USENIX Security '23 | PrivTrace: Differentially Private Trajectory Synthesis by Adaptive Markov Models | Haiming Wang, Zhikun Zhang, Tianhao Wang, Shibo He, Michael Backes, Jiming Chen, Yang Zhang |
USENIX Security '23 | Humans vs. Machines in Malware Classification | Simone Aonzo, Yufei Han, Alessandro Mantovani, Davide Balzarotti |
USENIX Security '23 | Are Consumers Willing to Pay for Security and Privacy of IoT Devices? | Pardis Emami-Naeini, Janarth Dheenadhayalan, Yuvraj Agarwal, Lorrie Faith Cranor |
USENIX Security '23 | PolyFuzz: Holistic Greybox Fuzzing of Multi-Language Systems | Wen Li, Jinyang Ruan, Guangbei Yi, Long Cheng, Xiapu Luo, Haipeng Cai |
USENIX Security '23 | Reassembly is Hard: A Reflection on Challenges and Strategies | Hyungseok Kim, Soomin Kim, Junoh Lee, Kangkook Jee, Sang Kil Cha |
USENIX Security '23 | Examining Consumer Reviews to Understand Security and Privacy Issues in the Market of Smart Home Devices | Swaathi Vetrivel, Veerle van Harten, Carlos H. Gañán, Michel van Eeten, Simon Parkin |
USENIX Security '23 | Internet Service Providers' and Individuals' Attitudes, Barriers, and Incentives to Secure IoT | Nissy Sombatruang, Tristan Caulfield, Ingolf Becker, Akira Fujita, Takahiro Kasama, Koji Nakao, Daisuke Inoue |
USENIX Security '23 | Araña: Discovering and Characterizing Password Guessing Attacks in Practice | Mazharul Islam, Marina Sanusi Bohuk, Paul Chung, Thomas Ristenpart, Rahul Chatterjee |
USENIX Security '23 | Password Guessing Using Random Forest | Ding Wang, Yunkai Zou, Zijian Zhang, Kedong Xiu |
USENIX Security '23 | Detecting and Handling IoT Interaction Threats in Multi-Platform Multi-Control-Channel Smart Homes | Haotian Chi, Qiang Zeng, Xiaojiang Du |
USENIX Security '23 | Automated Cookie Notice Analysis and Enforcement | Rishabh Khandelwal, Asmit Nayak, Hamza Harkous, Kassem Fawaz |
USENIX Security '23 | Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy Labels | Yue Xiao, Zhengyi Li, Yue Qin, Xiaolong Bai, Jiale Guan, Xiaojing Liao, Luyi Xing |
USENIX Security '23 | Improving Real-world Password Guessing Attacks via Bi-directional Transformers | Ming Xu, Jitao Yu, Xinyi Zhang, Chuanwang Wang, Shenghao Zhang, Haoqi Wu, Weili Han |
USENIX Security '23 | AURC: Detecting Errors in Program Code and Documentation | Peiwei Hu, Ruigang Liang, Ying Cao, Kai Chen, Runze Zhang |
USENIX Security '23 | Black-box Adversarial Example Attack towards FCG Based Android Malware Detection under Incomplete Feature Information | Heng Li, Zhang Cheng, Bang Wu, Liheng Yuan, Cuiying Gao, Wei Yuan, Xiapu Luo |
USENIX Security '23 | MorFuzz: Fuzzing Processor via Runtime Instruction Morphing enhanced Synchronizable Co-simulation | Jinyan Xu, Yiyuan Liu, Sirui He, Haoran Lin, Yajin Zhou, Cong Wang |
USENIX Security '23 | Meta-Sift: How to Sift Out a Clean Subset in the Presence of Data Poisoning? | Yi Zeng, Minzhou Pan, Himanshu Jahagirdar, Ming Jin, Lingjuan Lyu, Ruoxi Jia |
USENIX Security '23 | Adversarial Training for Raw-Binary Malware Classifiers | Keane Lucas, Samruddhi Pai, Weiran Lin, Lujo Bauer, Michael K. Reiter, Mahmood Sharif |
USENIX Security '23 | No Single Silver Bullet: Measuring the Accuracy of Password Strength Meters | Ding Wang, Xuan Shan, Qiying Dong, Yaosheng Shen, Chunfu Jia |
USENIX Security '23 | Three Lessons From Threema: Analysis of a Secure Messenger | Kenneth G. Paterson, Matteo Scarlata, Kien Tuong Truong |
USENIX Security '23 | TreeSync: Authenticated Group Management for Messaging Layer Security | Théophile Wallez, Jonathan Protzenko, Benjamin Beurdouche, Karthikeyan Bhargavan |
USENIX Security '23 | Formal Analysis of Session-Handling in Secure Messaging: Lifting Security from Sessions to Conversations | Cas Cremers, Charlie Jacomme, Aurora Naska |
USENIX Security '23 | Fine-grained Poisoning Attack to Local Differential Privacy Protocols for Mean and Variance Estimation | Xiaoguang Li, Ninghui Li, Wenhai Sun, Neil Zhenqiang Gong, Hui Li |
USENIX Security '23 | PrivateFL: Accurate, Differentially Private Federated Learning via Personalized Data Transformation | Yuchen Yang, Bo Hui, Haolin Yuan, Neil Gong, Yinzhi Cao |
USENIX Security '23 | Every Vote Counts: Ranking-Based Training of Federated Learning to Resist Poisoning Attacks | Hamid Mozaffari, Virat Shejwalkar, Amir Houmansadr |