USENIX Security '23 | AIRS: Explanation for Deep Reinforcement Learning based Security Applications | Jiahao Yu, Wenbo Guo, Qi Qin, Gang Wang, Ting Wang, Xinyu Xing |
USENIX Security '23 | Multiview: Finding Blind Spots in Access-Deny Issues Diagnosis | Bingyu Shen, Tianyi Shan, Yuanyuan Zhou |
USENIX Security '23 | Attacks are Forwarded: Breaking the Isolation of MicroVM-based Containers Through Operation Forwarding | Jietao Xiao, Nanzi Yang, Wenbo Shen, Jinku Li, Xin Guo, Zhiqiang Dong, Fei Xie, Jianfeng Ma |
USENIX Security '23 | NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems | Zixuan Wang, Mohammadkazem Taram, Daniel Moghimi, Steven Swanson, Dean Tullsen, Jishen Zhao |
USENIX Security '23 | PROVIDENCE: a Flexible Round-by-Round Risk-Limiting Audit | Oliver Broadrick, Poorvi Vora, Filip Zagórski |
USENIX Security '23 | Strategies and Vulnerabilities of Participants in Venezuelan Influence Operations | Ruben Recabarren, Bogdan Carbunar, Nestor Hernandez, Ashfaq Ali Shafin |
USENIX Security '23 | Formal Analysis of SPDM: Security Protocol and Data Model version 1.2 | Cas Cremers, Alexander Dax, Aurora Naska |
USENIX Security '23 | Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine Learning | Jonathan Prokos, Neil Fendley, Matthew Green, Roei Schuster, Eran Tromer, Tushar Jois, Yinzhi Cao |
USENIX Security '23 | DISTDET: A Cost-Effective Distributed Cyber Threat Detection System | Feng Dong, Liu Wang, Xu Nie, Fei Shao, Haoyu Wang, Ding Li, Xiapu Luo, Xusheng Xiao |
USENIX Security '23 | VulChecker: Graph-based Vulnerability Localization in Source Code | Yisroel Mirsky, George Macon, Michael Brown, Carter Yagemann, Matthew Pruett, Evan Downing, Sukarno Mertoguno, Wenke Lee |
USENIX Security '23 | Machine-checking Multi-Round Proofs of Shuffle: Terelius-Wikstrom and Bayer-Groth | Thomas Haines, Rajeev Gore, Mukesh Tiwari |
USENIX Security '23 | Gradient Obfuscation Gives a False Sense of Security in Federated Learning | Kai Yue, Richeng Jin, Chau-Wai Wong, Dror Baron, Huaiyu Dai |
USENIX Security '23 | AURC: Detecting Errors in Program Code and Documentation | Peiwei Hu, Ruigang Liang, Ying Cao, Kai Chen, Runze Zhang |
USENIX Security '23 | Araña: Discovering and Characterizing Password Guessing Attacks in Practice | Mazharul Islam, Marina Sanusi Bohuk, Paul Chung, Thomas Ristenpart, Rahul Chatterjee |
USENIX Security '23 | PhyAuth: Physical-Layer Message Authentication for ZigBee Networks | Ang Li, Jiawei Li, Dianqi Han, Yan Zhang, Tao Li, Ting Zhu, Yanchao Zhang |
USENIX Security '23 | Log: It’s Big, It’s Heavy, It’s Filled with Personal Data! Measuring the Logging of Sensitive Information in the Android Ecosystem | Allan Lyons, Julien Gamba, Austin Shawaga, Joel Reardon, Juan Tapiador, Serge Egelman, Narseo Vallina-Rodriguez |
USENIX Security '23 | Linear Private Set Union from Multi-Query Reverse Private Membership Test | Cong Zhang, Yu Chen, Weiran Liu, Min Zhang, Dongdai Lin |
USENIX Security '23 | PolyFuzz: Holistic Greybox Fuzzing of Multi-Language Systems | Wen Li, Jinyang Ruan, Guangbei Yi, Long Cheng, Xiapu Luo, Haipeng Cai |
USENIX Security '23 | “Security is not my field, I’m a stats guy”: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry | Jaron Mink, Harjot Kaur, Juliane Schmüser, Sascha Fahl, Yasemin Acar |
USENIX Security '23 | Intender: Fuzzing Intent-Based Networking with Intent-State Transition Guidance | Jiwon Kim, Benjamin E. Ujcich, Dave (Jing) Tian |
USENIX Security '23 | Inducing Authentication Failures to Bypass Credit Card PINs | David Basin, Patrick Schaller, Jorge Toro-Pozo |
USENIX Security '23 | Place Your Locks Well: Understanding and Detecting Lock Misuse Bugs | Yuandao Cai, Peisen Yao, Chengfeng Ye, Charles Zhang |
USENIX Security '23 | Token Spammers, Rug Pulls, and Sniper Bots: An Analysis of the Ecosystem of Tokens in Ethereum and in the Binance Smart Chain (BNB) | Federico Cernera, Massimo La Morgia, Alessandro Mei, Francesco Sassi |
USENIX Security '23 | Sherlock on Specs: Building LTE Conformance Tests through Automated Reasoning | Yi Chen, Di Tang, Yepeng Yao, Mingming Zha, XiaoFeng Wang, Xiaozhong Liu, Haixu Tang, Baoxu Liu |
USENIX Security '23 | Timeless Timing Attacks and Preload Defenses in Tor's DNS Cache | Rasmus Dahlberg, Tobias Pulls |