USENIX Security '23 | PatchVerif: Discovering Faulty Patches in Robotic Vehicles | Hyungsub Kim, Muslum Ozgur Ozmen, Z. Berkay Celik, Antonio Bianchi, Dongyan Xu |
USENIX Security '23 | DISTDET: A Cost-Effective Distributed Cyber Threat Detection System | Feng Dong, Liu Wang, Xu Nie, Fei Shao, Haoyu Wang, Ding Li, Xiapu Luo, Xusheng Xiao |
USENIX Security '23 | The Impostor Among US(B): Off-Path Injection Attacks on USB Communications | Robert Dumitru, Daniel Genkin, Andrew Wabnitz, Yuval Yarom |
USENIX Security '23 | Fuzztruction: Using Fault Injection-based Fuzzing to Leverage Implicit Domain Knowledge | Nils Bars, Moritz Schloegel, Tobias Scharnowski, Nico Schiller, Thorsten Holz |
USENIX Security '23 | NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems | Zixuan Wang, Mohammadkazem Taram, Daniel Moghimi, Steven Swanson, Dean Tullsen, Jishen Zhao |
USENIX Security '23 | A Research Framework and Initial Study of Browser Security for the Visually Impaired | Elaine Lau, Zachary Peterson |
USENIX Security '23 | PUMM: Preventing Use-After-Free Using Execution Unit Partitioning | Carter Yagemann, Simon P. Chung, Brendan Saltaformaggio, Wenke Lee |
USENIX Security '23 | POLICYCOMP: Counterpart Comparison of Privacy Policies Uncovers Overbroad Personal Data Collection Practices | Lu Zhou, Chengyongxiao Wei, Tong Zhu, Guoxing Chen, Xiaokuan Zhang, Suguo Du, Hui Cao, Haojin Zhu |
USENIX Security '23 | One Server for the Price of Two: Simple and Fast Single-Server Private Information Retrieval | Alexandra Henzinger, Matthew M. Hong, Henry Corrigan-Gibbs, Sarah Meiklejohn, Vinod Vaikuntanathan |
USENIX Security '23 | Exploring User Reactions and Mental Models Towards Perceptual Manipulation Attacks in Mixed Reality | Kaiming Cheng, Jeffery F. Tian, Tadayoshi Kohno, Franziska Roesner |
USENIX Security '23 | Eavesdropping Mobile App Activity via Radio-Frequency Energy Harvesting | Tao Ni, Guohao Lan, Jia Wang, Qingchuan Zhao, Weitao Xu |
USENIX Security '23 | Side-Channel Attacks on Optane Persistent Memory | Sihang Liu, Suraaj Kanniwadi, Martin Schwarzl, Andreas Kogler, Daniel Gruss, Samira Khan |
USENIX Security '23 | A Study of Multi-Factor and Risk-Based Authentication Availability | Anthony Gavazzi, Ryan Williams, Engin Kirda, Long Lu, Andre King, Andy Davis, Tim Leek |
USENIX Security '23 | Person Re-identification in 3D Space: A WiFi Vision-based Approach | Yili Ren, Yichao Wang, Sheng Tan, Yingying Chen, Jie Yang |
USENIX Security '23 | Fourteen Years in the Life: A Root Server’s Perspective on DNS Resolver Security | Alden Hilton, Casey Deccio, Jacob Davis |
USENIX Security '23 | ClepsydraCache -- Preventing Cache Attacks with Time-Based Evictions | Jan Philipp Thoma, Christian Niesler, Dominic Funke, Gregor Leander, Pierre Mayr, Nils Pohl, Lucas Davi, Tim Güneysu |
USENIX Security '23 | Guarding Serverless Applications with Kalium | Deepak Sirone Jegan, Liang Wang, Siddhant Bhagat, Michael Swift |
USENIX Security '23 | DynSQL: Stateful Fuzzing for Database Management Systems with Complex and Valid SQL Query Generation | Zu-Ming Jiang, Jia-Ju Bai, Zhendong Su |
USENIX Security '23 | Automated Security Analysis of Exposure Notification Systems | Kevin Morio, Ilkan Esiyok, Dennis Jackson, Robert Künnemann |
USENIX Security '23 | xNIDS: Explaining Deep Learning-based Network Intrusion Detection Systems for Active Intrusion Responses | Feng Wei, Hongda Li, Ziming Zhao, Hongxin Hu |
USENIX Security '23 | Pspray: Timing Side-Channel based Linux Kernel Heap Exploitation Technique | Yoochan Lee, Jinhan Kwak, Junesoo Kang, Yuseok Jeon, Byoungyoung Lee |
USENIX Security '23 | Strategies and Vulnerabilities of Participants in Venezuelan Influence Operations | Ruben Recabarren, Bogdan Carbunar, Nestor Hernandez, Ashfaq Ali Shafin |
USENIX Security '23 | Investigating Verification Behavior and Perceptions of Visual Digital Certificates | Dañiel Gerhardt, Alexander Ponticello, Adrian Dabrowski, Katharina Krombholz |
USENIX Security '23 | Remote Attacks on Speech Recognition Systems Using Sound from Power Supply | Lanqing Yang, Xinqi Chen, Xiangyong Jian, Leping Yang, Yijie Li, Qianfei Ren, Yi-Chao Chen, Guangtao Xue, Xiaoyu Ji |
USENIX Security '23 | HOMESPY: The Invisible Sniffer of Infrared Remote Control of Smart TVs | Kong Huang, YuTong Zhou, Ke Zhang, Jiacen Xu, Jiongyi Chen, Di Tang, Kehuan Zhang |