USENIX Security '23 | A Data-free Backdoor Injection Approach in Neural Networks | Peizhuo Lv, Chang Yue, Ruigang Liang, Yunfei Yang, Shengzhi Zhang, Hualong Ma, Kai Chen |
USENIX Security '23 | HECO: Fully Homomorphic Encryption Compiler | Alexander Viand, Patrick Jattke, Miro Haller, Anwar Hithnawi |
USENIX Security '23 | Automated Exploitable Heap Layout Generation for Heap Overflows Through Manipulation Distance-Guided Fuzzing | Bin Zhang, Jiongyi Chen, Runhao Li, Chao Feng, Ruilin Li, Chaojing Tang |
USENIX Security '23 | Attacks are Forwarded: Breaking the Isolation of MicroVM-based Containers Through Operation Forwarding | Jietao Xiao, Nanzi Yang, Wenbo Shen, Jinku Li, Xin Guo, Zhiqiang Dong, Fei Xie, Jianfeng Ma |
USENIX Security '23 | NAUTILUS: Automated RESTful API Vulnerability Detection | Gelei Deng, Zhiyi Zhang, Yuekang Li, Yi Liu, Tianwei Zhang, Yang Liu, Guo Yu, Dongjin Wang |
USENIX Security '23 | An Input-Agnostic Hierarchical Deep Learning Framework for Traffic Fingerprinting | Jian Qu, Xiaobo Ma, Jianfeng Li, Xiapu Luo, Lei Xue, Junjie Zhang, Zhenhua Li, Li Feng, Xiaohong Guan |
USENIX Security '23 | Pass2Edit: A Multi-Step Generative Model for Guessing Edited Passwords | Ding Wang, Yunkai Zou, Yuan-An Xiao, Siqi Ma, Xiaofeng Chen |
USENIX Security '23 | PROVIDENCE: a Flexible Round-by-Round Risk-Limiting Audit | Oliver Broadrick, Poorvi Vora, Filip Zagórski |
USENIX Security '23 | Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software | Jan Wichelmann, Anna Pätschke, Luca Wilke, Thomas Eisenbarth |
USENIX Security '23 | Subverting Website Fingerprinting Defenses with Robust Traffic Representation | Meng Shen, Kexin Ji, Zhenbo Gao, Qi Li, Liehuang Zhu, Ke Xu |
USENIX Security '23 | User Awareness and Behaviors Concerning Encrypted DNS Settings in Web Browsers | Alexandra Nisenoff, Ranya Sharma, Nick Feamster |
USENIX Security '23 | It's all in your head(set): Side-channel attacks on AR/VR systems | Yicheng Zhang, Carter Slocum, Jiasi Chen, Nael Abu-Ghazaleh |
USENIX Security '23 | Work-From-Home and COVID-19: Trajectories of Endpoint Security Management in a Security Operations Center | Kailani R. Jones, Dalton A. Brucker-Hahn, Bradley Fidler, Alexandru G. Bardas |
USENIX Security '23 | Adversarial Training for Raw-Binary Malware Classifiers | Keane Lucas, Samruddhi Pai, Weiran Lin, Lujo Bauer, Michael K. Reiter, Mahmood Sharif |
USENIX Security '23 | ELASM: Error-Latency-Aware Scale Management for Fully Homomorphic Encryption | Yongwoo Lee, Seonyoung Cheon, Dongkwan Kim, Dongyoon Lee, Hanjun Kim |
USENIX Security '23 | Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse | Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Danny Yuxing Huang, Rahul Chatterjee |
USENIX Security '23 | Trojan Source: Invisible Vulnerabilities | Nicholas Boucher, Ross Anderson |
USENIX Security '23 | ARMore: Pushing Love Back Into Binaries | Luca Di Bartolomeo, Hossein Moghaddas, Mathias Payer |
USENIX Security '23 | ProSpeCT: Provably Secure Speculation for the Constant-Time Policy | Lesly-Ann Daniel, Marton Bognar, Job Noorman, Sébastien Bardin, Tamara Rezk, Frank Piessens |
USENIX Security '23 | Exorcising "Wraith": Protecting LiDAR-based Object Detector in Automated Driving System from Appearing Attacks | Qifan Xiao, Xudong Pan, Yifan Lu, Mi Zhang, Jiarun Dai, Min Yang |
USENIX Security '23 | GAP: Differentially Private Graph Neural Networks with Aggregation Perturbation | Sina Sajadmanesh, Ali Shahin Shamsabadi, Aurélien Bellet, Daniel Gatica-Perez |
USENIX Security '23 | SandDriller: A Fully-Automated Approach for Testing Language-Based JavaScript Sandboxes | Abdullah AlHamdan, Cristian-Alexandru Staicu |
USENIX Security '23 | Catch You and I Can: Revealing Source Voiceprint Against Voice Conversion | Jiangyi Deng, Yanjiao Chen, Yinan Zhong, Qianhao Miao, Xueluan Gong, Wenyuan Xu |
USENIX Security '23 | How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic | Mingshi Wu, Jackson Sippe, Danesh Sivakumar, Jack Burg, Peter Anderson, Xiaokang Wang, Kevin Bock, Amir Houmansadr, Dave Levin, Eric Wustrow |
USENIX Security '23 | Pool-Party: Exploiting Browser Resource Pools for Web Tracking | Peter Snyder, Soroush Karami, Arthur Edelstein, Benjamin Livshits, Hamed Haddadi |