USENIX Security '23 | Formal Analysis and Patching of BLE-SC Pairing | Min Shi, Jing Chen, Kun He, Haoran Zhao, Meng Jia, Ruiying Du |
USENIX Security '23 | Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse | Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Danny Yuxing Huang, Rahul Chatterjee |
USENIX Security '23 | CarpetFuzz: Automatic Program Option Constraint Extraction from Documentation for Fuzzing | Dawei Wang, Ying Li, Zhiyu Zhang, Kai Chen |
USENIX Security '23 | No Single Silver Bullet: Measuring the Accuracy of Password Strength Meters | Ding Wang, Xuan Shan, Qiying Dong, Yaosheng Shen, Chunfu Jia |
USENIX Security '23 | Pass2Edit: A Multi-Step Generative Model for Guessing Edited Passwords | Ding Wang, Yunkai Zou, Yuan-An Xiao, Siqi Ma, Xiaofeng Chen |
USENIX Security '23 | Password Guessing Using Random Forest | Ding Wang, Yunkai Zou, Zijian Zhang, Kedong Xiu |
USENIX Security '23 | FuzzJIT: Oracle-Enhanced Fuzzing for JavaScript Engine JIT Compiler | Junjie Wang, Zhiyi Zhang, Shuang Liu, Xiaoning Du, Junjie Chen |
USENIX Security '23 | Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic Augmentation | Renjie Xie, Jiahao Cao, Enhuan Dong, Mingwei Xu, Kun Sun, Qi Li, Licheng Shen, Menghao Zhang |
USENIX Security '23 | MorFuzz: Fuzzing Processor via Runtime Instruction Morphing enhanced Synchronizable Co-simulation | Jinyan Xu, Yiyuan Liu, Sirui He, Haoran Lin, Yajin Zhou, Cong Wang |
USENIX Security '23 | PUMM: Preventing Use-After-Free Using Execution Unit Partitioning | Carter Yagemann, Simon P. Chung, Brendan Saltaformaggio, Wenke Lee |
USENIX Security '23 | Rethinking White-Box Watermarks on Deep Learning Models under Neural Structural Obfuscation | Yifan Yan, Xudong Pan, Mi Zhang, Min Yang |
USENIX Security '23 | InfinityGauntlet: Expose Smartphone Fingerprint Authentication to Brute-force Attack | Yu Chen, Yang Yu, Lidong Zhai |
USENIX Security '23 | Internet Service Providers' and Individuals' Attitudes, Barriers, and Incentives to Secure IoT | Nissy Sombatruang, Tristan Caulfield, Ingolf Becker, Akira Fujita, Takahiro Kasama, Koji Nakao, Daisuke Inoue |
USENIX Security '23 | TreeSync: Authenticated Group Management for Messaging Layer Security | Théophile Wallez, Jonathan Protzenko, Benjamin Beurdouche, Karthikeyan Bhargavan |
USENIX Security '23 | XCheck: Verifying Integrity of 3D Printed Patient-Specific Devices via Computing Tomography | Zhiyuan Yu, Yuanhaur Chang, Shixuan Zhai, Nicholas Deily, Tao Ju, XiaoFeng Wang, Uday Jammalamadaka, Ning Zhang |
USENIX Security '23 | Multi-Factor Key Derivation Function (MFKDF) for Fast, Flexible, Secure, & Practical Key Management | Vivek Nair, Dawn Song |
USENIX Security '23 | Fuzztruction: Using Fault Injection-based Fuzzing to Leverage Implicit Domain Knowledge | Nils Bars, Moritz Schloegel, Tobias Scharnowski, Nico Schiller, Thorsten Holz |
USENIX Security '23 | Educators’ Perspectives of Using (or Not Using) Online Exam Proctoring | David G. Balash, Elena Korkes, Miles Grant, Adam J. Aviv, Rahel A. Fainchtein, Micah Sherr |
USENIX Security '23 | Person Re-identification in 3D Space: A WiFi Vision-based Approach | Yili Ren, Yichao Wang, Sheng Tan, Yingying Chen, Jie Yang |
USENIX Security '23 | A Plot is Worth a Thousand Words: Model Information Stealing Attacks via Scientific Plots | Boyang Zhang, Xinlei He, Yun Shen, Tianhao Wang, Yang Zhang |
USENIX Security '23 | Practical Asynchronous High-threshold Distributed Key Generation and Distributed Polynomial Sampling | Sourav Das, Zhuolun Xiang, Lefteris Kokoris-Kogias, Ling Ren |
USENIX Security '23 | Device Tracking via Linux’s New TCP Source Port Selection Algorithm | Moshe Kol, Amit Klein, Yossi Gilad |
USENIX Security '23 | Long Live The Honey Badger: Robust Asynchronous DPSS and its Applications | Thomas Yurek, Zhuolun Xiang, Yu Xia, Andrew Miller |
USENIX Security '23 | The OK Is Not Enough: A Large Scale Study of Consent Dialogs in Smartphone Applications | Simon Koch, Benjamin Altpeter, Martin Johns |
USENIX Security '23 | NAUTILUS: Automated RESTful API Vulnerability Detection | Gelei Deng, Zhiyi Zhang, Yuekang Li, Yi Liu, Tianwei Zhang, Yang Liu, Guo Yu, Dongjin Wang |