USENIX Security '23 | Attacks are Forwarded: Breaking the Isolation of MicroVM-based Containers Through Operation Forwarding | Jietao Xiao, Nanzi Yang, Wenbo Shen, Jinku Li, Xin Guo, Zhiqiang Dong, Fei Xie, Jianfeng Ma |
USENIX Security '23 | NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems | Zixuan Wang, Mohammadkazem Taram, Daniel Moghimi, Steven Swanson, Dean Tullsen, Jishen Zhao |
USENIX Security '23 | PROVIDENCE: a Flexible Round-by-Round Risk-Limiting Audit | Oliver Broadrick, Poorvi Vora, Filip Zagórski |
USENIX Security '23 | Strategies and Vulnerabilities of Participants in Venezuelan Influence Operations | Ruben Recabarren, Bogdan Carbunar, Nestor Hernandez, Ashfaq Ali Shafin |
USENIX Security '23 | Formal Analysis of SPDM: Security Protocol and Data Model version 1.2 | Cas Cremers, Alexander Dax, Aurora Naska |
USENIX Security '23 | DISTDET: A Cost-Effective Distributed Cyber Threat Detection System | Feng Dong, Liu Wang, Xu Nie, Fei Shao, Haoyu Wang, Ding Li, Xiapu Luo, Xusheng Xiao |
USENIX Security '23 | VulChecker: Graph-based Vulnerability Localization in Source Code | Yisroel Mirsky, George Macon, Michael Brown, Carter Yagemann, Matthew Pruett, Evan Downing, Sukarno Mertoguno, Wenke Lee |
USENIX Security '23 | Machine-checking Multi-Round Proofs of Shuffle: Terelius-Wikstrom and Bayer-Groth | Thomas Haines, Rajeev Gore, Mukesh Tiwari |
USENIX Security '23 | Gradient Obfuscation Gives a False Sense of Security in Federated Learning | Kai Yue, Richeng Jin, Chau-Wai Wong, Dror Baron, Huaiyu Dai |
USENIX Security '23 | AURC: Detecting Errors in Program Code and Documentation | Peiwei Hu, Ruigang Liang, Ying Cao, Kai Chen, Runze Zhang |
USENIX Security '23 | Araña: Discovering and Characterizing Password Guessing Attacks in Practice | Mazharul Islam, Marina Sanusi Bohuk, Paul Chung, Thomas Ristenpart, Rahul Chatterjee |
USENIX Security '23 | PhyAuth: Physical-Layer Message Authentication for ZigBee Networks | Ang Li, Jiawei Li, Dianqi Han, Yan Zhang, Tao Li, Ting Zhu, Yanchao Zhang |
USENIX Security '23 | Log: It’s Big, It’s Heavy, It’s Filled with Personal Data! Measuring the Logging of Sensitive Information in the Android Ecosystem | Allan Lyons, Julien Gamba, Austin Shawaga, Joel Reardon, Juan Tapiador, Serge Egelman, Narseo Vallina-Rodriguez |
USENIX Security '23 | “Security is not my field, I’m a stats guy”: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry | Jaron Mink, Harjot Kaur, Juliane Schmüser, Sascha Fahl, Yasemin Acar |
USENIX Security '23 | Intender: Fuzzing Intent-Based Networking with Intent-State Transition Guidance | Jiwon Kim, Benjamin E. Ujcich, Dave (Jing) Tian |
USENIX Security '23 | Inducing Authentication Failures to Bypass Credit Card PINs | David Basin, Patrick Schaller, Jorge Toro-Pozo |
USENIX Security '23 | Place Your Locks Well: Understanding and Detecting Lock Misuse Bugs | Yuandao Cai, Peisen Yao, Chengfeng Ye, Charles Zhang |
USENIX Security '23 | Token Spammers, Rug Pulls, and Sniper Bots: An Analysis of the Ecosystem of Tokens in Ethereum and in the Binance Smart Chain (BNB) | Federico Cernera, Massimo La Morgia, Alessandro Mei, Francesco Sassi |
USENIX Security '23 | Sherlock on Specs: Building LTE Conformance Tests through Automated Reasoning | Yi Chen, Di Tang, Yepeng Yao, Mingming Zha, XiaoFeng Wang, Xiaozhong Liu, Haixu Tang, Baoxu Liu |
USENIX Security '23 | Timeless Timing Attacks and Preload Defenses in Tor's DNS Cache | Rasmus Dahlberg, Tobias Pulls |
USENIX Security '23 | Investigating Verification Behavior and Perceptions of Visual Digital Certificates | Dañiel Gerhardt, Alexander Ponticello, Adrian Dabrowski, Katharina Krombholz |
USENIX Security '23 | The Role of Professional Product Reviewers in Evaluating Security and Privacy | Wentao Guo, Jason Walter, Michelle L. Mazurek |
USENIX Security '23 | Fourteen Years in the Life: A Root Server’s Perspective on DNS Resolver Security | Alden Hilton, Casey Deccio, Jacob Davis |
USENIX Security '23 | KextFuzz: Fuzzing macOS Kernel EXTensions on Apple Silicon via Exploiting Mitigations | Tingting Yin, Zicong Gao, Zhenghang Xiao, Zheyu Ma, Min Zheng, Chao Zhang |
USENIX Security '23 | HOMESPY: The Invisible Sniffer of Infrared Remote Control of Smart TVs | Kong Huang, YuTong Zhou, Ke Zhang, Jiacen Xu, Jiongyi Chen, Di Tang, Kehuan Zhang |