USENIX Security '23 | Sherlock on Specs: Building LTE Conformance Tests through Automated Reasoning | Yi Chen, Di Tang, Yepeng Yao, Mingming Zha, XiaoFeng Wang, Xiaozhong Liu, Haixu Tang, Baoxu Liu |
USENIX Security '23 | ACon^2: Adaptive Conformal Consensus for Provable Blockchain Oracles | Sangdon Park, Osbert Bastani, Taesoo Kim |
USENIX Security '23 | A Research Framework and Initial Study of Browser Security for the Visually Impaired | Elaine Lau, Zachary Peterson |
USENIX Security '23 | DynSQL: Stateful Fuzzing for Database Management Systems with Complex and Valid SQL Query Generation | Zu-Ming Jiang, Jia-Ju Bai, Zhendong Su |
USENIX Security '23 | xNIDS: Explaining Deep Learning-based Network Intrusion Detection Systems for Active Intrusion Responses | Feng Wei, Hongda Li, Ziming Zhao, Hongxin Hu |
USENIX Security '23 | Remote Attacks on Speech Recognition Systems Using Sound from Power Supply | Lanqing Yang, Xinqi Chen, Xiangyong Jian, Leping Yang, Yijie Li, Qianfei Ren, Yi-Chao Chen, Guangtao Xue, Xiaoyu Ji |
USENIX Security '23 | HOMESPY: The Invisible Sniffer of Infrared Remote Control of Smart TVs | Kong Huang, YuTong Zhou, Ke Zhang, Jiacen Xu, Jiongyi Chen, Di Tang, Kehuan Zhang |
USENIX Security '23 | “If sighted people know, I should be able to know:” Privacy Perceptions of Bystanders with Visual Impairments around Camera-based Technology | Yuhang Zhao, Yaxing Yao, Jiaru Fu, Nihan Zhou |
USENIX Security '23 | AIFORE: Smart Fuzzing Based on Automatic Input Format Reverse Engineering | Ji Shi, Zhun Wang, Zhiyao Feng, Yang Lan, Shisong Qin, Wei You, Wei Zou, Mathias Payer, Chao Zhang |
USENIX Security '23 | Bleem: Packet Sequence Oriented Fuzzing for Protocol Implementations | Zhengxiong Luo, Junze Yu, Feilong Zuo, Jianzhong Liu, Yu Jiang, Ting Chen, Abhik Roychoudhury, Jiaguang Sun |
USENIX Security '23 | MINER: A Hybrid Data-Driven Approach for REST API Fuzzing | Chenyang Lyu, Jiacheng Xu, Shouling Ji, Xuhong Zhang, Qinying Wang, Binbin Zhao, Gaoning Pan, Wei Cao, Peng Chen, Raheem Beyah |
USENIX Security '23 | PROGRAPHER: An Anomaly Detection System based on Provenance Graph Embedding | Fan Yang, Jiacen Xu, Chunlin Xiong, Zhou Li, Kehuan Zhang |
USENIX Security '23 | VeriZexe: Decentralized Private Computation with Universal Setup | Alex Luoyuan Xiong, Binyi Chen, Zhenfei Zhang, Benedikt Bünz, Ben Fisch, Fernando Krell, Philippe Camacho |
USENIX Security '23 | CSHER: A System for Compact Storage with HE-Retrieval | Adi Akavia, Neta Oren, Boaz Sapir, Margarita Vald |
USENIX Security '23 | ELASM: Error-Latency-Aware Scale Management for Fully Homomorphic Encryption | Yongwoo Lee, Seonyoung Cheon, Dongkwan Kim, Dongyoon Lee, Hanjun Kim |
USENIX Security '23 | Near-Ultrasound Inaudible Trojan (Nuit): Exploiting Your Speaker to Attack Your Microphone | Qi Xia, Qian Chen, Shouhuai Xu |
USENIX Security '23 | Intender: Fuzzing Intent-Based Networking with Intent-State Transition Guidance | Jiwon Kim, Benjamin E. Ujcich, Dave (Jing) Tian |
USENIX Security '23 | We Really Need to Talk About Session Tickets: A Large-Scale Analysis of Cryptographic Dangers with TLS Session Tickets | Sven Hebrok, Simon Nachtigall, Marcel Maehren, Nurullah Erinola, Robert Merget, Juraj Somorovsky, Jörg Schwenk |
USENIX Security '23 | ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks | Phillip Rieger, Marco Chilese, Reham Mohamed, Markus Miettinen, Hossein Fereidooni, Ahmad-Reza Sadeghi |
USENIX Security '23 | HOLMES: Efficient Distribution Testing for Secure Collaborative Learning | Ian Chang, Katerina Sotiraki, Weikeng Chen, Murat Kantarcioglu, Raluca Popa |
USENIX Security '23 | BalanceProofs: Maintainable Vector Commitments with Fast Aggregation | Weijie Wang, Annie Ulichney, Charalampos Papamanthou |
USENIX Security '23 | DiffSmooth: Certifiably Robust Learning via Diffusion Models and Local Smoothing | Jiawei Zhang, Zhongzhu Chen, Huan Zhang, Chaowei Xiao, Bo Li |
USENIX Security '23 | Automated Exploitable Heap Layout Generation for Heap Overflows Through Manipulation Distance-Guided Fuzzing | Bin Zhang, Jiongyi Chen, Runhao Li, Chao Feng, Ruilin Li, Chaojing Tang |
USENIX Security '23 | V-Cloak: Intelligibility-, Naturalness- & Timbre-Preserving Real-Time Voice Anonymization | Jiangyi Deng, Fei Teng, Yanjiao Chen, Xiaofu Chen, Zhaohui Wang, Wenyuan Xu |
USENIX Security '23 | The Impostor Among US(B): Off-Path Injection Attacks on USB Communications | Robert Dumitru, Daniel Genkin, Andrew Wabnitz, Yuval Yarom |