USENIX Security '23 | No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning | Thorsten Eisenhofer, Erwin Quiring, Jonas Möller, Doreen Riepel, Thorsten Holz, Konrad Rieck |
USENIX Security '23 | Password Guessing Using Random Forest | Ding Wang, Yunkai Zou, Zijian Zhang, Kedong Xiu |
USENIX Security '23 | Detecting and Handling IoT Interaction Threats in Multi-Platform Multi-Control-Channel Smart Homes | Haotian Chi, Qiang Zeng, Xiaojiang Du |
USENIX Security '23 | TRIDENT: Towards Detecting and Mitigating Web-based Social Engineering Attacks | Zheng Yang, Joey Allen, Matthew Landen, Roberto Perdisci, Wenke Lee |
USENIX Security '23 | DDRace: Finding Concurrency UAF Vulnerabilities in Linux Drivers with Directed Fuzzing | |
USENIX Security '23 | Secure Floating-Point Training | Deevashwer Rathee, Anwesh Bhattacharya, Divya Gupta, Rahul Sharma, Dawn Song |
USENIX Security '23 | The OK Is Not Enough: A Large Scale Study of Consent Dialogs in Smartphone Applications | Simon Koch, Benjamin Altpeter, Martin Johns |
USENIX Security '23 | Timeless Timing Attacks and Preload Defenses in Tor's DNS Cache | Rasmus Dahlberg, Tobias Pulls |
USENIX Security '23 | CacheQL: Quantifying and Localizing Cache Side-Channel Vulnerabilities in Production Software | Yuanyuan Yuan, Zhibo Liu, Shuai Wang |
USENIX Security '23 | “If sighted people know, I should be able to know:” Privacy Perceptions of Bystanders with Visual Impairments around Camera-based Technology | Yuhang Zhao, Yaxing Yao, Jiaru Fu, Nihan Zhou |
USENIX Security '23 | Access Denied: Assessing Physical Risks to Internet Access Networks | Alexander Marder, Zesen Zhang, Ricky Mok, Ramakrishna Padmanabhan, Bradley Huffaker, Matthew Luckie, Alberto Dainotti, kc claffy, Alex C. Snoeren, Aaron Schulman |
USENIX Security '23 | Security and Privacy Failures in Popular 2FA Apps | Conor Gilsenan, Fuzail Shakir, Noura Alomar, Serge Egelman |
USENIX Security '23 | Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses | Vincent Cheval, Cas Cremers, Alexander Dax, Lucca Hirschi, Charlie Jacomme, Steve Kremer |
USENIX Security '23 | Content-Type: multipart/oracle - Tapping into Format Oracles in Email End-to-End Encryption | Fabian Ising, Damian Poddebniak, Tobias Kappert, Christoph Saatjohann, Sebastian Schinzel |
USENIX Security '23 | Glowing in the Dark: Uncovering IPv6 Address Discovery and Scanning Strategies in the Wild | Hammas Bin Tanveer, Rachee Singh, Paul Pearce, Rishab Nithyanand |
USENIX Security '23 | Every Signature is Broken: On the Insecurity of Microsoft Office’s OOXML Signatures | Simon Rohlmann, Vladislav Mladenov, Christian Mainka, Daniel Hirschberger, Jörg Schwenk |
USENIX Security '23 | Humans vs. Machines in Malware Classification | Simone Aonzo, Yufei Han, Alessandro Mantovani, Davide Balzarotti |
USENIX Security '23 | How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment | Olivier Blazy, Ioana Boureanu, Pascal Lafourcade, Cristina Onete, Léo Robert |
USENIX Security '23 | Assessing Anonymity Techniques Employed in German Court Decisions: A De-Anonymization Experiment | Dominic Deuber, Michael Keuchen, Nicolas Christin |
USENIX Security '23 | GLeeFuzz: Fuzzing WebGL Through Error Message Guided Mutation | Hui Peng, Zhihao Yao, Ardalan Amiri Sani, Dave (Jing) Tian, Mathias Payer |
USENIX Security '23 | Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps | Yuhong Nan, Xueqiang Wang, Luyi Xing, Xiaojing Liao, Ruoyu Wu, Jianliang Wu, Yifan Zhang, XiaoFeng Wang |
USENIX Security '23 | The Space of Adversarial Strategies | Ryan Sheatsley, Blaine Hoak, Eric Pauley, Patrick McDaniel |
USENIX Security '23 | Credit Karma: Understanding Security Implications of Exposed Cloud Services through Automated Capability Inference | Xueqiang Wang, Yuqiong Sun, Susanta Nanda, XiaoFeng Wang |
USENIX Security '23 | That Person Moves Like A Car: Misclassification Attack Detection for Autonomous Systems Using Spatiotemporal Consistency | Yanmao Man, Raymond Muller, Ming Li, Z. Berkay Celik, Ryan Gerdes |
USENIX Security '23 | CipherH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations | Sen Deng, Mengyuan Li, Yining Tang, Shuai Wang, Shoumeng Yan, Yinqian Zhang |