USENIX Security '23 | Silent Spring: Prototype Pollution Leads to Remote Code Execution in Node.js | Mikhail Shcherbakov, Musard Balliu, Cristian-Alexandru Staicu |
USENIX Security '23 | Reassembly is Hard: A Reflection on Challenges and Strategies | Hyungseok Kim, Soomin Kim, Junoh Lee, Kangkook Jee, Sang Kil Cha |
USENIX Security '23 | PCAT: Functionality and Data Stealing from Split Learning by Pseudo-Client Attack | Xinben Gao, Lan Zhang |
USENIX Security '23 | VulChecker: Graph-based Vulnerability Localization in Source Code | Yisroel Mirsky, George Macon, Michael Brown, Carter Yagemann, Matthew Pruett, Evan Downing, Sukarno Mertoguno, Wenke Lee |
USENIX Security '23 | Examining Consumer Reviews to Understand Security and Privacy Issues in the Market of Smart Home Devices | Swaathi Vetrivel, Veerle van Harten, Carlos H. Gañán, Michel van Eeten, Simon Parkin |
USENIX Security '23 | Isolated and Exhausted: Attacking Operating Systems via Site Isolation in the Browser | Matthias Gierlings, Marcus Brinkmann, Jörg Schwenk |
USENIX Security '23 | Internet Service Providers' and Individuals' Attitudes, Barriers, and Incentives to Secure IoT | Nissy Sombatruang, Tristan Caulfield, Ingolf Becker, Akira Fujita, Takahiro Kasama, Koji Nakao, Daisuke Inoue |
USENIX Security '23 | Framing Frames: Bypassing Wi-Fi Encryption by Manipulating Transmit Queues | Domien Schepers, Aanjhan Ranganathan, Mathy Vanhoef |
USENIX Security '23 | Improving Logging to Reduce Permission Over-Granting Mistakes | Bingyu Shen, Tianyi Shan, Yuanyuan Zhou |
USENIX Security '23 | V-Cloak: Intelligibility-, Naturalness- & Timbre-Preserving Real-Time Voice Anonymization | Jiangyi Deng, Fei Teng, Yanjiao Chen, Xiaofu Chen, Zhaohui Wang, Wenyuan Xu |
USENIX Security '23 | PatchVerif: Discovering Faulty Patches in Robotic Vehicles | Hyungsub Kim, Muslum Ozgur Ozmen, Z. Berkay Celik, Antonio Bianchi, Dongyan Xu |
USENIX Security '23 | DISTDET: A Cost-Effective Distributed Cyber Threat Detection System | Feng Dong, Liu Wang, Xu Nie, Fei Shao, Haoyu Wang, Ding Li, Xiapu Luo, Xusheng Xiao |
USENIX Security '23 | The Impostor Among US(B): Off-Path Injection Attacks on USB Communications | Robert Dumitru, Daniel Genkin, Andrew Wabnitz, Yuval Yarom |
USENIX Security '23 | Fuzztruction: Using Fault Injection-based Fuzzing to Leverage Implicit Domain Knowledge | Nils Bars, Moritz Schloegel, Tobias Scharnowski, Nico Schiller, Thorsten Holz |
USENIX Security '23 | NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems | Zixuan Wang, Mohammadkazem Taram, Daniel Moghimi, Steven Swanson, Dean Tullsen, Jishen Zhao |
USENIX Security '23 | A Research Framework and Initial Study of Browser Security for the Visually Impaired | Elaine Lau, Zachary Peterson |
USENIX Security '23 | PUMM: Preventing Use-After-Free Using Execution Unit Partitioning | Carter Yagemann, Simon P. Chung, Brendan Saltaformaggio, Wenke Lee |
USENIX Security '23 | POLICYCOMP: Counterpart Comparison of Privacy Policies Uncovers Overbroad Personal Data Collection Practices | Lu Zhou, Chengyongxiao Wei, Tong Zhu, Guoxing Chen, Xiaokuan Zhang, Suguo Du, Hui Cao, Haojin Zhu |
USENIX Security '23 | One Server for the Price of Two: Simple and Fast Single-Server Private Information Retrieval | Alexandra Henzinger, Matthew M. Hong, Henry Corrigan-Gibbs, Sarah Meiklejohn, Vinod Vaikuntanathan |
USENIX Security '23 | Exploring User Reactions and Mental Models Towards Perceptual Manipulation Attacks in Mixed Reality | Kaiming Cheng, Jeffery F. Tian, Tadayoshi Kohno, Franziska Roesner |
USENIX Security '23 | Eavesdropping Mobile App Activity via Radio-Frequency Energy Harvesting | Tao Ni, Guohao Lan, Jia Wang, Qingchuan Zhao, Weitao Xu |
USENIX Security '23 | Side-Channel Attacks on Optane Persistent Memory | Sihang Liu, Suraaj Kanniwadi, Martin Schwarzl, Andreas Kogler, Daniel Gruss, Samira Khan |
USENIX Security '23 | A Study of Multi-Factor and Risk-Based Authentication Availability | Anthony Gavazzi, Ryan Williams, Engin Kirda, Long Lu, Andre King, Andy Davis, Tim Leek |
USENIX Security '23 | Person Re-identification in 3D Space: A WiFi Vision-based Approach | Yili Ren, Yichao Wang, Sheng Tan, Yingying Chen, Jie Yang |
USENIX Security '23 | Fourteen Years in the Life: A Root Server’s Perspective on DNS Resolver Security | Alden Hilton, Casey Deccio, Jacob Davis |