USENIX Security '23 | DISTDET: A Cost-Effective Distributed Cyber Threat Detection System | |
USENIX Security '23 | The Impostor Among US(B): Off-Path Injection Attacks on USB Communications | |
USENIX Security '23 | TAP: Transparent and Privacy-Preserving Data Services | |
USENIX Security '23 | CipherH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations | |
USENIX Security '23 | "My Privacy for their Security": Employees' Privacy Perspectives and Expectations when using Enterprise Security Software | |
USENIX Security '23 | Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine Learning | |
USENIX Security '23 | V-Cloak: Intelligibility-, Naturalness- & Timbre-Preserving Real-Time Voice Anonymization | |
USENIX Security '23 | Timeless Timing Attacks and Preload Defenses in Tor's DNS Cache | |
USENIX Security '23 | Content-Type: multipart/oracle - Tapping into Format Oracles in Email End-to-End Encryption | |
USENIX Security '23 | Framing Frames: Bypassing Wi-Fi Encryption by Manipulating Transmit Queues | |
USENIX Security '23 | Formal Analysis and Patching of BLE-SC Pairing | |
USENIX Security '23 | Extending a Hand to Attackers: Browser Privilege Escalation Attacks via Extensions | |
USENIX Security '23 | Exorcising "Wraith": Protecting LiDAR-based Object Detector in Automated Driving System from Appearing Attacks | |
USENIX Security '23 | ZBCAN: A Zero-Byte CAN Defense System | |
USENIX Security '23 | Formal Analysis of Session-Handling in Secure Messaging: Lifting Security from Sessions to Conversations | |
USENIX Security '23 | XCheck: Verifying Integrity of 3D Printed Patient-Specific Devices via Computing Tomography | |
USENIX Security '23 | Formal Analysis of SPDM: Security Protocol and Data Model version 1.2 | |
USENIX Security '23 | Attacks are Forwarded: Breaking the Isolation of MicroVM-based Containers Through Operation Forwarding | |
USENIX Security '23 | X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item Detection | |
USENIX Security '23 | Watch your Watch: Inferring Personality Traits from Wearable Activity Trackers | |
USENIX Security '23 | User Awareness and Behaviors Concerning Encrypted DNS Settings in Web Browsers | |
USENIX Security '23 | Work-From-Home and COVID-19: Trajectories of Endpoint Security Management in a Security Operations Center | |
USENIX Security '23 | Trojan Source: Invisible Vulnerabilities | |
USENIX Security '23 | Ultimate SLH: Taking Speculative Load Hardening to the Next Level | |
USENIX Security '23 | We Really Need to Talk About Session Tickets: A Large-Scale Analysis of Cryptographic Dangers with TLS Session Tickets | |