USENIX Security '23 | Did the Shark Eat the Watchdog in the NTP Pool? Deceiving the NTP Pool’s Monitoring System | Jonghoon Kwon, Jeonggyu Song, Junbeom Hur, Adrian Perrig |
USENIX Security '23 | Formal Analysis of SPDM: Security Protocol and Data Model version 1.2 | Cas Cremers, Alexander Dax, Aurora Naska |
USENIX Security '23 | V1SCAN: Discovering 1-day Vulnerabilities in Reused C/C++ Open-source Software Components Using Code Classification Techniques | Seunghoon Woo, Eunjin Choi, Heejo Lee, Hakjoo Oh |
USENIX Security '23 | BunnyHop: Exploiting the Instruction Prefetcher | Zhiyuan Zhang, Mingtian Tao, Sioli O'Connell, Chitchanok Chuengsatiansup, Daniel Genkin, Yuval Yarom |
USENIX Security '23 | DiffSmooth: Certifiably Robust Learning via Diffusion Models and Local Smoothing | Jiawei Zhang, Zhongzhu Chen, Huan Zhang, Chaowei Xiao, Bo Li |
USENIX Security '23 | ACon^2: Adaptive Conformal Consensus for Provable Blockchain Oracles | Sangdon Park, Osbert Bastani, Taesoo Kim |
USENIX Security '23 | Measuring Up to (Reasonable) Consumer Expectations: Providing an Empirical Basis for Holding IoT Manufacturers Legally Responsible | Lorenz Kustosch, Carlos Gañán, Mattis van 't Schip, Michel van Eeten, Simon Parkin |
USENIX Security '23 | A Data-free Backdoor Injection Approach in Neural Networks | Peizhuo Lv, Chang Yue, Ruigang Liang, Yunfei Yang, Shengzhi Zhang, Hualong Ma, Kai Chen |
USENIX Security '23 | HECO: Fully Homomorphic Encryption Compiler | Alexander Viand, Patrick Jattke, Miro Haller, Anwar Hithnawi |
USENIX Security '23 | Automated Exploitable Heap Layout Generation for Heap Overflows Through Manipulation Distance-Guided Fuzzing | Bin Zhang, Jiongyi Chen, Runhao Li, Chao Feng, Ruilin Li, Chaojing Tang |
USENIX Security '23 | Attacks are Forwarded: Breaking the Isolation of MicroVM-based Containers Through Operation Forwarding | Jietao Xiao, Nanzi Yang, Wenbo Shen, Jinku Li, Xin Guo, Zhiqiang Dong, Fei Xie, Jianfeng Ma |
USENIX Security '23 | NAUTILUS: Automated RESTful API Vulnerability Detection | Gelei Deng, Zhiyi Zhang, Yuekang Li, Yi Liu, Tianwei Zhang, Yang Liu, Guo Yu, Dongjin Wang |
USENIX Security '23 | An Input-Agnostic Hierarchical Deep Learning Framework for Traffic Fingerprinting | Jian Qu, Xiaobo Ma, Jianfeng Li, Xiapu Luo, Lei Xue, Junjie Zhang, Zhenhua Li, Li Feng, Xiaohong Guan |
USENIX Security '23 | Pass2Edit: A Multi-Step Generative Model for Guessing Edited Passwords | Ding Wang, Yunkai Zou, Yuan-An Xiao, Siqi Ma, Xiaofeng Chen |
USENIX Security '23 | PROVIDENCE: a Flexible Round-by-Round Risk-Limiting Audit | Oliver Broadrick, Poorvi Vora, Filip Zagórski |
USENIX Security '23 | Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software | Jan Wichelmann, Anna Pätschke, Luca Wilke, Thomas Eisenbarth |
USENIX Security '23 | Subverting Website Fingerprinting Defenses with Robust Traffic Representation | Meng Shen, Kexin Ji, Zhenbo Gao, Qi Li, Liehuang Zhu, Ke Xu |
USENIX Security '23 | User Awareness and Behaviors Concerning Encrypted DNS Settings in Web Browsers | Alexandra Nisenoff, Ranya Sharma, Nick Feamster |
USENIX Security '23 | It's all in your head(set): Side-channel attacks on AR/VR systems | Yicheng Zhang, Carter Slocum, Jiasi Chen, Nael Abu-Ghazaleh |
USENIX Security '23 | Work-From-Home and COVID-19: Trajectories of Endpoint Security Management in a Security Operations Center | Kailani R. Jones, Dalton A. Brucker-Hahn, Bradley Fidler, Alexandru G. Bardas |
USENIX Security '23 | Adversarial Training for Raw-Binary Malware Classifiers | Keane Lucas, Samruddhi Pai, Weiran Lin, Lujo Bauer, Michael K. Reiter, Mahmood Sharif |
USENIX Security '23 | ELASM: Error-Latency-Aware Scale Management for Fully Homomorphic Encryption | Yongwoo Lee, Seonyoung Cheon, Dongkwan Kim, Dongyoon Lee, Hanjun Kim |
USENIX Security '23 | Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse | Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Danny Yuxing Huang, Rahul Chatterjee |
USENIX Security '23 | Trojan Source: Invisible Vulnerabilities | Nicholas Boucher, Ross Anderson |
USENIX Security '23 | ProSpeCT: Provably Secure Speculation for the Constant-Time Policy | Lesly-Ann Daniel, Marton Bognar, Job Noorman, Sébastien Bardin, Tamara Rezk, Frank Piessens |