USENIX Security '23 | Work-From-Home and COVID-19: Trajectories of Endpoint Security Management in a Security Operations Center | Kailani R. Jones, Dalton A. Brucker-Hahn, Bradley Fidler, Alexandru G. Bardas |
USENIX Security '23 | Adversarial Training for Raw-Binary Malware Classifiers | Keane Lucas, Samruddhi Pai, Weiran Lin, Lujo Bauer, Michael K. Reiter, Mahmood Sharif |
USENIX Security '23 | ELASM: Error-Latency-Aware Scale Management for Fully Homomorphic Encryption | Yongwoo Lee, Seonyoung Cheon, Dongkwan Kim, Dongyoon Lee, Hanjun Kim |
USENIX Security '23 | Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse | Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Danny Yuxing Huang, Rahul Chatterjee |
USENIX Security '23 | Trojan Source: Invisible Vulnerabilities | Nicholas Boucher, Ross Anderson |
USENIX Security '23 | ProSpeCT: Provably Secure Speculation for the Constant-Time Policy | Lesly-Ann Daniel, Marton Bognar, Job Noorman, Sébastien Bardin, Tamara Rezk, Frank Piessens |
USENIX Security '23 | Exorcising "Wraith": Protecting LiDAR-based Object Detector in Automated Driving System from Appearing Attacks | Qifan Xiao, Xudong Pan, Yifan Lu, Mi Zhang, Jiarun Dai, Min Yang |
USENIX Security '23 | GAP: Differentially Private Graph Neural Networks with Aggregation Perturbation | Sina Sajadmanesh, Ali Shahin Shamsabadi, Aurélien Bellet, Daniel Gatica-Perez |
USENIX Security '23 | SandDriller: A Fully-Automated Approach for Testing Language-Based JavaScript Sandboxes | Abdullah AlHamdan, Cristian-Alexandru Staicu |
USENIX Security '23 | Catch You and I Can: Revealing Source Voiceprint Against Voice Conversion | Jiangyi Deng, Yanjiao Chen, Yinan Zhong, Qianhao Miao, Xueluan Gong, Wenyuan Xu |
USENIX Security '23 | How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic | Mingshi Wu, Jackson Sippe, Danesh Sivakumar, Jack Burg, Peter Anderson, Xiaokang Wang, Kevin Bock, Amir Houmansadr, Dave Levin, Eric Wustrow |
USENIX Security '23 | Pool-Party: Exploiting Browser Resource Pools for Web Tracking | Peter Snyder, Soroush Karami, Arthur Edelstein, Benjamin Livshits, Hamed Haddadi |
USENIX Security '23 | The Role of Professional Product Reviewers in Evaluating Security and Privacy | Wentao Guo, Jason Walter, Michelle L. Mazurek |
USENIX Security '23 | Near-Ultrasound Inaudible Trojan (Nuit): Exploiting Your Speaker to Attack Your Microphone | Qi Xia, Qian Chen, Shouhuai Xu |
USENIX Security '23 | Bilingual Problems: Studying the Security Risks Incurred by Native Extensions in Scripting Languages | Cristian-Alexandru Staicu, Sazzadur Rahaman, Ágnes Kiss, Michael Backes |
USENIX Security '23 | Ultimate SLH: Taking Speculative Load Hardening to the Next Level | Zhiyuan Zhang, Gilles Barthe, Chitchanok Chuengsatiansup, Peter Schwabe, Yuval Yarom |
USENIX Security '23 | Intender: Fuzzing Intent-Based Networking with Intent-State Transition Guidance | Jiwon Kim, Benjamin E. Ujcich, Dave (Jing) Tian |
USENIX Security '23 | Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-M | Xhani Marvin Saß, Richard Mitev, Ahmad-Reza Sadeghi |
USENIX Security '23 | No Single Silver Bullet: Measuring the Accuracy of Password Strength Meters | Ding Wang, Xuan Shan, Qiying Dong, Yaosheng Shen, Chunfu Jia |
USENIX Security '23 | Place Your Locks Well: Understanding and Detecting Lock Misuse Bugs | Yuandao Cai, Peisen Yao, Chengfeng Ye, Charles Zhang |
USENIX Security '23 | Three Lessons From Threema: Analysis of a Secure Messenger | Kenneth G. Paterson, Matteo Scarlata, Kien Tuong Truong |
USENIX Security '23 | One Size Does not Fit All: Quantifying the Risk of Malicious App Encounters for Different Android User Profiles | Savino Dambra, Leyla Bilge, Platon Kotzias, Yun Shen, Juan Caballero |
USENIX Security '23 | “Security is not my field, I’m a stats guy”: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry | Jaron Mink, Harjot Kaur, Juliane Schmüser, Sascha Fahl, Yasemin Acar |
USENIX Security '23 | BoKASAN: Binary-only Kernel Address Sanitizer for Effective Kernel Fuzzing | Mingi Cho, Dohyeon An, Hoyong Jin, Taekyoung Kwon |
USENIX Security '23 | The Blockchain Imitation Game | Kaihua Qin, Stefanos Chaliasos, Liyi Zhou, Benjamin Livshits, Dawn Song, Arthur Gervais |