in Enclaves: Attacks and Detection | Sanchuan Chen, Zhiqiang Lin, Yinqian Zhang |
USENIX Security '23 | Know Your Cybercriminal: Evaluating Attacker Preferences by Measuring Profile Sales on an Active, Leading Criminal Market for User Impersonation at Scale | Michele Campobasso, Luca Allodi |
USENIX Security '23 | autofz: Automated Fuzzer Composition at Runtime | Yu-Fu Fu, Jaehyuk Lee, Taesoo Kim |
USENIX Security '23 | Black-box Adversarial Example Attack towards FCG Based Android Malware Detection under Incomplete Feature Information | Heng Li, Zhang Cheng, Bang Wu, Liheng Yuan, Cuiying Gao, Wei Yuan, Xiapu Luo |
USENIX Security '23 | Three Lessons From Threema: Analysis of a Secure Messenger | Kenneth G. Paterson, Matteo Scarlata, Kien Tuong Truong |
USENIX Security '23 | GLeeFuzz: Fuzzing WebGL Through Error Message Guided Mutation | Hui Peng, Zhihao Yao, Ardalan Amiri Sani, Dave (Jing) Tian, Mathias Payer |
USENIX Security '23 | An Input-Agnostic Hierarchical Deep Learning Framework for Traffic Fingerprinting | Jian Qu, Xiaobo Ma, Jianfeng Li, Xiapu Luo, Lei Xue, Junjie Zhang, Zhenhua Li, Li Feng, Xiaohong Guan |
USENIX Security '23 | Improving Logging to Reduce Permission Over-Granting Mistakes | Bingyu Shen, Tianyi Shan, Yuanyuan Zhou |
USENIX Security '23 | Subverting Website Fingerprinting Defenses with Robust Traffic Representation | Meng Shen, Kexin Ji, Zhenbo Gao, Qi Li, Liehuang Zhu, Ke Xu |