USENIX Security '23 | Don’t be Dense: Efficient Keyword PIR for Sparse Databases | Sarvar Patel, Joon Young Seo, Kevin Yeo |
USENIX Security '23 | Proxy Hunting: Understanding and Characterizing Proxy-based Upgradeable Smart Contracts in Blockchains | William E Bodell III, Sajad Meisami, Yue Duan |
USENIX Security '23 | Fine-grained Poisoning Attack to Local Differential Privacy Protocols for Mean and Variance Estimation | Xiaoguang Li, Ninghui Li, Wenhai Sun, Neil Zhenqiang Gong, Hui Li |
USENIX Security '23 | PrivateFL: Accurate, Differentially Private Federated Learning via Personalized Data Transformation | Yuchen Yang, Bo Hui, Haolin Yuan, Neil Gong, Yinzhi Cao |
USENIX Security '23 | Controlled Data Races in Enclaves: Attacks and Detection | Sanchuan Chen, Zhiqiang Lin, Yinqian Zhang |
USENIX Security '23 | BalanceProofs: Maintainable Vector Commitments with Fast Aggregation | Weijie Wang, Annie Ulichney, Charalampos Papamanthou |
USENIX Security '23 | autofz: Automated Fuzzer Composition at Runtime | Yu-Fu Fu, Jaehyuk Lee, Taesoo Kim |
USENIX Security '23 | ICSPatch: Automated Vulnerability Localization and Non-Intrusive Hotpatching in Industrial Control Systems using Data Dependence Graphs | Prashant Hari Narayan Rajput, Constantine Doumanidis, Michail Maniatakos |
USENIX Security '23 | VeriZexe: Decentralized Private Computation with Universal Setup | Alex Luoyuan Xiong, Binyi Chen, Zhenfei Zhang, Benedikt Bünz, Ben Fisch, Fernando Krell, Philippe Camacho |
USENIX Security '23 | MTSan: A Feasible and Practical Memory Sanitizer for Fuzzing COTS Binaries | Xingman Chen, Yinghao Shi, Zheyu Jiang, Yuan Li, Ruoyu Wang, Haixin Duan, Haoyu Wang, Chao Zhang |
USENIX Security '23 | Lessons Lost: Incident Response in the Age of Cyber Insurance and Breach Attorneys | Daniel W. Woods, Rainer Böhme, Josephine Wolff, Daniel Schwarcz |
USENIX Security '23 | NRDelegationAttack: Complexity DDoS attack on DNS Recursive Resolvers | Yehuda Afek, Anat Bremler-Barr, Shani Stajnrod |
USENIX Security '23 | Jinn: Hijacking Safe Programs with Trojans | Komail Dharsee, John Criswell |
USENIX Security '23 | Hiding in Plain Sight: An Empirical Study of Web Application Abuse in Malware | Mingxuan Yao, Jonathan Fuller, Ranjita Pai Kasturi, Saumya Agarwal, Amit Kumar Sikder, Brendan Saltaformaggio |
USENIX Security '23 | CSHER: A System for Compact Storage with HE-Retrieval | Adi Akavia, Neta Oren, Boaz Sapir, Margarita Vald |
USENIX Security '23 | The Case for Learned Provenance Graph Storage Systems | Hailun Ding, Juan Zhai, Dong Deng, Shiqing Ma |
USENIX Security '23 | Understand Users' Privacy Perception and Decision of V2X Communication in Connected Autonomous Vehicles | Zekun Cai, Aiping Xiong |
USENIX Security '23 | Long Live The Honey Badger: Robust Asynchronous DPSS and its Applications | Thomas Yurek, Zhuolun Xiang, Yu Xia, Andrew Miller |
USENIX Security '23 | Automated Cookie Notice Analysis and Enforcement | Rishabh Khandelwal, Asmit Nayak, Hamza Harkous, Kassem Fawaz |
USENIX Security '23 | Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy Labels | Yue Xiao, Zhengyi Li, Yue Qin, Xiaolong Bai, Jiale Guan, Xiaojing Liao, Luyi Xing |
USENIX Security '23 | High Recovery with Fewer Injections: Practical Binary Volumetric Injection Attacks against Dynamic Searchable Encryption | Xianglong Zhang, Wei Wang, Peng Xu, Laurence T. Yang, Kaitai Liang |
USENIX Security '23 | Improving Real-world Password Guessing Attacks via Bi-directional Transformers | Ming Xu, Jitao Yu, Xinyi Zhang, Chuanwang Wang, Shenghao Zhang, Haoqi Wu, Weili Han |
USENIX Security '23 | KextFuzz: Fuzzing macOS Kernel EXTensions on Apple Silicon via Exploiting Mitigations | Tingting Yin, Zicong Gao, Zhenghang Xiao, Zheyu Ma, Min Zheng, Chao Zhang |
USENIX Security '23 | Forming Faster Firmware Fuzzers | |
USENIX Security '23 | AURC: Detecting Errors in Program Code and Documentation | Peiwei Hu, Ruigang Liang, Ying Cao, Kai Chen, Runze Zhang |