USENIX Security '23 | Towards a General Video-based Keystroke Inference Attack | Zhuolin Yang, Yuxin Chen, Zain Sarwar, Hadleigh Schwartz, Ben Y. Zhao, Haitao Zheng |
USENIX Security '23 | URET: Universal Robustness Evaluation Toolkit (for Evasion) | Kevin Eykholt, Taesung Lee, Douglas Schales, Jiyong Jang, Ian Molloy |
USENIX Security '23 | You Can't See Me: Physical Removal Attacks on LiDAR-based Autonomous Vehicles Driving Frameworks | Yulong Cao, S. Hrushikesh Bhupathiraju, Pirouz Naghavi, Takeshi Sugawara, Z. Morley Mao, Sara Rampazzi |
USENIX Security '23 | SMACK: Semantically Meaningful Adversarial Audio Attack | Zhiyuan Yu, Yuanhaur Chang, Ning Zhang, Chaowei Xiao |
USENIX Security '23 | Gradient Obfuscation Gives a False Sense of Security in Federated Learning | Kai Yue, Richeng Jin, Chau-Wai Wong, Dror Baron, Huaiyu Dai |
USENIX Security '23 | Are Consumers Willing to Pay for Security and Privacy of IoT Devices? | Pardis Emami-Naeini, Janarth Dheenadhayalan, Yuvraj Agarwal, Lorrie Faith Cranor |
USENIX Security '23 | PhyAuth: Physical-Layer Message Authentication for ZigBee Networks | Ang Li, Jiawei Li, Dianqi Han, Yan Zhang, Tao Li, Ting Zhu, Yanchao Zhang |
USENIX Security '23 | Fairness Properties of Face Recognition and Obfuscation Systems | Harrison Rosenberg, Brian Tang, Kassem Fawaz, Somesh Jha |
USENIX Security '23 | Beyond The Gates: An Empirical Analysis of HTTP-Managed Password Stealers and Operators | Athanasios Avgetidis, Omar Alrawi, Kevin Valakuzhy, Charles Lever, Paul Burbage, Angelos D. Keromytis, Fabian Monrose, Manos Antonakakis |
USENIX Security '23 | Decompiling x86 Deep Neural Network Executables | Zhibo Liu, Yuanyuan Yuan, Shuai Wang, Xiaofei Xie, Lei Ma |
USENIX Security '23 | PolyFuzz: Holistic Greybox Fuzzing of Multi-Language Systems | Wen Li, Jinyang Ruan, Guangbei Yi, Long Cheng, Xiapu Luo, Haipeng Cai |
USENIX Security '23 | Linear Private Set Union from Multi-Query Reverse Private Membership Test | Cong Zhang, Yu Chen, Weiran Liu, Min Zhang, Dongdai Lin |
USENIX Security '23 | An Efficient Design of Intelligent Network Data Plane | Guangmeng Zhou, Zhuotao Liu, Chuanpu Fu, Qi Li, Ke Xu |
USENIX Security '23 | AIFORE: Smart Fuzzing Based on Automatic Input Format Reverse Engineering | Ji Shi, Zhun Wang, Zhiyao Feng, Yang Lan, Shisong Qin, Wei You, Wei Zou, Mathias Payer, Chao Zhang |
USENIX Security '23 | Inducing Authentication Failures to Bypass Credit Card PINs | David Basin, Patrick Schaller, Jorge Toro-Pozo |
USENIX Security '23 | Silent Spring: Prototype Pollution Leads to Remote Code Execution in Node.js | Mikhail Shcherbakov, Musard Balliu, Cristian-Alexandru Staicu |
USENIX Security '23 | Reassembly is Hard: A Reflection on Challenges and Strategies | Hyungseok Kim, Soomin Kim, Junoh Lee, Kangkook Jee, Sang Kil Cha |
USENIX Security '23 | PCAT: Functionality and Data Stealing from Split Learning by Pseudo-Client Attack | Xinben Gao, Lan Zhang |
USENIX Security '23 | VulChecker: Graph-based Vulnerability Localization in Source Code | Yisroel Mirsky, George Macon, Michael Brown, Carter Yagemann, Matthew Pruett, Evan Downing, Sukarno Mertoguno, Wenke Lee |
USENIX Security '23 | Examining Consumer Reviews to Understand Security and Privacy Issues in the Market of Smart Home Devices | Swaathi Vetrivel, Veerle van Harten, Carlos H. Gañán, Michel van Eeten, Simon Parkin |
USENIX Security '23 | Isolated and Exhausted: Attacking Operating Systems via Site Isolation in the Browser | Matthias Gierlings, Marcus Brinkmann, Jörg Schwenk |
USENIX Security '23 | Internet Service Providers' and Individuals' Attitudes, Barriers, and Incentives to Secure IoT | Nissy Sombatruang, Tristan Caulfield, Ingolf Becker, Akira Fujita, Takahiro Kasama, Koji Nakao, Daisuke Inoue |
USENIX Security '23 | Framing Frames: Bypassing Wi-Fi Encryption by Manipulating Transmit Queues | Domien Schepers, Aanjhan Ranganathan, Mathy Vanhoef |
USENIX Security '23 | Improving Logging to Reduce Permission Over-Granting Mistakes | Bingyu Shen, Tianyi Shan, Yuanyuan Zhou |
USENIX Security '23 | V-Cloak: Intelligibility-, Naturalness- & Timbre-Preserving Real-Time Voice Anonymization | Jiangyi Deng, Fei Teng, Yanjiao Chen, Xiaofu Chen, Zhaohui Wang, Wenyuan Xu |