USENIX Security '23 | InfinityGauntlet: Expose Smartphone Fingerprint Authentication to Brute-force Attack | Yu Chen, Yang Yu, Lidong Zhai |
USENIX Security '23 | Multiview: Finding Blind Spots in Access-Deny Issues Diagnosis | Bingyu Shen, Tianyi Shan, Yuanyuan Zhou |
USENIX Security '23 | A Plot is Worth a Thousand Words: Model Information Stealing Attacks via Scientific Plots | Boyang Zhang, Xinlei He, Yun Shen, Tianhao Wang, Yang Zhang |
USENIX Security '23 | X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item Detection | Aishan Liu, Jun Guo, Jiakai Wang, Siyuan Liang, Renshuai Tao, Wenbo Zhou, Cong Liu, Xianglong Liu, Dacheng Tao |
USENIX Security '23 | Extending a Hand to Attackers: Browser Privilege Escalation Attacks via Extensions | Young Min Kim, Byoungyoung Lee |
USENIX Security '23 | Hey Kimya, Is My Smart Speaker Spying on Me? Taking Control of Sensor Privacy Through Isolation and Amnesia | Piet De Vaere, Adrian Perrig |
USENIX Security '23 | Capstone: A Capability-based Foundation for Trustless Secure Memory Access | Jason Zhijingcheng Yu, Conrad Watt, Aditya Badole, Trevor E. Carlson, Prateek Saxena |
USENIX Security '23 | Watch your Watch: Inferring Personality Traits from Wearable Activity Trackers | Noé Zufferey, Mathias Humbert, Romain Tavenard, Kévin Huguenin |
USENIX Security '23 | Squirrel: A Scalable Secure Two-Party Computation Framework for Training Gradient Boosting Decision Tree | Wen-jie Lu, Zhicong Huang, Qizhi Zhang, Yuchen Wang, Cheng Hong |
USENIX Security '23 | Authenticated private information retrieval | Simone Colombo, Kirill Nikitin, Henry Corrigan-Gibbs, David J. Wu, Bryan Ford |
USENIX Security '23 | Bug Hunters’ Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem | Omer Akgul, Taha Eghtesad, Amit Elazari, Omprakash Gnawali, Jens Grossklags, Michelle L. Mazurek, Daniel Votipka, Aron Laszka |
USENIX Security '23 | Defining "Broken": User Experiences and Remediation Tactics When Ad-Blocking or Tracking-Protection Tools Break a Website’s User Experience | Alexandra Nisenoff, Arthur Borem, Madison Pickering, Grant Nakanishi, Maya Thumpasery, Blase Ur |
USENIX Security '23 | Log: It’s Big, It’s Heavy, It’s Filled with Personal Data! Measuring the Logging of Sensitive Information in the Android Ecosystem | Allan Lyons, Julien Gamba, Austin Shawaga, Joel Reardon, Juan Tapiador, Serge Egelman, Narseo Vallina-Rodriguez |
USENIX Security '23 | Fact-Saboteurs: A Taxonomy of Evidence Manipulation Attacks against Fact-Verification Systems | Sahar Abdelnabi, Mario Fritz |
USENIX Security '23 | Meta-Sift: How to Sift Out a Clean Subset in the Presence of Data Poisoning? | Yi Zeng, Minzhou Pan, Himanshu Jahagirdar, Ming Jin, Lingjuan Lyu, Ruoxi Jia |
USENIX Security '23 | “Employees Who Don’t Accept the Time Security Takes Are Not Aware Enough”: The CISO View of Human-Centred Security | Jonas Hielscher, Uta Menges, Simon Parkin, Annette Kluge, M. Angela Sasse |
USENIX Security '23 | How Library IT Staff Navigate Privacy and Security Challenges and Responsibilities | Alan F. Luo, Noel Warford, Samuel Dooley, Rachel Greenstadt, Michelle L. Mazurek, Nora McDonald |
USENIX Security '23 | Silent Bugs Matter: A Study of Compiler-Introduced Security Bugs | Jianhao Xu, Kangjie Lu, Zhengjie Du, Zhu Ding, Linke Li, Qiushi Wu, Mathias Payer, Bing Mao |
USENIX Security '23 | IvySyn: Automated Vulnerability Discovery in Deep Learning Frameworks | Neophytos Christou, Di Jin, Vaggelis Atlidakis, Baishakhi Ray, Vasileios P. Kemerlis |
USENIX Security '23 | Bleem: Packet Sequence Oriented Fuzzing for Protocol Implementations | Zhengxiong Luo, Junze Yu, Feilong Zuo, Jianzhong Liu, Yu Jiang, Ting Chen, Abhik Roychoudhury, Jiaguang Sun |
USENIX Security '23 | Araña: Discovering and Characterizing Password Guessing Attacks in Practice | Mazharul Islam, Marina Sanusi Bohuk, Paul Chung, Thomas Ristenpart, Rahul Chatterjee |
USENIX Security '23 | AIRS: Explanation for Deep Reinforcement Learning based Security Applications | Jiahao Yu, Wenbo Guo, Qi Qin, Gang Wang, Ting Wang, Xinyu Xing |
USENIX Security '23 | Minimalist: Semi-automated Debloating of PHP Web Applications through Static Analysis | Rasoul Jahanshahi, Babak Amin Azad, Nick Nikiforakis, Manuel Egele |
USENIX Security '23 | Machine-checking Multi-Round Proofs of Shuffle: Terelius-Wikstrom and Bayer-Groth | Thomas Haines, Rajeev Gore, Mukesh Tiwari |
USENIX Security '23 | FreeEagle: Detecting Complex Neural Trojans in Data-Free Cases | Chong Fu, Xuhong Zhang, Shouling Ji, Ting Wang, Peng Lin, Yanghe Feng, Jianwei Yin |