USENIX Security '23 | How Library IT Staff Navigate Privacy and Security Challenges and Responsibilities | Alan F. Luo, Noel Warford, Samuel Dooley, Rachel Greenstadt, Michelle L. Mazurek, Nora McDonald |
USENIX Security '23 | One Size Does not Fit All: Quantifying the Risk of Malicious App Encounters for Different Android User Profiles | Savino Dambra, Leyla Bilge, Platon Kotzias, Yun Shen, Juan Caballero |
USENIX Security '23 | Secure Floating-Point Training | Deevashwer Rathee, Anwesh Bhattacharya, Divya Gupta, Rahul Sharma, Dawn Song |
USENIX Security '23 | NeuroPots: Realtime Proactive Defense against Bit-Flip Attacks in Neural Networks | Qi Liu, Jieming Yin, Wujie Wen, Chengmo Yang, Shi Sha |
USENIX Security '23 | Access Denied: Assessing Physical Risks to Internet Access Networks | Alexander Marder, Zesen Zhang, Ricky Mok, Ramakrishna Padmanabhan, Bradley Huffaker, Matthew Luckie, Alberto Dainotti, kc claffy, Alex C. Snoeren, Aaron Schulman |
USENIX Security '23 | How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment | Olivier Blazy, Ioana Boureanu, Pascal Lafourcade, Cristina Onete, Léo Robert |
USENIX Security '23 | That Person Moves Like A Car: Misclassification Attack Detection for Autonomous Systems Using Spatiotemporal Consistency | Yanmao Man, Raymond Muller, Ming Li, Z. Berkay Celik, Ryan Gerdes |
USENIX Security '23 | ZBCAN: A Zero-Byte CAN Defense System | Khaled Serag, Rohit Bhatia, Akram Faqih, Muslum Ozgur Ozmen, Vireshwar Kumar, Z. Berkay Celik, Dongyan Xu |
USENIX Security '23 | Jinn: Hijacking Safe Programs with Trojans | Komail Dharsee, John Criswell |
USENIX Security '23 | Pspray: Timing Side-Channel based Linux Kernel Heap Exploitation Technique | Yoochan Lee, Jinhan Kwak, Junesoo Kang, Yuseok Jeon, Byoungyoung Lee |
USENIX Security '23 | A Study of Multi-Factor and Risk-Based Authentication Availability | Anthony Gavazzi, Ryan Williams, Engin Kirda, Long Lu, Andre King, Andy Davis, Tim Leek |
USENIX Security '23 | Pool-Party: Exploiting Browser Resource Pools for Web Tracking | Peter Snyder, Soroush Karami, Arthur Edelstein, Benjamin Livshits, Hamed Haddadi |
USENIX Security '23 | ClepsydraCache -- Preventing Cache Attacks with Time-Based Evictions | Jan Philipp Thoma, Christian Niesler, Dominic Funke, Gregor Leander, Pierre Mayr, Nils Pohl, Lucas Davi, Tim Güneysu |
USENIX Security '23 | Fine-grained Poisoning Attack to Local Differential Privacy Protocols for Mean and Variance Estimation | Xiaoguang Li, Ninghui Li, Wenhai Sun, Neil Zhenqiang Gong, Hui Li |
USENIX Security '23 | Work-From-Home and COVID-19: Trajectories of Endpoint Security Management in a Security Operations Center | Kailani R. Jones, Dalton A. Brucker-Hahn, Bradley Fidler, Alexandru G. Bardas |
USENIX Security '23 | Humans vs. Machines in Malware Classification | Simone Aonzo, Yufei Han, Alessandro Mantovani, Davide Balzarotti |
USENIX Security '23 | MTSan: A Feasible and Practical Memory Sanitizer for Fuzzing COTS Binaries | Xingman Chen, Yinghao Shi, Zheyu Jiang, Yuan Li, Ruoyu Wang, Haixin Duan, Haoyu Wang, Chao Zhang |
USENIX Security '23 | Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks | Jialai Wang, Ziyuan Zhang, Meiqi Wang, Han Qiu, Tianwei Zhang, Qi Li, Zongpeng Li, Tao Wei, Chao Zhang |
USENIX Security '23 | Lessons Lost: Incident Response in the Age of Cyber Insurance and Breach Attorneys | Daniel W. Woods, Rainer Böhme, Josephine Wolff, Daniel Schwarcz |
USENIX Security '23 | Bug Hunters’ Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem | Omer Akgul, Taha Eghtesad, Amit Elazari, Omprakash Gnawali, Jens Grossklags, Michelle L. Mazurek, Daniel Votipka, Aron Laszka |
USENIX Security '23 | ProSpeCT: Provably Secure Speculation for the Constant-Time Policy | Lesly-Ann Daniel, Marton Bognar, Job Noorman, Sébastien Bardin, Tamara Rezk, Frank Piessens |
USENIX Security '23 | IvySyn: Automated Vulnerability Discovery in Deep Learning Frameworks | Neophytos Christou, Di Jin, Vaggelis Atlidakis, Baishakhi Ray, Vasileios P. Kemerlis |
USENIX Security '23 | UnGANable: Defending Against GAN-based Face Manipulation | Zheng Li, Ning Yu, Ahmed Salem, Michael Backes, Mario Fritz, Yang Zhang |
USENIX Security '23 | Fairness Properties of Face Recognition and Obfuscation Systems | Harrison Rosenberg, Brian Tang, Kassem Fawaz, Somesh Jha |
USENIX Security '23 | GlitchHiker: Uncovering Vulnerabilities of Image Signal Transmission with IEMI | Qinhong Jiang, Xiaoyu Ji, Chen Yan, Zhixin Xie, Haina Lou, Wenyuan Xu |